Abstract: The paper presents new results of a recent industry
supported research and development study in which an efficient
framework for evaluating practical and meaningful power system
reliability and quality indices was applied. The system-wide
integrated performance indices are capable of addressing and
revealing areas of deficiencies and bottlenecks as well as
redundancies in the composite generation-transmission-demand
structure of large-scale power grids. The technique utilizes a linear
programming formulation, which simulates practical operating
actions and offers a general and comprehensive framework to assess
the harmony and compatibility of generation, transmission and
demand in a power system. Practical applications to a reduced
system model as well as a portion of the Saudi power grid are also
presented in the paper for demonstration purposes.
Abstract: The lack of any centralized infrastructure in mobile ad
hoc networks (MANET) is one of the greatest security concerns in
the deployment of wireless networks. Thus communication in
MANET functions properly only if the participating nodes cooperate
in routing without any malicious intention. However, some of the
nodes may be malicious in their behavior, by indulging in flooding
attacks on their neighbors. Some others may act malicious by
launching active security attacks like denial of service. This paper
addresses few related works done on trust evaluation and
establishment in ad hoc networks. Related works on flooding attack
prevention are reviewed. A new trust approach based on the extent of
friendship between the nodes is proposed which makes the nodes to
co-operate and prevent flooding attacks in an ad hoc environment.
The performance of the trust algorithm is tested in an ad hoc network
implementing the Ad hoc On-demand Distance Vector (AODV)
protocol.
Abstract: As far as the latest technological improvements are concerned, digital systems more become popular than the past. Despite this growing demand to the digital systems, content copy and attack against the digital cinema contents becomes a serious problem. To solve the above security problem, we propose “traceable watermarking using Hash functions for digital cinema system. Digital Cinema is a great application for traceable watermarking since it uses watermarking technology during content play as well as content transmission. The watermark is embedded into the randomly selected movie frames using CRC-32 techniques. CRC-32 is a Hash function. Using it, the embedding position is distributed by Hash Function so that any party cannot break off the watermarking or will not be able to change. Finally, our experimental results show that proposed DWT watermarking method using CRC-32 is much better than the convenient watermarking techniques in terms of robustness, image quality and its simple but unbreakable algorithm.
Abstract: Routing in mobile ad hoc networks is a challenging task because nodes are free to move randomly. In DSR like all On- Demand routing algorithms, route discovery mechanism is associated with great delay. More Clearly in DSR routing protocol to send route reply packet, when current route breaks, destination seeks a new route. In this paper we try to change route selection mechanism proactively. We also define a link stability parameter in which a stability value is assigned to each link. Given this feature, destination node can estimate stability of routes and can select the best and more stable route. Therefore we can reduce the delay and jitter of sending data packets.
Abstract: Availability of raw materials is important for
Indonesia as a furniture exporting country. Teak log as raw materials
is supplied to the furniture industry by Perum Perhutani (PP). PP
needs to involve carbon trading for nature conservation. PP also has
an obligation in the Corporate Social Responsibility program. PP and
furniture industry also must prosecute the regulations related to
ecological issues and labor rights. This study has the objective to
create the relationship model between supplier and manufacturer to
fulfill teak log demand that involving teak forest carbon
sequestration. A model is formulated as Goal Programming to get the
favorable solution for teak log procurement and support carbon
sequestration that considering economical, ecological, and social
aspects of both supplier and manufacturer. The results show that the
proposed model can be used to determine the teak log quantity
involving carbon trading to achieve the seven goals to be satisfied the
sustainability considerations.
Abstract: FlexRay, as a communication protocol for automotive
control systems, is developed to fulfill the increasing demand on the
electronic control units for implementing systems with higher safety
and more comfort. In this work, we study the impact of
radiation-induced soft errors on FlexRay-based steer-by-wire system.
We injected the soft errors into general purpose register set of FlexRay
nodes to identify the most critical registers, the failure modes of the
steer-by-wire system, and measure the probability distribution of
failure modes when an error occurs in the register file.
Abstract: The increase on the demand of IT resources diverts
the enterprises to use the cloud as a cheap and scalable solution.
Cloud computing promises achieved by using the virtual machine as a
basic unite of computation. However, the virtual machine pre-defined
settings might be not enough to handle jobs QoS requirements. This
paper addresses the problem of mapping jobs have critical start
deadlines to virtual machines that have predefined specifications.
These virtual machines hosted by physical machines and shared a
fixed amount of bandwidth. This paper proposed an algorithm that
uses the idle virtual machines bandwidth to increase the quote of other
virtual machines nominated as executors to urgent jobs. An algorithm
with empirical study have been given to evaluate the impact of the
proposed model on impatient jobs. The results show the importance
of dynamic bandwidth allocation in virtualized environment and its
affect on throughput metric.
Abstract: The 15-a-side Fiji rugby team trains well in preparations for any rugby competition but rarely performs to expectations. In order to help the Fiji local based rugby players to identify some key basic areas in improving their performance, a series of workshops were conducted to assess their nutritional status and dietary habits in relation to energy demand during rugby matches. The nutrition workshop included the administration of questionnaires to 19 local based rugby players, requesting the following information: usual food intakes, training camp food intakes, carbohydrate loading, pre-game meals and post-game meals. The study revealed that poor eating habits of the players resulted in the low carbohydrate intake, which may have contributed to increase levels of fatigue leading to loss of stamina even before the second half of the game. It appears that the diet of most 15-a-side players does not provide enough energy to enable them to last the full eightyminutes of the game.
Abstract: In countries with hot climates, air-conditioning forms
a large proportion of annual peak electrical demand, requiring
expansion of power plants to meet the peak demand, which goes
unused most of the time. Use of well-designed cool storage can offset
the peak demand to a large extent. In this study, an air conditioning
system with naturally stratified storage tank was designed,
constructed and tested. A new type of diffuser was designed and used
in this study. Factors that influence the performance of chilled water
storage tanks were investigated. The results indicated that stratified
storage tank consistently stratified well without any physical barrier.
Investigation also showed that storage efficiency decreased with
increasing flow rate due to increased mixing of warm and chilled
water. Diffuser design and layout primarily affected the mixing near
the inlet diffuser and the extent of this mixing had primary influence
on the shape of the thermocline. The heat conduction through tank
walls and through the thermocline caused widening of mixed volume.
Thermal efficiency of stratified storage tanks was as high as 90
percent, which indicates that stratified tanks can effectively be used
as a load management technique.
Abstract: As a result of the ever-changing environment and the demands of rganisations- customers, it is important to recognise the importance of some important managerial challenges. It is the sincere belief that failure to meet these challenges, will ultimately contribute to inevitable problems for organisations. This recognition
requires from managers and by implication organisations to be engaged in ethical behaviour, identity awareness and learning organisational behaviour. All these aspects actually reflect on the
importance of intellectual capital as the competitive weapons for
organisations in the future.
Abstract: Most agricultural crops cultivated in Brazil are highly
nutrient demanding. Brazilian soils are generally acidic with low base
saturation and available nutrients. Demand for fertilizer application
has increased because the national agricultural sector expansion. To
improve productivity without environmental impact, there is the need
for the utilization of novel procedures and techniques to optimize
fertilizer application. This includes the digital soil mapping and GIS
application applied to mapping in different scales. This paper is
based on research, realized during 2005 to 2010 by Brazilian
Corporation for Agricultural Research (EMBRAPA) and its partners.
The purpose was to map soil fertility in national and regional scales.
A soil profile data set in national scale (1:5,000,000) was constructed
from the soil archives of Embrapa Soils, Rio de Janeiro and in the
regional scale (1:250,000) from COMIGO Cooperative soil data set,
Rio Verde, Brazil. The mapping was doing using ArcGIS 9.1 tools
from ESRI.
Abstract: The given work is devoted to the description of
Information Technologies NAS of Azerbaijan created and
successfully maintained in Institute. On the basis of the decision of
board of the Supreme Certifying commission at the President of the
Azerbaijan Republic and Presidium of National Academy of
Sciences of the Azerbaijan Republic, the organization of training
courses on Computer Sciences for all post-graduate students and
dissertators of the republic, taking of examinations of candidate
minima, it was on-line entrusted to Institute of Information
Technologies of the National Academy of Sciences of Azerbaijan.
Therefore, teaching the computer sciences to post-graduate
students and dissertators a scientific - methodological manual on
effective application of new information technologies for research
works by post-graduate students and dissertators and taking of
candidate minima is carried out in the Educational Center.
Information and communication technologies offer new
opportunities and prospects of their application for teaching and
training. The new level of literacy demands creation of essentially
new technology of obtaining of scientific knowledge. Methods of
training and development, social and professional requirements,
globalization of the communicative economic and political projects
connected with construction of a new society, depends on a level of
application of information and communication technologies in the
educational process. Computer technologies develop ideas of
programmed training, open completely new, not investigated
technological ways of training connected to unique opportunities of
modern computers and telecommunications. Computer technologies
of training are processes of preparation and transfer of the
information to the trainee by means of computer. Scientific and
technical progress as well as global spread of the technologies
created in the most developed countries of the world is the main
proof of the leading role of education in XXI century. Information
society needs individuals having modern knowledge. In practice, all
technologies, using special technical information means (computer,
audio, video) are called information technologies of education.
Abstract: This paper investigates the problem of sampling from transactional data streams. We introduce CFISDS as a content based sampling algorithm that works on a landmark window model of data streams and preserve more informed sample in sample space. This algorithm that work based on closed frequent itemset mining tasks, first initiate a concept lattice using initial data, then update lattice structure using an incremental mechanism.Incremental mechanism insert, update and delete nodes in/from concept lattice in batch manner. Presented algorithm extracts the final samples on demand of user. Experimental results show the accuracy of CFISDS on synthetic and real datasets, despite on CFISDS algorithm is not faster than exist sampling algorithms such as Z and DSS.
Abstract: increased competition and increased costs of
designing made it important for the firms to identify the right
products and the right methods for manufacturing the products. Firms
should focus on customers and identify customer demands directly to
design the right products. Several management methods and
techniques that are currently available improve one or more functions
or processes in an industry and do not take the complete product life
cycle into consideration. On the other hand target costing is a method
/ philosophy that takes financial, manufacturing and customer aspects
into consideration during designing phase and helps firms in making
product design decisions to increase the profit / value of the
company. It uses various techniques to identify customer demands, to
decrease costs of manufacturing and finally to achieve strategic goals.
Target Costing forms an integral part of total product design /
redesign based on strategic plans.
Abstract: The efficient use of available licensed spectrum is
becoming more and more critical with increasing demand and usage
of the radio spectrum. This paper shows how the use of spectrum as
well as dynamic spectrum management can be effectively managed
and spectrum allocation schemes in the wireless communication
systems be implemented and used, in future. This paper would be an
attempt towards better utilization of the spectrum. This research will
focus on the decision-making process mainly, with an
assumption that the radio environment has already been sensed and
the QoS requirements for the application have been specified either
by the sensed radio environment or by the secondary user itself. We
identify and study the characteristic parameters of Cognitive Radio
and use Genetic Algorithm for spectrum allocation. Performance
evaluation is done using MATLAB toolboxes.
Abstract: With the rapid advanced of technology, the industrial processes become increasingly demanding, from the point of view, power quality and controllability. The advent of multi levels inverters responds partially to these requirements. But actually, the new generation of multi-cells inverters permits to reach more performances, since, it offers more voltage levels. The disadvantage in the increase of voltage levels by the number of cells in cascades is on account of series igbts synchronisation loss, from where, a limitation of cells in cascade to 4. Regarding to these constraints, a new topology is proposed in this paper, which increases the voltage levels of the three-cell inverter from 4 to 8; with the same number of igbts, and using less stored energy in the flaying capacitors. The details of operation and modelling of this new inverter structure are also presented, then tested thanks to a three phase induction motor. KeywordsFlaying capacitors, Multi-cells inverter, pwm, switchers, modelling.
Abstract: As the network based technologies become
omnipresent, demands to secure networks/systems against threat
increase. One of the effective ways to achieve higher security is
through the use of intrusion detection systems (IDS), which are a
software tool to detect anomalous in the computer or network. In this
paper, an IDS has been developed using an improved machine
learning based algorithm, Locally Linear Neuro Fuzzy Model
(LLNF) for classification whereas this model is originally used for
system identification. A key technical challenge in IDS and LLNF
learning is the curse of high dimensionality. Therefore a feature
selection phase is proposed which is applicable to any IDS. While
investigating the use of three feature selection algorithms, in this
model, it is shown that adding feature selection phase reduces
computational complexity of our model. Feature selection algorithms
require the use of a feature goodness measure. The use of both a
linear and a non-linear measure - linear correlation coefficient and
mutual information- is investigated respectively
Abstract: Mobile Ad Hoc Networks (MANETs) are multi-hop
wireless networks in which all nodes cooperatively maintain network
connectivity. In such a multi-hop wireless network, every node may
be required to perform routing in order to achieve end-to-end
communication among nodes. These networks are energy constrained
as most ad hoc mobile nodes today operate with limited battery
power. Hence, it is important to minimize the energy consumption of
the entire network in order to maximize the lifetime of ad hoc
networks. In this paper, a mechanism involving the integration of
load balancing approach and transmission power control approach is
introduced to maximize the life-span of MANETs. The mechanism is
applied on Ad hoc On-demand Vector (AODV) protocol to make it
as energy aware AODV (EA_AODV). The simulation is carried out
using GloMoSim2.03 simulator. The results show that the proposed
mechanism reduces the average required transmission energy per
packet compared to the standard AODV.
Abstract: Internet application in China has maintained a constant
development tendency in the past decade. China is now one of the
most populous countries in terms of internet user population. While
offering enormous opportunities, the dramatic digitalization also
brings about a series of challenges that demand urgent attention.
Digital divide is one of the challenges that affect China as well as other
countries in the world. This paper examines digital divide in the
Chinese context from the perspective of development communication.
Through a case study of a rural township under the backdrop of the
rapid internet development in China, the paper discusses the
economic, psychological and cultural roots of digital divide; and
explores development communication strategies addressing the roots
of digital divide. It is argued that development communication must be
responsive to the potentialities and preferences of the specific society
and serve the purposes of participation and sustainability.
Abstract: Due to rapid economic growth, Indonesia's energy needs is rapidly increasing. Indonesia-s primary energy consumption has doubled in 2007 compared to 2003. Indonesia's status change from oil net-exporter to oil net-importer country recently has increased Indonesia's concern over energy security. Due to this, oil import becomes center of attention in the dynamics of Indonesia's energy security. Conventional studies addressing Indonesia's energy security have focused on energy production sector. This study explores Indonesia-s energy security considering energy import sector by modeling and simulating Indonesia-s energy-related policies using system dynamics. Simulation result of Indonesia's energy security in 2020 in Business-As-Usual scenario shows that in term of supply demand ratio, energy security will be very high, but also it poses high dependence on energy import. The Alternative scenario result shows lower energy security in term of supply demand ratio and much lower dependence on energy import. It is also found that the Alternative scenario produce lower GDP growth.