Results (75)
Search Parameters:
Keyword: StorageDSTATCOM-Fuel Cell System on Radial Low-voltage Distribution Network for Mitigating Voltage Rise Caused by High Penetration of Photovoltaic Systems
The Malaysian government has recently announced to increase the share of renewable energy generation from 2% to 20% of the total electricity consumption by year 2030. However, integrating a significant level of renewable energy sources on the distribution network without proper coordination will cause adverse effects that leads to unnecessary operation costs to the stakeholders.…
Read MoreEvent Monitoring using Distributed Pattern Recognition Approach on Integrated IoT-Blockchain Network
With the advancement in the field of Internet-of-Things (IoT), event monitoring applications have rapidly evolved from a simple event data acquisition towards predictive event analytics involving multi-sensory data aggregation in a distributed environment. Existing event monitoring schemes are mainly relying on ine_cient centralized processing mechanism, which may lead to the common single-point of failure for…
Read MoreSmart Meter Data Analysis for Electricity Theft Detection using Neural Networks
The major problem in electric utility is Electrical Theft, which is harmful to electric power suppliers and causes economic loss. Detecting and controlling electrical theft is a challenging task that involves several aspects like economic, social, regional, managerial, political, infrastructural, literacy rate, etc. Numerous methods were proposed formerly for detecting electricity theft. However, the previous…
Read MoreDetection the Places of the Heat Energy Leak on the Underground Thermal Pipelines Using the Computer System
The purpose of this paper is to improve the thermographic method for detection the places of heat energy losses on the urban underground thermal pipelines using the computer system. This goal was achieved by building a heat map of the surveyed heating main with data layering directly on a computer map of the area, which…
Read MoreRelational Databases Versus HBase: An Experimental Evaluation
Relational database management systems (RDBMS) have been imposed for more than three decades as a facto standard for data storage, management, and analysis. They have a good reputation by supporting ACID properties (Atomicity, Consistency, Isolation, and Durability) and by adopting the SQL language which has become a standardized language. However, despite their power, RDBMS have…
Read MoreVirtualization in Cloud Environment: Bandwidth Management
Cloud computing recently emerged as an interesting model that enables computing and other related internet activities to take place anywhere, anytime. Cloud service providers centralize all servers, networks, and applications to allow their users’ access at any time and from any location. Cloud computing uses already existing resources like server, CPU and storage memory but…
Read MoreUsing Fuzzy PD Controllers for Soft Motions in a Car-like Robot
This paper deals with the control problem for nonholonomic wheeled mobile robots moving on the plane, and in particular, the use of a Fuzzy controller technique for achieving a given motion task which consists of following a rectilinear trajectory until an obstacle occurs on the path. After a background part, in which the fundamental knowledge…
Read MoreDifference in Speech Analysis Results by Coding
Mental health disorder is becoming a social problem, and there is a need for technology that can easily check for states of stress and depression as a countermeasure. Conventional methods of diagnostic support and screening include self-administered psychological tests and use of biomarkers. However, there are problems such as burden on subjects, examination costs, dedicated…
Read MoreProtecting Private Data using Improved Honey Encryption and Honeywords Generation Algorithm
Nowadays, many companies and organizations use various encryption techniques to secure their private data before send it through the unsecure network. However, many attackers try to store private data by using various attacks. Most of the organizations use password based encryption algorithm (PBE) to protect their private data. However, the existing PBE methods are vulnerable…
Read MoreA Study on Improving Security and Efficiency using Dynamic Ownership Management in Client-Side Deduplication Environments
Data deduplication technology is used to improve the spatial efficiency of cloud storage. This technology is used for storing data on a cloud and omitting data uploading if the data are already present. However, various security threats may occur during the deduplication process. These security threats include poison attacks and user identity exposure through ownership.…
Read MoreTowards an Efficient Federated Cloud Service Selection to Support Workflow Big Data Requirements
Cloud Computing is considered nowadays an attractive solution to serve the Big Data storage, processing, and analytics needs. Given the high complexity of Big Data workflows and their contingent requirements, a single cloud provider might not be able alone to satisfy these needs. A multitude of cloud providers that offer myriad of cloud services and…
Read MoreMinimizing Time Delay of Information Routed Across Dynamic Temporal Sensor Networks
In this research we address the problem of routing information across dynamic temporal sensor networks. The goal is to determine which information, generated by sensors on resources at various times, is able to be routed to other resources, consumer resources, within the given information time window, while being constrained by temporally dynamic bandwidth limitations across…
Read MoreComplete Modeling of the Hydrogen Stored in a Spherical Cavity
Hydrogen is the lightest of gases and possesses the lowest density. However at ambient temperature and pressure it occupies a large volume. This necessitates compressing it at high pressures up to 800 Bars to minimize the volume. The immense interest generated by hydrogen comes from the fact that it has the best energy per weight…
Read MoreStream Cipher by Reed-Solomon Codes
Stream cipher can be used in constrained environments to provide information security and reduce energy expense at data transmission. In this paper, it is shown that Reed-Solomon (RS) code can be used to implement stream cipher, which is widely used for error corrections of data in transmission and storages. The proposed stream cipher combines the…
Read MoreImproving Patient Outcomes Through Untethered Patient-Centered Health Records
Patient generated data, or personal clinical data, is considered an important aspect in improving patient outcomes. However, personal clinical data is difficult to collect and manage due to its distributed nature. For example, they can be located in multiple places such as doctors’ offices, radiology centers, hospitals, or some clinics. Another factor that can make…
Read MoreModeling of the wave functions and of the energy states of hydrogen stored in a spherical cavity
This article examines the hydrogen storage phenomenon in a spherical cavity. The hydrogen gas or liquid is subjected to high pressures, leading to significant loss of mass of hydrogen, and requires materials that can withstand these high pressures also minimize losses. For all these reasons, the problem is considered at the quantum scale. So in…
Read MoreTwo-Stage Performance Engineering of Container-based Virtualization
Cloud computing has become a compelling paradigm built on compute and storage virtualization technologies. The current virtualization solution in the Cloud widely relies on hypervisor-based technologies. Given the recent booming of the container ecosystem, the container-based virtualization starts receiving more attention for being a promising alternative. Although the container technologies are generally considered to be…
Read MoreMedium Voltage Microgrid Test Setup and Procedures Implemented on a Real Pilot Project
This paper presents various concepts related to the application of a microgrid pilot project in a residential condominium at Fortaleza / CE – Brazil, such as battery energy system, renewable and distributed generation, islanding recloser and all different units using interface based on power electronics. This papers main objective is to create information about microgrid…
Read MoreNumerical evaluation of ABS parts fabricated by fused deposition modeling and vapor smoothing
The automotive industry has focused to use polymer materials in order to increase energy efficiency. So, the industry pays attention to use 3D printing technologies using several polymers. Among several 3D printer technologies, fused deposition modeling (FDM) is one of the popular 3D printing technologies due to an inexpensive extrusion machine and multi-material printing. FDM…
Read MoreEmbedded C Programming Using FRDM to Enhance Engineering Students’ Learning Skill
Computer programming course that utilizes languages such as C/C++ is always packed with dreary syntax details that consume most of the students’ learning time to obtain ‘grammatically’ correct source code. Consequently, it is difficult for most of the students to apply the theory they have learned in a real life context. Thus, this project proposed…
Read MoreScalability Dilemma and Statistic Multiplexed Computing — A Theory and Experiment
The For the last three decades, end-to-end computing paradigms, such as MPI (Message Passing Interface), RPC (Remote Procedure Call) and RMI (Remote Method Invocation), have been the de facto paradigms for distributed and parallel programming. Despite of the successes, applications built using these paradigms suffer due to the proportionality factor of crash in the application…
Read MoreImproving the Performance of Fair Scheduler in Hadoop
Cloud computing is a power platform to deal with big data. Among several software frameworks used for the construction of cloud computing systems, Apache Hadoop, which is an open-source software, becomes a popular one. Hadoop supports for distributed data storage and the process of large data sets on computer clusters based on a MapReduce parallel…
Read MoreThe main characteristics of five distributed file systems required for big data: A comparative study
These last years, the amount of data generated by information systems has exploded. It is not only the quantities of information that are now estimated in Exabyte, but also the variety of these data which is more and more structurally heterogeneous and the velocity of generation of these data which can be compared in many…
Read MoreEvaluation of Three Evaporation Estimation Techniques In A Semi-Arid Region (Omar El Mukhtar Reservoir Sluge, Libya- As a case Study)
In many semi-arid countries in the world like Libya, drinking water supply is dependent on reservoirs water storage. Since the evaporation rate is very high in semi-arid countries, estimates and forecasts of reservoir evaporation rate can be useful in the management of major water source. Many researchers have been investigating the suitability of estimates evaporation…
Read MoreEnergy Management and Simulation of Photovoltaic/Hydrogen /Battery Hybrid Power System
This manuscript focuses on a hybrid power system combining a solar photovoltaic array and energy storage system based on hydrogen technology (fuel cell, hydrogen tank and electrolyzer) and battery. The complete architecture is connected to the national grid through power converters to increase the continuity of power. The proposed a hybrid power system is designed…
Read More
