Abstract: Reliability Centered Maintenance(RCM) is one of
most widely used methods in the modern power system to schedule a
maintenance cycle and determine the priority of inspection. In order
to apply the RCM method to the Smart Grid, a precedence study for
the new structure of rearranged system should be performed due to
introduction of additional installation such as renewable and
sustainable energy resources, energy storage devices and advanced
metering infrastructure. This paper proposes a new method to
evaluate the priority of maintenance and inspection of the power
system facilities in the Smart Grid using the Risk Priority Number. In
order to calculate that risk index, it is required that the reliability
block diagram should be analyzed for the Smart Grid system. Finally,
the feasible technical method is discussed to estimate the risk
potential as part of the RCM procedure.
Abstract: This paper investigates the use of mobile phones and
tablets for learning purposes among university students in Saudi
Arabia. For this purpose, an extended Technology Acceptance Model
(TAM) is proposed to analyze the adoption of mobile devices and
smart phones by Saudi university students for accessing course
materials, searching the web for information related to their
discipline, sharing knowledge, conducting assignments etc.
Abstract: Like any sentient organism, a smart environment
relies first and foremost on sensory data captured from the real
world. The sensory data come from sensor nodes of different
modalities deployed on different locations forming a Wireless Sensor
Network (WSN). Embedding smart sensors in humans has been a
research challenge due to the limitations imposed by these sensors
from computational capabilities to limited power. In this paper, we
first propose a practical WSN application that will enable blind
people to see what their neighboring partners can see. The challenge
is that the actual mapping between the input images to brain pattern
is too complex and not well understood. We also study the
connectivity problem in 3D/2D wireless sensor networks and propose
distributed efficient algorithms to accomplish the required
connectivity of the system. We provide a new connectivity algorithm
CDCA to connect disconnected parts of a network using cooperative
diversity. Through simulations, we analyze the connectivity gains
and energy savings provided by this novel form of cooperative
diversity in WSNs.
Abstract: The flow filed around a flatted-roof compound has
been investigated by means of 2D and 3D numerical simulations. A
constant wind velocity profile, based both on the maximum reference
wind speed in the building site (peak gust speed worked out for a 50-
year return period) and on the local roughness coefficient, has been
simulated in order to determine the wind-induced loads on top of the
roof. After determining the influence of the incoming wind directions
on the induced roof loads, a 2D analysis of the most severe load
condition has been performed, achieving a numerical quantification
of the expected wind-induced forces on the PV panels on top of the
roof.
Abstract: The development of distributed systems has been affected by the need to accommodate an increasing degree of flexibility, adaptability, and autonomy. The Mobile Agent technology is emerging as an alternative to build a smart generation of highly distributed systems. In this work, we investigate the performance aspect of agent-based technologies for information retrieval. We present a comparative performance evaluation model of Mobile Agents versus Remote Method Invocation by means of an analytical approach. We demonstrate the effectiveness of mobile agents for dynamic code deployment and remote data processing by reducing total latency and at the same time producing minimum network traffic. We argue that exploiting agent-based technologies significantly enhances the performance of distributed systems in the domain of information retrieval.
Abstract: New advancement of technology and never satisfying demands of the civilization are putting huge pressure on the natural fuel resources and these resources are at a constant threat to its sustainability. To get the best out of the automobile, the optimum balance between performance and fuel economy is important. In the present state of art, either of the above two aspects are taken into mind while designing and development process which puts the other in the loss as increase in fuel economy leads to decrement in performance and vice-versa. In-depth observation of the vehicle dynamics apparently shows that large amount of energy is lost during braking and likewise large amount of fuel is consumed to reclaim the initial state, this leads to lower fuel efficiency to gain the same performance. Current use of Kinetic Energy Recovery System is only limited to sports vehicles only because of the higher cost of this system. They are also temporary in nature as power can be squeezed only during a small time duration and use of superior parts leads to high cost, which results on concentration on performance only and neglecting the fuel economy. In this paper Kinetic Energy Recovery System for storing the power and then using the same while accelerating has been discussed. The major storing element in this system is a Flat Spiral Spring that will store energy by compression and torsion.
The use of spring ensure the permanent storage of energy until used by the driver unlike present mechanical regeneration system in which the energy stored decreases with time and is eventually lost. A combination of internal gears and spur gears will be used in order to make the energy release uniform which will lead to safe usage. The system can be used to improve the fuel efficiency by assisting in overcoming the vehicle’s inertia after braking or to provide instant acceleration whenever required by the driver. The performance characteristics of the system including response time, mechanical efficiency and overall increase in efficiency are demonstrated. This technology makes the KERS (Kinetic Energy Recovery System) more flexible and economical allowing specific application while at the same time increasing the time frame and ease of usage.
Abstract: The main objective of this article is to present the semi-active vibration control using an electro-rheological fluid embedded sandwich structure for a cantilever beam. ER fluid is a smart material, which cause the suspended particles polarize and connect each other to form chain. The stiffness and damping coefficients of the ER fluid can be changed in 10 micro seconds; therefore, ERF is suitable to become the material embedded in the tunable vibration absorber to become a smart absorber. For the ERF smart material embedded structure, the fuzzy control law depends on the experimental expert database and the proposed self-tuning strategy. The electric field is controlled by a CRIO embedded system to implement the real application. This study investigates the different performances using the Type-1 fuzzy and interval Type-2 fuzzy controllers. The Interval type-2 fuzzy control is used to improve the modeling uncertainties for this ERF embedded shock absorber. The self-tuning vibration controllers using Type-1 and Interval Type-2 fuzzy law are implemented to the shock absorber system. Based on the resulting performance, Internal Type-2 fuzzy is better than the traditional Type-1 fuzzy control for this vibration control system.
Abstract: A low cost Short Message System (SMS) based Home security system equipped with motion, smoke, temperature, humidity and light sensors has been studied and tested. The sensors are controlled by a microprocessor PIC 18F4520 through the SMS having password protection code for the secure operation. The user is able to switch light and the appliances and get instant feedback. Also in cases of emergencies such as fire or robbery the system will send alert message to occupant and relevant civil authorities. The operation of the home security has been tested on Vodafone- Fiji network and Digicel Fiji Network for emergency and feedback responses for 25 samples. The experiment showed that it takes about 8-10s for the security system to respond in case of emergency. It takes about 18-22s for the occupant to switch and monitor lights and appliances and then get feedback depending upon the network traffic.
Abstract: There are many expand of Wi-Fi zones provided
mobile careers and usage of wireless access point at home as increase
of usage of wireless internet caused by the use of smart phone. This
paper shows wireless local area network status, security threats of
WLAN and functionality of major wireless access point in Korea. We
propose security countermeasures concerned with life cycle of access
point from manufacturing to installation, using and finally disposal.
There needed to releasing with configured secure at access point.
Because, it is most cost effective resolution than stage of installation or
other life cycle of access point.
Abstract: Cities denote instantaneously a challenge and an
opportunity for climate change policy. Cities are the place where
most energy services are needed because urbanization is closely
linked to high population densities and concentration of economic
activities and production (Urban energy demand). Consequently, it is
critical to explain about the role of cities within the world-s energy
systems and its correlation with the climate change issue. With more
than half of the world-s population already living in urban areas, and
that percentage expected to rise to 75 per cent by 2050, it is clear that
the path to sustainable development must pass through cities. Cities
expanding in size and population pose increased challenges to the
environment, of which energy is part as a natural resource, and to the
quality of life. Nowadays, most cities have already understood the
importance of sustainability, both at their local scale as in terms of
their contribution to sustainability at higher geographical scales. It
requires the perception of a city as a complex and dynamic
ecosystem, an open system, or cluster of systems, where the energy
as well as the other natural resources is transformed to satisfy the
needs of the different urban activities. In fact, buildings and
transportation generally represent most of cities direct energy
demand, i.e., between 60 per cent and 80 per cent of the overall
consumption. Buildings, both residential and services are usually
influenced by the local physical and social conditions. In terms of
transport, the energy demand is also strongly linked with the specific
characteristics of a city (urban mobility).The concept of a “smart
city" builds on statistics as seven key axes of a city-s success in
moving towards common platform (brain nerve)of sustainable urban
energy systems.
With the aforesaid knowledge, the authors have suggested a frame
work to role of cities, as energy actors for smart city management.
The authors have discusses the potential elements needed for energy
in smart cities and also identified potential energy actions and
relevant barriers. Furthermore, three levels of city smartness in cities
actions to overcome market /institutional failures with a local
approach are distinguished. The authors have made an attempt to
conceive and implement concepts of city smartness by adopting the
city or local government as nerve center through an integrated
planning approach. Finally, concluding with recommendations for
the organization of the Smart Sustainable Cities for positive changes
of urban India.
Abstract: As the latest advancement and trend in IT field, Green
& Smart IT has attracted more and more attentions from researchers.
This study focuses on the development of assessing tools which can be
used for evaluating Green & Smart IT level within an organization. In
order to achieve meaningful results, a comprehensive review of
relevant literature was performed in advance, then, Delphi survey and
other processes were also employed to develop the assessment tools
for Green & Smart IT level. Two rounds of Delphi questionnaire
survey were conducted with 20 IT experts in public sector. The results
reveal that the top five weighted KPIs to evaluate maturity of Green &
Smart IT were: (1) electronic execution of business process; (2)
shutdown of unused IT devices; (3) virtualization of severs; (4)
automation of constant temperature and humidity; and (5) introduction
of smart-work system. Finally, these tools were applied to case study
of a public research institute in Korea. The findings presented in this
study provide organizations with useful implications for the
introduction and promotion of Green & Smart IT in the future
Abstract: This paper presents an exact solution and a finite element method (FEM) for a Piezoceramic Rod under static load. The cylindrical rod is made from polarized ceramics (piezoceramics) with axial poling. The lateral surface of the rod is traction-free and is unelectroded. The two end faces are under a uniform normal traction. Electrically, the two end faces are electroded with a circuit between the electrodes, which can be switched on or off. Two cases of open and shorted electrodes (short circuit and open circuit) will be considered. Finally, a finite element model will be used to compare the results with an exact solution. The study uses ABAQUS (v.6.7) software to derive the finite element model of the ceramic rod.
Abstract: The study investigated the practices of organisations in Gulf Cooperation Council (GCC) countries with regards to G2C egovernment maturity. It reveals that e-government G2C initiatives in the surveyed countries in particular, and arguably around the world in general, are progressing slowly because of the lack of a trusted and secure medium to authenticate the identities of online users. The authors conclude that national ID schemes will play a major role in helping governments reap the benefits of e-government if the three advanced technologies of smart card, biometrics and public key infrastructure (PKI) are utilised to provide a reliable and trusted authentication medium for e-government services.
Abstract: In Public Wireless LANs(PWLANs), user anonymity
is an essential issue. Recently, Juang et al. proposed an anonymous
authentication and key exchange protocol using smart cards in
PWLANs. They claimed that their proposed scheme provided identity
privacy, mutual authentication, and half-forward secrecy. In this paper,
we point out that Juang et al.'s protocol is vulnerable to the
stolen-verifier attack and does not satisfy user anonymity.
Abstract: Like other external sorting algorithms, the presented
algorithm is a two step algorithm including internal and external
steps. The first part of the algorithm is like the other similar
algorithms but second part of that is including a new easy
implementing method which has reduced the vast number of inputoutput
operations saliently. As decreasing processor operating time
does not have any effect on main algorithm speed, any improvement
in it should be done through decreasing the number of input-output
operations. This paper propose an easy algorithm for choose the
correct record location of the final list. This decreases the time
complexity and makes the algorithm faster.
Abstract: The accelerated growth in aircraft industries desire
effectual schemes, programs, innovative designs of advanced systems
and facilities to accomplish the augmenting need for home-free air
transportation. In this paper, a contemporary conceptual design of a
cambered airfoil has been proposed in order to providing augmented
effective lift force relative to the airplane, and to eliminating
drawbacks and limitations of an airfoil in a commercial airplane by
using a kind of smart materials. This invention of an unsymmetrical
airfoil structure utilizes the amplified air momentum around the
airfoil and increased camber length to providing improved aircraft
performance and assist to enhancing the reliability of the aircraft
components. Moreover, this conjectured design helps to reducing
airplane weight and total drag.
Abstract: One challenging direction of mobile commerce (mcommerce)
that is getting a great deal of attention globally is mobile
financing. The smart-phone and PDA users all around the world are
facing difficulties to become accustomed and trust in m-commerce.
The main rationale can be the slow variation and lack of trust in
mobile payment systems. Mobile payment systems that are in use
need to be more effective and efficient. This paper proposes: the
interface design is not the only factor affecting the m-commerce
adoption and lack of trust; in fact it is the combined effect of
interface usability and trustworthy mobile payment systems, because
it-s the money that the user has to spend at the end of the day, which
the user requires to get transferred securely. The purpose of this
research is to identify the problems regarding the trust and adaption
of m-commerce applications by mobile users and to provide the best
possible solution with respect to human computer interaction (HCI)
principles.
Abstract: An emotional speech recognition system for the
applications on smart phones was proposed in this study to combine
with 3G mobile communications and social networks to provide users
and their groups with more interaction and care. This study developed
a mechanism using the support vector machines (SVM) to recognize
the emotions of speech such as happiness, anger, sadness and normal.
The mechanism uses a hierarchical classifier to adjust the weights of
acoustic features and divides various parameters into the categories of
energy and frequency for training. In this study, 28 commonly used
acoustic features including pitch and volume were proposed for
training. In addition, a time-frequency parameter obtained by
continuous wavelet transforms was also used to identify the accent and
intonation in a sentence during the recognition process. The Berlin
Database of Emotional Speech was used by dividing the speech into
male and female data sets for training. According to the experimental
results, the accuracies of male and female test sets were increased by
4.6% and 5.2% respectively after using the time-frequency parameter
for classifying happy and angry emotions. For the classification of all
emotions, the average accuracy, including male and female data, was
63.5% for the test set and 90.9% for the whole data set.
Abstract: A pressure-based implicit procedure to solve Navier-
Stokes equations on a nonorthogonal mesh with collocated finite
volume formulation is used to simulate flow around the smart and
conventional flaps of spoiler under the ground effect. Cantilever
beam with uniformly varying load with roller support at the free end
is considered for smart flaps. The boundedness criteria for this
procedure are determined from a Normalized Variable diagram
(NVD) scheme. The procedure incorporates es the k -ε eddyviscosity
turbulence model. The method is first validated against
experimental data. Then, the algorithm is applied for turbulent
aerodynamic flows around a spoiler section with smart and
conventional flaps for different attack angle, flap angle and ground
clearance where the results of two flaps are compared.
Abstract: Security has been an important issue and concern in the
smart home systems. Smart home networks consist of a wide range of
wired or wireless devices, there is possibility that illegal access to
some restricted data or devices may happen. Password-based
authentication is widely used to identify authorize users, because this
method is cheap, easy and quite accurate. In this paper, a neural
network is trained to store the passwords instead of using verification
table. This method is useful in solving security problems that
happened in some authentication system. The conventional way to
train the network using Backpropagation (BPN) requires a long
training time. Hence, a faster training algorithm, Resilient
Backpropagation (RPROP) is embedded to the MLPs Neural
Network to accelerate the training process. For the Data Part, 200
sets of UserID and Passwords were created and encoded into binary
as the input. The simulation had been carried out to evaluate the
performance for different number of hidden neurons and combination
of transfer functions. Mean Square Error (MSE), training time and
number of epochs are used to determine the network performance.
From the results obtained, using Tansig and Purelin in hidden and
output layer and 250 hidden neurons gave the better performance. As
a result, a password-based user authentication system for smart home
by using neural network had been developed successfully.