Abstract: The development of renewable energies - particularly energy from wind, water, solar power and biomass - is a central aim of the European Commission's energy policy. There are several reasons for this choice: renewable energies are sustainable, nonpolluting, widely available and clean. Increasing the share of renewable energy in the energy balance enhances sustainability. It also helps to improve the security of energy supply by reducing the Community's growing dependence on imported energy sources.In this paper it was studied the possibility to realize three photovoltaic systems in the Italian Natural Park “Gola della Rossa e di Frasassi". The first photovoltaic system is a grid-connected system for Services and Documentation Center of Castelletta with a nominal power of about 6 kWp. The second photovoltaic system is a grid-connected integrated system on the ticket office-s roof with a nominal power of about 4 kWp. The third project is set up by five grid-connected systems integrated on the roofs of the bungalows in Natural Park-s tourist camping with a nominal power of about 10 kWp. The electricity which is generated by all these plants is purchased according to the Italian program called “Conto Energia". Economical analysis and the amount of the avoided CO2 emissions are elaborated for these photovoltaic systems.
Abstract: Information and communication technology (ICT) has
become, within a very short time, one of the basic building blocks of
modern society. Many countries now understanding the importance
of ICT and mastering the basic skills and concepts of it as part of the
core of education. Organizations, experts and practitioners in the
education sector increasingly recognizing the importance of ICT in
supporting educational improvement and reform. This paper
addresses the convergence of ICT and education. When two
technologies are converging to each other, together they will generate
some great opportunities and challenges. This paper focuses on these
issues. In introduction section, it explains the ICT, education, and
ICT-enhanced education. In next section it describes need of ICT in
education, relationship between ICT skills and education, and stages
of teaching learning process. The next two sections describe
opportunities and challenges in integrating ICT in education. Finally
the concluding section summaries the idea and its usefulness.
Abstract: The European countries that during the past two
decades based their exchange rate regimes on currency board
arrangement (CBA) are usually analysed from the perspective of
corner solution choice’s stabilisation effects. There is an open
discussion on the positive and negative background of a strict
exchange rate regime choice, although it should be seen as part of the
transition process towards the monetary union membership. The
focus of the paper is on the Baltic countries that after two decades of
a rigid exchange rate arrangement and strongly influenced by global
crisis are finishing their path towards the euro zone. Besides the
stabilising capacity, the CBA is highly vulnerable regime, with
limited developing potential. The rigidity of the exchange rate (and
monetary) system, despite the ensured credibility, do not leave
enough (or any) space for the adjustment and/or active crisis
management. Still, the Baltics are in a process of recovery, with fiscal
consolidation measures combined with (painful and politically
unpopular) measures of internal devaluation. Today, two of them
(Estonia and Latvia) are members of euro zone, fulfilling their
ultimate transition targets, but de facto exchanging one fixed regime
with another.
The paper analyses the challenges for the CBA in unstable
environment since the fixed regimes rely on imported stability and
are sensitive to external shocks. With limited monetary instruments,
these countries were oriented to the fiscal policies and used a
combination of internal devaluation and tax policy measures. Despite
their rather quick recovery, our second goal is to analyse the long
term influence that the measures had on the national economy.
Abstract: The paper shows that in the analysis of a queuing system with fixed-size batch arrivals, there emerges a set of polynomials which are a generalization of Chebyshev polynomials of the second kind. The paper uses these polynomials in assessing the transient behaviour of the overflow (equivalently call blocking) probability in the system. A key figure to note is the proportion of the overflow (or blocking) probability resident in the transient component, which is shown in the results to be more significant at the beginning of the transient and naturally decays to zero in the limit of large t. The results also show that the significance of transients is more pronounced in cases of lighter loads, but lasts longer for heavier loads.
Abstract: This work presents a novel means of extracting fixedlength parameters from voice signals, such that words can be recognized
in linear time. The power and the zero crossing rate are first
calculated segment by segment from a voice signal; by doing so, two
feature sequences are generated. We then construct an FIR system
across these two sequences. The parameters of this FIR system, used
as the input of a multilayer proceptron recognizer, can be derived by
recursive LSE (least-square estimation), implying that the complexity of overall process is linear to the signal size. In the second part of
this work, we introduce a weighting factor λ to emphasize recent
input; therefore, we can further recognize continuous speech signals.
Experiments employ the voice signals of numbers, from zero to nine, spoken in Mandarin Chinese. The proposed method is verified to
recognize voice signals efficiently and accurately.
Abstract: This paper presents a comparative study on two most
popular control strategies for Permanent Magnet Synchronous Motor
(PMSM) drives: field-oriented control (FOC) and direct torque
control (DTC). The comparison is based on various criteria including
basic control characteristics, dynamic performance, and
implementation complexity. The study is done by simulation using
the Simulink Power System Blockset that allows a complete
representation of the power section (inverter and PMSM) and the
control system. The simulation and evaluation of both control
strategies are performed using actual parameters of Permanent
Magnet Synchronous Motor fed by an IGBT PWM inverter.
Abstract: In this paper, the finite-time stabilization of a class of multi-state time delay of fractional-order system is proposed. First, we define finite-time stability with the fractional-order system. Second, by using Generalized Gronwall's approach and the methods of the inequality, we get some conditions of finite-time stability for the fractional system with multi-state delay. Finally, a numerical example is given to illustrate the result.
Abstract: The service sector continues to grow and the percentage
of GDP accounted for by service industries keeps increasing. The
growth and importance of service to an economy is not just a
phenomenon of advanced economies, service is now a majority of the
world gross domestic products. However, the performance evaluation
process of new service development problems generally involves
uncertain and imprecise data. This paper presents a 2-tuple fuzzy
linguistic computing approach to dealing with heterogeneous
information and information loss problems while the processes of
subjective evaluation integration. The proposed method based on group
decision-making scenario to assist business managers in measuring
performance of new service development manipulates the
heterogeneity integration processes and avoids the information loss
effectively.
Abstract: The main purpose of this research was to analyze Socio-Cultural obstacles of disseminating of nanotechnology in Iran's agricultural section. One hundred twenty eight out of a total of 190 researchers with different levels of expertise in and familiarity with nanotechnology were randomly selected and questionnaires completed by them. Face validity have been done by expert's suggestion and correction, reliability by using Cronbakh-Alpha formula. The results of a factor analysis showed variation for different factors. For cultural factors 19/475 percent, for management 13/139 percent, information factor 11/277 percent, production factor 9/703 percent, social factor 9/267 percent, and for attitude factor it became 8/947 percent. Also results indicated that socio-cultural factors were the most important obstacle for nanotechnology dissemination in agricultural section in Iran.
Abstract: The urbanization phenomenon in Yogyakarta Special
Province, Indonesia, encouraged people move to the city for getting
jobs in the informal sectors. They live in some temporary houses in
the three main riverbanks: Gadjahwong, Code, and Winongo.
Triggered by its independent status they use it as the space for
accommodating domestic, social and economy activities because of
the non standardized room size of their houses, where are recognized
as the environmental hazards. This recognition makes the ambivalent
perception when was related to the twelfth point of the philosophy of
community development concept: the empowering individuals and
communities. Its spatial implication have actually described the
territory and the place making phenomena. By analyzing some data
collected the author-s fundamental research funded by The General
Directorate of Higher Education of Indonesia, this paper will discuss
how do the spatial implications of the occupants- behavior and the
numerous perceptions of those phenomena.
Abstract: Access control is a critical security service in Wire- less
Sensor Networks (WSNs). To prevent malicious nodes from joining
the sensor network, access control is required. On one hand, WSN
must be able to authorize and grant users the right to access to the
network. On the other hand, WSN must organize data collected by
sensors in such a way that an unauthorized entity (the adversary)
cannot make arbitrary queries. This restricts the network access only
to eligible users and sensor nodes, while queries from outsiders will
not be answered or forwarded by nodes. In this paper we presentee
different access control schemes so as to ?nd out their objectives,
provision, communication complexity, limits, etc. Using the node
density parameter, we also provide a comparison of these proposed
access control algorithms based on the network topology which can
be flat or hierarchical.
Abstract: The scope of this research was to study the relation between the facial expressions of three lecturers in a real academic lecture theatre and the reactions of the students to those expressions. The first experiment aimed to investigate the effectiveness of a virtual lecturer-s expressions on the students- learning outcome in a virtual pedagogical environment. The second experiment studied the effectiveness of a single facial expression, i.e. the smile, on the students- performance. Both experiments involved virtual lectures, with virtual lecturers teaching real students. The results suggest that the students performed better by 86%, in the lectures where the lecturer performed facial expressions compared to the results of the lectures that did not use facial expressions. However, when simple or basic information was used, the facial expressions of the virtual lecturer had no substantial effect on the students- learning outcome. Finally, the appropriate use of smiles increased the interest of the students and consequently their performance.
Abstract: This paper describes a new supervised fusion (hybrid)
electrocardiogram (ECG) classification solution consisting of a new
QRS complex geometrical feature extraction as well as a new version
of the learning vector quantization (LVQ) classification algorithm
aimed for overcoming the stability-plasticity dilemma. Toward this
objective, after detection and delineation of the major events of ECG
signal via an appropriate algorithm, each QRS region and also its
corresponding discrete wavelet transform (DWT) are supposed as
virtual images and each of them is divided into eight polar sectors.
Then, the curve length of each excerpted segment is calculated
and is used as the element of the feature space. To increase the
robustness of the proposed classification algorithm versus noise,
artifacts and arrhythmic outliers, a fusion structure consisting of
five different classifiers namely as Support Vector Machine (SVM),
Modified Learning Vector Quantization (MLVQ) and three Multi
Layer Perceptron-Back Propagation (MLP–BP) neural networks with
different topologies were designed and implemented. The new proposed
algorithm was applied to all 48 MIT–BIH Arrhythmia Database
records (within–record analysis) and the discrimination power of the
classifier in isolation of different beat types of each record was
assessed and as the result, the average accuracy value Acc=98.51%
was obtained. Also, the proposed method was applied to 6 number
of arrhythmias (Normal, LBBB, RBBB, PVC, APB, PB) belonging
to 20 different records of the aforementioned database (between–
record analysis) and the average value of Acc=95.6% was achieved.
To evaluate performance quality of the new proposed hybrid learning
machine, the obtained results were compared with similar peer–
reviewed studies in this area.
Abstract: Atrial Fibrillation is the most common sustained
arrhythmia encountered by clinicians. Because of the invisible
waveform of atrial fibrillation in atrial activation for human, it is
necessary to develop an automatic diagnosis system. 12-Lead ECG
now is available in hospital and is appropriate for using Independent
Component Analysis to estimate the AA period. In this research, we
also adopt a second-order blind identification approach to transform
the sources extracted by ICA to more precise signal and then we use
frequency domain algorithm to do the classification. In experiment,
we gather a significant result of clinical data.
Abstract: The main goal of the present work is to decrease the
computational burden for optimum design of steel frames with
frequency constraints using a new type of neural networks called
Wavelet Neural Network. It is contested to train a suitable neural
network for frequency approximation work as the analysis program.
The combination of wavelet theory and Neural Networks (NN)
has lead to the development of wavelet neural networks.
Wavelet neural networks are feed-forward networks using
wavelet as activation function. Wavelets are mathematical
functions within suitable inner parameters, which help them to
approximate arbitrary functions. WNN was used to predict the
frequency of the structures. In WNN a RAtional function with
Second order Poles (RASP) wavelet was used as a transfer
function. It is shown that the convergence speed was faster
than other neural networks. Also comparisons of WNN with
the embedded Artificial Neural Network (ANN) and with
approximate techniques and also with analytical solutions are
available in the literature.
Abstract: Phishing, or stealing of sensitive information on the
web, has dealt a major blow to Internet Security in recent times. Most
of the existing anti-phishing solutions fail to handle the fuzziness
involved in phish detection, thus leading to a large number of false
positives. This fuzziness is attributed to the use of highly flexible and
at the same time, highly ambiguous HTML language. We introduce a
new perspective against phishing, that tries to systematically prove,
whether a given page is phished or not, using the corresponding
original page as the basis of the comparison. It analyzes the layout of
the pages under consideration to determine the percentage distortion
between them, indicative of any form of malicious alteration. The
system design represents an intelligent system, employing dynamic
assessment which accurately identifies brand new phishing attacks
and will prove effective in reducing the number of false positives.
This framework could potentially be used as a knowledge base, in
educating the internet users against phishing.
Abstract: Recently there has been a growing interest in the field
of bio-mimetic robots that resemble the behaviors of an insect or an
aquatic animal, among many others. One of various bio-mimetic robot
applications is to explore pipelines, spotting any troubled areas or
malfunctions and reporting its data. Moreover, the robot is able to
prepare for and react to any abnormal routes in the pipeline. Special
types of mobile robots are necessary for the pipeline monitoring tasks.
In order to move effectively along a pipeline, the robot-s movement
will resemble that of insects or crawling animals. When situated in
massive pipelines with complex routes, the robot places fixed sensors
in several important spots in order to complete its monitoring. This
monitoring task is to prevent a major system failure by preemptively
recognizing any minor or partial malfunctions. Areas uncovered by
fixed sensors are usually impossible to provide real-time observation
and examination, and thus are dependent on periodical offline
monitoring. This paper proposes a monitoring system that is able to
monitor the entire area of pipelines–with and without fixed
sensors–by using the bio-mimetic robot.
Abstract: Emergence of smartphones brings to live the concept
of converged devices with the availability of web amenities. Such
trend also challenges the mobile devices manufactures and service
providers in many aspects, such as security on mobile phones,
complex and long time design flow, as well as higher development
cost. Among these aspects, security on mobile phones is getting more
and more attention. Microkernel based virtualization technology will
play a critical role in addressing these challenges and meeting mobile
market needs and preferences, since virtualization provides essential
isolation for security reasons and it allows multiple operating systems
to run on one processor accelerating development and cutting development
cost. However, virtualization benefits do not come for free.
As an additional software layer, it adds some inevitable virtualization
overhead to the system, which may decrease the system performance.
In this paper we evaluate and analyze the virtualization performance
cost of L4 microkernel based virtualization on a competitive mobile
phone by comparing the L4Linux, a para-virtualized Linux on top of
L4 microkernel, with the native Linux performance using lmbench
and a set of typical mobile phone applications.
Abstract: Facility Layout Problem (FLP) is one of the essential
problems of several types of manufacturing and service sector. It is
an optimization problem on which the main objective is to obtain the
efficient locations, arrangement and order of the facilities. In the
literature, there are numerous facility layout problem research
presented and have used meta-heuristic approaches to achieve
optimal facility layout design. This paper presented genetic algorithm
to solve facility layout problem; to minimize total cost function. The
performance of the proposed approach was verified and compared
using problems in the literature.
Abstract: This paper presents an effective framework for Chinesesyntactic parsing, which includes two parts. The first one is a parsing framework, which is based on an improved bottom-up chart parsingalgorithm, and integrates the idea of the beam search strategy of N bestalgorithm and heuristic function of A* algorithm for pruning, then get multiple parsing trees. The second is a novel evaluation model, which integrates contextual and partial lexical information into traditional PCFG model and defines a new score function. Using this model, the tree with the highest score is found out as the best parsing tree. Finally,the contrasting experiment results are given. Keywords?syntactic parsing, PCFG, pruning, evaluation model.