Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Physical Sciences and Mathematics

Vulnerability Assessment Of A Large Sized Power System Considering A New Index Based On Power System Loss, Ahmed M. Haidar, Azah Mohamed, Aini Hussain Jan 2007

Vulnerability Assessment Of A Large Sized Power System Considering A New Index Based On Power System Loss, Ahmed M. Haidar, Azah Mohamed, Aini Hussain

Faculty of Informatics - Papers (Archive)

The concept of power system vulnerability assessment combines information on the level of system security as well as information on a wide range of situations, events and contingencies with regards to which a system is vulnerable. This paper attempts to investigate and evaluate the effect of line outage, generation outage and amount of load disconnected on the power transmission network losses of a large size power system. These effects will be investigated and evaluated using new proposed method based on vulnerability index of power system loss. The objectives of this work is to evaluate and compare the efficiency of the …


System Architecture And Mobility Management For Mobile Immersive Communications, Mehran Dowlatshahi, Farzad Safaei Jan 2007

System Architecture And Mobility Management For Mobile Immersive Communications, Mehran Dowlatshahi, Farzad Safaei

Faculty of Informatics - Papers (Archive)

We propose a system design for delivery of immersive communications to mobile wireless devices based on a distributed proxy model. It is demonstrated that this architecture addresses key technical challenges for the delivery of these services, that is, constraints on link capacity and power consumption in mobile devices. However, additional complexity is introduced with respect to application layer mobility management. The paper proposes three possible methods for updating proxy assignments in response to mobility management and compares the performance of these methods.


Rfid-Based Anti-Theft Auto Security System With An Immobilizer, Geeth Jayendra, Sisil Kumarawadu, Lasantha Meegahapola Jan 2007

Rfid-Based Anti-Theft Auto Security System With An Immobilizer, Geeth Jayendra, Sisil Kumarawadu, Lasantha Meegahapola

Faculty of Informatics - Papers (Archive)

This paper presents a novel radio frequency identification (RFID) based vehicle immobilizer system, which features low hacking probability while preserving the safety of the passengers of the hijacked vehicle. The immobilizer uses the active RFID technology where the tag is generated with comparatively large character sets. The receiving unit is intelligently integrated into three control circuits in the vehicle, namely, ignition circuit, power control unit, and automatic gear changing system, enabling it to bring the vehicle speed down to zero in a safe step by step manner. The anti-theft auto security system proposed here was tested under different weather conditions …


A Task Model Of Software Intensive Acquisitions: An Integrated Tactical Avionics System Case Study, Ricardo Peculis, Derek Rogers, Peter Campbell Jan 2007

A Task Model Of Software Intensive Acquisitions: An Integrated Tactical Avionics System Case Study, Ricardo Peculis, Derek Rogers, Peter Campbell

SMART Infrastructure Facility - Papers

The acquisition of complex software intensive systems is fraught with significant risks and often incurs schedule delays, cost overruns and reduced functionality when the product is finally delivered. This paper presents a model to assess the effectiveness of software intensive acquisitions, founded on the premise that the solution depends on a series of transformations that transform input products in one domain into output products in another domain. Transformations are performed by people, and require knowledge and skills pertinent to both input and output domains. Ideally, products should be transformed without distortions resulting into the desirable solution. In reality, distortions occur …


Conducting Polymers With Fibrillar Morphology Synthesized In A Biphasic Ionic Liquid/Water System, J.M. Pringle, Orawan Ngamna, Carol M. Lynam, Gordon G. Wallace, Maria Forsyth, Douglas Macfarlane Jan 2007

Conducting Polymers With Fibrillar Morphology Synthesized In A Biphasic Ionic Liquid/Water System, J.M. Pringle, Orawan Ngamna, Carol M. Lynam, Gordon G. Wallace, Maria Forsyth, Douglas Macfarlane

Faculty of Science - Papers (Archive)

The synthesis of poly(pyrrole), poly(terthiophene), and poly(3,4-ethylenedioxythiophene) with unusual fibrillar morphologies has been achieved by chemical polymerization in a biphasic ionic liquid/water system. Use of aqueous gold chloride as the oxidant, with the monomers dissolved in a hydrophobic ionic liquid, allows the polymerization to occur at the ionic liquid/water interface. The resultant conducting polymer fibrils are, on average, 50−100 nm wide and can be thousands of nanometers long. The polymers produced in this ionic liquid system are compared to those synthesized in a biphasic chloroform/water system.


Application Of Semistructured Data Model To The Implementation Of Semantic Content-Based Video Retrieval System, Lilac A. E. Al-Safadi, Janusz R. Getta Jan 2007

Application Of Semistructured Data Model To The Implementation Of Semantic Content-Based Video Retrieval System, Lilac A. E. Al-Safadi, Janusz R. Getta

Faculty of Informatics - Papers (Archive)

Semantic indexing of a video document is a process that performs the identification of elementary and complex semantic units in the indexed document in order to create a semantic index defined as a mapping of semantic units into the sequences of video frames. Semantic content-based video retrieval system is a software system that uses a semantic index built over a collection of video documents to retrieve the sequences of video frames that satisfy the given conditions. This work introduces a new multilevel view of data for the semantic content-based video retrieval systems. At the topmost level, we define an abstract …


New Method Vulnerability Assessment Of Power System, Ahmed M. Haidar, Azah Mohamed, Aini Hussain Jan 2007

New Method Vulnerability Assessment Of Power System, Ahmed M. Haidar, Azah Mohamed, Aini Hussain

Faculty of Informatics - Papers (Archive)

Vulnerability assessment in power systems is to determine a power system`s ability to continue to provide service in case of an unforeseen catastrophic contingency. It combines information on the level of system security as well as information on a wide range of scenarios, events and contingencies. To assess the level of system strength or weakness relative to the occurrence of an undesired event, a quantitative measure based on vulnerability index is often considered. In this study, a new vulnerability assessment method is proposed based on total power system loss which considers power generation loss due to generation outage, power line …