Abstract: The objective of this research is to design and
construct the PV-Wind hybrid autonomous system for the greenhouse
plantation, and analyze the technical performance of the PV-Wind
energy system. This design depends on the water consumption in the
greenhouse by using 24 of the fogging mist each with the capability
of 24 liter/min. The operating time is 4 times per day, each round for
15 min. The fogging system is being driven by water pump with AC
motor rating 0.5 hp. The load energy consumed is around 1.125
kWh/d. The designing results of the PV-Wind hybrid energy system
is that sufficient energy could be generated by this system. The
results of this study can be applied as a technical data reference for
other areas in the central part of Thailand.
Abstract: In this paper cognitive radio is presented and the
spectrum overlay cognitive radio antenna system is detailed. A UWB
antenna with frequency reconfigurable characteristics is proposed.
The reconfigurability is achieved when the filter is integrated to the
feeding line of the single port overlay cognitive radio. When
activated, the filter can transform the UWB frequency response into a
reconfigurable narrowband one, which is suitable for the
communication operation of the CR system. Here single port overlay
cognitive radio antenna is designed and simulated using Ansoft High
Frequency Structure Simulator (HFSS).
Abstract: Examining existing experimental results for shallow
rigid foundations subjected to vertical centric load (N), accompanied
or not with a bending moment (M), two main non-linear mechanisms
governing the cyclic response of the soil-foundation system can be
distinguished: foundation uplift and soil yielding. A soil-foundation
failure limit, is defined as a domain of resistance in the two
dimensional (2D) load space (N, M) inside of which lie all the
admissible combinations of loads; these latter correspond to a pure
elastic, non-linear elastic or plastic behavior of the soil-foundation
system, while the points lying on the failure limit correspond to a
combination of loads leading to a failure of the soil-foundation
system. In this study, the proposed resistance domain is constructed
analytically based on mechanics. Original elastic limit, uplift
initiation limit and iso-uplift limits are constructed inside this
domain. These limits give a prediction of the mechanisms activated
for each combination of loads applied to the foundation. A
comparison of the proposed failure limit with experimental tests
existing in the literature shows interesting results. Also, the
developed uplift initiation limit and iso-uplift curves are confronted
with others already proposed in the literature and widely used due to
the absence of other alternatives, and remarkable differences are
noted, showing evident errors in the past proposals and relevant
accuracy for those given in the present work.
Abstract: In-memory database systems are becoming popular
due to the availability and affordability of sufficiently large RAM and
processors in modern high-end servers with the capacity to manage
large in-memory database transactions. While fast and reliable inmemory
systems are still being developed to overcome cache misses,
CPU/IO bottlenecks and distributed transaction costs, disk-based data
stores still serve as the primary persistence. In addition, with the
recent growth in multi-tenancy cloud applications and associated
security concerns, many organisations consider the trade-offs and
continue to require fast and reliable transaction processing of diskbased
database systems as an available choice. For these
organizations, the only way of increasing throughput is by improving
the performance of disk-based concurrency control. This warrants a
hybrid database system with the ability to selectively apply an
enhanced disk-based data management within the context of inmemory
systems that would help improve overall throughput.
The general view is that in-memory systems substantially
outperform disk-based systems. We question this assumption and
examine how a modified variation of access invariance that we call
enhanced memory access, (EMA) can be used to allow very high
levels of concurrency in the pre-fetching of data in disk-based
systems. We demonstrate how this prefetching in disk-based systems
can yield close to in-memory performance, which paves the way for
improved hybrid database systems. This paper proposes a novel EMA
technique and presents a comparative study between disk-based EMA
systems and in-memory systems running on hardware configurations
of equivalent power in terms of the number of processors and their
speeds. The results of the experiments conducted clearly substantiate
that when used in conjunction with all concurrency control
mechanisms, EMA can increase the throughput of disk-based systems
to levels quite close to those achieved by in-memory system. The
promising results of this work show that enhanced disk-based
systems facilitate in improving hybrid data management within the
broader context of in-memory systems.
Abstract: Higher order ΔΣ Modulator (DSM) is basically an
unstable system. The approximate conditions for stability cannot be
used for the design of a DSM for industrial applications where risk is
involved. The existing second order, single stage, single bit, unity
feedback gain , discrete DSM cannot be used for the normalized full
range (-1 to +1) of an input signal since the DSM becomes unstable
when the input signal is above ±0.55. The stability is also not
guaranteed for input signals of amplitude less than ±0.55. In the
present paper, the above mentioned second order DSM is modified
with input signal dependent forward path gain. The proposed DSM is
suitable for industrial applications where one needs the digital
representation of the analog input signal, during each sampling
period. The proposed DSM can operate almost for the full range of
input signals (-0.95 to +0.95) without causing instability, assuming
that the second integrator output should not exceed the circuit supply
voltage, ±15 Volts.
Abstract: This paper presents a combination of both robust
nonlinear controller and nonlinear controller for a class of nonlinear
4Y Octorotor UAV using Back-stepping and sliding mode controller.
The robustness against internal and external disturbance and
decoupling control are the merits of the proposed paper. The
proposed controller decouples the Octorotor dynamical system. The
controller is then applied to a 4Y Octortor UAV and its feature will
be shown.
Abstract: Passing the entrance exam to a university is a major
step in one's life. University entrance exam commonly known as
Kankor is the nationwide entrance exam in Afghanistan. This
examination is prerequisite for all public and private higher education
institutions at undergraduate level. It is usually taken by students who
are graduated from high schools. In this paper, we reflect the major
educational school graduates issues and propose ICT-based test
preparation environment, known as ‘Online Kankor Exam Prep
System’ to give students the tools to help them pass the university
entrance exam on the first try. The system is based on Intelligent
Tutoring System (ITS), which introduced an essential package of
educational technology for learners that features: (I) exam-focused
questions and content; (ii) self-assessment environment; and (iii) test
preparation strategies in order to help students to acquire the necessary
skills in their carrier and keep them up-to-date with instruction.
Abstract: Nowadays social media information, such as news,
links, images, or VDOs, is shared extensively. However, the
effectiveness of disseminating information through social media
lacks in quality: less fact checking, more biases, and several rumors.
Many researchers have investigated about credibility on Twitter, but
there is no the research report about credibility information on
Facebook. This paper proposes features for measuring credibility on
Facebook information. We developed the system for credibility on
Facebook. First, we have developed FB credibility evaluator for
measuring credibility of each post by manual human’s labelling. We
then collected the training data for creating a model using Support
Vector Machine (SVM). Secondly, we developed a chrome extension
of FB credibility for Facebook users to evaluate the credibility of
each post. Based on the usage analysis of our FB credibility chrome
extension, about 81% of users’ responses agree with suggested
credibility automatically computed by the proposed system.
Abstract: With a long history, dual-task has become one of the
most intriguing research fields regarding human brain functioning
and cognition. However, findings considering effects of taskinterrelations
are limited (especially, in combined motor and
cognitive tasks). Therefore, we aimed at developing a measurement
system in order to analyse interrelation effects of cognitive and motor
tasks. On the one hand, the present study demonstrates the
applicability of the measurement system and on the other hand first
results regarding a systematisation of different task combinations are
shown. Future investigations should combine imagine technologies
and this developed measurement system.
Abstract: Cross flow water tube heat exchanger can be designed
and made operational using methods of model building and
simulation of the system. This paper projects the design and
development of a model of cross flow water tube heat-exchanger
system, simulation and validation of control analysis of different
tuning methods. Feedback and override control system is developed
using inputs acquired with the help of sensory system. A
mathematical model is formulated for analysis of system behaviour.
The temperature is regulated at the desired set point automatically.
Abstract: In this paper, we present preconditioned generalized
accelerated overrelaxation (GAOR) methods for solving certain
nonsingular linear system. We compare the spectral radii of the
iteration matrices of the preconditioned and the original methods. The
comparison results show that the preconditioned GAOR methods
converge faster than the GAOR method whenever the GAOR method
is convergent. Finally, we give two numerical examples to confirm our
theoretical results.
Abstract: At present, the evaluation of voltage stability
assessment experiences sizeable anxiety in the safe operation of
power systems. This is due to the complications of a strain power
system. With the snowballing of power demand by the consumers
and also the restricted amount of power sources, therefore, the system
has to perform at its maximum proficiency. Consequently, the
noteworthy to discover the maximum ability boundary prior to
voltage collapse should be undertaken. A preliminary warning can be
perceived to evade the interruption of power system’s capacity. The
effectiveness of line voltage stability indices (LVSI) is differentiated
in this paper. The main purpose of the indices used is to predict the
proximity of voltage instability of the electric power system. On the
other hand, the indices are also able to decide the weakest load buses
which are close to voltage collapse in the power system. The line
stability indices are assessed using the IEEE 14 bus test system to
validate its practicability. Results demonstrated that the implemented
indices are practically relevant in predicting the manifestation of
voltage collapse in the system. Therefore, essential actions can be
taken to dodge the incident from arising.
Abstract: The focal aspire of e-Government (eGovt) is to offer
citizen-centered service delivery. Accordingly, the citizenry
consumes services from multiple government agencies through
national portal. Thus, eGovt is an enterprise with the primary
business motive of transparent, efficient and effective public services
to its citizenry and its logical structure is the eGovernment Enterprise
Architecture (eGEA). Since eGovt is IT oriented multifaceted
service-centric system, EA doesn’t do much on an automated
enterprise other than the business artifacts. Service-Oriented
Architecture (SOA) manifestation led some governments to pertain
this in their eGovts, but it limits the source of business artifacts. The
concurrent use of EA and SOA in eGovt executes interoperability and
integration and leads to Service-Oriented e-Government Enterprise
(SOeGE). Consequently, agile eGovt system becomes a reality. As an
IT perspective eGovt comprises of centralized public service artifacts
with the existing application logics belong to various departments at
central, state and local level. The eGovt is renovating to SOeGE by
apply the Service-Orientation (SO) principles in the entire system.
This paper explores IT perspective of SOeGE in India which
encompasses the public service models and illustrated with a case
study the Passport service of India.
Abstract: Software Architecture is the basic structure of
software that states the development and advancement of a software
system. Software architecture is also considered as a significant tool
for the construction of high quality software systems. A clean design
leads to the control, value and beauty of software resulting in its
longer life while a bad design is the cause of architectural erosion
where a software evolution completely fails. This paper discusses the
occurrence of software architecture erosion and presents a set of
methods for the detection, declaration and prevention of architecture
erosion. The causes and symptoms of architecture erosion are
observed with the examples of prescriptive and descriptive
architectures and the practices used to stop this erosion are also
discussed by considering different types of software erosion and their
affects. Consequently finding and devising the most suitable
approach for fighting software architecture erosion and in some way
reducing its affect is evaluated and tested on different scenarios.
Abstract: The final step to complete the “Analytical Systems
Engineering Process” is the “Allocated Architecture” in which all
Functional Requirements (FRs) of an engineering system must be
allocated into their corresponding Physical Components (PCs). At
this step, any design for developing the system’s allocated
architecture in which no clear pattern of assigning the exclusive
“responsibility” of each PC for fulfilling the allocated FR(s) can be
found is considered a poor design that may cause difficulties in
determining the specific PC(s) which has (have) failed to satisfy a
given FR successfully. The present study utilizes the Axiomatic
Design method principles to mathematically address this problem and
establishes an “Axiomatic Model” as a solution for reaching good
alternatives for developing the allocated architecture. This study
proposes a “loss Function”, as a quantitative criterion to monetarily
compare non-ideal designs for developing the allocated architecture
and choose the one which imposes relatively lower cost to the
system’s stakeholders. For the case-study, we use the existing design
of U. S. electricity marketing subsystem, based on data provided by
the U.S. Energy Information Administration (EIA). The result for
2012 shows the symptoms of a poor design and ineffectiveness due to
coupling among the FRs of this subsystem.
Abstract: Safety is one of the most important considerations
when buying a new car. While active safety aims at avoiding
accidents, passive safety systems such as airbags and seat belts
protect the occupant in case of an accident. In addition to legal
regulations, organizations like Euro NCAP provide consumers with
an independent assessment of the safety performance of cars and
drive the development of safety systems in automobile industry.
Those ratings are mainly based on injury assessment reference values
derived from physical parameters measured in dummies during a car
crash test.
The components and sub-systems of a safety system are designed
to achieve the required restraint performance. Sled tests and other
types of tests are then carried out by car makers and their suppliers
to confirm the protection level of the safety system. A Knowledge
Discovery in Databases (KDD) process is proposed in order to
minimize the number of tests. The KDD process is based on the
data emerging from sled tests according to Euro NCAP specifications.
About 30 parameters of the passive safety systems from different data
sources (crash data, dummy protocol) are first analysed together with
experts opinions. A procedure is proposed to manage missing data
and validated on real data sets. Finally, a procedure is developed to
estimate a set of rough initial parameters of the passive system before
testing aiming at reducing the number of tests.
Abstract: The method of introducing the proxy interpretation for
sending and receiving requests increase the capability of the server
and our approach UDIV (User-Data Identity Security) to solve the
data and user authentication without extending size of the data makes
better than hybrid IDS (Intrusion Detection System). And at the same
time all the security stages we have framed have to pass through less
through that minimize the response time of the request. Even though
an anomaly detected, before rejecting it the proxy extracts its identity
to prevent it to enter into system. In case of false anomalies, the
request will be reshaped and transformed into legitimate request for
further response. Finally we are holding the normal and abnormal
requests in two different queues with own priorities.
Abstract: This paper investigates the joint effect of the
interconnected (n,k)-star network topology and Multi-Agent
automated control on restoration and reconfiguration of power
systems. With the increasing trend in development in Multi-Agent
control technologies applied to power system reconfiguration
in presence of faulty components or nodes. Fault tolerance is
becoming an important challenge in the design processes of the
distributed power system topology. Since the reconfiguration of a
power system is performed by agent communication, the (n,k)-star
interconnected network topology is studied and modeled in this
paper to optimize the process of power reconfiguration. In this paper,
we discuss the recently proposed (n,k)-star topology and examine its
properties and advantages as compared to the traditional multi-bus
power topologies. We design and simulate the topology model for
distributed power system test cases. A related lemma based on the
fault tolerance and conditional diagnosability properties is presented
and proved both theoretically and practically. The conclusion is
reached that (n,k)-star topology model has measurable advantages
compared to standard bus power systems while exhibiting fault
tolerance properties in power restoration, as well as showing
efficiency when applied to power system route discovery.
Abstract: In wireless communication, space-time block code (STBC), cyclic delay diversity (CDD) and space-time cyclic delay diversity (STCDD)are used as the spatial diversity schemes and have been widely studied for the reliablecommunication. If these schemes are used, the communication system can obtain the improved performance. However,the quality of the system is degraded when the distance between a source and a destination is distant in wireless communication system. In this paper, the cooperative transmission scheme using two sources is proposed and improves the performance of the wireless communication system.
Abstract: Recommendation systems are widely used in
e-commerce applications. The engine of a current recommendation
system recommends items to a particular user based on user
preferences and previous high ratings. Various recommendation
schemes such as collaborative filtering and content-based approaches
are used to build a recommendation system. Most of current
recommendation systems were developed to fit a certain domain such
as books, articles, and movies. We propose1 a hybrid framework
recommendation system to be applied on two dimensional spaces
(User × Item) with a large number of Users and a small number
of Items. Moreover, our proposed framework makes use of both
favorite and non-favorite items of a particular user. The proposed
framework is built upon the integration of association rules mining
and the content-based approach. The results of experiments show
that our proposed framework can provide accurate recommendations
to users.