Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 38

Full-Text Articles in Physical Sciences and Mathematics

Estimates Of Probable Dementia Prevalence From Population-Based Surveys Compared With Dementia Prevalence Estimates Based On Meta-Analyses, Kaarin J. Anstey, Richard A. Burns, Carole Birrell, David G. Steel, Kim M. Kiely, Mary A. Luszcz Dec 2015

Estimates Of Probable Dementia Prevalence From Population-Based Surveys Compared With Dementia Prevalence Estimates Based On Meta-Analyses, Kaarin J. Anstey, Richard A. Burns, Carole Birrell, David G. Steel, Kim M. Kiely, Mary A. Luszcz

Dr Carole Birrell

Background: National data on dementia prevalence are not always available, yet it may be possible to obtain estimates from large surveys that include dementia screening instruments. In Australia, many of the dementia prevalence estimates are based on European data collected between 15 and 50 years ago. We derived populationbased estimates of probable dementia and possible cognitive impairment in Australian studies using the Mini-Mental State Examination (MMSE), and compared these to estimates of dementia prevalence from meta-analyses of European studies. Methods: Data sources included a pooled dataset of Australian longitudinal studies (DYNOPTA), and two Australian Bureau of Statistics National Surveys of …


Estimates Of Probable Dementia Prevalence From Population-Based Surveys Compared With Dementia Prevalence Estimates Based On Meta-Analyses, Kaarin J. Anstey, Richard A. Burns, Carole Birrell, David G. Steel, Kim M. Kiely, Mary A. Luszcz Dec 2015

Estimates Of Probable Dementia Prevalence From Population-Based Surveys Compared With Dementia Prevalence Estimates Based On Meta-Analyses, Kaarin J. Anstey, Richard A. Burns, Carole Birrell, David G. Steel, Kim M. Kiely, Mary A. Luszcz

Dr Carole Birrell

Background: National data on dementia prevalence are not always available, yet it may be possible to obtain estimates from large surveys that include dementia screening instruments. In Australia, many of the dementia prevalence estimates are based on European data collected between 15 and 50 years ago. We derived populationbased estimates of probable dementia and possible cognitive impairment in Australian studies using the Mini-Mental State Examination (MMSE), and compared these to estimates of dementia prevalence from meta-analyses of European studies. Methods: Data sources included a pooled dataset of Australian longitudinal studies (DYNOPTA), and two Australian Bureau of Statistics National Surveys of …


Formation Of Magnesium Diboride-Based Materials With High Critical Currents And Mechanical Characteristics By High-Pressure Synthesis, Tetiana Prikhna, W. Gawalek, Ya M. Savchuk, N. V. Sergienko, V. E. Moshchil, M. Wendt, M. Zeisberger, T. Habisreuther, V. B. Sverdun, S X. Dou, S. N. Dub, V. S. Melnikov, Ch Schmidt, J. Dellith, P. A. Nagorny Mar 2014

Formation Of Magnesium Diboride-Based Materials With High Critical Currents And Mechanical Characteristics By High-Pressure Synthesis, Tetiana Prikhna, W. Gawalek, Ya M. Savchuk, N. V. Sergienko, V. E. Moshchil, M. Wendt, M. Zeisberger, T. Habisreuther, V. B. Sverdun, S X. Dou, S. N. Dub, V. S. Melnikov, Ch Schmidt, J. Dellith, P. A. Nagorny

Shi Xue Dou

The developed method of high-pressure synthesis (HPS) allows producing nanostructural highly dense material based on MGB2, which possesses the highest superconducting and mechanical characteristics among the known world analogues, in the form of blocks that are suitable for application in SC electromotors and pumps. Additions of Zr can increase critical current density (jc) of synthesized at 2 GPa and 750-800 °C MGB2 in the same manner as additions of Ta or Ti, i.e. due to the absorption of impurity hydrogen forming the ZrH2. The formation of ZrB2 phase at higher synthesis temperatures (about 950 °C) in HPS MGB2 does not …


Places Of Reconciliation: Gay, Lesbian And Transgender Place-Based Belongings In A Regional Australian Centre, Gordon R. Waitt, Andrew W. Gorman-Murray Jul 2013

Places Of Reconciliation: Gay, Lesbian And Transgender Place-Based Belongings In A Regional Australian Centre, Gordon R. Waitt, Andrew W. Gorman-Murray

Gordon Waitt

Place-based belonging is a key concern of geographical work on sexuality. Marginalised through practices of heterosexism and homophobia, gay men, lesbians and other sexual minorities have a heightened awareness of where they belong – of where they can perform sexual difference. Much research here focuses on place-based belonging in metropolitan centres. There is less consideration of how sexual minorities sustain place-based belonging in regional centres, which are also believed to exhibit higher levels of homophobia. Drawing on in-depth interviews, we examine how sexual minorities generate place-based belonging in Townsville. We argue that place-based belonging be understood as an ongoing relational …


A Numerical Model For Multiphase Flow Based On The Gmpps Formulation, Part I Kinematics, Song-Ping Zhu, Frank Bierbrauer Jun 2013

A Numerical Model For Multiphase Flow Based On The Gmpps Formulation, Part I Kinematics, Song-Ping Zhu, Frank Bierbrauer

Professor Song-Ping Zhu

The CFD modeling of two dimensional multiphase ows is a useful tool in industry, although accurate modeling itself remains a difficult task. One of the difficulties is to track the complicated topological deformations of the interfaces between di erent phases. This paper describes a marker-particle method designed to track fluid interfaces for fluid ows of at least three phases. The interface-tracking scheme presented in this paper is the first part of a series of papers presenting our complete model based on a one-field Godunov marker-particle projection scheme (GMPPS). In this part, we shall focus on the presentation of the interface-tracking …


Feature Based Stereo Correspondence Using Moment Invariant, Prashan Premaratne, Farzad Safaei Jun 2013

Feature Based Stereo Correspondence Using Moment Invariant, Prashan Premaratne, Farzad Safaei

Professor Farzad Safaei

Autonomous navigation is seen as a vital tool in harnessing the enormous potential of Unmanned Aerial Vehicles (UAV) and small robotic vehicles for both military and civilian use. Even though, laser based scanning solutions for Simultaneous Location And Mapping (SLAM) is considered as the most reliable for depth estimation, they are not feasible for use in UAV and land-based small vehicles due to their physicalsize and weight. Stereovision is considered as the best approach for any autonomous navigation solution as stereo rigs are considered to be lightweight and inexpensive. However, stereoscopy which estimates the depth information through pairs of stereo …


Photoelectrochemical Cells Based On Inherently Conducting Polymers, Gordon G. Wallace, Chee O. Too, David L. Officer, Paul C Dastoor Mar 2013

Photoelectrochemical Cells Based On Inherently Conducting Polymers, Gordon G. Wallace, Chee O. Too, David L. Officer, Paul C Dastoor

Gordon Wallace

This review of photoelectrochemical cells (PECs) based on inherently conducting polymers (ICPs) deals with the mechanisms of operation and the various factors that influence the overall efficiency of PECs. The factors addressed include ICP composition and oxidation state, the use of nanostructured surfaces and interfaces, and the PEC electrolyte and redox mediator.


Data Security And Information Privacy For Pda Accessible Clinical-Log For Medical Education In Problem-Based Learning (Pbl) Approach, Rattiporn Luanrattana, Khin Than Win, John A. Fulcher Dec 2012

Data Security And Information Privacy For Pda Accessible Clinical-Log For Medical Education In Problem-Based Learning (Pbl) Approach, Rattiporn Luanrattana, Khin Than Win, John A. Fulcher

Dr Khin Win

Data security and information privacy are the important aspects to consider for the use of mobile technology for recording clinical experience and encounter in medical education. Objective: This study aims to address the qualitative findings of the appropriate data security and information privacy for PDA accessible clinical-log in problem-based learning (PBL) approach in medical education. Method: The semi-structured interviews were conducted with the medical faculty members, honorary clinical academics and medical education technology specialists. Results: Data security and information access plan were determined for managing clinical-log data. The results directed the guideline for the future development and implementation of clinical-log …


Electronic Health Record System Evaluation Based On Patient Safety, Yung-Yu Su, Khin Than Win, John A. Fulcher Dec 2012

Electronic Health Record System Evaluation Based On Patient Safety, Yung-Yu Su, Khin Than Win, John A. Fulcher

Dr Khin Win

After describing the general characteristics of Electronic Health Records (EHRs), we consider patient safety. We then proceed to discuss IS evaluation in general terms, followed by HIS system evaluation in particular. The D&M IS Success model, Technology Acceptance model and Task-Technology Fit model are considered as potential candidates for EHR System evaluation. Based upon a critical review of the available literature, we draw some conclusions about the appropriateness of current HIS/EHR evaluation approaches. Finally, we suggest that by incorporating patient safety attributes in any EHR System evaluation framework, then this could lead to improved accuracy, and in turn improved patient …


A Car Detection System Based On Hierarchical Visual Features, Fok Hing Chi Tivive, Abdesselam Bouzerdoum Dec 2012

A Car Detection System Based On Hierarchical Visual Features, Fok Hing Chi Tivive, Abdesselam Bouzerdoum

Dr Fok Hing Chi Tivive

In this paper, we address the problem of detecting and localizing cars in still images. The proposed car detection system is based on a hierarchical feature detector in which the processing units are shunting inhibitory neurons. To reduce the training time and complexity of the network, the shunting inhibitory neurons in the first layer are implemented as directional nonlinear filters, whereas the neurons in the second layer have trainable parameters. A multi-resolution processing scheme is implemented so as to detect cars of different sizes, and to reduce the number of false positives during the detection stage, an adaptive thresholding strategy …


A Human Gait Classification Method Based On Radar Doppler Spectrograms, Fok Hing Chi Tivive, Abdesselam Bouzerdoum, Moeness G. Amin Dec 2012

A Human Gait Classification Method Based On Radar Doppler Spectrograms, Fok Hing Chi Tivive, Abdesselam Bouzerdoum, Moeness G. Amin

Dr Fok Hing Chi Tivive

An image classification technique, which has recently been introduced for visual pattern recognition, is successfully applied for human gait classification based on radar Doppler signatures depicted in the time-frequency domain. The proposed method has three processing stages. The first two stages are designed to extract Doppler features that can effectively characterize humanmotion based on the nature of arm swings, and the third stage performs classification. Three types of arm motion are considered: free-arm swings, one-arm confined swings, and no-arm swings. The last two arm motions can be indicative of a human carrying objects or a person in stressed situations. The …


An Ambient Multimedia User Experience Feedback Framework Based On User Tagging And Eeg Biosignals, Eva Cheng, Stephen J. Davis, Ian Burnett, Christian H. Ritz Dec 2012

An Ambient Multimedia User Experience Feedback Framework Based On User Tagging And Eeg Biosignals, Eva Cheng, Stephen J. Davis, Ian Burnett, Christian H. Ritz

Dr Christian Ritz

Multimedia is increasingly accessed online and within social networks; however, users are typically limited to visual/auditory stimulus through media presented onscreen with accompanying audio over speakers. Whilst recent research studying additional ambient sensory multimedia effects recorded numerical scores of perceptual quality, the users’ time-varying emotional response to the ambient sensory feedback is not considered. This paper thus introduces a framework to evaluate user ambient quality of multimedia experience and discover users’ time-varying emotional responses through explicit user tagging and implicit EEG biosignal analysis. In the proposed framework, users interact with the media via discrete tagging activities whilst their EEG biosignal …


Cancelable Key-Based Fingerprint Templates, Russell Ang, Reihaneh Safavi-Naini, Luke F. Mcaven Dec 2012

Cancelable Key-Based Fingerprint Templates, Russell Ang, Reihaneh Safavi-Naini, Luke F. Mcaven

Dr Luke McAven

Biometric based authentication can provide strong security guarantee about the identity of users. Security of biometric data is particularly important as compromise of the data will be permanent. Cancelable biometrics store a non-invertible transformed version of the biometric data and so if the storage is compromised the biometric data remains safe. Cancelable biometrics also provide a higher level of privacy by allowing many templates for the same biometric data and hence non-linkability of user's data stored in different databases. We define how to measure the success of a particular transformation and matching algorithm for fingerprints. We consider a key-dependent geometric …


Age Estimation Based On Extended Non-Negative Matrix Factorization, Ce Zhan, Wanqing Li, Philip Ogunbona Dec 2012

Age Estimation Based On Extended Non-Negative Matrix Factorization, Ce Zhan, Wanqing Li, Philip Ogunbona

Associate Professor Wanqing Li

Previous studies suggested that local appearance-based methods are more efficient than geometric-based and holistic methods for age estimation. This is mainly due to the fact that age information are usually encoded by the local features such as wrinkles and skin texture on the forehead or at the eye corners. However, the variations of theses features caused by other factors such as identity, expression, pose and lighting may be larger than that caused by aging. Thus, one of the key challenges of age estimation lies in constructing a feature space that could successfully recovers age information while ignoring other sources of …


Reflecting On Ontologies Towards Ontology-Based Agent-Oriented Software Engineering, Ghassan Beydoun, Brian Henderson-Sellers, Jun Shen, G. Low Dec 2012

Reflecting On Ontologies Towards Ontology-Based Agent-Oriented Software Engineering, Ghassan Beydoun, Brian Henderson-Sellers, Jun Shen, G. Low

Associate Professor Ghassan Beydoun

“Ontology” in association with “software engineering” is becoming commonplace. This paper argues for the need to place ontologies at the centre of the software development lifecycle for multi agent systems to enhance reuse of software workproducts as well as to unify agent-based software engineering knowledge. The paper bridges the state-of-the-art of ontologies research from Knowledge Engineering (KE) within Artificial Intelligence and Metamodelling within Software Engineering (SE). It presents a sketch of an ontology-based Multi Agent System (MAS) methodology discussing key roles on ontologies and their impact of workproducts, illustrating these in a MAS software development project for an important application …


Pbtrust: A Priority-Based Trust Model For Service Selection In General Service-Oriented Environments, Xing Su, Minjie Zhang, Yi Mu, Kwang Mong Sim Dec 2012

Pbtrust: A Priority-Based Trust Model For Service Selection In General Service-Oriented Environments, Xing Su, Minjie Zhang, Yi Mu, Kwang Mong Sim

Associate Professor Minjie Zhang

How to choose the best service provider (agent), which a service consumer can trust in terms of the quality and success rate of the service in an open and dynamic environment, is a challenging problem in many service-oriented applications such as Internet-based grid systems, e-trading systems, as well as service-oriented computing systems. This paper presents a Priority-Based Trust (PBTrust) model for service selection in general service-oriented environments. The PBTrust is robust and novel from several perspectives. (1) The reputation of a service provider is derived from referees who are third parties and had interactions with the provider in a rich …


Ontology-Based Knowledge Representation For A P2p Multi-Agent Distributed Intrusion Detection System, Dayong Ye, Quan Bai, Minjie Zhang Dec 2012

Ontology-Based Knowledge Representation For A P2p Multi-Agent Distributed Intrusion Detection System, Dayong Ye, Quan Bai, Minjie Zhang

Associate Professor Minjie Zhang

Many research efforts on application of ontology in network security have been done in the past decade. However, they mostly stop at initial proposal or focus on framework design without detailed representation of intrusion or attack and relevant detection knowledge with ontology. In this paper, the design and implementation of ontology-based knowledge representation for a peer-to-peer multi-agent distributed intrusion detection system (ontology-based MADIDS) are introduced. An example which demonstrates the representation of an attack with ontology and the relevant detection process is also presented. In ontology-Based MADIDS, ontology technique enables peers in the system and agents in one peer to …


An Agent-Based Peer-To-Peer Grid Computing Architecture, Jia Tang, Minjie Zhang Dec 2012

An Agent-Based Peer-To-Peer Grid Computing Architecture, Jia Tang, Minjie Zhang

Associate Professor Minjie Zhang

The conventional computing Grid has developed a service oriented computing architecture with a superlocal resource management and scheduling strategy. This architecture is limited in modeling computer systems with highly dynamic and autonomous computing resources due to its server-based computing model. The super-local resource management and scheduling strategy also limits the utilization of the computing resources. In this paper, we propose a multi-agent based Peer-to-Peer Grid computing architecture. This novel architecture solves the above issues, while provides reasonable compatibility and interoperability with the conventional Grid systems and clients. The main characteristics of this architecture are highlighted by its promising performance and …


An Ontology-Based Approach For Expert And Knowledge Mining In Complex Multi-Agent Systems, Minjie Zhang, Xijin Tang, Quan Bai, Jifa Gu Dec 2012

An Ontology-Based Approach For Expert And Knowledge Mining In Complex Multi-Agent Systems, Minjie Zhang, Xijin Tang, Quan Bai, Jifa Gu

Associate Professor Minjie Zhang

Complex problems require diverse expertise and multiple techniques to solve. In order to solve such problems, complex multi-agent systems include numbers of heterogeneous agents, which may include both of human experts and autonomous agents, to work together toward some complex problems. Most complex multi-agent systems are working in open domains. Due to heterogeneities and dynamic working environments, expertise and capabilities of agents might not be well estimated and presented in the system. Therefore, how to discover useful knowledge from human and autonomous experts, make more accurate estimation for experts' capabilities and to find out suitable expert(s) to solve incoming problems …


3d Face Recognition Based On A Modified Icp Method, Kankan Zhao, Jiangtao Xi, Yanguang Yu, Joe F. Chicharo Dec 2012

3d Face Recognition Based On A Modified Icp Method, Kankan Zhao, Jiangtao Xi, Yanguang Yu, Joe F. Chicharo

Dr Yanguang Yu

3D face recognition technique has gained much more attention recently, and it is widely used in security system, identification system, and access control system, etc. The core technique in 3D face recognition is to find out the corresponding points in different 3D face images. The classic partial Iterative Closest Point (ICP) method is iteratively align the two point sets based on repetitively calculate the closest points as the corresponding points in each iteration. After several iterations, the corresponding points can be obtained accurately. However, if two 3D face images with different scale are from the same person, the classic partial …


Wfms-Based Data Integration For E-Learning, Jianming Yong, Jun Yan, Xiaodi Huang Dec 2012

Wfms-Based Data Integration For E-Learning, Jianming Yong, Jun Yan, Xiaodi Huang

Dr Jun Yan

As more and more organisations and institutions are moving towards the e-learning strategy, more and more disparate data are distributed by different e-learning systems. How to effectively use this vast amount of distributed data becomes a big challenge. This paper addresses this challenge and works out a new mechanism to implement data integration for e-learning. A workflow management system based (WFMS-based) data integration model is contributed to the e-learning.


Support-Based Distributed Optimisation: An Approach To Radiotherapy Patient Scheduling, Graham Billiau, Chee-Fon Chang, Andrew Alexis Miller, Aditya K. Ghose Dec 2012

Support-Based Distributed Optimisation: An Approach To Radiotherapy Patient Scheduling, Graham Billiau, Chee-Fon Chang, Andrew Alexis Miller, Aditya K. Ghose

Professor Aditya K. Ghose

In the health system inefficiency leads to poor use of scarce expensive resources. Lengthy patient treatment waiting time can result from inefficiency in scheduling. The use of state-of-the art multi-agent and distributed computing technologies can provide a solution to address this problem. However, distributed optimisation in such a multi-agent setting poses an important challenge that requires protocols to enable agents to optimise shared objectives without necessarily revealing all of their private constraints. In this study we show that if the problem is expressed as a Dynamic Distributed Constraint Optimisation Problem a powerful algorithm such as SBDO can be deployed to …


A Provable Secure Id-Based Explicit Authenticated Key Agreement Protocol Without Random Oracles, Haibo Tian, Willy Susilo, Yang Ming, Yumin Wang Dec 2012

A Provable Secure Id-Based Explicit Authenticated Key Agreement Protocol Without Random Oracles, Haibo Tian, Willy Susilo, Yang Ming, Yumin Wang

Professor Willy Susilo

In this paper, we present an identity-based explicit authenticated key agreement protocol that is provably secure without random oracles. The protocol employs a new method to isolate a session key from key con¯rmation keys so that there is no direct usage of hash functions in the protocol. The protocol is proved secure without random oracles in a variant of Bellare and Rogaway style model, an exception to current proof method in this style model in the ID-based setting. We believe that this key isolation method is novel and can be further studied for constructing more e±cient protocols.


Estimates Of Probable Dementia Prevalence From Population-Based Surveys Compared With Dementia Prevalence Estimates Based On Meta-Analyses, Kaarin J. Anstey, Richard A. Burns, Carole Birrell, David G. Steel, Kim M. Kiely, Mary A. Luszcz Dec 2012

Estimates Of Probable Dementia Prevalence From Population-Based Surveys Compared With Dementia Prevalence Estimates Based On Meta-Analyses, Kaarin J. Anstey, Richard A. Burns, Carole Birrell, David G. Steel, Kim M. Kiely, Mary A. Luszcz

Professor David Steel

Background: National data on dementia prevalence are not always available, yet it may be possible to obtain estimates from large surveys that include dementia screening instruments. In Australia, many of the dementia prevalence estimates are based on European data collected between 15 and 50 years ago. We derived populationbased estimates of probable dementia and possible cognitive impairment in Australian studies using the Mini-Mental State Examination (MMSE), and compared these to estimates of dementia prevalence from meta-analyses of European studies.

Methods: Data sources included a pooled dataset of Australian longitudinal studies (DYNOPTA), and two Australian Bureau of Statistics National …


A Pragmatic Gis-Oriented Ontology For Location Based Services, Jun Shen, Aneesh Krishna, Shuai Yuan, Ke Cai, Yuemin Qin Dec 2012

A Pragmatic Gis-Oriented Ontology For Location Based Services, Jun Shen, Aneesh Krishna, Shuai Yuan, Ke Cai, Yuemin Qin

Dr Jun Shen

With advances in automatic position sensing and wireless connectivity, location-based services (LBS) are rapidly developing, particularly in fields of geographic, tourism and logistic information systems. Currently, Web service has been viewed as one of most significant innovations in business industry, and designed on demand to provide spatial related information for LBS consumption. However, the traditional Web Service Description Language (WSDL) cannot meet those requirements, as WSDL is not able to support semantic content and information. In recent years, Ontology came up with an effective approach to enhance service description, automated discovery, dynamic composition, enactment, and other tasks such as managing …


Reflecting On Ontologies Towards Ontology-Based Agent-Oriented Software Engineering, Ghassan Beydoun, Brian Henderson-Sellers, Jun Shen, G. Low Dec 2012

Reflecting On Ontologies Towards Ontology-Based Agent-Oriented Software Engineering, Ghassan Beydoun, Brian Henderson-Sellers, Jun Shen, G. Low

Dr Jun Shen

“Ontology” in association with “software engineering” is becoming commonplace. This paper argues for the need to place ontologies at the centre of the software development lifecycle for multi agent systems to enhance reuse of software workproducts as well as to unify agent-based software engineering knowledge. The paper bridges the state-of-the-art of ontologies research from Knowledge Engineering (KE) within Artificial Intelligence and Metamodelling within Software Engineering (SE). It presents a sketch of an ontology-based Multi Agent System (MAS) methodology discussing key roles on ontologies and their impact of workproducts, illustrating these in a MAS software development project for an important application …


Adaptive Task Allocation For P2p-Based E-Services Composition, Jun Shen, Shuai Yuan Dec 2012

Adaptive Task Allocation For P2p-Based E-Services Composition, Jun Shen, Shuai Yuan

Dr Jun Shen

To effectively manage the task allocation, especially when handling with numerous different peers’ qualities, is one of the greatest challenges to be faced in order to guarantee the success of P2P-based e-services composition. In this context, various QoS descriptive frameworks and Web services technologies (such as WSDL and BPEL) are being considered as the most affordable solutions to promote the performance of decentralized e-services, through applying strategies like QoS ontologies and related optimization algorithms globally or locally. Nonetheless, most P2P-based service selection and composition approaches applied nowadays lack dynamism and autonomy. In this paper, we first propose an extension of …


Voltage Quality Behaviour Of A Wind Turbine Based Remote Area Power System, Nishad Mendis, Kashem Muttaqi, Sarath Perera Nov 2012

Voltage Quality Behaviour Of A Wind Turbine Based Remote Area Power System, Nishad Mendis, Kashem Muttaqi, Sarath Perera

Associate Professor Sarath Perera

The power quality behaviour of a Remote Area Power System (RAPS) consisting of a Doubly Fed Induction Generator (DFIG), its main loads and a dummy load is presented in this paper. The dummy load is used to maintain the power balance of the system under changing wind and loading conditions. The performance of the remote area power system subject to various loading conditions has been evaluated in terms of the voltage quality, an aspect which has not received much attention in the past. The existing Distributed Generation (DG) power quality standards are taken as the basis to compare the voltage …


Voltage Quality Behaviour Of A Wind Turbine Based Remote Area Power System, Nishad Mendis, Kashem Muttaqi, Sarath Perera Nov 2012

Voltage Quality Behaviour Of A Wind Turbine Based Remote Area Power System, Nishad Mendis, Kashem Muttaqi, Sarath Perera

Associate Professor Kashem Muttaqi

The power quality behaviour of a Remote Area Power System (RAPS) consisting of a Doubly Fed Induction Generator (DFIG), its main loads and a dummy load is presented in this paper. The dummy load is used to maintain the power balance of the system under changing wind and loading conditions. The performance of the remote area power system subject to various loading conditions has been evaluated in terms of the voltage quality, an aspect which has not received much attention in the past. The existing Distributed Generation (DG) power quality standards are taken as the basis to compare the voltage …


Pbtrust: A Priority-Based Trust Model For Service Selection In General Service-Oriented Environments, Xing Su, Minjie Zhang, Yi Mu, Kwang Mong Sim Nov 2012

Pbtrust: A Priority-Based Trust Model For Service Selection In General Service-Oriented Environments, Xing Su, Minjie Zhang, Yi Mu, Kwang Mong Sim

Professor Yi Mu

How to choose the best service provider (agent), which a service consumer can trust in terms of the quality and success rate of the service in an open and dynamic environment, is a challenging problem in many service-oriented applications such as Internet-based grid systems, e-trading systems, as well as service-oriented computing systems. This paper presents a Priority-Based Trust (PBTrust) model for service selection in general service-oriented environments. The PBTrust is robust and novel from several perspectives. (1) The reputation of a service provider is derived from referees who are third parties and had interactions with the provider in a rich …