Abstract: This paper presents the solution of power economic dispatch (PED) problem of generating units with valve point effects and multiple fuel options using Self-Adaptive Differential Evolution (SDE) algorithm. The global optimal solution by mathematical approaches becomes difficult for the realistic PED problem in power systems. The Differential Evolution (DE) algorithm is found to be a powerful evolutionary algorithm for global optimization in many real problems. In this paper the key parameters of control in DE algorithm such as the crossover constant CR and weight applied to random differential F are self-adapted. The PED problem formulation takes into consideration of nonsmooth fuel cost function due to valve point effects and multi fuel options of generator. The proposed approach has been examined and tested with the numerical results of PED problems with thirteen-generation units including valve-point effects, ten-generation units with multiple fuel options neglecting valve-point effects and ten-generation units including valve-point effects and multiple fuel options. The test results are promising and show the effectiveness of proposed approach for solving PED problems.
Abstract: The purpose of semantic web research is to transform
the Web from a linked document repository into a distributed knowledge base and application platform, thus allowing the vast range of available information and services to be more efficiently
exploited. As a first step in this transformation, languages such as
OWL have been developed. Although fully realizing the Semantic Web still seems some way off, OWL has already been very
successful and has rapidly become a defacto standard for ontology
development in fields as diverse as geography, geology, astronomy,
agriculture, defence and the life sciences. The aim of this paper is to classify key concepts of Semantic Web as well as introducing a new
practical approach which uses these concepts to outperform Word Wide Web.
Abstract: We propose an enhanced key management scheme
based on Key Infection, which is lightweight scheme for tiny sensors.
The basic scheme, Key Infection, is perfectly secure against node
capture and eavesdropping if initial communications after node
deployment is secure. If, however, an attacker can eavesdrop on
the initial communications, they can take the session key. We use
common neighbors for each node to generate the session key. Each
node has own secret key and shares it with its neighbor nodes. Then
each node can establish the session key using common neighbors-
secret keys and a random number. Our scheme needs only a few
communications even if it uses neighbor nodes- information. Without
losing the lightness of basic scheme, it improves the resistance against
eavesdropping on the initial communications more than 30%.
Abstract: Despite the strong and consistent increase in the use of
electronic payment methods worldwide, the diffusion of electronic
wallets is still far from widespread. Analysis of the failure of
electronic wallet uptake has either focused on technical issues or
chosen to analyse a specific scheme. This article proposes a joint
approach to analysing key factors affecting the adoption of e-wallets
by using the ‘Technology Acceptance Model” [1] which we have
expanded to take into account the cost of using e-wallets. We use this
model to analyse Monéo, the only French electronic wallet still in
operation.
Abstract: The objective of this research is to explore the role of actors at the local level in managing the Pre-hospital Emergency Medical Service (EMS) system in Thailand. The research method was done through documentary research, individual interviews, and one forum conducted in each province. This paper uses the case of three provinces located in three regions in Thailand including; Ubon Ratchathani (North-eastern region), Lampang (Northern Region), and Songkhla (Southern Region). The result shows that, recently, the role of the local government in being the service provider for their local people is increasingly concerned. In identifying the key success factors towards the EMS system, it includes; (i) the local executives- vision and influence that the decisions made by them, for both PAO (Provincial Administration Organisation (PAO) and TAO (Tambon Administration Organisation), is vital to address the overall challenges in EMS development, (ii) the administrative system through reforming their working style create the flexibility in running the EMS task, (iii) the network-based management among different agencies at the local level leads to the better EMS practices, and (iv) the development in human resource is very vital in delivering the effective services.
Abstract: The preparation of good-quality Environmental Impact Assessment (EIA) reports contribute to enhancing overall effectiveness of EIA. This component of the EIA process becomes more important in situation where public participation is weak and there is lack of expertise on the part of the competent authority. In Pakistan, EIA became mandatory for every project likely to cause adverse environmental impacts from July 1994. The competent authority also formulated guidelines for preparation and review of EIA reports in 1997. However, EIA is yet to prove as a successful decision support tool to help in environmental protection. One of the several reasons of this ineffectiveness is the generally poor quality of EIA reports. This paper critically reviews EIA reports of some randomly selected projects. Interviews of EIA consultants, project proponents and concerned government officials have also been conducted to underpin the root causes of poor quality of EIA reports. The analysis reveals several inadequacies particularly in areas relating to identification, evaluation and mitigation of key impacts and consideration of alternatives. The paper identifies some opportunities and suggests measures for improving the quality of EIA reports and hence making EIA an effective tool to help in environmental protection.
Abstract: The method of modeling is the key technology for
digital mockup (DMU). Based upon the developing for mechanical
product DMU, the theory, method and approach for virtual
environment (VE) and virtual object (VO) were studied. This paper
has expounded the design goal and architecture of DMU system,
analyzed the method of DMU application, and researched the general
process of physics modeling and behavior modeling.
Abstract: This paper is concerned with the role strategic
management plays in higher education and the methods it entails.
Using the University of West Bohemia and the Czech Republic as
examples, the paper describes the methods used in furthering
strategic objectives within institutions and their different parts
(faculties, institutes). The nature of the demands faced by the
university dictates the need for a strategic framework which defines
the basic objectives and parameters of tertiary education and research
in a local, regional and national context. Sharing strategies with a
wider range of actors (universities, cities, regions, the practical
sphere) is key to laying the foundations for more efficient
cooperation.
Abstract: The objective of this paper is to support the application of Open Innovation practices in firms and organizations by the assessment and management of Intellectual Capital. Intellectual Capital constituents are analyzed in order to verify their capability of acting as key drivers of Open Innovation processes and, therefore, of creating value. A methodology is defined to settle a procedure which helps to select the most relevant Intellectual Capital value drivers and to provide Communities of Innovation with strategic and managerial guidelines in sustaining Open Innovation paradigm. An application of the methodology is developed within a specifically addressed project and its results are hereafter examined.
Abstract: Keystroke authentication is a new access control system
to identify legitimate users via their typing behavior. In this paper,
machine learning techniques are adapted for keystroke authentication.
Seven learning methods are used to build models to differentiate user
keystroke patterns. The selected classification methods are Decision
Tree, Naive Bayesian, Instance Based Learning, Decision Table, One
Rule, Random Tree and K-star. Among these methods, three of them
are studied in more details. The results show that machine learning
is a feasible alternative for keystroke authentication. Compared to
the conventional Nearest Neighbour method in the recent research,
learning methods especially Decision Tree can be more accurate. In
addition, the experiment results reveal that 3-Grams is more accurate
than 2-Grams and 4-Grams for feature extraction. Also, combination
of attributes tend to result higher accuracy.
Abstract: Human activities are increasingly based on the use of remote resources and services, and on the interaction between
remotely located parties that may know little about each other. Mobile agents must be prepared to execute on different hosts with
various environmental security conditions. The aim of this paper is to
propose a trust based mechanism to improve the security of mobile
agents and allow their execution in various environments. Thus, an
adaptive trust mechanism is proposed. It is based on the dynamic interaction between the agent and the environment. Information
collected during the interaction enables generation of an environment
key. This key informs on the host-s trust degree and permits the mobile agent to adapt its execution. Trust estimation is based on
concrete parameters values. Thus, in case of distrust, the source of problem can be located and a mobile agent appropriate behavior can
be selected.
Abstract: In Public Wireless LANs(PWLANs), user anonymity
is an essential issue. Recently, Juang et al. proposed an anonymous
authentication and key exchange protocol using smart cards in
PWLANs. They claimed that their proposed scheme provided identity
privacy, mutual authentication, and half-forward secrecy. In this paper,
we point out that Juang et al.'s protocol is vulnerable to the
stolen-verifier attack and does not satisfy user anonymity.
Abstract: Size based filtration is one of the common methods
employed to isolate circulating tumor cells (CTCs) from whole
blood. It is well known that this method suffers from isolation
efficiency to purity tradeoff. However, this tradeoff is poorly
understood. In this paper, we present the design and manufacturing
of a special rectangular slit filter. The filter was designed to retain
maximal amounts of nucleated cells, while minimizing the pressure
on cells, thereby preserving their morphology. The key parameter,
namely, input pressure, was optimized to retain the maximal number
of tumor cells, whilst maximizing the depletion of normal blood cells
(red and white blood cells and platelets). Our results indicate that for
a slit geometry of 5 × 40 μm on a 13 mm circular membrane with a
fill factor of 21%, a pressure of 6.9 mBar yields the optimum for
maximizing isolation of MCF-7 and depletion of normal blood cells.
Abstract: Many Wireless Sensor Network (WSN) applications necessitate secure multicast services for the purpose of broadcasting delay sensitive data like video files and live telecast at fixed time-slot. This work provides a novel method to deal with end-to-end delay and drop rate of packets. Opportunistic Routing chooses a link based on the maximum probability of packet delivery ratio. Null Key Generation helps in authenticating packets to the receiver. Markov Decision Process based Adaptive Scheduling algorithm determines the time slot for packet transmission. Both theoretical analysis and simulation results show that the proposed protocol ensures better performance in terms of packet delivery ratio, average end-to-end delay and normalized routing overhead.
Abstract: There has been a growing interest in utilizing surfactants in remediation processes to separate the hydrophobic volatile organic compounds (HVOCs) from aqueous solution. One attractive process is cloud point extraction (CPE), which utilizes nonionic surfactants as a separating agent. Since the surfactant cost is a key determination of the economic viability of the process, it is important that the surfactants are recycled and reused. This work aims to study the performance of the co-current vacuum stripping using a packed column for HVOCs removal from contaminated surfactant solution. Six types HVOCs are selected as contaminants. The studied surfactant is the branched secondary alcohol ethoxylates (AEs), Tergitol TMN-6 (C14H30O2). The volatility and the solubility of HVOCs in surfactant system are determined in terms of an apparent Henry’s law constant and a solubilization constant, respectively. Moreover, the HVOCs removal efficiency of vacuum stripping column is assessed in terms of percentage of HVOCs removal and the overall liquid phase volumetric mass transfer coefficient. The apparent Henry’s law constant of benzenz , toluene, and ethyl benzene were 7.00×10-5, 5.38×10-5, 3.35× 10-5 respectively. The solubilization constant of benzene, toluene, and ethyl benzene were 1.71, 2.68, 7.54 respectively. The HVOCs removal for all solute were around 90 percent.
Abstract: This paper reports on a receding horizon filtering for
mobile robot systems with cross-correlated sensor noises and
uncertainties. Also, the effect of uncertain parameters in the state of
the tracking error model performance is considered. A distributed
fusion receding horizon filter is proposed. The distributed fusion
filtering algorithm represents the optimal linear combination of the
local filters under the minimum mean square error criterion. The
derivation of the error cross-covariances between the local receding
horizon filters is the key of this paper. Simulation results of the
tracking mobile robot-s motion demonstrate high accuracy and
computational efficiency of the distributed fusion receding horizon
filter.
Abstract: Nanostructured materials have attracted many
researchers due to their outstanding mechanical and physical
properties. For example, carbon nanotubes (CNTs) or carbon
nanofibres (CNFs) are considered to be attractive reinforcement
materials for light weight and high strength metal matrix composites.
These composites are being projected for use in structural
applications for their high specific strength as well as functional
materials for their exciting thermal and electrical characteristics. The
critical issues of CNT-reinforced MMCs include processing
techniques, nanotube dispersion, interface, strengthening mechanisms
and mechanical properties. One of the major obstacles to the effective
use of carbon nanotubes as reinforcements in metal matrix
composites is their agglomeration and poor distribution/dispersion
within the metallic matrix. In order to tap into the advantages of the
properties of CNTs (or CNFs) in composites, the high dispersion of
CNTs (or CNFs) and strong interfacial bonding are the key issues
which are still challenging. Processing techniques used for synthesis
of the composites have been studied with an objective to achieve
homogeneous distribution of carbon nanotubes in the matrix.
Modified mechanical alloying (ball milling) techniques have emerged
as promising routes for the fabrication of carbon nanotube (CNT)
reinforced metal matrix composites. In order to obtain a
homogeneous product, good control of the milling process, in
particular control of the ball movement, is essential. The control of
the ball motion during the milling leads to a reduction in grinding
energy and a more homogeneous product. Also, the critical inner
diameter of the milling container at a particular rotational speed can
be calculated. In the present work, we use conventional and modified
mechanical alloying to generate a homogenous distribution of 2 wt.
% CNT within Al powders. 99% purity Aluminium powder (Acros,
200mesh) was used along with two different types of multiwall
carbon nanotube (MWCNTs) having different aspect ratios to
produce Al-CNT composites. The composite powders were processed
into bulk material by compaction, and sintering using a cylindrical
compaction and tube furnace. Field Emission Scanning electron
microscopy (FESEM), X-Ray diffraction (XRD), Raman
spectroscopy and Vickers macro hardness tester were used to
evaluate CNT dispersion, powder morphology, CNT damage, phase
analysis, mechanical properties and crystal size determination.
Despite the success of ball milling in dispersing CNTs in Al powder,
it is often accompanied with considerable strain hardening of the Al
powder, which may have implications on the final properties of the
composite. The results show that particle size and morphology vary
with milling time. Also, by using the mixing process and sonication
before mechanical alloying and modified ball mill, dispersion of the
CNTs in Al matrix improves.
Abstract: The sand production problem has led researchers into making various attempts to understand the phenomenon. The generally accepted concept is that the occurrence of sanding is due to the in-situ stress conditions and the induced changes in stress that results in the failure of the reservoir sandstone during hydrocarbon production from wellbores. By using a hypothetical cased (perforated) well, an approach to the problem is presented here by using Finite Element numerical modelling techniques. In addition to the examination of the erosion problem, the influence of certain key parameters is studied in order to ascertain their effect on the failure and subsequent erosion process. The major variables investigated include: drawdown, perforation depth, and the erosion criterion. Also included is the determination of the optimal mud pressure for given operational and reservoir conditions. The improved understanding between parameters enables the choice of optimal values to minimize sanding during oil production.
Abstract: Scale Time Offset Robust Modulation (STORM) [1]–
[3] is a high bandwidth waveform design that adds time-scale
to embedded reference modulations using only time-delay [4]. In
an environment where each user has a specific delay and scale,
identification of the user with the highest signal power and that
user-s phase is facilitated by the STORM processor. Both of these
parameters are required in an efficient multiuser detection algorithm.
In this paper, the STORM modulation approach is evaluated with
a direct sequence spread quadrature phase shift keying (DS-QPSK)
system. A misconception of the STORM time scale modulation is that
a fine temporal resolution is required at the receiver. STORM will
be applied to a QPSK code division multiaccess (CDMA) system
by modifying the spreading codes. Specifically, the in-phase code
will use a typical spreading code, and the quadrature code will
use a time-delayed and time-scaled version of the in-phase code.
Subsequently, the same temporal resolution in the receiver is required
before and after the application of STORM. In this paper, the bit error
performance of STORM in a synchronous CDMA system is evaluated
and compared to theory, and the bit error performance of STORM
incorporated in a single user WCDMA downlink is presented to
demonstrate the applicability of STORM in a modern communication
system.
Abstract: In recent years, most of the regions in the world are
exposed to degradation and erosion caused by increasing
population and over use of land resources. The understanding of
the most important factors on soil erosion and sediment yield are
the main keys for decision making and planning. In this study, the
sediment yield and soil erosion were estimated and the priority of
different soil erosion factors used in the MPSIAC method of soil
erosion estimation is evaluated in AliAbad watershed in southwest
of Isfahan Province, Iran. Different information layers of the
parameters were created using a GIS technique. Then, a
multivariate procedure was applied to estimate sediment yield and
to find the most important factors of soil erosion in the model. The
results showed that land use, geology, land and soil cover are the
most important factors describing the soil erosion estimated by
MPSIAC model.