Abstract: The electric power industry is currently undergoing an unprecedented reform. One of the most exciting and potentially profitable recent developments is increasing usage of artificial intelligence techniques. The intention of this paper is to give an overview of using neural network (NN) techniques in power systems. According to the growth rate of NNs application in some power system subjects, this paper introduce a brief overview in fault diagnosis, security assessment, load forecasting, economic dispatch and harmonic analyzing. Advantages and disadvantages of using NNs in above mentioned subjects and the main challenges in these fields have been explained, too.
Abstract: The purpose of this paper is to present a Dynamic
Time Warping technique which reduces significantly the data
processing time and memory size of multi-dimensional time series
sampled by the biometric smart pen device BiSP. The acquisition
device is a novel ballpoint pen equipped with a diversity of sensors
for monitoring the kinematics and dynamics of handwriting
movement. The DTW algorithm has been applied for time series
analysis of five different sensor channels providing pressure,
acceleration and tilt data of the pen generated during handwriting on
a paper pad. But the standard DTW has processing time and memory
space problems which limit its practical use for online handwriting
recognition. To face with this problem the DTW has been applied to
the sum of the five sensor signals after an adequate down-sampling
of the data. Preliminary results have shown that processing time and
memory size could significantly be reduced without deterioration of
performance in single character and word recognition. Further
excellent accuracy in recognition was achieved which is mainly due
to the reduced dynamic time warping RDTW technique and a novel
pen device BiSP.
Abstract: Many contemporary telemedical applications rely on
regular consultations over the phone or video conferencing which
consumes valuable resources such as the time of the doctors. Some
applications or treatments allow automated diagnostics on the patient
side which only notifies the doctors in case a significant worsening
of patient’s condition is measured.
Such programs can save valuable resources but an important
implementation issue is how to ensure effective and cheap diagnostics
on the patient side. First, specific diagnostic devices on patient side
are expensive and second, they need to be user-˜friendly to encourage
patient’s cooperation and reduce errors in usage which may cause
noise in diagnostic data.
This article proposes the use of modern smartphones and various
build-in or attachable sensors as universal diagnostic devices applicable
in a wider range of telemedical programs and demonstrates their
application on a case-study – a program for schizophrenic relapse
prevention.
Abstract: It is believed that continuously variable transmission (CVT) will dominate the automotive transmissions in the future. The most popular design is Van Doorne-s CVT with single metal pushing V-belt. However, it is only applicable to low power passenger cars because its major limitation is low torque capacity. Therefore, this research studies a novel dual-belt CVT system to overcome the limitation of traditional single-belt CVT, such that it can be applicable to the heavy-duty vehicles. This paper presents the mathematical model of the design and its experimental verification. Experimental and simulated results show that the model developed is valid and the proposed dual-belt CVT can really overcome the traditional limitation of single-belt Van Doorne-s CVT.
Abstract: Nowadays due to globalization of economy and
competition environment, innovation and technology plays key role
at creation of wealth and economic growth of countries. In fact
prompt growth of practical and technologic knowledge may results in
social benefits for countries when changes into effective innovation.
Considering the importance of innovation for the development of
countries, this study addresses the radical technological innovation
introduced by nanopapers at different stages of producing paper
including stock preparation, using authorized additives, fillers and
pigments, using retention, calender, stages of producing conductive
paper, porous nanopaper and Layer by layer self-assembly. Research
results show that in coming years the jungle related products will lose
considerable portion of their market share, unless embracing radical
innovation. Although incremental innovations can make this industry
still competitive in mid-term, but to have economic growth and
competitive advantage in long term, radical innovations are
necessary. Radical innovations can lead to new products and
materials which their applications in packaging industry can produce
value added. However application of nanotechnology in this industry
can be costly, it can be done in cooperation with other industries to
make the maximum use of nanotechnology possible. Therefore this
technology can be used in all the production process resulting in the
mass production of simple and flexible papers with low cost and
special properties such as facility at shape, form, easy transportation,
light weight, recovery and recycle marketing abilities, and sealing.
Improving the resistance of the packaging materials without reducing
the performance of packaging materials enhances the quality and the
value added of packaging. Improving the cellulose at nano scale can
have considerable electron optical and magnetic effects leading to
improvement in packaging and value added. Comparing to the
specifications of thermoplastic products and ordinary papers,
nanopapers show much better performance in terms of effective
mechanical indexes such as the modulus of elasticity, tensile strength,
and strain-stress. In densities lower than 640 kgm -3, due to the
network structure of nanofibers and the balanced and randomized
distribution of NFC in flat space, these specifications will even
improve more. For nanopapers, strains are 1,4Gpa, 84Mpa and 17%,
13,3 Gpa, 214Mpa and 10% respectively. In layer by layer self
assembly method (LbL) the tensile strength of nanopaper with Tio3
particles and Sio2 and halloysite clay nanotube are 30,4 ±7.6Nm/g
and 13,6 ±0.8Nm/g and 14±0.3,3Nm/g respectively that fall within
acceptable range of similar samples with virgin fiber. The usage of
improved brightness and porosity index in nanopapers can create
more competitive advantages at packaging industry.
Abstract: Overhead conveyor systems are in use in many installations around the world, meeting the widest range of applications possible. Overhead conveyor systems are particularly preferred in automotive industry but also at post offices. Overhead conveyor systems must always be integrated with a logistical process by finding the best way for a cheaper material flow in order to guarantee precise and fast workflows. With their help, any transport can take place without wasting ground and space, without excessive company capacity, lost or damaged products, erroneous delivery, endless travels and without wasting time. Ultra-light overhead conveyor systems are rope-based conveying systems with individually driven vehicles. The vehicles can move automatically on the rope and this can be realized by energy and signals. Crossings are realized by switches. Ultra-light overhead conveyor systems provide optimal material flow, which produces profit and saves time. This article introduces two new ultra-light overhead conveyor designs in logistics and explains their components. According to the explanation of the components, scenarios are created by means of their technical characteristics. The scenarios are visualized with the help of CAD software. After that, assumptions are made for application area. According to these assumptions scenarios are visualized. These scenarios help logistics companies achieve lower development costs as well as quicker market maturity.
Abstract: Nowadays viruses use polymorphic techniques to mutate their code on each replication, thus evading detection by antiviruses. However detection by emulation can defeat simple polymorphism: thus metamorphic techniques are used which thoroughly change the viral code, even after decryption. We briefly detail this evolution of virus protection techniques against detection and then study the METAPHOR virus, today's most advanced metamorphic virus.
Abstract: E-services have significantly changed the way of
doing business in recent years. We can, however, observe poor use of
these services. There is a large gap between supply and actual eservices
usage. This is why we started a project to provide an
environment that will encourage the use of e-services. We believe
that only providing e-service does not automatically mean consumers
would use them. This paper shows the origins of our project and its
current position. We discuss the decision of using semantic web
technologies and their potential to improve e-services usage. We also
present current knowledge base and its real-world classification. In the paper, we discuss further work to be done in the project. Current
state of the project is promising.
Abstract: Personnel protection devices are cardinal in safety hazard applications. They are widely used in home, office and in industry environments to reduce the risk of lethal shock to human being and equipment safety. This paper briefly reviews various personnel protection devices also describes the basic working principle of conventional ground fault circuit interrupter (GFCI) or ground fault isolator (GFI), its disadvantages and ways to overcome the disadvantages with solid-state relay (SSR) based GFI with ultrafast response up on fault implemented in printed circuit board. This solid state GFI comprises discrete MOSFET based alternating current (AC) switches, linear optical amplifier, photovoltaic isolator and sense resistor. In conventional GFI, current transformer is employed as a sensing element to detect the difference in current flow between live and neutral conductor. If there is no fault in equipment powered through GFI, due to insulation failure of internal wires and windings of motors, both live and neutral currents will be equal in magnitude and opposite in phase.
Abstract: Contact stress analysis between two spur gear
teeth was considered in different contact positions,
representing a pair of mating gears during rotation. A
programme has been developed to plot a pair of teeth in contact. This programme was run for each 3° of pinion
rotation from the first location of contact to the last location of
contact to produce 10 cases. Each case was represented a
sequence position of contact between these two teeth. The
programme gives graphic results for the profiles of these teeth
in each position and location of contact during rotation. Finite
element models were made for these cases and stress analysis
was done. The results were presented and finite element
analysis results were compared with theoretical calculations,
wherever available.
Abstract: This paper examines ethical and social issues which
have proved important when initiating and creating educational spaces within a virtual environment. It focuses on one project, identifying the key decisions made, the barriers to new practice
encountered and the impact these had on the project. It demonstrates
the importance of the 'backstage' ethical and social issues involved in
the creation of a virtual education community and offers conclusions,
and questions, which will inform future research and practice in this
area. These ethical issues are considered using Knobel-s framework
of front-end, in-process and back-end concerns, and include
establishing social practices for the islands, allocating access rights,
considering personal safety and supporting researchers appropriately
within this context.
Abstract: The proliferation of user-generated content (UGC) results in huge opportunities to explore event patterns. However, existing event recommendation systems primarily focus on advanced information technology users. Little work has been done to address novice and low-literacy users. The next billion users providing and consuming UGC are likely to include communities from developing countries who are ready to use affordable technologies for subsistence goals. Therefore, we propose a design framework for providing event recommendations to address the needs of such users. Grounded in information integration theory (IIT), our framework advocates that effective event recommendation is supported by systems capable of (1) reliable information gathering through structured user input, (2) accurate sense making through spatial-temporal analytics, and (3) intuitive information dissemination through interactive visualization techniques. A mobile pest management application is developed as an instantiation of the design framework. Our preliminary study suggests a set of design principles for novice and low-literacy users.
Abstract: Wireless sensor network has recently emerged as enablers
of several areas. Real applications of WSN are being explored
and some of them are yet to come. While the potential of sensor
networks has been only beginning to be realized, several challenges
still remain. One of them is the experimental evaluation of WSN.
Therefore, deploying and operating a testbed to study the real
behavior of WSN become more and more important. The main
contribution of this work is to analysis the RF link budget behavior
of wireless sensor networks in underground mine gallery.
Abstract: Biclustering is a very useful data mining technique for
identifying patterns where different genes are co-related based on a
subset of conditions in gene expression analysis. Association rules
mining is an efficient approach to achieve biclustering as in
BIMODULE algorithm but it is sensitive to the value given to its
input parameters and the discretization procedure used in the
preprocessing step, also when noise is present, classical association
rules miners discover multiple small fragments of the true bicluster,
but miss the true bicluster itself. This paper formally presents a
generalized noise tolerant bicluster model, termed as μBicluster. An
iterative algorithm termed as BIDENS based on the proposed model
is introduced that can discover a set of k possibly overlapping
biclusters simultaneously. Our model uses a more flexible method to
partition the dimensions to preserve meaningful and significant
biclusters. The proposed algorithm allows discovering biclusters that
hard to be discovered by BIMODULE. Experimental study on yeast,
human gene expression data and several artificial datasets shows that
our algorithm offers substantial improvements over several
previously proposed biclustering algorithms.
Abstract: Research has suggested that implicit learning tasks
may rely on episodic processing to generate above chance
performance on the standard classification tasks. The current
research examines the invariant features task (McGeorge and Burton,
1990) and argues that such episodic processing is indeed important.
The results of the experiment suggest that both rejection and
similarity strategies are used by participants in this task to
simultaneously reject unfamiliar items and to accept (falsely) familiar
items. Primarily these decisions are based on the presence of low or
high frequency goal based features of the stimuli presented in the
incidental learning phase. It is proposed that a goal based analysis of
the incidental learning task provides a simple step in understanding
which features of the episodic processing are most important for
explaining the match between incidental, implicit learning and test
performance.
Abstract: In order to achieve better road utilization and traffic
efficiency, there is an urgent need for a travel information delivery
mechanism to assist the drivers in making better decisions in the
emerging intelligent transportation system applications. In this paper,
we propose a relayed multicast scheme under heterogeneous networks
for this purpose. In the proposed system, travel information consisting
of summarized traffic conditions, important events, real-time traffic
videos, and local information service contents is formed into layers
and multicasted through an integration of WiMAX infrastructure and
Vehicular Ad hoc Networks (VANET). By the support of adaptive
modulation and coding in WiMAX, the radio resources can be
optimally allocated when performing multicast so as to dynamically
adjust the number of data layers received by the users. In addition to
multicast supported by WiMAX, a knowledge propagation and
information relay scheme by VANET is designed. The experimental
results validate the feasibility and effectiveness of the proposed
scheme.
Abstract: In many applications, magnetic suspension systems
are required to operate over large variations in air gap. As a result,
the nonlinearities inherent in most types of suspensions have a
significant impact on performance. Specifically, it may be difficult to
design a linear controller which gives satisfactory performance,
stability, and disturbance rejection over a wide range of operating
points. in this paper an optimal controller based on discontinuous
mathematical model of the system for an electromagnetic suspension
system which is applied in magnetic trains has been designed .
Simulations show that the new controller can adapt well to the
variance of suspension mass and gap, and keep its dynamic
performance, thus it is superior to the classic controller.
Abstract: This paper systematically investigates the timedependent
health outcomes for office staff during computer work
using the developed mathematical model. The model describes timedependent
health outcomes in multiple body regions associated with
computer usage. The association is explicitly presented with a doseresponse
relationship which is parametrized by body region
parameters. Using the developed model we perform extensive
investigations of the health outcomes statically and dynamically. We
compare the risk body regions and provide various severity rankings
of the discomfort rate changes with respect to computer-related
workload dynamically for the study population. Application of the
developed model reveals a wide range of findings. Such broad
spectrum of investigations in a single report literature is lacking.
Based upon the model analysis, it is discovered that the highest
average severity level of the discomfort exists in neck, shoulder, eyes,
shoulder joint/upper arm, upper back, low back and head etc. The
biggest weekly changes of discomfort rates are in eyes, neck, head,
shoulder, shoulder joint/upper arm and upper back etc. The fastest
discomfort rate is found in neck, followed by shoulder, eyes, head,
shoulder joint/upper arm and upper back etc. Most of our findings are
consistent with the literature, which demonstrates that the developed
model and results are applicable and valuable and can be utilized to
assess correlation between the amount of computer-related workload
and health risk.
Abstract: Nowadays increasingly the population makes use of
Information Technology (IT). As such, in recent year the Portuguese
government increased its focus on using the IT for improving
people-s life and began to develop a set of measures to enable the
modernization of the Public Administration, and so reducing the gap
between Public Administration and citizens.Thus the Portuguese
Government launched the Simplex Program. However these
SIMPLEX eGov measures, which have been implemented over the
years, present a serious challenge: how to forecast its impact on
existing Information Systems Architecture (ISA). Thus, this research
is focus in addressing the problem of automating the evaluation of the
actual impact of implementation an eGovSimplification and
Modernization measures in the Information Systems Architecture. To
realize the evaluation we proposes a Framework, which is supported
by some key concepts as: Quality Factors, ISA modeling,
Multicriteria Approach, Polarity Profile and Quality Metrics
Abstract: Software security testing is an important means to ensure software security and trustiness. This paper first mainly discusses the definition and classification of software security testing, and investigates methods and tools of software security testing widely. Then it analyzes and concludes the advantages and disadvantages of various methods and the scope of application, presents a taxonomy of security testing tools. Finally, the paper points out future focus and development directions of software security testing technology.