{"title":"A novel hybrid evolutionary algorithm based on ACO and SA for distribution feeder reconfiguration with regard to DGs","authors":"J. Olamei, T. Niknam, A. Arefi, A. H. Mazinan","doi":"10.1109/IEEEGCC.2011.5752495","DOIUrl":"https://doi.org/10.1109/IEEEGCC.2011.5752495","url":null,"abstract":"This paper presents an efficient hybrid evolutionary optimization algorithm based on combining Ant Colony Optimization (ACO) and Simulated Annealing (SA), called ACO-SA, for distribution feeder reconfiguration (DFR) considering Distributed Generators (DGs). Due to private ownership of DGs, a cost based compensation method is used to encourage DGs in active and reactive power generation. The objective function is summation of electrical energy generated by DGs and substation bus (main bus) in the next day. The approach is tested on a real distribution feeder. The simulation results show that the proposed evolutionary optimization algorithm is robust and suitable for solving DFR problem.","PeriodicalId":119104,"journal":{"name":"2011 IEEE GCC Conference and Exhibition (GCC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129099605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Normalized 3D to 2D model-based facial image synthesis for 2D model-based face recognition","authors":"A. Ansari, M. Mahoor, M. Abdel-Mottaleb","doi":"10.1109/IEEEGCC.2011.5752482","DOIUrl":"https://doi.org/10.1109/IEEEGCC.2011.5752482","url":null,"abstract":"In our previous research [1–3], we created a database of 3D textured face models of people using stereo images and a generic face mesh model for 3D face recognition application. Consequently, in this paper we make use of this available database and propose an algorithm for synthesizing multiple view 2D facial images of each subject, which extends the number of images used in the training stage of a 2D face recognition system. The main contributions of our work are: a) proposing a novel 3D model-based face pose and scale normalizations before creating the synthesized 2D database from its 3D counterpart and b) proposing a model-based facial area segmentation and normalization to a given 2D probe facial image. Recognition experiments, using near frontal probe facial images and the extended synthesized database, demonstrate improved 2D recognition rate.","PeriodicalId":119104,"journal":{"name":"2011 IEEE GCC Conference and Exhibition (GCC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130767163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Collecting malware from distributed honeypots — Honeypharm","authors":"A. Hassan, M. A. Ali","doi":"10.1109/IEEEGCC.2011.5752555","DOIUrl":"https://doi.org/10.1109/IEEEGCC.2011.5752555","url":null,"abstract":"The purpose of having a honeypot, such as Nepenthes, that collects malicious software (malware), is to build the capability of capturing malware propagating in a certain infrastructure, or intentionally targeting that infrastructure. When multiple honeypots of this type are deployed, they require a mechanism in which the malware and other related intelligence are reported to a centralized repository to analyze collected malware and study both overall and infrastructure-specific trends. Such a setup also caters for identifying new malware, i.e., malware that are not known by any antivirus provider. This provides a mechanism of malware detection and analysis at the early stages, which allows it to be dealt with before it spreads massively and causes severe damage.","PeriodicalId":119104,"journal":{"name":"2011 IEEE GCC Conference and Exhibition (GCC)","volume":"236 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132999182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammed H. Albadi, A. Al-Badi, A. Al-Lawati, A. Malik
{"title":"Cost of PV electricity in Oman","authors":"Mohammed H. Albadi, A. Al-Badi, A. Al-Lawati, A. Malik","doi":"10.1109/IEEEGCC.2011.5752548","DOIUrl":"https://doi.org/10.1109/IEEEGCC.2011.5752548","url":null,"abstract":"Utilizing solar radiation data of 25 locations in Oman, RETScreen software is used to study the economic prospects of solar energy. A solar PV power plant of 5-MW is considered at each of the 25 locations. The results show that the renewable energy produced each year from the PV power plant varies between 9000 MWh at Marmul to 6200 MWh at Sur while the mean value is 7700 MWh of all the 25 locations. The capacity factor of PV plant varies between 20% and 14% and the cost of electricity varies between 210 $/MWh and 304 $/MWh for the best location to the least attractive location, respectively. The study shows that the PV energy at the best location is competitive with diesel generation without including the externality costs of diesel. Renewable energy support policies that can be implemented in Oman are also discussed.","PeriodicalId":119104,"journal":{"name":"2011 IEEE GCC Conference and Exhibition (GCC)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122193572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applying Protocol Service for the monitoring of business process","authors":"Xiaofeng Du, B. Bordbar, M. Alodib, B. Majeed","doi":"10.1109/IEEEGCC.2011.5752622","DOIUrl":"https://doi.org/10.1109/IEEEGCC.2011.5752622","url":null,"abstract":"Identifying occurrences of failure is a major challenge in business process management. Current business monitoring techniques are invaluable tool for debugging and evaluating business process executions. In this paper a method of extending existing monitoring capabilities of the systems to allow real-time or near-real-time monitoring is discussed. The presented method draws on the existing Model Driven Development techniques to automatically create a new module called Protocol Service. The created Protocol Service is deployed with the existing system to monitor occurrences of undesirable events and failure. In this paper the outline of the approach will be presented.","PeriodicalId":119104,"journal":{"name":"2011 IEEE GCC Conference and Exhibition (GCC)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122328696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Phase difference method for two-end partial discharge location in power cables","authors":"R. Mardiana, C. Su","doi":"10.1109/IEEEGCC.2011.5752601","DOIUrl":"https://doi.org/10.1109/IEEEGCC.2011.5752601","url":null,"abstract":"This paper presents a method to locate partial discharges (PD) in power cables based on the phase difference between the first arriving waves of a PD pulse at the cable terminals. The phase difference as a function of frequency is obtained using the cross Fourier spectral density function. The final PD location can be determined from the slope of the phase difference. The performance of the proposed method is tested using the Electromagnetic Transient Program (EMTP) on the model of a 20 kV, 2km underground cable. The simulation takes into account the frequency-dependent parameters of the cable. The statistical results are given and discussed.","PeriodicalId":119104,"journal":{"name":"2011 IEEE GCC Conference and Exhibition (GCC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123779442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mahasin Younis, Hessa Al-Shehhi, Nada Al Hamar, M. Méribout
{"title":"A wireless sensor network-based heliostat system using real-time image processing techniques","authors":"Mahasin Younis, Hessa Al-Shehhi, Nada Al Hamar, M. Méribout","doi":"10.1109/IEEEGCC.2011.5752559","DOIUrl":"https://doi.org/10.1109/IEEEGCC.2011.5752559","url":null,"abstract":"In this paper a new concept of heliostat system to maximize the amount of solar energy projected onto the focus is introduced. Its principle consists to use a single CCD camera to track in real-time the three dimensional (3D) motion of the sun and to broadcast this information to all the mirrors of the system in a wireless manner. Each of these mirrors is controlled by an independent control unit, the task of which is to rotate the associated mirror around its center and in 3D space in such a way to provide the maximal reflection of the solar energy onto the focus. Experimental results on a hardware prototype system indicate the feasibility of the concept to track a source of light in an indoor environment at the image frame rate.","PeriodicalId":119104,"journal":{"name":"2011 IEEE GCC Conference and Exhibition (GCC)","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125012154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Aviation and Service Oriented Architecture","authors":"A. Zalzala, A. Udaipurwala","doi":"10.1109/IEEEGCC.2011.5752520","DOIUrl":"https://doi.org/10.1109/IEEEGCC.2011.5752520","url":null,"abstract":"Since the airline industry is one of the most volatile industries being continuously affected by macro-micro forces in the environment, it is imperative that the information infrastructure be flexible and agile to business changes. This paper explores the Service Oriented Architecture based IT reorganisation strategy within the information technology department of AirlineCo, a leading airline company, to handle the volatile business environment of the airline. Current challenges in the AirlineCo's IT information delivery life cycle are analysed in line with this new architectural strategy.","PeriodicalId":119104,"journal":{"name":"2011 IEEE GCC Conference and Exhibition (GCC)","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122618310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The potential of electron-nuclear spin interactions for use in quantum information processing","authors":"G. W. Hitt, A. Isakovic","doi":"10.1109/IEEEGCC.2011.5752488","DOIUrl":"https://doi.org/10.1109/IEEEGCC.2011.5752488","url":null,"abstract":"Recent experiments have demonstrated that an ensemble of spin polarized electrons can transfer its spin polarization to the spin of the host atomic nuclei in a “spin-friendly” semiconductor like gallium arsenide (GaAs). In this paper, we analyze this process in terms of its efficiency for using natural nuclear spin in a solid state quantum computer. Among the appealing features of the proposed design is the potential to mate it to existing memory technology. We propose a realizable and scalable model of such a device based on growth-implanted quantum dots in a III-V semiconductor matrix and analyze the feasibility of transferring spin polarized information to such a system, keeping it stored in the system and processing it.","PeriodicalId":119104,"journal":{"name":"2011 IEEE GCC Conference and Exhibition (GCC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122646062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Bouchalkha, M. S. Hamad, Khaled Al-Beloushi, Mana Al-Qayedi, K. Al-Hammadi
{"title":"Design of an oil pipe inner surface inspection system","authors":"A. Bouchalkha, M. S. Hamad, Khaled Al-Beloushi, Mana Al-Qayedi, K. Al-Hammadi","doi":"10.1109/IEEEGCC.2011.5752533","DOIUrl":"https://doi.org/10.1109/IEEEGCC.2011.5752533","url":null,"abstract":"Magnetic Flux Leakage (MFL) techniques are the commonly used methods in the inspection of oil pipelines. This technique presents several limitations in detecting cracks. In this paper we present a novel method using ultrasound waves to obtain 3-d images of pipeline inner surfaces. Using this technique, cracks on the inner surface of a steel pipeline were identified and measured.","PeriodicalId":119104,"journal":{"name":"2011 IEEE GCC Conference and Exhibition (GCC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122680909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}