Abstract: This research presents the main ideas to implement an
intelligent system composed by communicating wireless sensors
measuring environmental data linked to drought indicators (such as
air temperature, soil moisture , etc...). On the other hand, the setting
up of a spatio temporal database communicating with a Web mapping
application for a monitoring in real time in activity 24:00 /day, 7
days/week is proposed to allow the screening of the drought
parameters time evolution and their extraction. Thus this system
helps detecting surfaces touched by the phenomenon of drought.
Spatio-temporal conceptual models seek to answer the users who
need to manage soil water content for irrigating or fertilizing or other
activities pursuing crop yield augmentation. Effectively, spatiotemporal
conceptual models enable users to obtain a diagram of
readable and easy data to apprehend. Based on socio-economic
information, it helps identifying people impacted by the phenomena
with the corresponding severity especially that this information is
accessible by farmers and stakeholders themselves. The study will be
applied in Siliana watershed Northern Tunisia.
Abstract: Localization of nodes is one of the key issues of
Wireless Sensor Network (WSN) that gained a wide attention in
recent years. The existing localization techniques can be generally
categorized into two types: range-based and range-free. Compared
with rang-based schemes, the range-free schemes are more costeffective,
because no additional ranging devices are needed. As a
result, we focus our research on the range-free schemes. In this paper
we study three types of range-free location algorithms to compare the
localization error and energy consumption of each one. Centroid
algorithm requires a normal node has at least three neighbor anchors,
while DV-hop algorithm doesn’t have this requirement. The third
studied algorithm is the amorphous algorithm similar to DV-Hop
algorithm, and the idea is to calculate the hop distance between two
nodes instead of the linear distance between them. The simulation
results show that the localization accuracy of the amorphous
algorithm is higher than that of other algorithms and the energy
consumption does not increase too much.
Abstract: The recent interest in alternative and renewable
energy systems results in increased installed capacity ratio of such
systems in total energy production of the world. Specifically, Wind
Energy Conversion Systems (WECS) draw significant attention
among possible alternative energy options, recently. On the contrary
of the positive points of penetrating WECS in all over the world in
terms of environment protection, energy independence of the
countries, etc., there are significant problems to be solved for the grid
connection of large scale WECS. The reactive power regulation,
voltage variation suppression, etc. can be presented as major issues to
be considered in this regard. Thus, this paper evaluates the
application of a Static VAr Compensator (SVC) unit for the reactive
power regulation and operation continuity of WECS during a fault
condition. The system is modeled employing the IEEE 13 node test
system. Thus, it is possible to evaluate the system performance with
an overall grid simulation model close to real grid systems. The
overall simulation model is developed in
MATLAB/Simulink/SimPowerSystems® environments and the
obtained results effectively match the target of the provided study.
Abstract: Wireless Sensor Networks (WSNs) enable new
applications and need non-conventional paradigms for the protocol
because of energy and bandwidth constraints, In WSN, sensor node’s
life is a critical parameter. Research on life extension is based on
Low-Energy Adaptive Clustering Hierarchy (LEACH) scheme,
which rotates Cluster Head (CH) among sensor nodes to distribute
energy consumption over all network nodes. CH selection in WSN
affects network energy efficiency greatly. This study proposes an
improved CH selection for efficient data aggregation in sensor
networks. This new algorithm is based on Bacterial Foraging
Optimization (BFO) incorporated in LEACH.
Abstract: This study analyzes the critical gaps in the
architecture of European stability and the expected role of the
banking union as the new important step towards completing the
Economic and Monetary Union that should enable the creation of
safe and sound financial sector for the euro area market. The single
rulebook together with the Single Supervisory Mechanism and the
Single Resolution Mechanism - as two main pillars of the banking
union, should provide a consistent application of common rules and
administrative standards for supervision, recovery and resolution of
banks – with the final aim of replacing the former bail-out practice
with the bail-in system through which possible future bank failures
would be resolved by their own funds, i.e. with minimal costs for
taxpayers and real economy. In this way, the vicious circle between
banks and sovereigns would be broken. It would also reduce the
financial fragmentation recorded in the years of crisis as the result of
divergent behaviors in risk premium, lending activities and interest
rates between the core and the periphery. In addition, it should
strengthen the effectiveness of monetary transmission channels, in
particular the credit channels and overflows of liquidity on the money
market which, due to the fragmentation of the common financial
market, has been significantly disabled in period of crisis. However,
contrary to all the positive expectations related to the future
functioning of the banking union, major findings of this study
indicate that characteristics of the economic system in which the
banking union will operate should not be ignored. The euro area is an
integration of strong and weak entities with large differences in
economic development, wealth, assets of banking systems, growth
rates and accountability of fiscal policy. The analysis indicates that
low and unbalanced economic growth remains a challenge for the
maintenance of financial stability and this problem cannot be
resolved just by a single supervision. In many countries bank assets
exceed their GDP by several times and large banks are still a matter
of concern, because of their systemic importance for individual
countries and the euro zone as a whole. The creation of the Single
Supervisory Mechanism and the Single Resolution Mechanism is a
response to the European crisis, which has particularly affected
peripheral countries and caused the associated loop between the
banking crisis and the sovereign debt crisis, but has also influenced
banks’ balance sheets in the core countries, as the result of crossborder
capital flows. The creation of the SSM and the SRM should
prevent the similar episodes to happen again and should also provide
a new opportunity for strengthening of economic and financial
systems of the peripheral countries. On the other hand, there is a
potential threat that future focus of the ECB, resolution mechanism
and other relevant institutions will be extremely oriented towards
large and significant banks (whereby one half of them operate in the
core and most important euro area countries), and therefore it remains
questionable to what extent will the common resolution funds will be used for rescue of less important institutions. Recent geopolitical
developments will be the optimal indicator to show whether the
previously established mechanisms are sufficient enough to maintain
the adequate financial stability in the euro area market.
Abstract: Feature selection has been used in many fields such as
classification, data mining and object recognition and proven to be
effective for removing irrelevant and redundant features from the
original dataset. In this paper, a new design of distributed intrusion
detection system using a combination feature selection model based
on bees and decision tree. Bees algorithm is used as the search
strategy to find the optimal subset of features, whereas decision tree
is used as a judgment for the selected features. Both the produced
features and the generated rules are used by Decision Making Mobile
Agent to decide whether there is an attack or not in the networks.
Decision Making Mobile Agent will migrate through the networks,
moving from node to another, if it found that there is an attack on one
of the nodes, it then alerts the user through User Interface Agent or
takes some action through Action Mobile Agent. The KDD Cup 99
dataset is used to test the effectiveness of the proposed system. The
results show that even if only four features are used, the proposed
system gives a better performance when it is compared with the
obtained results using all 41 features.
Abstract: Establishing a secure communication of Internet
conferences for participants is very important. Before starting the
conference, all the participants establish a common conference key to
encrypt/decrypt communicated messages. It enables participants to
exchange the secure messages. Nevertheless, in the conference, if
there are any malicious participants who may try to upset the key
generation process causing other legal participants to obtain a different
conference key. In this article, we propose an improved conference
key agreement with fault-tolerant capability. The proposed scheme
can filter malicious participants at the beginning of the conference to
ensure that all participants obtain the same conference key. Compare
with other schemes, our scheme is more secure and efficient than
others.
Abstract: Geographical routing protocol requires node physical
location information to make forwarding decision. Geographical
routing uses location service or position service to obtain the position
of a node. The geographical information is a geographic coordinates
or can be obtained through reference points on some fixed coordinate
system. Link can be formed between two nodes. Link lifetime plays a
crucial role in MANET. Link lifetime represent how long the link is
stable without any failure between the nodes. Link failure may occur
due to mobility and because of link failure energy of nodes can be
drained. Thus this paper proposes survey about link lifetime
prediction using geographical information.
Abstract: Tannase (tannin acyl hydrolase, E.C.3.1.1.20) is an
important hydrolysable enzyme with innumerable applications and
industrial potential. In the present study, a kinetic model has been
developed for the batch fermentation used for the production of
tannase by A.flavus MTCC 3783. Maximum tannase activity of
143.30 U/ml was obtained at 96 hours under optimum operating
conditions at 35oC, an initial pH of 5.5 and with an inducer tannic
acid concentration of 3% (w/v) for a fermentation period of 120
hours. The biomass concentration reaches a maximum of 6.62 g/l at
96 hours and further there was no increase in biomass concentration
till the end of the fermentation. Various unstructured kinetic models
were analyzed to simulate the experimental values of microbial
growth, tannase activity and substrate concentration. The Logistic
model for microbial growth , Luedeking - Piret model for production
of tannase and Substrate utilization kinetic model for utilization of
substrate were capable of predicting the fermentation profile with
high coefficient of determination (R2) values of 0.980, 0.942 and
0.983 respectively. The results indicated that the unstructured models
were able to describe the fermentation kinetics more effectively.
Abstract: Mobile Ad hoc Network is a set of self-governing
nodes which communicate through wireless links. Dynamic topology
MANETs makes routing a challenging task. Various routing
protocols are there, but due to various fundamental characteristic
open medium, changing topology, distributed collaboration and
constrained capability, these protocols are tend to various types of
security attacks. Black hole is one among them. In this attack,
malicious node represents itself as having the shortest path to the
destination but that path not even exists. In this paper, we aim to
develop a routing protocol for detection and prevention of black hole
attack by modifying AODV routing protocol. This protocol is able to
detect and prevent the black hole attack. Simulation is done using
NS-2, which shows the improvement in network performance.
Abstract: File sharing in networks is generally achieved using
Peer-to-Peer (P2P) applications. Structured P2P approaches are
widely used in adhoc networks due to its distributed and scalability
features. Efficient mechanisms are required to handle the huge
amount of data distributed to all peers. The intrinsic characteristics of
P2P system makes for easier content distribution when compared to
client-server architecture. All the nodes in a P2P network act as both
client and server, thus, distributing data takes lesser time when
compared to the client-server method. CHORD protocol is a resource
routing based where nodes and data items are structured into a 1-
dimensional ring. The structured lookup algorithm of Chord is
advantageous for distributed P2P networking applications. However,
structured approach improves lookup performance in a high
bandwidth wired network it could contribute to unnecessary overhead
in overlay networks leading to degradation of network performance.
In this paper, the performance of existing CHORD protocol on
Wireless Mesh Network (WMN) when nodes are static and dynamic
is investigated.
Abstract: Propagation of arbitrary amplitude nonlinear Alfven
waves has been investigated in low but finite β electron-positron-ion
plasma including full ion dynamics. Using Sagdeev pseudopotential
method an energy integral equation has been derived. The Sagdeev
potential has been calculated for different plasma parameters and it
has been shown that inclusion of ion parallel motion along the
magnetic field changes the nature of slow shear Alfven wave solitons
from dip type to hump type. The effects of positron concentration,
plasma-β and obliqueness of the wave propagation on the solitary
wave structure have also been examined.
Abstract: This paper presents the design process of a high
performance 3-phase 3.7 kW 2-pole line start permanent magnet
synchronous motor for pumping system. A method was proposed to
study the starting torque characteristics considering line start with
high inertia load. A d-q model including cage was built to study the
synchronization capability. Time-stepping finite element method
analysis was utilized to accurately predict the dynamic and transient
performance, efficiency, starting current, speed curve and etc.
Considering the load torque of pumps during starting stage, the rotor
bar was designed with minimum demagnetization of permanent
magnet caused by huge starting current.
Abstract: The design of Reverse logistics Network has attracted
growing attention with the stringent pressures from both
environmental awareness and business sustainability. Reverse
logistical activities include return, remanufacture, disassemble and
dispose of products can be quite complex to manage. In addition,
demand can be difficult to predict, and decision making is one of the
challenges task in such network. This complexity has amplified the
need to develop an integrated architecture for product return as an
enterprise system. The main purpose of this paper is to design Multi
Agent System (MAS) architecture using the Prometheus
methodology to efficiently manage reverse logistics processes. The
proposed MAS architecture includes five types of agents: Gate
keeping Agent, Collection Agent, Sorting Agent, Processing Agent
and Disposal Agent which act respectively during the five steps of
reverse logistics Network.
Abstract: HR is a department that enhances the power of
employee performance in regard with their services, and to make the
organization strategic objectives. The main concern of HR
department is to organize people, focus on policies and their system.
The empirical study shows the relationship between HRM (Human
Resource Management practices) and their Job Satisfaction. The
Hypothesis is testing on a sample of overall 320 employees of 5
different Pharmaceutical departments of different organizations in
Pakistan. The important thing as Relationship of Job satisfaction with
HR Practices, Impact on Job Satisfaction with HR Practices,
Participation of Staff of Different Departments, HR Practices effects
the Job satisfaction, Recruitment or Hiring and Selection effects the
Job satisfaction, Training and Development, Performance and
Appraisals, Compensation affects the Job satisfaction , and Industrial
Relationships affects the Job satisfaction. After finishing all data
analysis, the conclusion is that lots of Job related activities raise the
confidence of Job satisfaction of employees with their salary and
other benefits.
Abstract: This article presents a vibration diagnostic method
designed for Permanent Magnets (PM) electrical machines–traction
motors and generators. Those machines are commonly used in traction
drives of electrical vehicles and small wind or water systems. The
described method is very innovative and unique. Specific structural
properties of machines excited by permanent magnets are used in this
method - electromotive force (EMF) generated due to vibrations. There
was analyzed number of publications, which describe vibration
diagnostic methods, and tests of electrical machines and there was no
method found to determine the technical condition of such machine
basing on their own signals. This work presents field-circuit model,
results of static tests, results of calculations and simulations.
Abstract: In this paper, we provided a literature survey on the
artificial stock problem (ASM). The paper began by exploring the
complexity of the stock market and the needs for ASM. ASM
aims to investigate the link between individual behaviors (micro
level) and financial market dynamics (macro level). The variety of
patterns at the macro level is a function of the AFM complexity. The
financial market system is a complex system where the relationship
between the micro and macro level cannot be captured analytically.
Computational approaches, such as simulation, are expected to
comprehend this connection. Agent-based simulation is a simulation
technique commonly used to build AFMs. The paper proceeds by
discussing the components of the ASM. We consider the roles
of behavioral finance (BF) alongside the traditionally risk-averse
assumption in the construction of agent’s attributes. Also, the
influence of social networks in the developing of agents interactions is
addressed. Network topologies such as a small world, distance-based,
and scale-free networks may be utilized to outline economic
collaborations. In addition, the primary methods for developing
agents learning and adaptive abilities have been summarized.
These incorporated approach such as Genetic Algorithm, Genetic
Programming, Artificial neural network and Reinforcement Learning.
In addition, the most common statistical properties (the stylized facts)
of stock that are used for calibration and validation of ASM are
discussed. Besides, we have reviewed the major related previous
studies and categorize the utilized approaches as a part of these
studies. Finally, research directions and potential research questions
are argued. The research directions of ASM may focus on the macro
level by analyzing the market dynamic or on the micro level by
investigating the wealth distributions of the agents.
Abstract: Mobile Adhoc Networks (MANETs) are
infrastructure-less, dynamic network of collections of wireless mobile
nodes communicating with each other without any centralized
authority. A MANET is a mobile device of interconnections through
wireless links, forming a dynamic topology. Routing protocols have a
big role in data transmission across a network. Routing protocols,
two major classifications are unipath and multipath. This study
evaluates performance of an on-demand multipath routing protocol
named Adhoc On-demand Multipath Distance Vector routing
(AOMDV). This study proposes Energy Aware AOMDV (EAAOMDV)
an extension of AOMDV which decreases energy
consumed on a route.
Abstract: Voting algorithms are extensively used to make
decisions in fault tolerant systems where each redundant module
gives inconsistent outputs. Popular voting algorithms include
majority voting, weighted voting, and inexact majority voters. Each
of these techniques suffers from scenarios where agreements do not
exist for the given voter inputs. This has been successfully overcome
in literature using fuzzy theory. Our previous work concentrated on a
neuro-fuzzy algorithm where training using the neuro system
substantially improved the prediction result of the voting system.
Weight training of Neural Network is sub-optimal. This study
proposes to optimize the weights of the Neural Network using
Artificial Bee Colony algorithm. Experimental results show the
proposed system improves the decision making of the voting
algorithms.
Abstract: Based on application requirements, nodes are static or
mobile in Wireless Sensor Networks (WSNs). Mobility poses
challenges in protocol design, especially at the link layer requiring
mobility adaptation algorithms to localize mobile nodes and predict
link quality to be established with them. This study implements
XMAC and Berkeley Media Access Control (BMAC) routing
protocols to evaluate performance under WSN’s static and mobility
conditions. This paper gives a comparative study of mobility-aware
MAC protocols. Routing protocol performance, based on Average
End to End Delay, Average Packet Delivery Ratio, Average Number
of hops, and Jitter is evaluated.