Abstract: Buildings and associated construction methods have a significant impact on the environment. As construction activity increases in Kuwait, there is a need to create design and construction strategies which will minimize the environmental impact of new buildings. Green construction is a design philosophy intended to improve the sustainability of construction by the minimization of resource depletion and CO2 emissions throughout the life cycle of buildings. This paper presents and discusses the results of a survey that was conducted in Kuwait, with the objective of investigating the awareness of developers and other stakeholders regarding their understanding and use of green construction strategies. The results of the survey demonstrate that whilst there seems to be a reasonable level of awareness amongst the stakeholders, this awareness is not currently well reflected in the design and construction practices actually being applied. It is therefore concluded is there is a pressing need for intervention from Government in order that the use of sustainable green design and construction strategies becomes the norm in Kuwait.
Abstract: In this paper, we proposed an efficient data
compression strategy exploiting the multi-resolution characteristic of
the wavelet transform. We have developed a sensor node called
“Smart Sensor Node; SSN". The main goals of the SSN design are
lightweight, minimal power consumption, modular design and robust
circuitry. The SSN is made up of four basic components which are a
sensing unit, a processing unit, a transceiver unit and a power unit.
FiOStd evaluation board is chosen as the main controller of the SSN
for its low costs and high performance. The software coding of the
implementation was done using Simulink model and MATLAB
programming language. The experimental results show that the
proposed data compression technique yields recover signal with good
quality. This technique can be applied to compress the collected data
to reduce the data communication as well as the energy consumption
of the sensor and so the lifetime of sensor node can be extended.
Abstract: The aim of this study was to investigate the correlation
between Facebook involvement and internet addiction. We sampled
577 university students in Taiwan and administered a survey of
Facebook usage, Facebook involvement scale (FIS), and internet
addiction scale. The FIS comprises three factors (salience, emotional
support, and amusement). Results showed that the Facebook
involvement scale had good reliability and validity. The correlation
between Facebook involvement and internet addiction was measured
at .395. This means that a higher degree of Facebook involvement
indicates a greater degree of psychological dependency on the internet,
and a greater propensity towards social withdrawal and other negative
psychological consequences associated with internet addiction.
Besides, the correlations between three factors of FIS (salience,
emotional support, and amusement) and internet addiction ranged
from .313-372, indicating that these neither of these factors (salience,
emotional support, and amusement) is more effective than the others in
predicting internet dependency.
Abstract: This paper presents a methodology towards the emulation of the electrical power consumption of the RF device during the cellular phone/handset transmission mode using the LTE technology. The emulation methodology takes the physical environmental variables and the logical interface between the baseband and the RF system as inputs to compute the emulated power dissipation of the RF device. The emulated power, in between the measured points corresponding to the discrete values of the logical interface parameters is computed as a polynomial interpolation using polynomial basis functions. The evaluation of polynomial and spline curve fitting models showed a respective divergence (test error) of 8% and 0.02% from the physically measured power consumption. The precisions of the instruments used for the physical measurements have been modeled as intervals. We have been able to model the power consumption of the RF device operating at 5MHz using homotopy between 2 continuous power consumptions of the RF device operating at the bandwidths 3MHz and 10MHz.
Abstract: This paper presents a methodology for operational and
economic characteristics based evaluation and selection of a power
plant using Graph theoretic approach. A universal evaluation index
on the basis of Operational and economics characteristics of a plant is
proposed which evaluates and ranks the various types of power plants.
The index thus obtained from the pool of operational characteristics
of the power plant attributes Digraph. The Digraph is developed
considering Operational and economics attributes of the power plants
and their relative importance for their smooth operation, installation
and commissioning and prioritizing their selection. The sensitivity
analysis of the attributes towards the objective has also been carried
out in order to study the impact of attributes over the desired outcome
i.e. the universal operational-economics index of the power plant.
Abstract: We present a new approach to evaluation of Cyber Security in Power Systems using the method of modeling the power systems Infrastructure using software agents. Interfaces between module and the home smart meter are recognized as the primary points of intrusion.
Abstract: This paper presents a method for the optimal
allocation of Distributed generation in distribution systems. In this
paper, our aim would be optimal distributed generation allocation for
voltage profile improvement and loss reduction in distribution
network. Genetic Algorithm (GA) was used as the solving tool,
which referring two determined aim; the problem is defined and
objective function is introduced. Considering to fitness values
sensitivity in genetic algorithm process, there is needed to apply load
flow for decision-making. Load flow algorithm is combined
appropriately with GA, till access to acceptable results of this
operation. We used MATPOWER package for load flow algorithm
and composed it with our Genetic Algorithm. The suggested method
is programmed under MATLAB software and applied ETAP
software for evaluating of results correctness. It was implemented on
part of Tehran electricity distributing grid. The resulting operation of
this method on some testing system is illuminated improvement of
voltage profile and loss reduction indexes.
Abstract: This paper describes the design and implementation of cyber video consultation systems(CVCS) using hybrid P2P for video consultation between remote sites. The proposed system is based on client-server and P2P(Peer to Peer) architecture, where client-server is used for communication with the MCU(Multipoint Control Unit) and P2P is used for the cyber video consultation. The developed video consultation system decreases server traffic, and cuts down network expenses, as the multimedia data decentralizes to the client by hybrid P2P architecture. Also the developed system is tested by the group-type video consultation system using communication protocol and application software through Ethernet networks.
Abstract: For any country the project management has been a
vital part for its development. The highly competitive business world
has created tremendous pressure on the project managers to achieve
success. The pressure is derived from survival and profit building in
business organizations which compels the project managers to pursue
unethical practices. As a result unethical activities in business
projects can be found easily where situations or issues arise due to
dubious business practice, high corruption, or absolute violation of
the law. The recent spur on Commonwealth games to be organized in
New Delhi indicates towards the same. It has been seen that the
project managers mainly focus on cost, time, and quality rather than
social impact and long term effects of the project. Surprisingly the
literature as well as the practitioner-s perspective also does not
identify the role of ethics in project success. This paper identifies
ethics as the fourth most important dimension in the project based
organizations. The paper predicts that the approach of considering
ethics will result in sustainability of the project. It will increase
satisfaction and loyalty of the customers as well as create harmony,
trust, brotherhood, values and morality among the team members.
This paper is conceptual in nature as inadequate literature exists
linking the project success with an ethical approach.
Abstract: The objective of this research was to investigate the efficiency of the light emitting diode (LED) tube in various color lights used to lure the adult coconut hispine beetle. The research was conducted by setting the forward bias on LED tubes, and the next step was to test luminous efficacy and quantity of electricity used to power each LED tube in different color lights. Finally, the researcher examined the efficiency of each color-light LED tube to lure the adult coconut hispine beetle.
The results showed that the ultraviolet LED tubes had the most capacity to allure the adult coconut hispine beetles with the percentage of 82.92, followed by the blue LED tubes with the percentage of 59.76. Whereas the yellow, pink, red and warm white LED tubes had no influence to the adult coconut hispine beetles.
Abstract: In this paper, we propose a hardware and software
design method for automotive Electronic Control Units (ECU)
considering the functional safety. The proposed ECU is considered for
the application to Electro-Mechanical Actuator systems and the
validity of the design method is shown by the application to the
Electro-Mechanical Brake (EMB) control system which is used as a
brake actuator in Brake-By-Wire (BBW) systems. The importance of a
functional safety-based design approach to EMB ECU design has been
emphasized because of its safety-critical functions, which are executed
with the aid of many electric actuators, sensors, and application
software. Based on hazard analysis and risk assessment according to
ISO26262, the EMB system should be ASIL-D-compliant, the highest
ASIL level. To this end, an external signature watchdog and an
Infineon 32-bit microcontroller TriCore are used to reduce risks
considering common-cause hardware failure. Moreover, a software
design method is introduced for implementing functional
safety-oriented monitoring functions based on an asymmetric dual
core architecture considering redundancy and diversity. The validity
of the proposed ECU design approach is verified by using the EMB
Hardware-In-the-Loop (HILS) system, which consists of the EMB
assembly, actuator ECU, a host PC, and a few debugging devices.
Furthermore, it is shown that the existing sensor fault tolerant control
system can be used more effectively for mitigating the effects of
hardware and software faults by applying the proposed ECU design
method.
Abstract: In the present paper some recommendations for the
use of software package “Mathematica" in a basic numerical analysis
course are presented. The methods which are covered in the course
include solution of systems of linear equations, nonlinear equations
and systems of nonlinear equations, numerical integration,
interpolation and solution of ordinary differential equations. A set of
individual assignments developed for the course covering all the
topics is discussed in detail.
Abstract: Modular multiplication is the basic operation
in most public key cryptosystems, such as RSA, DSA, ECC,
and DH key exchange. Unfortunately, very large operands
(in order of 1024 or 2048 bits) must be used to provide
sufficient security strength. The use of such big numbers
dramatically slows down the whole cipher system, especially
when running on embedded processors.
So far, customized hardware accelerators - developed on
FPGAs or ASICs - were the best choice for accelerating
modular multiplication in embedded environments. On the
other hand, many algorithms have been developed to speed
up such operations. Examples are the Montgomery modular
multiplication and the interleaved modular multiplication
algorithms. Combining both customized hardware with
an efficient algorithm is expected to provide a much faster
cipher system.
This paper introduces an enhanced architecture for computing
the modular multiplication of two large numbers X
and Y modulo a given modulus M. The proposed design is
compared with three previous architectures depending on
carry save adders and look up tables. Look up tables should
be loaded with a set of pre-computed values. Our proposed
architecture uses the same carry save addition, but replaces
both look up tables and pre-computations with an enhanced
version of sign detection techniques. The proposed architecture
supports higher frequencies than other architectures.
It also has a better overall absolute time for a single operation.
Abstract: The city of Melbourne in Victoria, Australia, provides a number of examples of how a growing city can integrate urban planning and water planning to achieve sustainable urban development, environmental protection, liveability and integrated water management outcomes, and move towards becoming a “Water Sensitive City". Three examples are provided - the development at Botanic Ridge, where a 318 hectare residential development is being planned and where integrated water management options are being implemented using a “triple bottom line" sustainability investment approach; the Toolern development, which will capture and reuse stormwater and recycled water to greatly reduce the suburb-s demand for potable water, and the development at Kalkallo where a 1,200 hectare industrial precinct development is planned which will merge design of the development's water supply, sewerage services and stormwater system. The Paper argues that an integrated urban planning and water planning approach is fundamental to creating liveable, vibrant communities which meet social and financial needs while being in harmony with the local environment. Further work is required on developing investment frameworks and risk analysis frameworks to ensure that all possible solutions can be assessed equally.
Abstract: This research details a Computational Fluid Dynamics (CFD) approach to model fluid flow in a journal bearing with 8 equispaced semi-circular axial grooves. Water is used as the lubricant and is fed from one end of the bearing to the other, under pressure. The geometry of the bearing is modeled using a commercially available modeling software GAMBIT and the flow analysis is performed using a dedicated CFD analysis software FLUENT. The pressure distribution in the bearing clearance is obtained from FLUENT for various whirl ratios and is used to calculate the hydrodynamic force components in the radial and tangential direction of the bearing. These values along with the various whirl speeds can be used to do a regression analysis to determine the stiffness and damping coefficients. The values obtained are then compared with the stiffness and damping coefficients of a 3 Axial groove water lubricated journal bearing and those obtained from a FORTRAN code for a similar bearing.
Abstract: This paper discusses a curriculum approach that will
give emphasis on practical portions of teaching network security
subjects in information and communication technology courses. As
we are well aware, the need to use a practice and application oriented
approach in education is paramount. Research on active learning and
cooperative groups have shown that students grasps more and have
more tendency towards obtaining and realizing soft skills like
leadership, communication and team work as opposed to the more
traditional theory and exam based teaching and learning. While this
teaching and learning paradigm is relatively new in Malaysia, it has
been practiced widely in the West. This paper examines a certain
approach whereby students learning wireless security are divided into
and work in small and manageable groups where there will be 2
teams which consist of black hat and white hat teams. The former
will try to find and expose vulnerabilities in a wireless network while
the latter will try their best to prevent such attacks on their wireless
networks using hardware, software, design and enforcement of
security policy and etc. This paper will try to show that the approach
taken plus the use of relevant and up to date software and hardware
and with suitable environment setting will hopefully expose students
to a more fruitful outcome in terms of understanding of concepts,
theories and their motivation to learn.
Abstract: The Eulerian numerical method is proposed to analyze
the explosion in tunnel. Based on this method, an original software
M-MMIC2D is developed by Cµ program language. With this
software, the explosion problem in the tunnel with three
expansion-chambers is numerically simulated, and the results are
found to be in full agreement with the observed experimental data.
Abstract: Herein, the organic semiconductor methyl orange
(MO), is investigated for the first time for its electronic applications.
For this purpose, Al/MO/n-Si heterojunction is fabricated through
economical cheap and simple “drop casting” technique. The currentvoltage
(I-V) measurements of the device are made at room
temperature under dark conditions. The I-V characteristics of
Al/MO/n-Si junction exhibits asymmetrical and rectifying behavior
that confirms the formation of diode. The diode parameters such as
rectification ratio (RR), turn on voltage (Vturn on), reverse saturation
current (I0), ideality factor (n), barrier height ( b
f ), series resistance
(Rs) and shunt resistance (Rsh) are determined from I-V curves using
Schottky equations. These values of these parameters are also
extracted and verified by applying Cheung’s functions. The
conduction mechanisms are explained from the forward bias I-V
characteristics using the power law.
Abstract: This paper compares the heuristic Global Search
Techniques; Genetic Algorithm, Particle Swarm Optimization,
Simulated Annealing, Generalized Pattern Search, genetic algorithm
hybridized with Nelder–Mead and Generalized pattern search
technique for tuning of fuzzy PID controller for Puma 560. Since the
actual control is in joint space ,inverse kinematics is used to generate
various joint angles correspoding to desired cartesian space
trajectory. Efficient dynamics and kinematics are modeled on Matlab
which takes very less simulation time. Performances of all the tuning
methods with and without disturbance are compared in terms of ITSE
in joint space and ISE in cartesian space for spiral trajectory tracking.
Genetic Algorithm hybridized with Generalized Pattern Search is
showing best performance.
Abstract: By taking advantage of computer-s processing power, an unlimited number of variations and parameters in both spatial and environmental can be provided while following the same set of rules and constraints. This paper focuses on using the tools of parametric urbanism towards a more responsive environmental and sustainable urban morphology. It presents an understanding to Parametric Urban Comfort Envelope (PUCE) as an interactive computational assessment urban model. In addition, it investigates the applicability potentials of this model to generate an optimized urban form to Borg El Arab city (a new Egyptian Community) concerning the human comfort values specially wind and solar envelopes. Finally, this paper utilizes its application outcomes -both visual and numerical- to extend the designer-s limitations by decrease the concern of controlling and manipulation of geometry, and increase the designer-s awareness about the various potentials of using the parametric tools to create relationships that generate multiple geometric alternatives.