Abstract: The protection issues in distribution systems with open and closed-loop are studied, and a generalized protection setting scheme based on the traditional over current protection theories is proposed to meet the new requirements. The setting method is expected to be easier realized using computer program, so that the on-line adaptive setting for coordination in distribution system can be implemented. An automatic setting program is created and several cases are taken into practice. The setting results are verified by the coordination curves of the protective devices which are plotted using MATLAB.
Abstract: Protein structure determination and prediction has
been a focal research subject in the field of bioinformatics due to the
importance of protein structure in understanding the biological and
chemical activities of organisms. The experimental methods used by
biotechnologists to determine the structures of proteins demand
sophisticated equipment and time. A host of computational methods
are developed to predict the location of secondary structure elements
in proteins for complementing or creating insights into experimental
results. However, prediction accuracies of these methods rarely
exceed 70%.
Abstract: We studied the selection of nest sites by Persian
ground Jay (Podoces pleskei), in a semi -desert central Iran. Habitat
variables such as plant species number, height of plant species,
vegetation percent and distance to water sources of nest sites were
compared with randomly selected non- used sites. The results showed that the most important factors influencing nesting site selection were total vegetation percent and number of shrubs
(Zgophyllum eurypterum and Atraphaxis spinosa). The mean vegetation percent of 20 area selected by Persian Ground Jay was
(4.41+ 0.17), which was significantly larger than that of the non –
selected area (2.08 + 0.06). The number of Zygophyllum eurypterum (1.13+ 0.01) and Atraphaxis spinosa (1.36+ 0.10) were also significantly higher compared with the control area (0.43+ 0.07)
and (0.58+ 0.9) respectively.
Abstract: DSTATCOM is one of the equipments for voltage sag mitigation in power systems. In this paper a new control method for balanced and unbalanced voltage sag mitigation using DSTATCOM is proposed. The control system has two loops in order to regulate compensator current and load voltage. Delayed signal cancellation has been used for sequence separation. The compensator should protect sensitive loads against different types of voltage sag. Performance of the proposed method is investigated under different types of voltage sags for linear and nonlinear loads. Simulation results show appropriate operation of the proposed control system.
Abstract: With the hardware technology advancing, the cost of
storing is decreasing. Thus there is an urgent need for new techniques
and tools that can intelligently and automatically assist us in
transferring this data into useful knowledge. Different techniques of
data mining are developed which are helpful for handling these large
size databases [7]. Data mining is also finding its role in the field of
biotechnology. Pedigree means the associated ancestry of a crop
variety. Genetic diversity is the variation in the genetic composition
of individuals within or among species. Genetic diversity depends
upon the pedigree information of the varieties. Parents at lower
hierarchic levels have more weightage for predicting genetic
diversity as compared to the upper hierarchic levels. The weightage
decreases as the level increases. For crossbreeding, the two varieties
should be more and more genetically diverse so as to incorporate the
useful characters of the two varieties in the newly developed variety.
This paper discusses the searching and analyzing of different possible
pairs of varieties selected on the basis of morphological characters,
Climatic conditions and Nutrients so as to obtain the most optimal
pair that can produce the required crossbreed variety. An algorithm
was developed to determine the genetic diversity between the
selected wheat varieties. Cluster analysis technique is used for
retrieving the results.
Abstract: With the fast progression of data exchange in electronic way, information security is becoming more important in data storage and transmission. Because of widely using images in industrial process, it is important to protect the confidential image data from unauthorized access. In this paper, we analyzed current image encryption algorithms and compression is added for two of them (Mirror-like image encryption and Visual Cryptography). Implementations of these two algorithms have been realized for experimental purposes. The results of analysis are given in this paper.
Abstract: This paper introduces the foundations of Bayesian probability theory and Bayesian decision method. The main goal of Bayesian decision theory is to minimize the expected loss of a decision or minimize the expected risk. The purposes of this study are to review the decision process on the issue of flood occurrences and to suggest possible process for decision improvement. This study examines the problem structure of flood occurrences and theoretically explicates the decision-analytic approach based on Bayesian decision theory and application to flood occurrences in Environmental Engineering. In this study, we will discuss about the flood occurrences upon an annual maximum water level in cm, 43-year record available from 1965 to 2007 at the gauging station of Sagaing on the Ayeyarwady River with the drainage area - 120193 sq km by using Bayesian decision method. As a result, we will discuss the loss and risk of vast areas of agricultural land whether which will be inundated or not in the coming year based on the two standard maximum water levels during 43 years. And also we forecast about that lands will be safe from flood water during the next 10 years.
Abstract: Knowledge management (KM) is generally
considered to be a positive process in an organisation, facilitating
opportunities to achieve competitive advantage via better quality
information handling, compilation of expert know-how and rapid
response to fluctuations in the business environment. The KM
paradigm as portrayed in the literature informs the processes that can
increase intangible assets so that corporate knowledge is preserved.
However, in some instances, knowledge management exists in a
universe of dynamic tension among the conflicting needs to respect
privacy and intellectual property (IP), to guard against data theft, to
protect national security and to stay within the laws. While the
Knowledge Management literature focuses on the bright side of the
paradigm, there is also a different side in which knowledge is
distorted, suppressed or misappropriated due to personal or
organisational motives (the paradox). This paper describes the ethical
paradoxes that occur within the taxonomy and deontology of
knowledge management and suggests that recognising both the
promises and pitfalls of KM requires wisdom.
Abstract: In this study, noise characteristics of structure were analyzed in an effort to reduce noise passing through an opening of an
enclosure surrounding the structure that generates noise. Enclosures
are essential measure to protect noise propagation from operating machinery. Access openings of the enclosures are important path of noise leakage. First, noise characteristics of structure were analyzed
and feed-forward noise control was performed using simulation in
order to reduce noise passing through the opening of enclosure, which
surrounds a structure generating noise. We then implemented a
feed-forward controller to actively control the acoustic power through
the opening. Finally, we conducted optimization of placement of the
reference sensors for several cases of the number of sensors. Good
control performances were achieved using the minimum number of microphones arranged an optimal placement.
Abstract: Scarcity of resources for biodiversity conservation gives rise to the need of strategic investment with priorities given to the cost of conservation. While the literature provides abundant methodological options for biodiversity conservation; estimating true cost of conservation remains abstract and simplistic, without recognising dynamic nature of the cost. Some recent works demonstrate the prominence of economic theory to inform biodiversity decisions, particularly on the costs and benefits of biodiversity however, the integration of the concept of true cost into biodiversity actions and planning are very slow to come by, and specially on a farm level. Conservation planning studies often use area as a proxy for costs neglecting different land values as well as protected areas. These literature consider only heterogeneous benefits while land costs are considered homogenous. Analysis with the assumption of cost homogeneity results in biased estimation; since not only it doesn’t address the true total cost of biodiversity actions and plans, but also it fails to screen out lands that are more (or less) expensive and/or difficult (or more suitable) for biodiversity conservation purposes, hindering validity and comparability of the results. Economies of scope” is one of the other most neglected aspects in conservation literature. The concept of economies of scope introduces the existence of cost complementarities within a multiple output production system and it suggests a lower cost during the concurrent production of multiple outputs by a given farm. If there are, indeed, economies of scope then simplistic representation of costs will tend to overestimate the true cost of conservation leading to suboptimal outcomes. The aim of this paper, therefore, is to provide first road review of the various theoretical ways in which economies of scope are likely to occur of how they might occur in conservation. Consequently, the paper addresses gaps that have to be filled in future analysis.
Abstract: New software protection product called “Obfuscation
Studio" is presented in the paper. Several obfuscating modules that
are already implemented are described. Some theoretical data is
presented, that shows the potency and effectiveness of described
obfuscation methods. “Obfuscation Studio" is being implemented for
protecting programs written for .NET platform, but the described
methods can also be interesting for other applications.
Abstract: The nanotechnology based on epitaxial systems
includes single or arranged misfit dislocations. In general, whatever
is the type of dislocation or the geometry of the array formed by the
dislocations; it is important for experimental studies to know exactly
the stress distribution for which there is no analytical expression [1,
2]. This work, using a numerical analysis, deals with relaxation of
epitaxial layers having at their interface a periodic network of edge
misfit dislocations. The stress distribution is estimated by using
isotropic elasticity. The results show that the thickness of the two
sheets is a crucial parameter in the stress distributions and then in the
profile of the two sheets.
A comparative study between the case of single dislocation and
the case of parallel network shows that the layers relaxed better when
the interface is covered by a parallel arrangement of misfit.
Consequently, a single dislocation at the interface produces an
important stress field which can be reduced by inserting a parallel
network of dislocations with suitable periodicity.
Abstract: Due to its special data structure and manipulative principle, Object-Oriented Database (OODB) has a particular security protection and authorization methods. This paper first introduces the features of security mechanism about OODB, and then talked about authorization checking process of OODB. Implicit authorization mechanism is based on the subject hierarchies, object hierarchies and access hierarchies of the security authorization modes, and simplifies the authorization mode. In addition, to combine with other authorization mechanisms, implicit authorization can make protection on the authorization of OODB expediently and effectively.
Abstract: Nowadays due to globalization of economy and
competition environment, innovation and technology plays key role
at creation of wealth and economic growth of countries. In fact
prompt growth of practical and technologic knowledge may results in
social benefits for countries when changes into effective innovation.
Considering the importance of innovation for the development of
countries, this study addresses the radical technological innovation
introduced by nanopapers at different stages of producing paper
including stock preparation, using authorized additives, fillers and
pigments, using retention, calender, stages of producing conductive
paper, porous nanopaper and Layer by layer self-assembly. Research
results show that in coming years the jungle related products will lose
considerable portion of their market share, unless embracing radical
innovation. Although incremental innovations can make this industry
still competitive in mid-term, but to have economic growth and
competitive advantage in long term, radical innovations are
necessary. Radical innovations can lead to new products and
materials which their applications in packaging industry can produce
value added. However application of nanotechnology in this industry
can be costly, it can be done in cooperation with other industries to
make the maximum use of nanotechnology possible. Therefore this
technology can be used in all the production process resulting in the
mass production of simple and flexible papers with low cost and
special properties such as facility at shape, form, easy transportation,
light weight, recovery and recycle marketing abilities, and sealing.
Improving the resistance of the packaging materials without reducing
the performance of packaging materials enhances the quality and the
value added of packaging. Improving the cellulose at nano scale can
have considerable electron optical and magnetic effects leading to
improvement in packaging and value added. Comparing to the
specifications of thermoplastic products and ordinary papers,
nanopapers show much better performance in terms of effective
mechanical indexes such as the modulus of elasticity, tensile strength,
and strain-stress. In densities lower than 640 kgm -3, due to the
network structure of nanofibers and the balanced and randomized
distribution of NFC in flat space, these specifications will even
improve more. For nanopapers, strains are 1,4Gpa, 84Mpa and 17%,
13,3 Gpa, 214Mpa and 10% respectively. In layer by layer self
assembly method (LbL) the tensile strength of nanopaper with Tio3
particles and Sio2 and halloysite clay nanotube are 30,4 ±7.6Nm/g
and 13,6 ±0.8Nm/g and 14±0.3,3Nm/g respectively that fall within
acceptable range of similar samples with virgin fiber. The usage of
improved brightness and porosity index in nanopapers can create
more competitive advantages at packaging industry.
Abstract: Nowadays viruses use polymorphic techniques to mutate their code on each replication, thus evading detection by antiviruses. However detection by emulation can defeat simple polymorphism: thus metamorphic techniques are used which thoroughly change the viral code, even after decryption. We briefly detail this evolution of virus protection techniques against detection and then study the METAPHOR virus, today's most advanced metamorphic virus.
Abstract: Personnel protection devices are cardinal in safety hazard applications. They are widely used in home, office and in industry environments to reduce the risk of lethal shock to human being and equipment safety. This paper briefly reviews various personnel protection devices also describes the basic working principle of conventional ground fault circuit interrupter (GFCI) or ground fault isolator (GFI), its disadvantages and ways to overcome the disadvantages with solid-state relay (SSR) based GFI with ultrafast response up on fault implemented in printed circuit board. This solid state GFI comprises discrete MOSFET based alternating current (AC) switches, linear optical amplifier, photovoltaic isolator and sense resistor. In conventional GFI, current transformer is employed as a sensing element to detect the difference in current flow between live and neutral conductor. If there is no fault in equipment powered through GFI, due to insulation failure of internal wires and windings of motors, both live and neutral currents will be equal in magnitude and opposite in phase.
Abstract: In this paper, we propose a new robust and secure
system that is based on the combination between two different
transforms Discrete wavelet Transform (DWT) and Contourlet
Transform (CT). The combined transforms will compensate the
drawback of using each transform separately. The proposed
algorithm has been designed, implemented and tested successfully.
The experimental results showed that selecting the best sub-band for
embedding from both transforms will improve the imperceptibility
and robustness of the new combined algorithm. The evaluated
imperceptibility of the combined DWT-CT algorithm which gave a
PSNR value 88.11 and the combination DWT-CT algorithm
improves robustness since it produced better robust against Gaussian
noise attack. In addition to that, the implemented system shored a
successful extraction method to extract watermark efficiently.
Abstract: A numerical study on the influence of forward-facing
cavity length upon forward-facing cavity and opposing jet combined
thermal protection system (TPS) cooling efficiency under hypersonic
flow is conducted, by means of which the flow field parameters, heat
flux distribution along the outer body surface are obtained. The
numerical simulation results are validated by experiments and the
cooling effect of the combined TPS with different cavity length is
analyzed. The numerical results show that the combined configuration
dose well in cooling the nose of the hypersonic vehicle. The deeper the
cavity is, the weaker the heat flux is. The recirculation region plays a
key role for the reduction of the aerodynamic heating.
Abstract: In Thailand, both the 1997 and the current 2007 Thai Constitutions have mentioned the establishment of independent organizations as a new mechanism to play a key role in proposing policy recommendations to national decision-makers in the interest of collective consumers. Over the last ten years, no independent organizations have yet been set up. Evidently, nobody could point out who should be key players in establishing provincial independent consumer bodies. The purpose of this study was to find definitive stakeholders in establishing and developing independent consumer bodies in a Thai context. This was a cross-sectional study between August and September 2007, using a postal questionnaire with telephone follow-up. The questionnaire was designed and used to obtain multiple stakeholder assessment of three key attributes (power, interest and influence). Study population was 153 stakeholders associated with policy decision-making, formulation and implementation processes of civil-based consumer protection in pilot provinces. The population covered key representatives from five sectors (academics, government officers, business traders, mass media and consumer networks) who participated in the deliberative forums at 10 provinces. A 49.7% response rate was achieved. Data were analyzed, comparing means of three stakeholder attributes and classification of stakeholder typology. The results showed that the provincial health officers were the definitive stakeholders as they had legal power, influence and interest in establishing and sustaining the independent consumer bodies. However, only a few key representatives of the provincial health officers expressed their own paradigm on the civil-based consumer protection. Most provincial health officers put their own standpoint of building civic participation at only a plan-implementation level. For effective policy implementation by the independent consumer bodies, the Thai government should provide budgetary support for the operation of the provincial health officers with their paradigm shift as well as their own clarified standpoint on corporate governance.
Abstract: Hyperglycemia-mediated accumulation of advanced glycation end-products (AGEs) play a pivotal role in the development of diabetic complications by inducing inflammation. In the present study, we evaluated the possible effects of water/ethanol (1/1, v/v) extracts (WEE) and its fractions from Canarium album Raeusch. (Chinese olive) which is a fruit used on AGEs-stimulated oxidative stress and inflammation in monocytes and vascular endothelial cells. Co-incubation of EA.hy926 endothelial cells with WEE and its fractions for 24h resulted in a significant decrease of monocyte–endothelial cell adhesion, the expression of ICAM-1, generation of intracellular ROS and depletion of GSH induced by AGEs. Chinese olive fruit extracts also reduced the expression of pro-inflammatory mediates, such as TNF-α, IL-1β and IL-6 in THP-1 cells. These findings suggested that Chinese olive fruit was able to protect vascular endothelium from dysfunction induced by AGEs.