Abstract: In recent years fuel cell vehicles are rapidly appearing
all over the globe. In less than 10 years, fuel cell vehicles have gone
from mere research novelties to operating prototypes and demonstration
models. At the same time, government and industry in development
countries have teamed up to invest billions of dollars in partnerships
intended to commercialize fuel cell vehicles within the early
years of the 21st century.
The purpose of this study is evaluation of model and performance
of fuel cell hybrid electric vehicle in different drive cycles. A fuel
cell system model developed in this work is a semi-experimental
model that allows users to use the theory and experimental relationships
in a fuel cell system. The model can be used as part of a complex
fuel cell vehicle model in advanced vehicle simulator (ADVISOR).
This work reveals that the fuel consumption and energy efficiency
vary in different drive cycles. Arising acceleration and speed in a
drive cycle leads to Fuel consumption increase. In addition, energy
losses in drive cycle relates to fuel cell system power request. Parasitic
power in different parts of fuel cell system will increase when
power request increases. Finally, most of energy losses in drive cycle
occur in fuel cell system because of producing a lot of energy by fuel
cell stack.
Abstract: An adaptive Chinese hand-talking system is presented
in this paper. By analyzing the 3 data collecting strategies for new
users, the adaptation framework including supervised and unsupervised
adaptation methods is proposed. For supervised adaptation,
affinity propagation (AP) is used to extract exemplar subsets, and enhanced
maximum a posteriori / vector field smoothing (eMAP/VFS)
is proposed to pool the adaptation data among different models. For
unsupervised adaptation, polynomial segment models (PSMs) are
used to help hidden Markov models (HMMs) to accurately label
the unlabeled data, then the "labeled" data together with signerindependent
models are inputted to MAP algorithm to generate
signer-adapted models. Experimental results show that the proposed
framework can execute both supervised adaptation with small amount
of labeled data and unsupervised adaptation with large amount
of unlabeled data to tailor the original models, and both achieve
improvements on the performance of recognition rate.
Abstract: An electric utility-s main concern is to plan, design, operate and maintain its power supply to provide an acceptable level of reliability to its users. This clearly requires that standards of reliability be specified and used in all three sectors of the power system, i.e., generation, transmission and distribution. That is why reliability of a power system is always a major concern to power system planners. This paper presents the reliability analysis of Bangladesh Power System (BPS). Reliability index, loss of load probability (LOLP) of BPS is evaluated using recursive algorithm and considering no de-rated states of generators. BPS has sixty one generators and a total installed capacity of 5275 MW. The maximum demand of BPS is about 5000 MW. The relevant data of the generators and hourly load profiles are collected from the National Load Dispatch Center (NLDC) of Bangladesh and reliability index 'LOLP' is assessed for the period of last ten years.
Abstract: Synchronous cooperative systems (SCS) bring together users that are geographically distributed and connected through a network to carry out a task. Examples of SCS include Tele- Immersion and Tele-Conferences. In SCS, the coordination is the core of the system, and it has been defined as the act of managing interdependencies between activities performed to achieve a goal. Some of the main problems that SCS present deal with the management of constraints between simultaneous activities and the execution ordering of these activities. In order to resolve these problems, orderings based on Lamport-s happened-before relation have been used, namely, causal, Δ-causal, and causal-total orderings. They mainly differ in the degree of asynchronous execution allowed. One of the most important orderings is the causal order, which establishes that the events must be seen in the cause-effect order as they occur in the system. In this paper we show that for certain SCS (e.g. videoconferences, tele-immersion) where some degradation of the system is allowed, ensuring the causal order is still rigid, which can render negative affects to the system. In this paper, we illustrate how a more relaxed ordering, which we call Fuzzy Causal Order (FCO), is useful for such kind of systems by allowing a more asynchronous execution than the causal order. The benefit of the FCO is illustrated by applying it to a particular scenario of intermedia synchronization of an audio-conference system.
Abstract: Decentralized Tuple Space (DTS) implements tuple
space model among a series of decentralized hosts and provides the
logical global shared tuple repository. Replication has been introduced
to promote performance problem incurred by remote tuple access. In
this paper, we propose a replication approach of DTS allowing
replication policies self-adapting. The accesses from users or other
nodes are monitored and collected to contribute the decision making.
The replication policy may be changed if the better performance is
expected. The experiments show that this approach suitably adjusts the
replication policies, which brings negligible overhead.
Abstract: It is well-known that in wireless local area networks,
authenticating nodes by their MAC addresses is not secure since it is
very easy for an attacker to learn one of the authorized addresses and
change his MAC address accordingly. In this paper, in order to
prevent MAC address spoofing attacks, we propose to use
dynamically changing MAC addresses and make each address usable
for only one session. The scheme we propose does not require any
change in 802.11 protocols and incurs only a small performance
overhead. One of the nice features of our new scheme is that no third
party can link different communication sessions of the same user by
monitoring MAC addresses therefore our scheme is preferable also
with respect to user privacy.
Abstract: With a growing number of digital libraries and other
open education repositories being made available throughout the
world, effective search and retrieval tools are necessary to access the
desired materials that surpass the effectiveness of traditional, allinclusive
search engines. This paper discusses the design and use of
Folksemantic, a platform that integrates OpenCourseWare search,
Open Educational Resource recommendations, and social network
functionality into a single open source project. The paper describes
how the system was originally envisioned, its goals for users, and
data that provides insight into how it is actually being used. Data
sources include website click-through data, query logs, web server
log files and user account data. Based on a descriptive analysis of its
current use, modifications to the platform's design are recommended
to better address goals of the system, along with recommendations
for additional phases of research.
Abstract: Creation and maintenance of knowledge management
systems has been recognized as an important research area.
Consecutively lack of accurate results from knowledge management
systems limits the organization to apply their knowledge
management processes. This leads to a failure in getting the right
information to the right people at the right time thus followed by a
deficiency in decision making processes. An Intranet offers a
powerful tool for communication and collaboration, presenting data
and information, and the means that creates and shares knowledge,
all in one easily accessible place. This paper proposes an archetype
describing how a knowledge management system, with the support
of intranet capabilities, could very much increase the accuracy of
capturing, storing and retrieving knowledge based processes thereby
increasing the efficiency of the system. This system will expect a
critical mass of usage, by the users, for intranet to function as
knowledge management systems. This prototype would lead to a
design of an application that would impose creation and maintenance
of an effective knowledge management system through intranet. The
aim of this paper is to introduce an effective system to handle
capture, store and distribute knowledge management in a form that
may not lead to any failure which exists in most of the systems. The
methodology used in the system would require all the employees, in
the organization, to contribute the maximum to deliver the system to
a successful arena. The system is still in its initial mode and thereby
the authors are under the process to practically implement the ideas,
as mentioned in the system, to produce satisfactory results.
Abstract: RFID system, in which we give identification number to each item and detect it with radio frequency, supports more variable service than barcode system can do. For example, a refrigerator with RFID reader and internet connection will automatically notify expiration of food validity to us. But, in spite of its convenience, RFID system has some security threats, because anybody can get ID information of item easily. One of most critical threats is privacy invasion. Existing privacy protection schemes or systems have been proposed, and these schemes or systems defend normal users from attempts that any attacker tries to get information using RFID tag value. But, these systems still have weakness that attacker can get information using analogous value instead of original tag value. In this paper, we mention this type of attack more precisely and suggest 'Tag Broker Model', which can defend it. Tag broker in this model translates original tag value to random value, and user can only get random value. Attacker can not use analogous tag value, because he/she is not able to know original one from it.
Abstract: This paper develops a pedometer with a three-axis acceleration sensor that can be placed with any angle. The proposed pedometer measures the number of steps while users walk, jog or run. It can be worn on users’ waistband or placed within pocket or backpack. The work address to improve on the general pedometers, which can only be used in a single direction or can only count of steps without the continuous exercise judgment mechanism. Finally, experimental results confirm the superior performance of the proposed pedometer.
Abstract: Nano fibers produced by electrospinning are of industrial and scientific attention due to their special characteristics such as long length, small diameter and high surface area. Applications of electrospun structures in nanotechnology are included tissue scaffolds, fibers for drug delivery, composite reinforcement, chemical sensing, enzyme immobilization, membrane-based filtration, protective clothing, catalysis, solar cells, electronic devices and others. Many polymer and ceramic precursor nano fibers have been successfully electrospun with diameters in the range from 1 nm to several microns. The process is complex so that fiber diameter is influenced by various material, design and operating parameters. The objective of this work is to apply genetic algorithm on the parameters of electrospinning which have the most significant effect on the nano fiber diameter to determine the optimum parameter values before doing experimental set up. Effective factors including initial polymer concentration, initial jet radius, electrical potential, relaxation time, initial elongation, viscosity and distance between nozzle and collector are considered to determine finest diameter which is selected by user.
Abstract: Building condition assessment is a critical activity in Malaysia-s Comprehensive Asset Management Model. It is closely related to building performance that impact user-s life and decision making. This study focuses on public primary school, one of the most valuable assets for the country. The assessment was carried out based on CSP1 Matrix in Kuching Division of Sarawak, Malaysia. Based on the matrix used, three main criteria of the buildings has successfully evaluate: the number of defects; schools rating; and total schools rating. The analysis carried out on 24 schools found that the overall 4, 725 defects has been identified. Meanwhile, the overall score obtained was 45, 868 and the overall rating is 9.71, which is at the fair condition. This result has been associated with building age to evaluate its impacts on school buildings condition. The findings proved that building condition is closely related to building age and its support the theory that 'the ageing building has more defect than the new one'.
Abstract: Voice Over IP (VoIP) is a technology that could pass
the voice traffic and data packet form over an IP network. Network
can be used for intranet or Internet. Phone calls using VoIP has
advantages in terms of cheaper cost of PSTN phone to more than
half, because the cost is calculated by the cost of the global nature of
the Internet. Session Initiation Protocol (SIP) is a signaling protocol
at the application layer which serves to establish, modify, and
terminate a multimedia session involving one or more users. This SIP
signaling has SIP message in text form that is used for session
management by the SIP components, such as User Agent, Registrar,
Redirect Server, and Proxy Server. To build a SIP communication is
required SIP Express Router (SER) to be able to receive SIP
messages, for handling the basic functions of SIP messages.
Problems occur when the NAT through which affects the voice
communication will be blocked starting from the sound that is not
sent or one side of the sound are sent (half duplex). How that could
be used to penetrate NAT is to use a given mediaproxy random RTP
port to penetrate NAT.
Abstract: A trustworthy voting process in democratic is
important that each vote is recorded with accuracy and impartiality.
The accuracy and impartiality are tallied in high rate with biometric
system. One of the sign is a fingerprint. Fingerprint recognition is
still a challenging problem, because of the distortions among the
different impression of the same finger. Because of the trustworthy of
biometric voting technologies, it may give a great effect on numbers
of voter-s participation and outcomes of the democratic process.
Hence in this study, the authors are interested in designing and
analyzing the Electronic Voting System and the participation of the
users. The system is based on the fingerprint minutiae with the
addition of person ID number. This is in order to enhance the
accuracy and speed of the voting process. The new design is analyzed
by conducting pilot election among a class of students for selecting
their representative.
Abstract: Evapotranspiration (ET) is a major component of the hydrologic cycle and its accurate estimation is essential for hydrological studies. In past, various estimation methods have been developed for different climatological data, and the accuracy of these methods varies with climatic conditions. Reference crop evapotranspiration (ET0) is a key variable in procedures established for estimating evapotranspiration rates of agricultural crops. Values of ET0 are used with crop coefficients for many aspects of irrigation and water resources planning and management. Numerous methods are used for estimating ET0. As per internationally accepted procedures outlined in the United Nations Food and Agriculture Organization-s Irrigation and Drainage Paper No. 56(FAO-56), use of Penman-Monteith equation is recommended for computing ET0 from ground based climatological observations. In the present study, seven methods have been selected for performance evaluation. User friendly software has been developed using programming language visual basic. The visual basic has ability to create graphical environment using less coding. For given data availability the developed software estimates reference evapotranspiration for any given area and period for which data is available. The accuracy of the software has been checked by the examples given in FAO-56.The developed software is a user friendly tool for estimating ET0 under different data availability and climatic conditions.
Abstract: FAQ system can make user find answer to the problem that puzzles them. But now the research on Chinese FAQ system is still on the theoretical stage. This paper presents an approach to semantic inference for FAQ mining. To enhance the efficiency, a small pool of the candidate question-answering pairs retrieved from the system for the follow-up work according to the concept of the agriculture domain extracted from user input .Input queries or questions are converted into four parts, the question word segment (QWS), the verb segment (VS), the concept of agricultural areas segment (CS), the auxiliary segment (AS). A semantic matching method is presented to estimate the similarity between the semantic segments of the query and the questions in the pool of the candidate. A thesaurus constructed from the HowNet, a Chinese knowledge base, is adopted for word similarity measure in the matcher. The questions are classified into eleven intension categories using predefined question stemming keywords. For FAQ mining, given a query, the question part and answer part in an FAQ question-answer pair is matched with the input query, respectively. Finally, the probabilities estimated from these two parts are integrated and used to choose the most likely answer for the input query. These approaches are experimented on an agriculture FAQ system. Experimental results indicate that the proposed approach outperformed the FAQ-Finder system in agriculture FAQ retrieval.
Abstract: Diesel Engines emit complex mixtures of inorganic
and organic compounds in the form of both solid and vapour phase
particles. Most of the particulates released are ultrafine nanoparticles
which are detrimental to human health and can easily enter the body
by respiration. The emissions standards on particulate matter release
from diesel engines are constantly upgraded within the European
Union and with future regulations based on the particles numbers
released instead of merely mass, the need for effective aftertreatment
devices will increase. Standard particulate filters in the form of wall
flow filters can have problems with high soot accumulation,
producing a large exhaust backpressure. A potential solution would
be to combine the standard filter with a flow through filter to reduce
the load on the wall flow filter. In this paper soot particle trapping has
been simulated in different continuous flow filters of monolithic
structure including the use of promoters, at laminar flow conditions.
An Euler Lagrange model, the discrete phase model in Ansys used
with user defined functions for forces acting on particles. A method
to quickly screen trapping of 5 nm and 10 nm particles in different
catalysts designs with tracers was also developed.
Simulations of square duct monoliths with promoters show that the
strength of the vortices produced are not enough to give a high
amount of particle deposition on the catalyst walls. The smallest
particles in the simulations, 5 and 10 nm particles were trapped to a
higher extent, than larger particles up to 1000 nm, in all studied
geometries with the predominant deposition mechanism being
Brownian diffusion. The comparison of the different filters designed
with a wall flow filter does show that the options for altering a design
of a flow through filter, without imposing a too large pressure drop
penalty are good.
Abstract: This paper investigates the impact of the hand-hold
positions on both antenna performance and the specific absorption
rate (SAR) induced in the user-s head. A cellular handset with
external antenna operating at GSM-900 frequency is modeled and
simulated using a finite difference time-domain (FDTD)-based
platform SEMCAD-X. A specific anthropomorphic mannequin
(SAM) is adopted to simulate the user-s head, whereas a semirealistic
CAD-model of three-tissues is designed to simulate the
user-s hand. The results show that in case of the handset in hand close
to head at different positions; the antenna total efficiency gets
reduced to (14.5% - 5.9%) at cheek-position and to (27.5% to 11.8%)
at tilt-position. The peak averaged SAR1g values in head close to
handset without hand, are 4.67 W/Kg and 2.66 W/Kg at cheek and
tilt-position, respectively. Due to the presence of hand, the SAR1g in
head gets reduced to (3.67-3.31 W/Kg) at cheek-position and to
(1.84-1.64 W/Kg) at tilt-position, depending on the hand-hold
position.
Abstract: Nowadays the devices of night vision are widely used both for military and civil applications. The variety of night vision applications require a variety of the night vision devices designs. A web-based architecture of a software system for design assessment before producing of night vision devices is developed. The proposed architecture of the web-based system is based on the application of a mathematical model for designing of night vision devices. An algorithm with two components – for iterative design and for intelligent design is developed and integrated into system architecture. The iterative component suggests compatible modules combinations to choose from. The intelligent component provides compatible combinations of modules satisfying given user requirements to device parameters. The proposed web-based architecture of a system for design assessment of night vision devices is tested via a prototype of the system. The testing showed the applicability of both iterative and intelligent components of algorithm.
Abstract: Electronic banking must be secure and easy to use and
many banks heavily advertise an apparent of 100% secure system
which is contestable in many points. In this work, an alternative
approach to the design of e-banking system, through a new solution
for user authentication and security with digital certificate called
LumaCert is introduced. The certificate applies new algorithm for
asymmetric encryption by utilizing two mathematical operators
called Pentors and UltraPentors. The public and private key in this
algorithm represent a quadruple of parameters which are directly
dependent from the above mentioned operators. The strength of the
algorithm resides in the inability to find the respective Pentor and
UltraPentor operator from the mentioned parameters.