Abstract: This paper presents a review of an 8-year study on radiation effects in commercial memory devices operating within the main on-board computer system OBC386 of the Algerian microsatellite Alsat-1. A statistical analysis of single-event upset (SEU) and multiple-bit upset (MBU) activity in these commercial memories shows that the typical SEU rate at alsat-1's orbit is 4.04 × 10-7 SEU/bit/day, where 98.6% of these SEUs cause single-bit errors, 1.22% cause double-byte errors, and the remaining SEUs result in multiple-bit and severe errors.
Abstract: This paper presents a model for analysis the induced voltage of transmission lines (energized) acting on neighboring distribution lines (de-energized). From environmental restrictions, 22 kV distribution lines need to be installed under 115 kV transmission lines. With the installation of the two parallel circuits like this, they make the induced voltage which can cause harm to operators. This work was performed with the ATP-EMTP modeling to analyze such phenomenon before field testing. Simulation results are used to find solutions to prevent danger to operators who are on the pole.
Abstract: Evolvable Hardware (EHW) has been regarded as adaptive system acquired by wide application market. Consumer market of any good requires diversity to satisfy consumers- preferences. Adaptation of EHW is a key technology that could provide individual approach to every particular user. This situation raises a question: how to set target for evolutionary algorithm? The existing techniques do not allow consumer to influence evolutionary process. Only designer at the moment is capable to influence the evolution. The proposed consumer-triggered evolution overcomes this problem by introducing new features to EHW that help adaptive system to obtain targets during consumer stage. Classification of EHW is given according to responsiveness, imitation of human behavior and target circuit response. Home intelligent water heating system is considered as an example.
Abstract: Mobile WiMAX is a broadband wireless solution that
enables convergence of mobile and fixed broadband networks
through a common wide area broadband radio access technology and
flexible network architecture. It adopts Orthogonal Frequency
Division Multiple Access (OFDMA) for improved multi-path
performance in Non-Line-Of-Sight (NLOS) environments. Scalable
OFDMA (SOFDMA) is introduced in the IEEE 802e[1]. WIMAX
system uses one of different types of channel coding but The
mandatory channel coding scheme is based on binary nonrecursive
Convolutional Coding (CC). There are other several optional channel
coding schemes such as block turbo codes, convolutional turbo
codes, and low density parity check (LDPC).
In this paper a comparison between the performance of WIMAX
using turbo code and using convolutional product code (CPC) [2] is
made. Also a combination between them had been done. The CPC
gives good results at different SNR values compared to both the
turbo system, and the combination between them. For example, at
BER equal to 10-2 for 128 subcarriers, the amount of improvement
in SNR equals approximately 3 dB higher than turbo code and equals
approximately 2dB higher than the combination respectively. Several
results are obtained at different modulating schemes (16QAM and
64QAM) and different numbers of sub-carriers (128 and 512).
Abstract: In this paper DJess is presented, a novel distributed production system that provides an infrastructure for factual and procedural knowledge sharing. DJess is a Java package that provides programmers with a lightweight middleware by which inference systems implemented in Jess and running on different nodes of a network can communicate. Communication and coordination among inference systems (agents) is achieved through the ability of each agent to transparently and asynchronously reason on inferred knowledge (facts) that might be collected and asserted by other agents on the basis of inference code (rules) that might be either local or transmitted by any node to any other node.
Abstract: In this paper we study the resource allocation problem
for an OFDMA based cooperative two-way relaying (TWR) network.
We focus on amplify and forward (AF) analog network coding
(ANC) protocol. An optimization problem for two basic resources
namely, sub-carrier and power is formulated for multi-user TWR
networks. A joint optimal optimization problem is investigated and
two-step low complexity sub-optimal resource allocation algorithm is
proposed for multi-user TWR networks with ANC protocol. The
proposed algorithm has been evaluated in term of total achievable
system sum-rate and achievable individual sum-rate for each userpair.
The good tradeoff between system sum-rate and fairness is
observed in the two-step proportional resource allocation scheme.
Abstract: In this paper the effect of faults in the elements and
parts of discrete event systems is investigated. In the occurrence of
faults, some states of the system must be changed and some of them
must be forbidden. For this goal, different states of these elements are
examined and a model for fail-safe behavior of each state is
introduced. Replacing new models of the target elements in the
preliminary model by a systematic method, leads to a fail-safe
discrete event system.
Abstract: This research aimed to develop plasma system used in air conditioners. This developed plasma system could be installed in the air conditioners - all split type. The quality of air could be improved to be equal to present plasma system. Development processes were as follows: 1) to study the plasma system used in the air conditioners, 2) to design a plasma generator, 3) to develop the plasma generator, and 4) to test its performance in many types of the air conditioners. This plasma system was developed by AC high voltage – 14 kv with a frequency of 50 kHz. Carbon was a conductor to generate arc in air purifier system. The research was tested by installing the plasma generator in the air conditioners - wall type. Whereas, there were 3 types of installations: air flow out, air flow in, and room center. The result of the plasma generator installed in the air conditioners, split type, revealed that the air flow out installation provided the highest average of o-zone at 223 mg/h. This type of installation provided the highest efficiency of air quality improvement. Moreover, the air flow in installation and the room center installation provided the average of the o-zone at 163 mg/h and 64 mg/h, respectively.
Abstract: Accurate evaluation of damping ratios involving soilstructure interaction (SSI) effects is the prerequisite for seismic design of in-situ buildings. This study proposes a combined approach to identify damping ratios of SSI systems based on ambient excitation technique. The proposed approach is illustrated with main test process, sampling principle and algorithm steps through an engineering example, as along with its feasibility and validity. The proposed approach is employed for damping ratio identification of 82 buildings in Xi-an, China. Based on the experimental data, the variation range and tendency of damping ratios of these SSI systems, along with the preliminary influence factor, are shown and discussed. In addition, a fitting curve indicates the relation between the damping ratio and fundamental natural period of SSI system.
Abstract: The cost of developing the software from scratch can
be saved by identifying and extracting the reusable components from
already developed and existing software systems or legacy systems
[6]. But the issue of how to identify reusable components from
existing systems has remained relatively unexplored. We have used
metric based approach for characterizing a software module. In this
present work, the metrics McCabe-s Cyclometric Complexity
Measure for Complexity measurement, Regularity Metric, Halstead
Software Science Indicator for Volume indication, Reuse Frequency
metric and Coupling Metric values of the software component are
used as input attributes to the different types of Neural Network
system and reusability of the software component is calculated. The
results are recorded in terms of Accuracy, Mean Absolute Error
(MAE) and Root Mean Squared Error (RMSE).
Abstract: This paper presents a modified version of the
maximum urgency first scheduling algorithm. The maximum
urgency algorithm combines the advantages of fixed and dynamic
scheduling to provide the dynamically changing systems with
flexible scheduling. This algorithm, however, has a major
shortcoming due to its scheduling mechanism which may cause a
critical task to fail. The modified maximum urgency first scheduling
algorithm resolves the mentioned problem. In this paper, we propose
two possible implementations for this algorithm by using either
earliest deadline first or modified least laxity first algorithms for
calculating the dynamic priorities. These two approaches are
compared together by simulating the two algorithms. The earliest
deadline first algorithm as the preferred implementation is then
recommended. Afterwards, we make a comparison between our
proposed algorithm and maximum urgency first algorithm using
simulation and results are presented. It is shown that modified
maximum urgency first is superior to maximum urgency first, since it
usually has less task preemption and hence, less related overhead. It
also leads to less failed non-critical tasks in overloaded situations.
Abstract: The purpose of this study was to explore the
demographic differences of international tourists according to three
main factors, including the value of time, shopping behavior and
shopping motivation. The Chatuchak Weekend Market is known as
one of the biggest weekend markets in the world. Too little academic
studies had been conducted in this area of weekend market, despite its
growth and continuous development. In general, both domestic
visitors and international tourists are attracted to the perception of
cheap and bargaining prices the weekend market. However, systematic
research study can provide reliable understanding of the perception of
the visitors.
This study focused on the group of international tourists who visited
the market and aimed to provide better insights based on the
differences in their demographic factors. Findings indicated that
several differences in value of time, shopping behavior, and shopping
motivation were identified by gender, income and age. Research
implications and directions for further studies were discussed.
Abstract: Nowadays for algae cell ultrasonication the
longitudinal ultrasonic piezosystems are used. In this paper a
possibility of creating unique ultrasonic piezoelectric system, which
would allow reducing energy losses and concentrating this energy to
a small closed volume are proposed. The current vibrating systems
whose ultrasonic energy is concentrated inside of hollow cylinder in
which water-algae mixture is flowing. Two, three or multiply
ultrasonic composite systems to concentrate total energy into a
hollow cylinder to creating strong algae cell ultrasonication are used.
The experiments and numerical FEM analysis results using diskshaped
transducer and the first biological test results on algae cell
disruption by ultrasonication are presented as well.
Abstract: The survey and classification of the different security
attacks in structured peer-to-peer (P2P) overlay networks can be
useful to computer system designers, programmers, administrators,
and users. In this paper, we attempt to provide a taxonomy of
structured P2P overlay networks security attacks. We have specially
focused on the way these attacks can arise at each level of the
network. Moreover, we observed that most of the existing systems
such as Content Addressable Network (CAN), Chord, Pastry,
Tapestry, Kademlia, and Viceroy suffer from threats and vulnerability
which lead to disrupt and corrupt their functioning. We hope that our
survey constitutes a good help for who-s working on this area of
research.
Abstract: The paper presents a set of guidelines for analysis of industrial embedded distributed systems and introduces a mathematical model derived from these guidelines. In this study, the author examines a set of modern communication technologies that are or possibly can be used to build communication links between the subsystems of a distributed embedded system. An investigation of these guidelines results in a algorithm for analysis of specific use cases of target technologies. A goal of the paper acts as an important base for ongoing research on comparison of communication technologies. The author describes the principles of the model and presents results of the test calculations. Practical implementation of target technologies and empirical experiment data are based on a practical experience during the design and test of specific distributed systems in Latvian market.
Abstract: Object-oriented simulation is considered one of the most sophisticated techniques that has been widely used in planning, designing, executing and maintaining construction projects. This technique enables the modeler to focus on objects which is extremely important for thorough understanding of a system. Thus, identifying an object is an essential point of building a successful simulation model. In a maintenance process an object is a maintenance work order (MWO). This study demonstrates a maintenance simulation model for the building maintenance division of Saudi Consolidated Electric Company (SCECO) in Dammam, Saudi Arabia. The model focused on both types of maintenance processes namely: (1) preventive maintenance (PM) and (2) corrective maintenance (CM). It is apparent from the findings that object-oriented simulation is a good diagnostic and experimental tool. This is because problems, limitations, bottlenecks and so forth are easily identified. These features are very difficult to obtain when using other tools.
Abstract: The work presented in this study is related to an
energy system analysis based on passive cooling system for
dwellings. It consists to solar chimney energy performances
determination versus geometrical and environmental considerations
as the size and inlet width conditions of the chimney. Adrar site
located in the southern region of Algeria is chosen for this study
according to ambient temperature and solar irradiance technical data
availability. Obtained results are related to the glazing temperature
distributions, the chimney air flow and internal wall temperatures.
The air room change per hour (ACH) parameter, the outlet air
velocity and mass air flow rate are also determined. It is shown that
the chimney width has a significant effect on energy performances
compared to its entry size. A good agreement is observed between
these results and those obtained by others from the literature.
Abstract: The challenge in the case of image authentication is that in many cases images need to be subjected to non malicious operations like compression, so the authentication techniques need to be compression tolerant. In this paper we propose an image authentication system that is tolerant to JPEG lossy compression operations. A scheme for JPEG grey scale images is proposed based on a data embedding method that is based on a secret key and a secret mapping vector in the frequency domain. An encrypted feature vector extracted from the image DCT coefficients, is embedded redundantly, and invisibly in the marked image. On the receiver side, the feature vector from the received image is derived again and compared against the extracted watermark to verify the image authenticity. The proposed scheme is robust against JPEG compression up to a maximum compression of approximately 80%,, but sensitive to malicious attacks such as cutting and pasting.
Abstract: We developed a new method based on quasimolecular
modeling to simulate the cavity flow in three cavity
shapes: rectangular, half-circular and bucket beer in cgs units. Each
quasi-molecule was a group of particles that interacted in a fashion
entirely analogous to classical Newtonian molecular interactions.
When a cavity flow was simulated, the instantaneous velocity vector
fields were obtained by using an inverse distance weighted
interpolation method. In all three cavity shapes, fluid motion was
rotated counter-clockwise. The velocity vector fields of the three
cavity shapes showed a primary vortex located near the upstream
corners at time t ~ 0.500 s, t ~ 0.450 s and t ~ 0.350 s, respectively.
The configurational kinetic energy of the cavities increased as time
increased until the kinetic energy reached a maximum at time t ~
0.02 s and, then, the kinetic energy decreased as time increased. The
rectangular cavity system showed the lowest kinetic energy, while
the half-circular cavity system showed the highest kinetic energy.
The kinetic energy of rectangular, beer bucket and half-circular
cavities fluctuated about stable average values 35.62 x 103, 38.04 x
103 and 40.80 x 103 ergs/particle, respectively. This indicated that the
half-circular shapes were the most suitable shape for a shrimp pond
because the water in shrimp pond flows best when we compared with
rectangular and beer bucket shape.
Abstract: For the past couple of decades Weak signal detection
is of crucial importance in various engineering and scientific
applications. It finds its application in areas like Wireless
communication, Radars, Aerospace engineering, Control systems and
many of those. Usually weak signal detection requires phase sensitive
detector and demodulation module to detect and analyze the signal.
This article gives you a preamble to intrusion detection system which
can effectively detect a weak signal from a multiplexed signal. By
carefully inspecting and analyzing the respective signal, this
system can successfully indicate any peripheral intrusion. Intrusion
detection system (IDS) is a comprehensive and easy approach
towards detecting and analyzing any signal that is weakened and
garbled due to low signal to noise ratio (SNR). This approach
finds significant importance in applications like peripheral security
systems.