Abstract: We propose that Virtual Learning Environments (VLEs) should be designed by taking into account the characteristics, the special needs and the specific operating rules of the academic institutions in which they are employed. In this context, we describe a VLE module that extends the support of the organization and delivery of course material by including administration activities related to the various stages of teaching. These include the co-ordination, collaboration and monitoring of the course material development process and institution-specific course material delivery modes. Our specialized module, which enhances VLE capabilities by Helping Educators and Learners through a Laboratory Assistance System, is willing to assist the Greek tertiary technological sector, which includes Technological Educational Institutes (T.E.I.).
Abstract: The aim of this paper is to present the role of
myotonometry in assessment muscle viscoelasticity by measurement
of force index (IF) and stiffness (S) at thigh muscle groups. The
results are used for improve the muscle training. The method is based
on mechanic impulse on the muscle group, that involve a muscle
response like acceleration, speed and amplitude curves. From these
we have information about elasticity, stiffness beginning from
mechanic oscillations of muscle tissue. Using this method offer the
possibility for monitoring the muscle capacity for produce mechanic
energy, that allows a efficiency of movement with a minimal tissue
deformation.
Abstract: This paper presented a modified efficient inductive
powering link based on ASK modulator and proposed efficient class-
E power amplifier. The design presents the external part which is
located outside the body to transfer power and data to the implanted
devices such as implanted Microsystems to stimulate and monitoring
the nerves and muscles. The system operated with low band
frequency 10MHZ according to industrial- scientific – medical (ISM)
band to avoid the tissue heating. For external part, the modulation
index is 11.1% and the modulation rate 7.2% with data rate 1 Mbit/s
assuming Tbit = 1us. The system has been designed using 0.35-μm
fabricated CMOS technology. The mathematical model is given and
the design is simulated using OrCAD P Spice 16.2 software tool and
for real-time simulation, the electronic workbench MULISIM 11 has
been used.
Abstract: A method and apparatus for noninvasive measurement
of blood glucose concentration based on transilluminated laser beam
via the Index Finger has been reported in this paper. This method
depends on atomic gas (He-Ne) laser operating at 632.8nm
wavelength. During measurement, the index finger is inserted into the
glucose sensing unit, the transilluminated optical signal is converted
into an electrical signal, compared with the reference electrical
signal, and the obtained difference signal is processed by signal
processing unit which presents the results in the form of blood
glucose concentration. This method would enable the monitoring
blood glucose level of the diabetic patient continuously, safely and
noninvasively.
Abstract: This paper presents the results of a comprehensive
investigation of five blackouts that occurred on 28 August to 8
September 2011 due to bushing failures of the 132/33 kV, 125 MVA
transformers at JBB Ali Grid station. The investigation aims to
explore the root causes of the bushing failures and come up with
recommendations that help in rectifying the problem and avoiding the
reoccurrence of similar type of incidents. The incident reports about
the failed bushings and the SCADA reports at this grid station were
examined and analyzed. Moreover, comprehensive power quality
field measurements at ten 33/11 kV substations (S/Ss) in JBB Ali
area were conducted, and frequency scans were performed to verify
any harmonic resonance frequencies due to power factor correction
capacitors. Furthermore, the daily operations of the on-load tap
changers (OLTCs) of both the 125 MVA and 20 MVA transformers
at JBB Ali Grid station have been analyzed. The investigation
showed that the five bushing failures were due to a local problem, i.e.
internal degradation of the bushing insulation. This has been
confirmed by analyzing the time interval between successive OLTC
operations of the faulty grid transformers. It was also found that
monitoring the number of OLTC operations can help in predicting
bushing failure.
Abstract: The present work faces the problem of automatic enumeration and recognition of an unknown and time-varying number of environmental sound sources while using a single microphone. The assumption that is made is that the sound recorded is a realization of sound sources belonging to a group of audio classes which is known a-priori. We describe two variations of the same principle which is to calculate the distance between the current unknown audio frame and all possible combinations of the classes that are assumed to span the soundscene. We concentrate on categorizing environmental sound sources, such as birds, insects etc. in the task of monitoring the biodiversity of a specific habitat.
Abstract: Traditional multivariate control charts assume that measurement from manufacturing processes follows a multivariate normal distribution. However, this assumption may not hold or may be difficult to verify because not all the measurement from manufacturing processes are normal distributed in practice. This study develops a new multivariate control chart for monitoring the processes with non-normal data. We propose a mechanism based on integrating the one-class classification method and the adaptive technique. The adaptive technique is used to improve the sensitivity to small shift on one-class classification in statistical process control. In addition, this design provides an easy way to allocate the value of type I error so it is easier to be implemented. Finally, the simulation study and the real data from industry are used to demonstrate the effectiveness of the propose control charts.
Abstract: To improve HSE standards, oil and gas industries are
interested in using remotely controlled and autonomous robots instead
of human workers on offshore platforms. In addition to earlier reason
this strategy would increase potential revenue, efficient usage of
work experts and even would allow operations in more remote areas.
This article is the presentation of a custom climbing robot, called
Walloid, designed for offshore platform topside automation. This 4
arms climbing robot with grippers is an ongoing project at University
of Oslo.
Abstract: A geothermal power plant multiple simulator for
operators training is presented. The simulator is designed to be
installed in a wireless local area network and has a capacity to train
one to six operators simultaneously, each one with an independent
simulation session. The sessions must be supervised only by one
instructor. The main parts of this multiple simulator are: instructor
and operator-s stations. On the instructor station, the instructor
controls the simulation sessions, establishes training exercises and
supervises each power plant operator in individual way. This station
is hosted in a Main Personal Computer (NS) and its main functions
are: to set initial conditions, snapshots, malfunctions or faults,
monitoring trends, and process and soft-panel diagrams. On the other
hand the operators carry out their actions over the power plant
simulated on the operator-s stations; each one is also hosted in a PC.
The main software of instructor and operator-s stations are executed
on the same NS and displayed in PCs through graphical Interactive
Process Diagrams (IDP). The geothermal multiple simulator has been
installed in the Geothermal Simulation Training Center (GSTC) of
the Comisi├│n Federal de Electricidad, (Federal Commission of
Electricity, CFE), Mexico, and is being utilized as a part of the
training courses for geothermal power plant operators.
Abstract: In the project FleGSens, a wireless sensor network
(WSN) for the surveillance of critical areas and properties is currently developed which incorporates mechanisms to ensure information
security. The intended prototype consists of 200 sensor nodes for
monitoring a 500m long land strip. The system is focused on ensuring
integrity and authenticity of generated alarms and availability in the
presence of an attacker who may even compromise a limited number
of sensor nodes. In this paper, two of the main protocols developed
in the project are presented, a tracking protocol to provide secure
detection of trespasses within the monitored area and a protocol for secure detection of node failures. Simulation results of networks
containing 200 and 2000 nodes as well as the results of the first prototype comprising a network of 16 nodes are presented. The focus of the simulations and prototype are functional testing of the protocols
and particularly demonstrating the impact and cost of several attacks.
Abstract: Context awareness is a capability whereby mobile
computing devices can sense their physical environment and adapt
their behavior accordingly. The term context-awareness, in
ubiquitous computing, was introduced by Schilit in 1994 and has
become one of the most exciting concepts in early 21st-century
computing, fueled by recent developments in pervasive computing
(i.e. mobile and ubiquitous computing). These include computing
devices worn by users, embedded devices, smart appliances, sensors
surrounding users and a variety of wireless networking technologies.
Context-aware applications use context information to adapt
interfaces, tailor the set of application-relevant data, increase the
precision of information retrieval, discover services, make the user
interaction implicit, or build smart environments. For example: A
context aware mobile phone will know that the user is currently in a
meeting room, and reject any unimportant calls. One of the major
challenges in providing users with context-aware services lies in
continuously monitoring their contexts based on numerous sensors
connected to the context aware system through wireless
communication. A number of context aware frameworks based on
sensors have been proposed, but many of them have neglected the
fact that monitoring with sensors imposes heavy workloads on
ubiquitous devices with limited computing power and battery. In this
paper, we present CALEEF, a lightweight and energy efficient
context aware framework for resource limited ubiquitous devices.
Abstract: Since large power transformers are the most
expensive and strategically important components of any power
generator and transmission system, their reliability is crucially
important for the energy system operation. Also, Circuit breakers are
very important elements in the power transmission line so monitoring
the events gives a knowledgebase to determine time to the next
maintenance. This paper deals with the introduction of the
comparative method of the state estimation of transformers and
Circuit breakers using continuous monitoring of voltage, current.
This paper gives details a new method based on wavelet to apparatus
insulation monitoring. In this paper to insulation monitoring of
transformer, a new method based on wavelet transformation and
neutral point analysis is proposed. Using the EMTP tools, fault in
transformer winding and the detailed transformer winding model
were simulated. The current of neutral point of winding was analyzed
by wavelet transformation. It is shown that the neutral current of the
transformer winding has useful information about fault in insulation
of the transformer.
Abstract: A wrist-band type biosignal measurement system and its data transfer through human body communication (HBC) were investigated. An HBC method based on pulses of ultra-wide band instead of using frequency or amplitude modulations was studied and implemented since the system became very compact and it was more suited for personal or mobile health monitoring. Our system measured photo-plethysmogram (PPG) and measured PPG signals were transmitted through a finger to a monitoring PC system. The device was compact and low-power consuming. HBC communication has very strongsecurity measures since it does not use wireless network.Furthermore, biosignal monitoring system becomes handy because it does not need to have wire connections.
Abstract: The system is made with main distributed components:
First Level: Industrial Computers placed in Control Room (monitors thermal and electrical processes based on the data provided by the second level); Second Level: PLCs which collects data from process and transmits information on the first level; also takes commands from this level which are further, passed to execution elements from third
level; Third Level: field elements consisting in 3 categories: data collecting elements; data transfer elements from the third level to the second; execution elements which take commands from the second
level PLCs and executes them after which transmits the confirmation of execution to them. The purpose of the automatic functioning is the optimization of the co-generative electrical energy commissioning in the national
energy system and the commissioning of thermal energy to the consumers.
The integrated system treats the functioning of all the equipments and devices as a whole: Gas Turbine Units (GTU); MT 20kV Medium Voltage Station (MVS); 0,4 kV Low Voltage Station (LVS); Main Hot Water Boilers (MHW); Auxiliary Hot Water Boilers (AHW); Gas Compressor Unit (GCU); Thermal Agent Circulation
Pumping Unit (TPU); Water Treating Station (WTS).
Abstract: Capacitive electrocardiogram (ECG) measurement is an attractive approach for long-term health monitoring. However, there is little literature available on its implementation, especially for multichannel system in standard ECG leads. This paper begins from the design criteria for capacitive ECG measurement and presents a multichannel limb-lead capacitive ECG system with conductive fabric tapes pasted on a double layer PCB as the capacitive sensors. The proposed prototype system incorporates a capacitive driven-body (CDB) circuit to reduce the common-mode power-line interference (PLI). The presented prototype system has been verified to be stable by theoretic analysis and practical long-term experiments. The signal quality is competitive to that acquired by commercial ECG machines. The feasible size and distance of capacitive sensor have also been evaluated by a series of tests. From the test results, it is suggested to be greater than 60 cm2 in sensor size and be smaller than 1.5 mm in distance for capacitive ECG measurement.
Abstract: Wireless sensor networks can be used to measure and monitor many challenging problems and typically involve in monitoring, tracking and controlling areas such as battlefield monitoring, object tracking, habitat monitoring and home sentry systems. However, wireless sensor networks pose unique security challenges including forgery of sensor data, eavesdropping, denial of service attacks, and the physical compromise of sensor nodes. Node in a sensor networks may be vanished due to power exhaustion or malicious attacks. To expand the life span of the sensor network, a new node deployment is needed. In military scenarios, intruder may directly organize malicious nodes or manipulate existing nodes to set up malicious new nodes through many kinds of attacks. To avoid malicious nodes from joining the sensor network, a security is required in the design of sensor network protocols. In this paper, we proposed a security framework to provide a complete security solution against the known attacks in wireless sensor networks. Our framework accomplishes node authentication for new nodes with recognition of a malicious node. When deployed as a framework, a high degree of security is reachable compared with the conventional sensor network security solutions. A proposed framework can protect against most of the notorious attacks in sensor networks, and attain better computation and communication performance. This is different from conventional authentication methods based on the node identity. It includes identity of nodes and the node security time stamp into the authentication procedure. Hence security protocols not only see the identity of each node but also distinguish between new nodes and old nodes.
Abstract: The Beshar River is one aquatic ecosystem,which is
affected by pollutants. This study was conducted to evaluate the
effects of human activities on the water quality of the Beshar river.
This river is approximately 190 km in length and situated at the
geographical positions of 51° 20' to 51° 48' E and 30° 18' to 30° 52'
N it is one of the most important aquatic ecosystems of Kohkiloye
and Boyerahmad province next to the city of Yasuj in southern Iran.
The Beshar river has been contaminated by industrial, agricultural
and other activities in this region such as factories, hospitals,
agricultural farms, urban surface runoff and effluent of wastewater
treatment plants. In order to evaluate the effects of these pollutants
on the quality of the Beshar river, five monitoring stations were
selected along its course. The first station is located upstream of
Yasuj near the Dehnow village; stations 2 to 4 are located east, south
and west of city; and the 5th station is located downstream of Yasuj.
Several water quality parameters were sampled. These include pH,
dissolved oxygen, biological oxygen demand (BOD), temperature,
conductivity, turbidity, total dissolved solids and discharge or flow
measurements. Water samples from the five stations were collected
and analysed to determine the following physicochemical
parameters: EC, pH, T.D.S, T.H, No2, DO, BOD5, COD during 2008
to 2009. The study shows that the BOD5 value of station 1 is at a
minimum (1.5 ppm) and increases downstream from stations 2 to 4 to
a maximum (7.2 ppm), and then decreases at station 5. The DO
values of station 1 is a maximum (9.55 ppm), decreases downstream
to stations 2 - 4 which are at a minimum (3.4 ppm), before increasing
at station 5. The amount of BOD and TDS are highest at the 4th
station and the amount of DO is lowest at this station, marking the
4th station as more highly polluted than the other stations. The
physicochemical parameters improve at the 5th station due to
pollutant degradation and dilution. Finally the point and nonpoint
pollutant sources of Beshar river were determined and compared to
the monitoring results.
Abstract: This paper presented a MATLAB-based system named Smart Access Network Testing, Analyzing and Database (SANTAD), purposely for in-service transmission surveillance and self restoration against fiber fault in fiber-to-the-home (FTTH) access network. The developed program will be installed with optical line terminal (OLT) at central office (CO) to monitor the status and detect any fiber fault that occurs in FTTH downwardly from CO towards residential customer locations. SANTAD is interfaced with optical time domain reflectometer (OTDR) to accumulate every network testing result to be displayed on a single computer screen for further analysis. This program will identify and present the parameters of each optical fiber line such as the line's status either in working or nonworking condition, magnitude of decreasing at each point, failure location, and other details as shown in the OTDR's screen. The failure status will be delivered to field engineers for promptly actions, meanwhile the failure line will be diverted to protection line to ensure the traffic flow continuously. This approach has a bright prospect to improve the survivability and reliability as well as increase the efficiency and monitoring capabilities in FTTH.
Abstract: Privacy issues commonly discussed among
researchers, practitioners, and end-users in pervasive healthcare.
Pervasive healthcare systems are applications that can support
patient-s need anytime and anywhere. However, pervasive healthcare
raises privacy concerns since it can lead to situations where patients
may not be aware that their private information is being shared and
becomes vulnerable to threat. We have systematically analyzed the
privacy issues and present a summary in tabular form to show the
relationship among the issues. The six issues identified are medical
information misuse, prescription leakage, medical information
eavesdropping, social implications for the patient, patient difficulties
in managing privacy settings, and lack of support in designing
privacy-sensitive applications. We narrow down the issues and chose
to focus on the issue of 'lack of support in designing privacysensitive
applications' by proposing a privacy-sensitive architecture
specifically designed for pervasive healthcare monitoring systems.
Abstract: One of the difficulties of the vibration-based damage identification methods is the nonuniqueness of the results of damage identification. The different damage locations and severity may cause the identical response signal, which is even more severe for detection of the multiple damage. This paper proposes a new strategy for damage detection to avoid this nonuniqueness. This strategy firstly determines the approximates damage area based on the statistical pattern recognition method using the dynamic strain signal measured by the distributed fiber Bragg grating, and then accurately evaluates the damage information based on the Bayesian model updating method using the experimental modal data. The stochastic simulation method is then used to compute the high-dimensional integral in the Bayesian problem. Finally, an experiment of the plate structure, simulating one part of mechanical structure, is used to verify the effectiveness of this approach.