Pub Date : 2011-03-20DOI: 10.1109/ISCI.2011.5958921
H. Trivedi, P. Veeraraghavan, S. Loke, A. Desai, J. Singh
Vehicular Ad-Hoc Network (VANET) will pave the way to advance automotive safety and occupant convenience. The potential VANET applications present diverse requirements. VANET shows unique characteristics and presents a set of challenges. The proposed VANET applications demand reliable and proficient message dissemination techniques. Routing techniques proposed for Mobile Ad-Hoc Network (MANET) do not cater for the characteristics of VANET. The need for novel routing techniques, exclusively designed for VANET has been recognised. This paper analyses different routing techniques proposed specifically for VANET. Unique characteristics of VANET pose challenges to traditional layered architecture where different layers make independent decisions. Mobility, absence of global view of network, random changes in topology, poor link quality and varied channel conditions have encouraged the paradigm shift to cross-layer approach. In order to optimise the performance of VANET, architectures based on cross-layer approach have been proposed by the researchers. The paper also surveys such cross-layer paradigm based solutions for VANET and concludes with an analytical summary.
{"title":"Routing mechanisms and cross-layer design for Vehicular Ad Hoc Networks: A survey","authors":"H. Trivedi, P. Veeraraghavan, S. Loke, A. Desai, J. Singh","doi":"10.1109/ISCI.2011.5958921","DOIUrl":"https://doi.org/10.1109/ISCI.2011.5958921","url":null,"abstract":"Vehicular Ad-Hoc Network (VANET) will pave the way to advance automotive safety and occupant convenience. The potential VANET applications present diverse requirements. VANET shows unique characteristics and presents a set of challenges. The proposed VANET applications demand reliable and proficient message dissemination techniques. Routing techniques proposed for Mobile Ad-Hoc Network (MANET) do not cater for the characteristics of VANET. The need for novel routing techniques, exclusively designed for VANET has been recognised. This paper analyses different routing techniques proposed specifically for VANET. Unique characteristics of VANET pose challenges to traditional layered architecture where different layers make independent decisions. Mobility, absence of global view of network, random changes in topology, poor link quality and varied channel conditions have encouraged the paradigm shift to cross-layer approach. In order to optimise the performance of VANET, architectures based on cross-layer approach have been proposed by the researchers. The paper also surveys such cross-layer paradigm based solutions for VANET and concludes with an analytical summary.","PeriodicalId":166647,"journal":{"name":"2011 IEEE Symposium on Computers & Informatics","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114895787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-03-20DOI: 10.1109/ISCI.2011.5959015
Batool Abadi Khasragi
Increasing miniaturization and sensor communication abilities make them invisible and expand the availability everywhere in any time. Sensor network applications, increase the challenging issues related to design network protocols have emerged. One of them is increasing energy efficiency and lifetime in the network. Sensor nodes with limited energy reserves are deployed, so the network must operate with minimal energy overhead. This article focuses on improving the network lifetime by using energy efficient arrangement of nodes in a state primary goal to reduce energy waste with using energy balance. Therefore, learning automata capabilities — to solve issues in sensor networks is appropriate is used. For the purpose mentioned above, energy balanced clustering technique based on learning automata is proposed that learning automata residing in the cluster head, for balance the best node is selected according to the amount of energy remaining as the new cluster head. Proposed technique with the NS2 simulator to simulate the behavior is evaluated. Results show that the calculated energy balance improves the life time of sensor network substantially.
{"title":"Energy balanced clustering method with use of learning automata","authors":"Batool Abadi Khasragi","doi":"10.1109/ISCI.2011.5959015","DOIUrl":"https://doi.org/10.1109/ISCI.2011.5959015","url":null,"abstract":"Increasing miniaturization and sensor communication abilities make them invisible and expand the availability everywhere in any time. Sensor network applications, increase the challenging issues related to design network protocols have emerged. One of them is increasing energy efficiency and lifetime in the network. Sensor nodes with limited energy reserves are deployed, so the network must operate with minimal energy overhead. This article focuses on improving the network lifetime by using energy efficient arrangement of nodes in a state primary goal to reduce energy waste with using energy balance. Therefore, learning automata capabilities — to solve issues in sensor networks is appropriate is used. For the purpose mentioned above, energy balanced clustering technique based on learning automata is proposed that learning automata residing in the cluster head, for balance the best node is selected according to the amount of energy remaining as the new cluster head. Proposed technique with the NS2 simulator to simulate the behavior is evaluated. Results show that the calculated energy balance improves the life time of sensor network substantially.","PeriodicalId":166647,"journal":{"name":"2011 IEEE Symposium on Computers & Informatics","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116485927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-03-20DOI: 10.1109/ISCI.2011.5958928
M. Hossain, Shakil Ahamed Khan, M. Shafiullah, M. Hossain
This paper proposes an intelligent method for maximum power point tracking (MPPT) of a photovoltaic system under variable temperature and insolation conditions and conversion of this solar energy into stabilized sine wave having low distortion factor (DF), so that the solar energy can be supplied to grid and can operate electrical and electronic devices efficiently. For the reduction of tracking time of maximum power from photovoltaic array and to obtain stabilized sine wave with very fast rise time for voltage stability, fuzzy logic control algorithm is implemented with the embedded microcontroller for improved performance as compared to conventional techniques. The system includes a photovoltaic array; a PWM controlled DC-DC, DC-AC converters, sensor circuits and zero crossing detector (ZCD). The designed MPPT controller regulates the converter output voltage by varying modulation index of the PWM pattern using MPPT algorithm and it maximizes the output power extracted from photovoltaic array. This paper discusses the low cost implementation of MPP algorithm in a 8-bit microcontroller using the tools and techniques to generate optimized real time code in C for ATMega8 microcontroller which will demonstrate how maximum power point tracker might provide elegant and efficient solution for increasing the efficiency of a solar system and connection of the extracted energy to grid which is based on experimental results rather than on mathematical models.
{"title":"Design and implementation of MPPT controlled grid connected photovoltaic system","authors":"M. Hossain, Shakil Ahamed Khan, M. Shafiullah, M. Hossain","doi":"10.1109/ISCI.2011.5958928","DOIUrl":"https://doi.org/10.1109/ISCI.2011.5958928","url":null,"abstract":"This paper proposes an intelligent method for maximum power point tracking (MPPT) of a photovoltaic system under variable temperature and insolation conditions and conversion of this solar energy into stabilized sine wave having low distortion factor (DF), so that the solar energy can be supplied to grid and can operate electrical and electronic devices efficiently. For the reduction of tracking time of maximum power from photovoltaic array and to obtain stabilized sine wave with very fast rise time for voltage stability, fuzzy logic control algorithm is implemented with the embedded microcontroller for improved performance as compared to conventional techniques. The system includes a photovoltaic array; a PWM controlled DC-DC, DC-AC converters, sensor circuits and zero crossing detector (ZCD). The designed MPPT controller regulates the converter output voltage by varying modulation index of the PWM pattern using MPPT algorithm and it maximizes the output power extracted from photovoltaic array. This paper discusses the low cost implementation of MPP algorithm in a 8-bit microcontroller using the tools and techniques to generate optimized real time code in C for ATMega8 microcontroller which will demonstrate how maximum power point tracker might provide elegant and efficient solution for increasing the efficiency of a solar system and connection of the extracted energy to grid which is based on experimental results rather than on mathematical models.","PeriodicalId":166647,"journal":{"name":"2011 IEEE Symposium on Computers & Informatics","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116513832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-03-20DOI: 10.1109/ISCI.2011.5958958
Chiraz Houaidia, H. Idoudi, L. Saidane
Wireless sensor networks are often deployed in hardly accessible or hazardous fields. Their main goal is to monitor the target field and transmit surveillance data to a sink. Therefore, connectivity of the sensor network and the coverage ratio of the monitored area are the most relevant concerns to reach these goals. In this paper, we propose to use several mobile robots to assist sensor networks redeployment in order to enhance the network connectivity and the coverage ratio of the monitored area. We model the sensor network as an islets-based topology and we propose to use robots to detect and heal connectivity and coverage holes availing the sensors redundancy. Preliminary simulations showed that our new scheme can significantly enhance the connectivity ratio of the initial network and improve the coverage ratio by using few numbers of robots.
{"title":"Improving connectivity and coverage of wireless sensor networks using mobile robots","authors":"Chiraz Houaidia, H. Idoudi, L. Saidane","doi":"10.1109/ISCI.2011.5958958","DOIUrl":"https://doi.org/10.1109/ISCI.2011.5958958","url":null,"abstract":"Wireless sensor networks are often deployed in hardly accessible or hazardous fields. Their main goal is to monitor the target field and transmit surveillance data to a sink. Therefore, connectivity of the sensor network and the coverage ratio of the monitored area are the most relevant concerns to reach these goals. In this paper, we propose to use several mobile robots to assist sensor networks redeployment in order to enhance the network connectivity and the coverage ratio of the monitored area. We model the sensor network as an islets-based topology and we propose to use robots to detect and heal connectivity and coverage holes availing the sensors redundancy. Preliminary simulations showed that our new scheme can significantly enhance the connectivity ratio of the initial network and improve the coverage ratio by using few numbers of robots.","PeriodicalId":166647,"journal":{"name":"2011 IEEE Symposium on Computers & Informatics","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116707516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-03-20DOI: 10.1109/ISCI.2011.5958911
M. Kumngern
This paper presents a new voltage-mode multifunction filter with four inputs and three outputs employing three current controlled differential difference current conveyors (CCDDCCs) and two grounded capacitors. The proposed circuit can provide low-pass, band-pass, high-pass, band-stop and all-pass voltage responses by appropriately connecting the input and output terminals, at a high impedance input terminal which enable easy cascadability. The circuit parameters ω0 and Q can be set orthogonally by adjusting the circuit components. PSPICE simulation results are also performed to confirm the theoretical analysis.
{"title":"Current-controlled voltage-mode multifunction filter using CCDDCCs","authors":"M. Kumngern","doi":"10.1109/ISCI.2011.5958911","DOIUrl":"https://doi.org/10.1109/ISCI.2011.5958911","url":null,"abstract":"This paper presents a new voltage-mode multifunction filter with four inputs and three outputs employing three current controlled differential difference current conveyors (CCDDCCs) and two grounded capacitors. The proposed circuit can provide low-pass, band-pass, high-pass, band-stop and all-pass voltage responses by appropriately connecting the input and output terminals, at a high impedance input terminal which enable easy cascadability. The circuit parameters ω0 and Q can be set orthogonally by adjusting the circuit components. PSPICE simulation results are also performed to confirm the theoretical analysis.","PeriodicalId":166647,"journal":{"name":"2011 IEEE Symposium on Computers & Informatics","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132112491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-03-20DOI: 10.1109/ISCI.2011.5958974
Nurul Ezza Asyikin Mohamed Almi, Najwa Abdul Rahman, Durkadavi Purusothaman, S. Sulaiman
Software engineering is one of the most demanding jobs in software industry nowadays and its demand keeps on increasing. However, there are several issues arise with regard to readiness of Information Technology (IT) or Computer Science (CS) graduates from the point of views of software industry. This perspective causes the supply of graduates mainly in software engineering field seems to be insufficient. The industry claims that the software engineering graduates are not able to meet their requirements in software industry. This is really surprising to the academia that offers software engineering specialisation or related programmes in IT or CS field. This phenomenon creates the gap between industry's requirements and graduates' readiness which indirectly reflects the gap between software engineering education and industry. A number of studies and frameworks are available to ponder the issues on software engineering education and industry. This paper reports the gap between industry's requirements and graduates' readiness in software engineering perspectives to face the real world. From the findings, we conclude that there is a gap due to high demands from the industry in highly skilled fresh graduates. In contrast, future graduates are still lack of confidence and readiness though they specialise in software engineering field that has more job opportunities in IT or CS field.
{"title":"Software engineering education: The gap between industry's requirements and graduates' readiness","authors":"Nurul Ezza Asyikin Mohamed Almi, Najwa Abdul Rahman, Durkadavi Purusothaman, S. Sulaiman","doi":"10.1109/ISCI.2011.5958974","DOIUrl":"https://doi.org/10.1109/ISCI.2011.5958974","url":null,"abstract":"Software engineering is one of the most demanding jobs in software industry nowadays and its demand keeps on increasing. However, there are several issues arise with regard to readiness of Information Technology (IT) or Computer Science (CS) graduates from the point of views of software industry. This perspective causes the supply of graduates mainly in software engineering field seems to be insufficient. The industry claims that the software engineering graduates are not able to meet their requirements in software industry. This is really surprising to the academia that offers software engineering specialisation or related programmes in IT or CS field. This phenomenon creates the gap between industry's requirements and graduates' readiness which indirectly reflects the gap between software engineering education and industry. A number of studies and frameworks are available to ponder the issues on software engineering education and industry. This paper reports the gap between industry's requirements and graduates' readiness in software engineering perspectives to face the real world. From the findings, we conclude that there is a gap due to high demands from the industry in highly skilled fresh graduates. In contrast, future graduates are still lack of confidence and readiness though they specialise in software engineering field that has more job opportunities in IT or CS field.","PeriodicalId":166647,"journal":{"name":"2011 IEEE Symposium on Computers & Informatics","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133739629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-03-20DOI: 10.1109/ISCI.2011.5958998
S. Safdar, M. Hassan, M. Qureshi, R. Akbar
The main objective of the research is to define and propose a framework for data hibernation in the workflows under intrusion threat. When the intrusion is detected, the data services need to be discontinued immediately to retain the security and the integrity of the valuable data, till the system is recovered from the threat. By discontinuing data services, the end users may face inconveniences in using the system because of its temporary unavailability. Data hibernation addresses a mechanism of secure transferring of data and providing an access of the data alternatively keeping the data integrity intact. Data hibernation involves three steps i.e. designing an alternate schema for storing data, transferring data to that alternate storage and providing an access to that data. Hence the system can continue to provide data services securely to the end user even in the threat situations.
{"title":"Data hibernation framework in workflows under intrusion threat","authors":"S. Safdar, M. Hassan, M. Qureshi, R. Akbar","doi":"10.1109/ISCI.2011.5958998","DOIUrl":"https://doi.org/10.1109/ISCI.2011.5958998","url":null,"abstract":"The main objective of the research is to define and propose a framework for data hibernation in the workflows under intrusion threat. When the intrusion is detected, the data services need to be discontinued immediately to retain the security and the integrity of the valuable data, till the system is recovered from the threat. By discontinuing data services, the end users may face inconveniences in using the system because of its temporary unavailability. Data hibernation addresses a mechanism of secure transferring of data and providing an access of the data alternatively keeping the data integrity intact. Data hibernation involves three steps i.e. designing an alternate schema for storing data, transferring data to that alternate storage and providing an access to that data. Hence the system can continue to provide data services securely to the end user even in the threat situations.","PeriodicalId":166647,"journal":{"name":"2011 IEEE Symposium on Computers & Informatics","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133919386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-03-20DOI: 10.1109/ISCI.2011.5958881
Mohammad Aazam, Adeel M. Syed, S. Shah, Imran Khan, Muhammad Alam
Coexistence of IPv4 and IPv6 bears problem of incompatibility, as IPv6 and IPv4 headers are different from each other. To counter this problem, three solutions are possible: a) making every device dual stack, b) translation, c) tunneling. Tunneling stands out as the best possible solution. Among the IPv6 tunneling techniques, this paper evaluates the performance of two recent IPv6 tunneling techniques: 6to4 and ISATAP. These protocols were implemented on real test bed setup, on Microsoft Windows (MS Windows XP and MS Windows Server 2003) and Linux operating systems. Five to six devices were used to setup the whole test bed. Each protocol was then implemented on the setup using specific configuration commands, available online at various sources. UDP based audio streaming, video streaming, and TCP based ICMP-ping traffic was run. Four different runs of IPv6 traffic were routed over the setup for both IPv6 tunneling protocols. The average of the data was taken to generate graphs and final results. The performance of these tunneling techniques has been evaluated through certain parameters, namely: throughput, end to end delay (E2ED), round trip time (RTT), and jitter.
IPv4和IPv6共存存在不兼容的问题,IPv6和IPv4的报头不同。为了解决这个问题,有三种可能的解决方案:a)使每个设备双堆栈,b)转换,c)隧道。挖隧道是最好的解决方案。在IPv6隧道技术中,本文评估了两种最新的IPv6隧道技术:6to4和ISATAP的性能。这些协议在真实的测试平台设置、Microsoft Windows (MS Windows XP和MS Windows Server 2003)和Linux操作系统上实现。整个试验台使用了5到6台设备。然后使用特定的配置命令在设置上实现每个协议,这些命令可以从各种来源在线获得。运行基于UDP的音频流、视频流和TCP的ICMP-ping流量。四个不同的IPv6流量运行路由在设置为两个IPv6隧道协议。取数据的平均值来生成图形和最终结果。这些隧道技术的性能已经通过某些参数进行了评估,即:吞吐量、端到端延迟(E2ED)、往返时间(RTT)和抖动。
{"title":"Evaluation of 6to4 and ISATAP on a test LAN","authors":"Mohammad Aazam, Adeel M. Syed, S. Shah, Imran Khan, Muhammad Alam","doi":"10.1109/ISCI.2011.5958881","DOIUrl":"https://doi.org/10.1109/ISCI.2011.5958881","url":null,"abstract":"Coexistence of IPv4 and IPv6 bears problem of incompatibility, as IPv6 and IPv4 headers are different from each other. To counter this problem, three solutions are possible: a) making every device dual stack, b) translation, c) tunneling. Tunneling stands out as the best possible solution. Among the IPv6 tunneling techniques, this paper evaluates the performance of two recent IPv6 tunneling techniques: 6to4 and ISATAP. These protocols were implemented on real test bed setup, on Microsoft Windows (MS Windows XP and MS Windows Server 2003) and Linux operating systems. Five to six devices were used to setup the whole test bed. Each protocol was then implemented on the setup using specific configuration commands, available online at various sources. UDP based audio streaming, video streaming, and TCP based ICMP-ping traffic was run. Four different runs of IPv6 traffic were routed over the setup for both IPv6 tunneling protocols. The average of the data was taken to generate graphs and final results. The performance of these tunneling techniques has been evaluated through certain parameters, namely: throughput, end to end delay (E2ED), round trip time (RTT), and jitter.","PeriodicalId":166647,"journal":{"name":"2011 IEEE Symposium on Computers & Informatics","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123433923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-03-20DOI: 10.1109/ISCI.2011.5958877
W. Wali, J. Cullen, K. Hassan, A. Mason, A. Al-Shamma'a
Biodiesel reactor is the heart of biodiesel system. These reactors involve a highly complex set of chemical reactions and heat transfers. The high nonlinearity requires an efficient control algorithm to handle the variation of operational process parameters and the effect of process disturbances efficiently. In this paper, Fuzzy logic and Adaptive controllers are compared for advance microwave biodiesel reactor. The process control is complex and nonlinear, the Adaptive control have longer time and unreliability in dealing with the system parameters including temperature, microwave power, liquid flow rate as well as the prediction of chemical reaction. The proposed fuzzy logic control will provide precise temperature control and faster warm-up phase with quicker response to disturbances with minimal overshoot and undershoot where Adaptive control techniques can not meet these extra challenges. A closed loop fuzzy and adaptive controllers are used to automatically and continuously adjust the applied power of microwave reactor under different perturbations. Labview based software tool will be presented and used for measurement and control of the full system, with real time monitoring.
{"title":"Comparison between Adaptive and Fuzzy logic controllers for advance microwave biodiesel reactor","authors":"W. Wali, J. Cullen, K. Hassan, A. Mason, A. Al-Shamma'a","doi":"10.1109/ISCI.2011.5958877","DOIUrl":"https://doi.org/10.1109/ISCI.2011.5958877","url":null,"abstract":"Biodiesel reactor is the heart of biodiesel system. These reactors involve a highly complex set of chemical reactions and heat transfers. The high nonlinearity requires an efficient control algorithm to handle the variation of operational process parameters and the effect of process disturbances efficiently. In this paper, Fuzzy logic and Adaptive controllers are compared for advance microwave biodiesel reactor. The process control is complex and nonlinear, the Adaptive control have longer time and unreliability in dealing with the system parameters including temperature, microwave power, liquid flow rate as well as the prediction of chemical reaction. The proposed fuzzy logic control will provide precise temperature control and faster warm-up phase with quicker response to disturbances with minimal overshoot and undershoot where Adaptive control techniques can not meet these extra challenges. A closed loop fuzzy and adaptive controllers are used to automatically and continuously adjust the applied power of microwave reactor under different perturbations. Labview based software tool will be presented and used for measurement and control of the full system, with real time monitoring.","PeriodicalId":166647,"journal":{"name":"2011 IEEE Symposium on Computers & Informatics","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121973958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-03-20DOI: 10.1109/ISCI.2011.5958950
N. Ahmad, S. Ahmad, A. Talib
This paper presents i) literature review of illuminance limits for conservation of exhibits; ii) pilot study on illuminance levels and distributions, air temperatures and relative humidity, RH and iii) survey results on visitors' visual feedbacks on the exhibits' conditions conducted at the Admiral Cheng Ho Gallery (Museum of History and Ethnography), Stadthuys, Melaka, Malaysia. Indicators for visual discomfort are observed from objectives ii and iii. The fieldwork was a pilot survey in the west facing gallery during high period of daylight distributions (14.00–16.00hr) for a full week in March 2010. Results showed illuminance levels exceeded allowable exposure limits for some showcases. Measured air temperatures were much higher than accepted comfort range especially with opened windows in the afternoon and the RH levels were within the prescribed range. The survey identified the combination of natural daylight and artificial lighting deteriorated the exhibits' conditions through fading, distortion, dirt and dust. The showcases were placed against and opposite the fully opened windows. Thus, the presence of sunlight, daylight and provision for external views in the gallery produced glare and veiling reflections problems on the glass showcases. These situations may demonstrate the need for proper maintenance and appropriate controlled shading system. The evaluation of daylight distributions may serve as future conservation measure for the exhibits.
{"title":"Illuminance distributions, visual response and limits for conservation of exhibits in Admiral Cheng Ho Gallery, Malaysia","authors":"N. Ahmad, S. Ahmad, A. Talib","doi":"10.1109/ISCI.2011.5958950","DOIUrl":"https://doi.org/10.1109/ISCI.2011.5958950","url":null,"abstract":"This paper presents i) literature review of illuminance limits for conservation of exhibits; ii) pilot study on illuminance levels and distributions, air temperatures and relative humidity, RH and iii) survey results on visitors' visual feedbacks on the exhibits' conditions conducted at the Admiral Cheng Ho Gallery (Museum of History and Ethnography), Stadthuys, Melaka, Malaysia. Indicators for visual discomfort are observed from objectives ii and iii. The fieldwork was a pilot survey in the west facing gallery during high period of daylight distributions (14.00–16.00hr) for a full week in March 2010. Results showed illuminance levels exceeded allowable exposure limits for some showcases. Measured air temperatures were much higher than accepted comfort range especially with opened windows in the afternoon and the RH levels were within the prescribed range. The survey identified the combination of natural daylight and artificial lighting deteriorated the exhibits' conditions through fading, distortion, dirt and dust. The showcases were placed against and opposite the fully opened windows. Thus, the presence of sunlight, daylight and provision for external views in the gallery produced glare and veiling reflections problems on the glass showcases. These situations may demonstrate the need for proper maintenance and appropriate controlled shading system. The evaluation of daylight distributions may serve as future conservation measure for the exhibits.","PeriodicalId":166647,"journal":{"name":"2011 IEEE Symposium on Computers & Informatics","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130081046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}