Abstract: If an unsteady heat transfer or heat impulse happens in
part of the cryogenic pipeline system of large space environment
simulation equipment while running in vacuum environment, it will
lead to abnormal flow of the cryogenic fluid in the pipeline. When the
situation gets worse, the cryogenic fluid in the pipeline will have phase
change and a gas block which results in the malfunction of the
cryogenic pipeline system. Referring to the structural parameter of a
typical cryogenic pipeline system and the basic equation, an analytical
model and a calculation model for cryogenic pipeline system can be
built. The various factors which influence the thermal resistance of a
cryogenic pipeline system can be analyzed and calculated by using the
qualitative analysis relation deduced for thermal resistance of pipeline.
The research conclusion could provide theoretical support for the
design and operation of a cryogenic pipeline system
Abstract: Based on an analysis of the current research and application of Road maintenance, geographic information system (WebGIS) and ArcGIS Server, the platform overhead construction for Road maintenance development is studied and the key issues are presented, including the organization and design of spatial data on the basis of the geodatabase technology, middleware technology, tiles cache index technology and dynamic segmentation of WebGIS. Road maintenance geographic information platform is put forward through the researching ideas of analysis of the system design. The design and application of WebGIS system are discussed on the basis of a case study of BaNan district of Chongqing highway maintenance management .The feasibility of the theories and methods are validated through the system.
Abstract: In this paper, the solubility of CO2 in AMP solution
have been measured at temperature range of ( 293, 303 ,313,323)
K.The amine concentration ranges studied are (2.0, 2.8, and 3.4) M.
A solubility apparatus was used to measure the solubility of CO2 in
AMP solution on samples of flue gases from Thermal and Central
Power Plants of Esfahan Steel Company. The modified Kent
Eisenberg model was used to correlate and predict the vapor-liquid
equilibria of the (CO2 + AMP + H2O) system. The model predicted
results are in good agreement with the experimental vapor-liquid
equilibrium measurements.
Abstract: Total liquid ventilation can support gas exchange in animal models of lung injury. Clinical application awaits further technical improvements and performance verification. Our aim was to develop a liquid ventilator, able to deliver accurate tidal volumes, and a computerized system for measuring lung mechanics. The computer-assisted, piston-driven respirator controlled ventilatory parameters that were displayed and modified on a real-time basis. Pressure and temperature transducers along with a lineal displacement controller provided the necessary signals to calculate lung mechanics. Ten newborn lambs (
Abstract: This paper addresses the problem of blind source separation
(BSS). To recover original signals, from linear instantaneous
mixtures, we propose a new contrast function based on the use of a
double referenced system. Our approach assumes statistical independence
sources. The reference vectors will be incrusted in the cumulant
to evaluate the independence. The estimation of the separating matrix
will be performed in two steps: whitening observations and joint
diagonalization of a set of referenced cumulant matrices. Computer
simulations are presented to demonstrate the effectiveness of the
suggested approach.
Abstract: Internet infrastructures in most places of the world
have been supported by the advancement of optical fiber technology,
most notably wavelength division multiplexing (WDM) system.
Optical technology by means of WDM system has revolutionized
long distance data transport and has resulted in high data capacity,
cost reductions, extremely low bit error rate, and operational
simplification of the overall Internet infrastructure. This paper
analyses and compares the system impairments, which occur at data
transmission rates of 2.5Gb/s and 10 Gb/s per wavelength channel in
our proposed optical WDM system for Internet infrastructure in
Tanzania. The results show that the data transmission rate of 2.5 Gb/s
has minimum system impairments compared with a rate of 10 Gb/s
per wavelength channel, and achieves a sufficient system
performance to provide a good Internet access service.
Abstract: Static Var Compensator (SVC) is a shunt type FACTS
device which is used in power system primarily for the purpose of
voltage and reactive power control. In this paper, a fuzzy logic based
supplementary controller for Static Var Compensator (SVC) is
developed which is used for damping the rotor angle oscillations and
to improve the transient stability of the power system. Generator
speed and the electrical power are chosen as input signals for the
Fuzzy Logic Controller (FLC). The effectiveness and feasibility of
the proposed control is demonstrated with Single Machine Infinite
Bus (SMIB) system and multimachine system (WSCC System)
which show improvement over the use of a fixed parameter
controller.
Abstract: The security of power systems against malicious cyberphysical
data attacks becomes an important issue. The adversary
always attempts to manipulate the information structure of the power
system and inject malicious data to deviate state variables while
evading the existing detection techniques based on residual test. The
solutions proposed in the literature are capable of immunizing the
power system against false data injection but they might be too costly
and physically not practical in the expansive distribution network.
To this end, we define an algebraic condition for trustworthy power
system to evade malicious data injection. The proposed protection
scheme secures the power system by deterministically reconfiguring
the information structure and corresponding residual test. More
importantly, it does not require any physical effort in either microgrid
or network level. The identification scheme of finding meters being
attacked is proposed as well. Eventually, a well-known IEEE 30-bus
system is adopted to demonstrate the effectiveness of the proposed
schemes.
Abstract: The Artificial immune systems algorithms are Meta
heuristic optimization method, which are used for clustering and
pattern recognition applications are abundantly. These algorithms in
multimodal optimization problems are more efficient than genetic
algorithms. A major drawback in these algorithms is their slow
convergence to global optimum and their weak stability can be
considered in various running of these algorithms. In this paper,
improved Artificial Immune System Algorithm is introduced for the
first time to overcome its problems of artificial immune system. That
use of the small size of a local search around the memory antibodies
is used for improving the algorithm efficiently. The credibility of the
proposed approach is evaluated by simulations, and it is shown that
the proposed approach achieves better results can be achieved
compared to the standard artificial immune system algorithms
Abstract: The paper discusses complexity of component-based
development (CBD) of embedded systems. Although CBD has its
merits, it must be augmented with methods to control the complexities
that arise due to resource constraints, timeliness, and run-time deployment
of components in embedded system development. Software
component specification, system-level testing, and run-time reliability
measurement are some ways to control the complexity.
Abstract: This paper studies the dependability of componentbased
applications, especially embedded ones, from the diagnosis
point of view. The principle of the diagnosis technique is to
implement inter-component tests in order to detect and locate the
faulty components without redundancy. The proposed approach for
diagnosing faulty components consists of two main aspects. The first
one concerns the execution of the inter-component tests which
requires integrating test functionality within a component. This is the
subject of this paper. The second one is the diagnosis process itself
which consists of the analysis of inter-component test results to
determine the fault-state of the whole system. Advantage of this
diagnosis method when compared to classical redundancy faulttolerant
techniques are application autonomy, cost-effectiveness and
better usage of system resources. Such advantage is very important
for many systems and especially for embedded ones.
Abstract: It is known that symmetric encryption algorithms are
fast and easy to implement in hardware. Also elliptic curves have
proved to be a good choice for building encryption system. Although
most of the symmetric systems have been broken, we can create a
hybrid system that has the same properties of the symmetric
encryption systems and in the same time, it has the strength of
elliptic curves in encryption. As DES algorithm is considered the
core of all successive symmetric encryption systems, we modified
DES using elliptic curves and built a new DES algorithm that is hard
to be broken and will be the core for all other symmetric systems.
Abstract: This paper presents the design and analysis of a parallel
connected inverter configuration of. The configuration consists of
parallel connected three-phase dc/ac inverter. Series resistors added
to the inverter output to maintain same current in each inverter of the
two parallel inverters, and to reduce the circulating current in the
parallel inverters to the minimum. High frequency third harmonic
injection PWM (THIPWM) employed to reduce the total harmonic
distortion and to make maximum use of the voltage source. DSP was
used to generate the THIPWM and the control algorithm for the
converter. Selected experimental results have been shown to validate
the proposed system.
Abstract: The main objective of Automatic Generation Control (AGC) is to balance the total system generation against system load losses so that the desired frequency and power interchange with neighboring systems is maintained. Any mismatch between generation and demand causes the system frequency to deviate from its nominal value. Thus high frequency deviation may lead to system collapse. This necessitates a very fast and accurate controller to maintain the nominal system frequency. This paper deals with a novel approach of artificial intelligence (AI) technique called Hybrid Neuro-Fuzzy (HNF) approach for an (AGC). The advantage of this controller is that it can handle the non-linearities at the same time it is faster than other conventional controllers. The effectiveness of the proposed controller in increasing the damping of local and inter area modes of oscillation is demonstrated in a two area interconnected power system. The result shows that intelligent controller is having improved dynamic response and at the same time faster than conventional controller.
Abstract: Considering payload, reliability, security and operational lifetime as major constraints in transmission of images we put forward in this paper a steganographic technique implemented at the physical layer. We suggest transmission of Halftoned images (payload constraint) in wireless sensor networks to reduce the amount of transmitted data. For low power and interference limited applications Turbo codes provide suitable reliability. Ensuring security is one of the highest priorities in many sensor networks. The Turbo Code structure apart from providing forward error correction can be utilized to provide for encryption. We first consider the Halftoned image and then the method of embedding a block of data (called secret) in this Halftoned image during the turbo encoding process is presented. The small modifications required at the turbo decoder end to extract the embedded data are presented next. The implementation complexity and the degradation of the BER (bit error rate) in the Turbo based stego system are analyzed. Using some of the entropy based crypt analytic techniques we show that the strength of our Turbo based stego system approaches that found in the OTPs (one time pad).
Abstract: This paper presents a integer frequency offset (IFO)
estimation scheme for the 3GPP long term evolution (LTE) downlink
system. Firstly, the conventional joint detection method for IFO and
sector cell index (CID) information is introduced. Secondly, an IFO
estimation without explicit sector CID information is proposed, which
can operate jointly with the proposed IFO estimation and reduce
the time delay in comparison with the conventional joint method.
Also, the proposed method is computationally efficient and has almost
similar performance in comparison with the conventional method over
the Pedestrian and Vehicular channel models.
Abstract: This work presents an approach for the measurement
of mutual inductance on near field inductive coupling. The mutual
inductance between inductive circuits allows the simulation of energy
transfer from reader to tag, that can be used in RFID and powerless
implantable devices. It also allows one to predict the maximum
voltage in the tag of the radio-frequency system.
Abstract: This paper proposes a methodology for analysis of
the dynamic behavior of a robotic manipulator in continuous
time. Initially this system (nonlinear system) will be decomposed
into linear submodels and analyzed in the context of the Linear
and Parameter Varying (LPV) Systems. The obtained linear
submodels, which represent the local dynamic behavior of the
robotic manipulator in some operating points were grouped in
a Takagi-Sugeno fuzzy structure. The obtained fuzzy model was
analyzed and validated through analog simulation, as universal
approximator of the robotic manipulator.
Abstract: Most of the real queuing systems include special properties and constraints, which can not be analyzed directly by using the results of solved classical queuing models. Lack of Markov chains features, unexponential patterns and service constraints, are the mentioned conditions. This paper represents an applied general algorithm for analysis and optimizing the queuing systems. The algorithm stages are described through a real case study. It is consisted of an almost completed non-Markov system with limited number of customers and capacities as well as lots of common exception of real queuing networks. Simulation is used for optimizing this system. So introduced stages over the following article include primary modeling, determining queuing system kinds, index defining, statistical analysis and goodness of fit test, validation of model and optimizing methods of system with simulation.