Abstract: Protection system hidden failures have been identified as one of the main causes of system cascading collapse resulting to power system instability. In this paper, a systematic approach is presented in order to identify the probability of a system cascading collapse by taking into consideration the effect of protection system hidden failure. This includes the accurate calculation of the probability of hidden failure as it will provide significant impinge on the findings of the probability of system cascading collapse. The probability of a system cascading collapse is then used to identify the initial tripping of sensitive transmission lines which will contribute to a critical system cascading collapse. Based on the results obtained from this study, it is important to decide on the accurate value of the hidden failure probability as it will affect the probability of a system cascading collapse.
Abstract: A automatic human tracking system using mobile
agent technology is realized because a mobile agent moves in
accordance with a migration of a target person. In this paper, we
propose a method for determining the neighbor node in consideration
of the imaging range of cameras.
Abstract: From the perspective of system of systems (SoS) and
emergent behaviors, this paper describes large scale application
software systems, and proposes framework methods to further depict
systems- functional and non-functional characteristics. Besides, this
paper also specifically discusses some functional frameworks. In the
end, the framework-s applications in system disintegrations, system
architecture and stable intermediate forms are additionally dealt with
in this in building, deployment and maintenance of large scale
software applications.
Abstract: Text categorization - the assignment of natural language documents to one or more predefined categories based on their semantic content - is an important component in many information organization and management tasks. Performance of neural networks learning is known to be sensitive to the initial weights and architecture. This paper discusses the use multilayer neural network initialization with decision tree classifier for improving text categorization accuracy. An adaptation of the algorithm is proposed in which a decision tree from root node until a final leave is used for initialization of multilayer neural network. The experimental evaluation demonstrates this approach provides better classification accuracy with Reuters-21578 corpus, one of the standard benchmarks for text categorization tasks. We present results comparing the accuracy of this approach with multilayer neural network initialized with traditional random method and decision tree classifiers.
Abstract: Synthetic aperture radar (SAR) imaging usually
requires echo data collected continuously pulse by pulse with certain
bandwidth. However in real situation, data collection or part of signal
spectrum can be interrupted due to various reasons, i.e. there will be
gaps in spatial spectrum. In this case we need to find ways to fill out
the resulted gaps and get image with defined resolution. In this paper
we introduce our work on how to apply iterative spatially variant
apodization (Super-SVA) technique to extrapolate the spatial
spectrum in both azimuthal and range directions so as to fill out the
gaps and get correct radar image.
Abstract: The paper deals with the analysis of the dynamic
response of footbridges under human - induced dynamic loads.
This is a frequently occurring and often dominant load for
footbridges as it stems from the very purpose of a footbridge - to
convey pedestrian. Due to the emergence of new materials and
advanced engineering technology, slender footbridges are
increasingly becoming popular to satisfy the modern transportation
needs and the aesthetical requirements of the society. These
structures however are always lively with low stiffness, low mass,
low damping and low natural frequencies. As a consequence, they are
prone to vibration induced by human activities and can suffer severe
vibration serviceability problems, particularly in the lateral direction.
Pedestrian bridges are designed according to first and second limit
states, these are the criteria involved in response to static design load.
However, it is necessary to assess the dynamic response of bridge
design load on pedestrians and assess it impact on the comfort of the
user movement. Usually the load is considered a person or a small
group which can be assumed in perfect motion synchronization.
Already one person or small group can excite significant vibration of
the deck. In order to calculate the dynamic response to the movement
of people, designer needs available and suitable computational model
and criteria. For the calculation program ANSYS based on finite
element method was used.
Abstract: The wireless mesh networks (WMNs) are emerging technology in wireless networking as they can serve large scale high speed internet access. Due to its wireless multi-hop feature, wireless mesh network is prone to suffer from many attacks, such as denial of service attack (DoS). We consider a special case of DoS attack which is selective forwarding attack (a.k.a. gray hole attack). In such attack, a misbehaving mesh router selectively drops the packets it receives rom its predecessor mesh router. It is very hard to detect that packet loss is due to medium access collision, bad channel quality or because of selective forwarding attack. In this paper, we present a review of detection algorithms of selective forwarding attack and discuss their advantage & disadvantage. Finally we conclude this paper with open research issues and challenges.
Abstract: The optimal design of PI controller for Automatic Generation Control in two area is presented in this paper. The concept of Dual mode control is applied in the PI controller, such that the proportional mode is made active when the rate of change of the error is sufficiently larger than a specified limit otherwise switched to the integral mode. A digital simulation is used in conjunction with the Hooke-Jeeve’s optimization technique to determine the optimum parameters (individual gain of proportional and integral controller) of the PI controller. Integrated Square of the Error (ISE), Integrated Time multiplied by Absolute Error(ITAE) , and Integrated Absolute Error(IAE) performance indices are considered to measure the appropriateness of the designed controller. The proposed controller are tested for a two area single nonreheat thermal system considering the practical aspect of the problem such as Deadband and Generation Rate Constraint(GRC). Simulation results show that dual mode with optimized values of the gains improved the control performance than the commonly used Variable Structure .
Abstract: Multiple-Input-Multiple-Output (MIMO) is one of the most important communication techniques that allow wireless systems to achieve higher data rate. To overcome the practical difficulties in implementing Dirty Paper Coding (DPC), various suboptimal MIMO Broadcast (MIMO-BC) scheduling algorithms are employed which choose the best set of users among all the users. In this paper we discuss such a sub-optimal MIMO-BC scheduling algorithm which employs antenna selection at the receiver side. The channels for the users considered here are not Identical and Independent Distributed (IID) so that users at the receiver side do not get equal opportunity for communication. So we introduce a method of applying weights to channels of the users which are not IID in such a way that each of the users gets equal opportunity for communication. The effect of weights on overall sum-rate achieved by the system has been investigated and presented.
Abstract: The authors present an optimization algorithm for order reduction and its application for the determination of the relative mapping errors of linear time invariant dynamic systems by the simplified models. These relative mapping errors are expressed by means of the relative integral square error criterion, which are determined for both unit step and impulse inputs. The reduction algorithm is based on minimization of the integral square error by particle swarm optimization technique pertaining to a unit step input. The algorithm is simple and computer oriented. It is shown that the algorithm has several advantages, e.g. the reduced order models retain the steady-state value and stability of the original system. Two numerical examples are solved to illustrate the superiority of the algorithm over some existing methods.
Abstract: This paper is on the general discussion of memory consistency model like Strict Consistency, Sequential Consistency, Processor Consistency, Weak Consistency etc. Then the techniques for implementing distributed shared memory Systems and Synchronization Primitives in Software Distributed Shared Memory Systems are discussed. The analysis involves the performance measurement of the protocol concerned that is Multiple Writer Protocol. Each protocol has pros and cons. So, the problems that are associated with each protocol is discussed and other related things are explored.
Abstract: Recent scientific investigations indicate that
multimodal biometrics overcome the technical limitations of
unimodal biometrics, making them ideally suited for everyday life
applications that require a reliable authentication system. However,
for a successful adoption of multimodal biometrics, such systems
would require large heterogeneous datasets with complex multimodal
fusion and privacy schemes spanning various distributed
environments. From experimental investigations of current
multimodal systems, this paper reports the various issues related to
speed, error-recovery and privacy that impede the diffusion of such
systems in real-life. This calls for a robust mechanism that caters to
the desired real-time performance, robust fusion schemes,
interoperability and adaptable privacy policies.
The main objective of this paper is to present a framework that
addresses the abovementioned issues by leveraging on the
heterogeneous resource sharing capacities of Grid services and the
efficient machine learning capabilities of artificial neural networks
(ANN). Hence, this paper proposes a Grid-based neural network
framework for adopting multimodal biometrics with the view of
overcoming the barriers of performance, privacy and risk issues that
are associated with shared heterogeneous multimodal data centres.
The framework combines the concept of Grid services for reliable
brokering and privacy policy management of shared biometric
resources along with a momentum back propagation ANN (MBPANN)
model of machine learning for efficient multimodal fusion and
authentication schemes. Real-life applications would be able to adopt
the proposed framework to cater to the varying business requirements
and user privacies for a successful diffusion of multimodal
biometrics in various day-to-day transactions.
Abstract: This article describes a Web pages automatic filtering system. It is an open and dynamic system based on multi agents architecture. This system is built up by a set of agents having each a quite precise filtering task of to carry out (filtering process broken up into several elementary treatments working each one a partial solution). New criteria can be added to the system without stopping its execution or modifying its environment. We want to show applicability and adaptability of the multi-agents approach to the networks information automatic filtering. In practice, most of existing filtering systems are based on modular conception approaches which are limited to centralized applications which role is to resolve static data flow problems. Web pages filtering systems are characterized by a data flow which varies dynamically.
Abstract: The purpose of this paper is to propose an integrated
consumer health informatics utilization framework that can be used
to gauge the online health information needs and usage patterns
among Malaysian women. The proposed framework was developed
based on four different theories/models: Use and Gratification
Theory, Technology Acceptance 3 Model, Health Belief Model, and
Multi-level Model of Information Seeking. The relevant constructs
and research hypotheses are also presented in this paper. The
framework will be tested in order for it to be used successfully to
identify Malaysian women-s preferences of online health information
resources and health information seeking activities.
Abstract: In this paper we use classical linear stability theory
to investigate the effects of uniform internal heat generation on the
onset of Marangoni convection in a horizontal layer of fluid heated
from below. We use a analytical technique to obtain the close form
analytical expression for the onset of Marangoni convection when
the lower boundary is conducting with free-slip condition. We show
that the effect of increasing the internal heat generation is always to
destabilize the layer.
Abstract: Atrazine, a herbicide widely used in sugarcane and corn production, is a frequently detected groundwater contaminant. An atrazine-degrading bacterium, strain KB02, was obtained from long-term atrazine-treated sugarcane field soils in Kanchanaburi province of Thailand. Strain KB02 had a rod-to-coccus morphological cycle during growth. Sequence analysis of the PCR product indicated that the 16S rRNA gene in strain KB02 was ranging from 97-98% identical to the same region in Klebsiella sp. Based on biochemical, physiological analysis and 16S rDNA sequence analysis of one representative isolate, strain KB02, the isolates belong to the genus Klebsiella in the family Enterobacteriaceae. Interestingly that the various primers for atzA, B and C failed to amplify genomic DNA of strain KB02. Whereas the expected PCR product of atzA, B and C were obtained from the reference strain, Arthrobacter sp. strain KU001.
Abstract: Research and development R&D work involves
enormous amount of work that has to do with data measurement and
collection. This process evolves as new information is fed, new
technologies are utilized, and eventually new knowledge is created
by the stakeholders i.e., researchers, clients, and end-users. When
new knowledge is created, procedures of R&D work should evolve
and produce better results within improved research skills and
improved methods of data measurements and collection. This
measurement improvement should then be benchmarked against a
metric that should be developed at the organization. In this paper, we
are suggesting a conceptual metric for R&D work performance
improvement (PI) at the Kuwait Institute for Scientific Research
(KISR). This PI is to be measured against a set of variables in the
suggested metric, which are more closely correlated to organizational
output, as opposed to organizational norms. The paper also mentions
and discusses knowledge creation and management as an addedvalue
to R&D work and measurement improvement. The research
methodology followed in this work is qualitative in nature, based on
a survey that was distributed to researchers and interviews held with
senior researchers at KISR. Research and analyses in this paper also
include looking at and analyzing KISR-s literature.
Abstract: Nowadays, organizations and business has several motivating factors to protect an individual-s privacy. Confidentiality refers to type of sharing information to third parties. This is always referring to private information, especially for personal information that usually needs to keep as a private. Because of the important of privacy concerns today, we need to design a database system that suits with privacy. Agrawal et. al. has introduced Hippocratic Database also we refer here as a privacy-aware database. This paper will explain how HD can be a future trend for web-based application to enhance their privacy level of trustworthiness among internet users.
Abstract: In contrast to existing methods which do not take into account multiconnectivity in a broad sense of this term, we develop mathematical models and highly effective combination (BIEM and FDM) numerical methods of calculation of stationary and cvazistationary temperature field of a profile part of a blade with convective cooling (from the point of view of realization on PC). The theoretical substantiation of these methods is proved by appropriate theorems. For it, converging quadrature processes have been developed and the estimations of errors in the terms of A.Ziqmound continuity modules have been received. For visualization of profiles are used: the method of the least squares with automatic conjecture, device spline, smooth replenishment and neural nets. Boundary conditions of heat exchange are determined from the solution of the corresponding integral equations and empirical relationships. The reliability of designed methods is proved by calculation and experimental investigations heat and hydraulic characteristics of the gas turbine 1st stage nozzle blade
Abstract: Producing IT products/services required carefully
designed. IT development process is intangible and labour intensive.
Making optimal use of available resources, both soft (knowledge,
skill-set etc.) and hard (computer system, ancillary equipment etc.),
is vital if IT development is to achieve sensible economical
advantages. Apart from the norm of Project Life Cycle and System
Development Life Cycle (SDLC), there is an urgent need to establish
a general yet widely acceptable guideline on the most effective and
efficient way to precede an IT project in the broader view of Product
Life Cycle. The current paper proposes such a framework with two
major areas of concern: (1) an integration of IT Products and IT
Services within an existing IT Process architecture and; (2) how IT
Product and IT Services are built into the framework of Product Life
Cycle, Project Life Cycle and SDLC.