Search results for: Pareto optimal solution.
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3901

Search results for: Pareto optimal solution.

1321 Effect of Robot Configuration Parameters, Masses and Friction on Painlevé Paradox for a Sliding Two-Link (P-R) Robot

Authors: Hassan M. Alkomy, Hesham A. Elkaranshawy, Ahmed S. Ashour, Khaled T. Mohamed

Abstract:

For a rigid body sliding on a rough surface, a range of uncertainty or non-uniqueness of solution could be found, which is termed: Painlevé paradox. Painlevé paradox is the reason of a wide range of bouncing motion, observed during sliding of robotic manipulators on rough surfaces. In this research work, the existence of the paradox zone during the sliding motion of a two-link (P-R) robotic manipulator with a unilateral constraint is investigated. Parametric study is performed to investigate the effect of friction, link-length ratio, total height and link-mass ratio on the paradox zone.

Keywords: Dynamical system, friction, multibody system, Painlevé paradox, robotic systems, sliding robots, unilateral constraint.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4737
1320 The First Integral Approach in Stability Problem of Large Scale Nonlinear Dynamical Systems

Authors: M. Kidouche, H. Habbi, M. Zelmat, S. Grouni

Abstract:

In analyzing large scale nonlinear dynamical systems, it is often desirable to treat the overall system as a collection of interconnected subsystems. Solutions properties of the large scale system are then deduced from the solution properties of the individual subsystems and the nature of the interconnections. In this paper a new approach is proposed for the stability analysis of large scale systems, which is based upon the concept of vector Lyapunov functions and the decomposition methods. The present results make use of graph theoretic decomposition techniques in which the overall system is partitioned into a hierarchy of strongly connected components. We show then, that under very reasonable assumptions, the overall system is stable once the strongly connected subsystems are stables. Finally an example is given to illustrate the constructive methodology proposed.

Keywords: Comparison principle, First integral, Large scale system, Lyapunov stability.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1527
1319 Measurement Scheme Improving for State Estimation Using Stochastic Tabu Search

Authors: T. Kerdchuen

Abstract:

This paper proposes the stochastic tabu search (STS) for improving the measurement scheme for power system state estimation. If the original measured scheme is not observable, the additional measurements with minimum number of measurements are added into the system by STS so that there is no critical measurement pair. The random bit flipping and bit exchanging perturbations are used for generating the neighborhood solutions in STS. The Pδ observable concept is used to determine the network observability. Test results of 10 bus, IEEE 14 and 30 bus systems are shown that STS can improve the original measured scheme to be observable without critical measurement pair. Moreover, the results of STS are superior to deterministic tabu search (DTS) in terms of the best solution hit.

Keywords: Measurement Scheme, Power System StateEstimation, Network Observability, Stochastic Tabu Search (STS).

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1275
1318 Extracting Tongue Shape Dynamics from Magnetic Resonance Image Sequences

Authors: María S. Avila-García, John N. Carter, Robert I. Damper

Abstract:

An important problem in speech research is the automatic extraction of information about the shape and dimensions of the vocal tract during real-time speech production. We have previously developed Southampton dynamic magnetic resonance imaging (SDMRI) as an approach to the solution of this problem.However, the SDMRI images are very noisy so that shape extraction is a major challenge. In this paper, we address the problem of tongue shape extraction, which poses difficulties because this is a highly deforming non-parametric shape. We show that combining active shape models with the dynamic Hough transform allows the tongue shape to be reliably tracked in the image sequence.

Keywords: Vocal tract imaging, speech production, active shapemodels, dynamic Hough transform, object tracking.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1735
1317 Application of a SubIval Numerical Solver for Fractional Circuits

Authors: Marcin Sowa

Abstract:

The paper discusses the subinterval-based numerical method for fractional derivative computations. It is now referred to by its acronym – SubIval. The basis of the method is briefly recalled. The ability of the method to be applied in time stepping solvers is discussed. The possibility of implementing a time step size adaptive solver is also mentioned. The solver is tested on a transient circuit example. In order to display the accuracy of the solver – the results have been compared with those obtained by means of a semi-analytical method called gcdAlpha. The time step size adaptive solver applying SubIval has been proven to be very accurate as the results are very close to the referential solution. The solver is currently able to solve FDE (fractional differential equations) with various derivative orders for each equation and any type of source time functions.

Keywords: Numerical method, SubIval, fractional calculus, numerical solver, circuit analysis.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 668
1316 A Concept of Successful Collaborative Design towards Sustainability of Project Development

Authors: Yani Rahmawati, Nadjadji Anwar, Christiono Utomo

Abstract:

Development in construction industry is leading to involve complexities in engineering systems; whereas it also required to its sustainability towards social, environmental, and economical aspects. Experts with requisite background and expertise are involved in order to integrate knowledge in achieving whole criteria through design process. Collaborative design is needed in order to attain optimum design through shared solution and goal from experts. This study is conducted to explore issues and approaches development of collaborative design research in construction and its influence to sustainability of the development. Literature review method is used in order to conceptually figure future research direction of collaborative design research. This research is a part of beginning process in doctoral research program, and will be used to support dissertation’s conceptual definition.

Keywords: Collaborative design, multi-discipline design, design process, sustainability of project development.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2227
1315 Isolation and Identification of an Acetobacter Strain from Iranian White-Red Cherry with High Acetic Acid Productivity as a Potential Strain for Cherry Vinegar Production in Foodand Agriculture Biotechnology

Authors: K. Beheshti Maal, R. Shafiee

Abstract:

According to FDA (Food and Drug Administration of the United States), vinegar is definedas a sour liquid containing at least 4 grams acetic acid in 100 cubic centimeter (4% solution of acetic acid) of solution that is produced from sugary materials by alcoholic fermentation. In the base of microbial starters, vinegars could be contained of more than 50 types of volatile and aromatic substances that responsible for their sweet taste and smelling. Recently the vinegar industry has a great proportion in agriculture, food and microbial biotechnology. The acetic acid bacteria are from the family Acetobacteraceae. Regarding to the latest version of Bergy-s Mannual of Systematic Bacteriology that has categorized bacteria in the base of their 16s RNA differences, the most important acetic acid genera are included Acetobacter (genus I), Gluconacetobacter (genus VIII) and Gluconobacter (genus IX). The genus Acetobacter that is primarily used in vinegar manufacturing plants is a gram negative, obligate aerobe coccus or rod shaped bacterium with the size 0.6 - 0.8 X 1.0 - 4.0 μm, nonmotile or motile with peritrichous flagella and catalase positive – oxidase negative biochemically. Some strains are overoxidizer that could convert acetic acid to carbon dioxide and water.In this research one Acetobacter native strain with high acetic acid productivity was isolated from Iranian white – red cherry. We used two specific culture media include Carr medium [yeast extract, 3%; ethanol, 2% (v/v); bromocresol green, 0.002%; agar, 2% and distilled water, 1000 ml], Frateur medium [yeast extract, 10 g/l; CaCO3, 20 g/l; ethanol, 20 g/l; agar, 20 g/l and distilled water, 1000 ml] and an industrial culture medium. In addition to high acetic acid production and high growth rate, this strain had a good tolerance against ethanol concentration that was examined using modified Carr media with 5%, 7% and 9% ethanol concentrations. While the industrial strains of acetic acid bacteria grow in the thermal range of 28 – 30 °C, this strain was adapted for growth in 34 – 36 °C after 96 hours incubation period. These dramatic characteristics suggest a potential biotechnological strain in production of cherry vinegar with a sweet smell and different nutritional properties in comparison to recent vinegar types. The lack of growth after 24, 48 and 72 hours incubation at 34 – 36 °C and the growth after 96 hours indicates a good and fast thermal flexibility of this strain as a significant characteristic of biotechnological and industrial strains.

Keywords: Acetobacte, acetic acid bacteria, white – red cherry, food and agriculture biotechnology, industrial fermentation, vinegar

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5020
1314 Development of Software Complex for Digitalization of Enterprise Activities

Authors: G. T. Balakayeva, K. K. Nurlybayeva, M. B. Zhanuzakov

Abstract:

In the proposed work, we have developed software and designed a software architecture for the implementation of enterprise business processes. The proposed software has a multi-level architecture using a domain-specific tool. The developed architecture is a guarantor of the availability, reliability and security of the system and the implementation of business processes, which are the basis for effective enterprise management. Automating business processes, automating the algorithmic stages of an enterprise, developing optimal algorithms for managing activities, controlling and monitoring, reducing risks and improving results help organizations achieve strategic goals quickly and efficiently. The software described in this article can connect to the corporate information system via two methods: a desktop client and a web client. With an appeal to the application server, the desktop client program connects to the information system on the company's work PCs over a local network. Outside the organization, the user can interact with the information system via a web browser, which acts as a web client and connects to a web server. The developed software consists of several integrated modules that share resources and interact with each other through an API. The following technology stack was used during development: Node js, React js, MongoDB, Ngnix, Cloud Technologies, Python.

Keywords: Algorithms, document processing, automation, integrated modules, software architecture, software design, information system.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 207
1313 Rotation Invariant Face Recognition Based on Hybrid LPT/DCT Features

Authors: Rehab F. Abdel-Kader, Rabab M. Ramadan, Rawya Y. Rizk

Abstract:

The recognition of human faces, especially those with different orientations is a challenging and important problem in image analysis and classification. This paper proposes an effective scheme for rotation invariant face recognition using Log-Polar Transform and Discrete Cosine Transform combined features. The rotation invariant feature extraction for a given face image involves applying the logpolar transform to eliminate the rotation effect and to produce a row shifted log-polar image. The discrete cosine transform is then applied to eliminate the row shift effect and to generate the low-dimensional feature vector. A PSO-based feature selection algorithm is utilized to search the feature vector space for the optimal feature subset. Evolution is driven by a fitness function defined in terms of maximizing the between-class separation (scatter index). Experimental results, based on the ORL face database using testing data sets for images with different orientations; show that the proposed system outperforms other face recognition methods. The overall recognition rate for the rotated test images being 97%, demonstrating that the extracted feature vector is an effective rotation invariant feature set with minimal set of selected features.

Keywords: Discrete Cosine Transform, Face Recognition, Feature Extraction, Log Polar Transform, Particle SwarmOptimization.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1873
1312 Investigation of Different Control Stratgies for UPFC Decoupled Model and the Impact of Location on Control Parameters

Authors: S.A. Alqallaf, S.A. Al-Mawsawi, A. Haider

Abstract:

In order to evaluate the performance of a unified power flow controller (UPFC), mathematical models for steady state and dynamic analysis are to be developed. The steady state model is mainly concerned with the incorporation of the UPFC in load flow studies. Several load flow models for UPFC have been introduced in literature, and one of the most reliable models is the decoupled UPFC model. In spite of UPFC decoupled load flow model simplicity, it is more robust compared to other UPFC load flow models and it contains unique capabilities. Some shortcoming such as additional set of nonlinear equations are to be solved separately after the load flow solution is obtained. The aim of this study is to investigate the different control strategies that can be realized in the decoupled load flow model (individual control and combined control), and the impact of the location of the UPFC in the network on its control parameters.

Keywords: UPFC, Decoupled model, Load flow.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2001
1311 Design, Development and Analysis of Automated Storage and Retrieval System with Single and Dual Command Dispatching using MATLAB

Authors: M. Aslam, Farrukh, A. R. Gardezi, Nasir Hayat

Abstract:

Automated material handling is given prime importance in the semi automated and automated facilities since it provides solution to the gigantic problems related to inventory and also support the latest philosophies like just in time production JIT and lean production. Automated storage and retrieval system is an antidote (if designed properly) to the facility sufferings like getting the right material , materials getting perished, long cycle times or many other similar kind of problems. A working model of automated storage and retrieval system (AS/RS) is designed and developed under the design parameters specified by Material Handling Industry of America (MHIA). Later on analysis was carried out to calculate the throughput and size of the machine. The possible implementation of this technology in local scenario is also discussed in this paper.

Keywords: Automated storage and retrieval system (AS/RS), Material handling, Computer integrated manufacturing (CIM), Lightdependent resistor (LDR)

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3430
1310 A Method to Compute Efficient 3D Helicopters Flight Trajectories Based on a Motion Polymorph-Primitives Algorithm

Authors: Konstanca Nikolajevic, Nicolas Belanger, David Duvivier, Rabie Ben Atitallah, Abdelhakim Artiba

Abstract:

Finding the optimal 3D path of an aerial vehicle under flight mechanics constraints is a major challenge, especially when the algorithm has to produce real time results in flight. Kinematics models and Pythagorian Hodograph curves have been widely used in mobile robotics to solve this problematic. The level of difficulty is mainly driven by the number of constraints to be saturated at the same time while minimizing the total length of the path. In this paper, we suggest a pragmatic algorithm capable of saturating at the same time most of dimensioning helicopter 3D trajectories’ constraints like: curvature, curvature derivative, torsion, torsion derivative, climb angle, climb angle derivative, positions. The trajectories generation algorithm is able to generate versatile complex 3D motion primitives feasible by a helicopter with parameterization of the curvature and the climb angle. An upper ”motion primitives’ concatenation” algorithm is presented based. In this article we introduce a new way of designing three-dimensional trajectories based on what we call the ”Dubins gliding symmetry conjecture”. This extremely performing algorithm will be soon integrated to a real-time decisional system dealing with inflight safety issues.

Keywords: Aerial robots, Motion primitives, Robotics.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2181
1309 Coordinated Design of TCSC Controller and PSS Employing Particle Swarm Optimization Technique

Authors: Sidhartha Panda, N. P. Padhy

Abstract:

This paper investigates the application of Particle Swarm Optimization (PSO) technique for coordinated design of a Power System Stabilizer (PSS) and a Thyristor Controlled Series Compensator (TCSC)-based controller to enhance the power system stability. The design problem of PSS and TCSC-based controllers is formulated as a time domain based optimization problem. PSO algorithm is employed to search for optimal controller parameters. By minimizing the time-domain based objective function, in which the deviation in the oscillatory rotor speed of the generator is involved; stability performance of the system is improved. To compare the capability of PSS and TCSC-based controller, both are designed independently first and then in a coordinated manner for individual and coordinated application. The proposed controllers are tested on a weakly connected power system. The eigenvalue analysis and non-linear simulation results are presented to show the effectiveness of the coordinated design approach over individual design. The simulation results show that the proposed controllers are effective in damping low frequency oscillations resulting from various small disturbances like change in mechanical power input and reference voltage setting.

Keywords: Particle swarm optimization, Phillips-Heffron model, power system stability, PSS, TCSC.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2159
1308 Chromium Adsorption by Modified Wood

Authors: I. Domingos, B. Esteves, A. Figueirinha, Luísa P. Cruz-Lopes, J. Ferreira, H. Pereira

Abstract:

Chromium is one of the most common heavy metals which exist in very high concentrations in wastewater. The removal is very expensive due to the high cost of normal adsorbents. Lignocellulosic materials and mainly treated materials have proven to be a good solution for this problem.

Adsorption tests were performed at different pH, different times and with varying concentrations.

Results show that is at pH 3 that treated wood absorbs more chromium ranging from 70% (2h treatment) to almost 100% (12 h treatment) much more than untreated wood with less than 40%. Most of the adsorption is made in the first 2-3 hours for untreated and heat treated wood. Modified wood adsorbs more chromium throughout the time. For all the samples, adsorption fitted relatively well the Langmuir model with correlation coefficient ranging from 0.85 to 0.97.

The results show that heat treated wood is a good adsorbent ant that this might be a good utilization for sawdust from treating companies.

Keywords: Adsorption, chromium, heat treatment, wood modification.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2401
1307 Graphical Programming of Programmable Logic Controllers -Case Study for a Punching Machine-

Authors: Vasile Marinescu, Ionut Clementin Constantin, Alexandru Epureanu, Virgil Teodor

Abstract:

The Programmable Logic Controller (PLC) plays a vital role in automation and process control. Grafcet is used for representing the control logic, and traditional programming languages are used for describing the pure algorithms. Grafcet is used for dividing the process to be automated in elementary sequences that can be easily implemented. Each sequence represent a step that has associated actions programmed using textual or graphical languages after case. The programming task is simplified by using a set of subroutines that are used in several steps. The paper presents an example of implementation for a punching machine for sheets and plates. The use the graphical languages the programming of a complex sequential process is a necessary solution. The state of Grafcet can be used for debugging and malfunction determination. The use of the method combined with a set of knowledge acquisition for process application reduces the downtime of the machine and improve the productivity.

Keywords: Grafcet, Petrinet, PLC, punching.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2117
1306 Application of a Similarity Measure for Graphs to Web-based Document Structures

Authors: Matthias Dehmer, Frank Emmert Streib, Alexander Mehler, Jürgen Kilian, Max Mühlhauser

Abstract:

Due to the tremendous amount of information provided by the World Wide Web (WWW) developing methods for mining the structure of web-based documents is of considerable interest. In this paper we present a similarity measure for graphs representing web-based hypertext structures. Our similarity measure is mainly based on a novel representation of a graph as linear integer strings, whose components represent structural properties of the graph. The similarity of two graphs is then defined as the optimal alignment of the underlying property strings. In this paper we apply the well known technique of sequence alignments for solving a novel and challenging problem: Measuring the structural similarity of generalized trees. In other words: We first transform our graphs considered as high dimensional objects in linear structures. Then we derive similarity values from the alignments of the property strings in order to measure the structural similarity of generalized trees. Hence, we transform a graph similarity problem to a string similarity problem for developing a efficient graph similarity measure. We demonstrate that our similarity measure captures important structural information by applying it to two different test sets consisting of graphs representing web-based document structures.

Keywords: Graph similarity, hierarchical and directed graphs, hypertext, generalized trees, web structure mining.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1892
1305 Exponential Stability and Periodicity of a Class of Cellular Neural Networks with Time-Varying Delays

Authors: Zixin Liu, Shu Lü, Shouming Zhong, Mao Ye

Abstract:

The problem of exponential stability and periodicity for a class of cellular neural networks (DCNNs) with time-varying delays is investigated. By dividing the network state variables into subgroups according to the characters of the neural networks, some sufficient conditions for exponential stability and periodicity are derived via the methods of variation parameters and inequality techniques. These conditions are represented by some blocks of the interconnection matrices. Compared with some previous methods, the method used in this paper does not resort to any Lyapunov function, and the results derived in this paper improve and generalize some earlier criteria established in the literature cited therein. Two examples are discussed to illustrate the main results.

Keywords: Cellular neural networks, exponential stability, time varying delays, partitioned matrices, periodic solution.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1526
1304 Ion- Acoustic Solitary Waves in a Self- Gravitating Dusty Plasma Having Two-Temperature Electrons

Authors: S.N.Paul, G.Pakira, B.Paul, B.Ghosh

Abstract:

Nonlinear propagation of ion-acoustic waves in a selfgravitating dusty plasma consisting of warm positive ions, isothermal two-temperature electrons and negatively charged dust particles having charge fluctuations is studied using the reductive perturbation method. It is shown that the nonlinear propagation of ion-acoustic waves in such plasma can be described by an uncoupled third order partial differential equation which is a modified form of the usual Korteweg-deVries (KdV) equation. From this nonlinear equation, a new type of solution for the ion-acoustic wave is obtained. The effects of two-temperature electrons, gravity and dust charge fluctuations on the ion-acoustic solitary waves are discussed with possible applications.

Keywords: Charge fluctuations, gravitating dusty plasma, Ionacoustic solitary wave, Two-temperature electrons

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2049
1303 A Study of Geographic Information System Combining with GPS and 3G for Parking Guidance and Information System

Authors: Yu-Chi Shiue, Jyong Lin, Shih-Chang Chen

Abstract:

With the increase of economic behavior and the upgrade of living standar, the ratio for people in Taiwan who own automobiles and motorcycles have recently increased with multiples. Therefore, parking issues will be a big challenge to facilitate traffic network and ensure urban life quality. The Parking Guidance and Information System is one of important systems for Advanced Traveler Information Services (ATIS). This research proposes a parking guidance and information system which integrates GPS and 3G network for a map on the Geographic Information System to solution inadequate of roadside information kanban. The system proposed in this study mainly includes Parking Host, Parking Guidance and Information Server, Geographic Map and Information System as well as Parking Guidance and Information Browser. The study results show this system can increase driver-s efficiency to find parking space and efficiently enhance parking convenience in comparison with roadside kanban system.

Keywords: Geographic Information System, 3G, GPS, parkinginformation

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1814
1302 Retraction Free Motion Approach and Its Application in Automated Robotic Edge Finishing and Inspection Processes

Authors: M. Nemer, E. I. Konukseven

Abstract:

In this paper, a motion generation algorithm for a six Degrees of Freedom (DoF) robotic hand in a static environment is presented. The purpose of developing this method is to be used in the path generation of the end-effector for edge finishing and inspection processes by utilizing the CAD model of the considered workpiece. Nonetheless, the proposed algorithm may be extended to be applicable for other similar manufacturing processes. A software package programmed in the application programming interface (API) of SolidWorks generates tool path data for the robot. The proposed method significantly simplifies the given problem, resulting in a reduction in the CPU time needed to generate the path, and offers an efficient overall solution. The ABB IRB2000 robot is chosen for executing the generated tool path.

Keywords: Offline programming, CAD-based tools, edge deburring, edge scanning, path generation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 913
1301 Key Based Text Watermarking of E-Text Documents in an Object Based Environment Using Z-Axis for Watermark Embedding

Authors: Mussarat Abdullah, Fazal Wahab

Abstract:

Data hiding into text documents itself involves pretty complexities due to the nature of text documents. A robust text watermarking scheme targeting an object based environment is presented in this research. The heart of the proposed solution describes the concept of watermarking an object based text document where each and every text string is entertained as a separate object having its own set of properties. Taking advantage of the z-ordering of objects watermark is applied with the z-axis letting zero fidelity disturbances to the text. Watermark sequence of bits generated against user key is hashed with selected properties of given document, to determine the bit sequence to embed. Bits are embedded along z-axis and the document has no fidelity issues when printed, scanned or photocopied.

Keywords: Digital Watermarking, Object Based Environment, Watermark, z-ordering.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1687
1300 A Frequency Dependence of the Phase Field Model in Laminar Boundary Layer with Periodic Perturbations

Authors: Yasuo Obikane

Abstract:

The frequency dependence of the phase field model(PFM) is studied. A simple PFM is proposed, and is tested in a laminar boundary layer. The Blasius-s laminar boundary layer solution on a flat plate is used for the flow pattern, and several frequencies are imposed on the PFM, and the decay times of the interfaces are obtained. The computations were conducted for three cases: 1) no-flow, and 2) a half ball on the laminar boundary layer, 3) a line of mass sources in the laminar boundary layer. The computations show the decay time becomes shorter as the frequency goes larger, and also show that it is sensitive to both background disturbances and surface tension parameters. It is concluded that the proposed simple PFM can describe the properties of decay process, and could give the fundamentals for the decay of the interface in turbulent flows.

Keywords: Phase field model, two phase flows, Laminarboundary Layer

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1509
1299 Hybridizing Genetic Algorithm with Biased Chance Local Search

Authors: Mehdi Basikhasteh, Mohamad A. Movafaghpour

Abstract:

This paper explores university course timetabling problem. There are several characteristics that make scheduling and timetabling problems particularly difficult to solve: they have huge search spaces, they are often highly constrained, they require sophisticated solution representation schemes, and they usually require very time-consuming fitness evaluation routines. Thus standard evolutionary algorithms lack of efficiency to deal with them. In this paper we have proposed a memetic algorithm that incorporates the problem specific knowledge such that most of chromosomes generated are decoded into feasible solutions. Generating vast amount of feasible chromosomes makes the progress of search process possible in a time efficient manner. Experimental results exhibit the advantages of the developed Hybrid Genetic Algorithm than the standard Genetic Algorithm.

Keywords: University Course Timetabling, Memetic Algorithm, Biased Chance Assignment, Optimization.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1699
1298 Power Frequency Magnetic Field Survey in Indoor Power Distribution Substation in Egypt

Authors: Ahmed Hossam_ ElDin, Ahmed Farag, Ibrahim Madi., Hanaa Karawia

Abstract:

In our modern society electricity is vital to our health, safety, comfort and well-being. While our daily use of electricity is often taken for granted, public concern has arisen about potential adverse health effects from electric and magnetic – electromagnetic – fields (EMFs) produced by our use of electricity. This paper aims to compare between the measured magnetic field values and the simulated models for the indoor medium to low voltage (MV/LV) distribution substations. To calculate the magnetic flux density in the substations, interactive software SUBCALC is used which is based on closed form solution of the Biot-Savart law with 3D conductor model. The comparison between the measured values and the simulated models was acceptable. However there were some discrepancies, as expected, may be due to the current variation during measurements.

Keywords: Distribution substation, magnetic field, measurement, simulation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2299
1297 Motion Control of a 2-link Revolute Manipulator in an Obstacle-Ridden Workspace

Authors: Avinesh Prasad, Bibhya Sharma, Jito Vanualailai

Abstract:

In this paper, we propose a solution to the motion control problem of a 2-link revolute manipulator arm. We require the end-effector of the arm to move safely to its designated target in a priori known workspace cluttered with fixed circular obstacles of arbitrary position and sizes. Firstly a unique velocity algorithm is used to move the end-effector to its target. Secondly, for obstacle avoidance a turning angle is designed, which when incorporated into the control laws ensures that the entire robot arm avoids any number of fixed obstacles along its path enroute the target. The control laws proposed in this paper also ensure that the equilibrium point of the system is asymptotically stable. Computer simulations of the proposed technique are presented.

Keywords: 2-link revolute manipulator, motion control, obstacle avoidance, asymptotic stability.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2851
1296 The Solution of the Direct Problem of Electrical Prospecting with Direct Current under Conditions of Ground Surface Relief

Authors: Balgaisha Mukanova, Tolkyn Mirgalikyzy

Abstract:

Theory of interpretation of electromagnetic fields studied in the electrical prospecting with direct current is mainly developed for the case of a horizontal surface observation. However in practice we often have to work in difficult terrain surface. Conducting interpretation without the influence of topography can cause non-existent anomalies on sections. This raises the problem of studying the impact of different shapes of ground surface relief on the results of electrical prospecting's research. This research examines the numerical solutions of the direct problem of electrical prospecting for two-dimensional and three-dimensional media, taking into account the terrain. The problem is solved using the method of integral equations. The density of secondary currents on the relief surface is obtained.

Keywords: Ground surface relief, method of integral equations, numerical method.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2124
1295 Mining Network Data for Intrusion Detection through Naïve Bayesian with Clustering

Authors: Dewan Md. Farid, Nouria Harbi, Suman Ahmmed, Md. Zahidur Rahman, Chowdhury Mofizur Rahman

Abstract:

Network security attacks are the violation of information security policy that received much attention to the computational intelligence society in the last decades. Data mining has become a very useful technique for detecting network intrusions by extracting useful knowledge from large number of network data or logs. Naïve Bayesian classifier is one of the most popular data mining algorithm for classification, which provides an optimal way to predict the class of an unknown example. It has been tested that one set of probability derived from data is not good enough to have good classification rate. In this paper, we proposed a new learning algorithm for mining network logs to detect network intrusions through naïve Bayesian classifier, which first clusters the network logs into several groups based on similarity of logs, and then calculates the prior and conditional probabilities for each group of logs. For classifying a new log, the algorithm checks in which cluster the log belongs and then use that cluster-s probability set to classify the new log. We tested the performance of our proposed algorithm by employing KDD99 benchmark network intrusion detection dataset, and the experimental results proved that it improves detection rates as well as reduces false positives for different types of network intrusions.

Keywords: Clustering, detection rate, false positive, naïveBayesian classifier, network intrusion detection.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5536
1294 Building Trust of Mobile Users and their Adoption of M-Commerce

Authors: Shafiq Ur Rehman, Jane-Lisa Coughlan

Abstract:

One challenging direction of mobile commerce (mcommerce) that is getting a great deal of attention globally is mobile financing. The smart-phone and PDA users all around the world are facing difficulties to become accustomed and trust in m-commerce. The main rationale can be the slow variation and lack of trust in mobile payment systems. Mobile payment systems that are in use need to be more effective and efficient. This paper proposes: the interface design is not the only factor affecting the m-commerce adoption and lack of trust; in fact it is the combined effect of interface usability and trustworthy mobile payment systems, because it-s the money that the user has to spend at the end of the day, which the user requires to get transferred securely. The purpose of this research is to identify the problems regarding the trust and adaption of m-commerce applications by mobile users and to provide the best possible solution with respect to human computer interaction (HCI) principles.

Keywords: m-commerce, usability, mobile payment method, interface design.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2237
1293 Performance of an Improved Fluidized System for Processing Green Tea

Authors: Nickson Kipng’etich Lang’at, Thomas Thoruwa, John Abraham, John Wanyoko

Abstract:

Green tea is made from the top two leaves and buds of a shrub, Camellia sinensis, of the family Theaceae and the order Theales. The green tea leaves are picked and immediately sent to be dried or steamed to prevent fermentation. Fluid bed drying technique is a common drying method used in drying green tea because of its ease in design and construction and fluidization of fine tea particles. Major problems in this method are significant loss of chemical content of the leaf and green appearance of tea, retention of high moisture content in the leaves and bed channeling and defluidization. The energy associated with the drying technology has been shown to be a vital factor in determining the quality of green tea. As part of the implementation, prototype dryer was built that facilitated sequence of operations involving steaming, cooling, pre-drying and final drying. The major findings of the project were in terms of quality characteristics of tea leaves and energy consumption during processing. The optimal design achieved a moisture content of 4.2 ± 0.84%. With the optimum drying temperature of 100 ºC, the specific energy consumption was 1697.8 kj.Kg-1 and evaporation rate of 4.272 x 10-4 Kg.m-2.s-1. The energy consumption in a fluidized system can be further reduced by focusing on energy saving designs.

Keywords: Evaporation rate, fluid bed dryer, maceration, specific energy consumption.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1701
1292 W-CAS: A Central Users Authentication and Authorization System for Enterprise Wide Web Applications

Authors: Sharil Tumin, Sylvia Encheva

Abstract:

Centrally controlled authentication and authorization services can provide enterprise with an increase in security, more flexible access control solutions and an increased users' trust. By using redirections, users of all Web-based applications within an organization are authenticated at a single well known and secure Web site and using secure communication protocol. Users are first authenticated at the central server using their domain wide credentials before being redirected to a particular Web-based application. The central authentication server will then provide others with pertinence authorization related particulars and credentials of the authenticated user to the specific application. The trust between the clients and the server hosts is established by secure session keys exchange. Case- studies are provided to demonstrate the usefulness and flexibility of the proposed solution.

Keywords: Authentication, Authorization, Security, Protected Web-based Applications

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1552