{"title":"Assessment of Flicker Due to Vertical Wind Shear in a Wind Turbine Mounted on a Hill with Linear Approach","authors":"Dr. Prof. Datta S Chavan Ph.D., P. Karandikar","doi":"10.1109/ICAIET.2014.50","DOIUrl":"https://doi.org/10.1109/ICAIET.2014.50","url":null,"abstract":"Wind energy is now one of the prime renewable energy sources. Power quality of wind energy is one of the prime issues. In this paper model of flicker produced in a wind turbine mounted on a hill is deliberated. Vertical wind shear is one the important factors affecting flicker producing in wind turbine. In this paper mathematical model of flicker initiated in wind turbine mounted on a hill is developed with linear approach. The parameters considered for the development of the model are vertical wind shear, blade length, turbine height. Hill height and hill slope is also considered. The tower considered is tubular tower. The model is developed for a three bladed horizontal axis upwind wind turbine. The validation of the model is also done with experimentation.","PeriodicalId":225159,"journal":{"name":"2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology","volume":"2342 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130381446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammad Arsyad Mohd Yakop, S. Mutalib, S. A. Rahman
{"title":"Review of Frequent Itemsets Mining in High Dimensional Dataset","authors":"Mohammad Arsyad Mohd Yakop, S. Mutalib, S. A. Rahman","doi":"10.1109/ICAIET.2014.19","DOIUrl":"https://doi.org/10.1109/ICAIET.2014.19","url":null,"abstract":"Nowadays, there are abundant of big data collection and to understand its patterns would need a thorough analysis. Analyzing big data would depend highly on the purpose and the tasks involved would be various. One of the significant tasks is frequent itemsets mining and the strategy has been evolved in many ways in order to improve the efficiency and effectiveness of the mining process. In this paper, we briefly reviewed mining frequent itemsets algorithms from year 1998 until year 2013 that focus on maximal and closed frequent itemsets. We discussed these algorithms based on three main areas namely: the searching strategy, space reduction method, and data representation. These three main areas are concluded as the optimization strategy and are designed to improve the efficiency and scalability using a different approach in different areas to adapt to numerous growth of the dataset. This work is beneficial for researchers in designing and enhancing the algorithm based on their own purposes.","PeriodicalId":225159,"journal":{"name":"2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology","volume":"221 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124963684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Natural Language Processing for Sentiment Analysis: An Exploratory Analysis on Tweets","authors":"Wei Yen Chong, Bhawani Selvaretnam, Lay-Ki Soon","doi":"10.1109/ICAIET.2014.43","DOIUrl":"https://doi.org/10.1109/ICAIET.2014.43","url":null,"abstract":"In this paper, we present our preliminary experiments on tweets sentiment analysis. This experiment is designed to extract sentiment based on subjects that exist in tweets. It detects the sentiment that refers to the specific subject using Natural Language Processing techniques. To classify sentiment, our experiment consists of three main steps, which are subjectivity classification, semantic association, and polarity classification. The experiment utilizes sentiment lexicons by defining the grammatical relationship between sentiment lexicons and subject. Experimental results show that the proposed system is working better than current text sentiment analysis tools, as the structure of tweets is not same as regular text.","PeriodicalId":225159,"journal":{"name":"2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128521826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Characterization Study of Using Acoustic Signals for Underwater Non-Destructive Testing","authors":"Sien Yan Kong, B. Chua, K. Teo, R. Chin","doi":"10.1109/ICAIET.2014.33","DOIUrl":"https://doi.org/10.1109/ICAIET.2014.33","url":null,"abstract":"Non-destructive testing in structural inspection is a list of techniques that is used to evaluate the condition of a structure in order to determine whether cracks, flaws defects or damages occur in structural build without causing any damage to the test object. This work presents the characterization study of using acoustic signals for underwater non-destructive testing. The optimum operating frequency for sensors, transmission angle between the transmitter and receiver and operating distance between the sensors with reflecting medium are determined. Early results can be implied in exploring the possibility of using acoustic signals in underwater structural inspection with non-destructive testing methods.","PeriodicalId":225159,"journal":{"name":"2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122213114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Two Novel Generic, Reconfigurable Neural Network FPGA Architectures","authors":"A. Youssef, K. Mohammed, Amin Nasar","doi":"10.1109/ICAIET.2014.11","DOIUrl":"https://doi.org/10.1109/ICAIET.2014.11","url":null,"abstract":"Two novel generic, scalable, and reconfigurable neural network architectures implemented using field programmable gate arrays (FPGAs) are presented in this paper. Previous Implementations of feed-forward Neural Networks face two major issues: 1) Limited resources available on the FPGA compared to the large number of multiplications required by Neural-Networks, 2) Limited reusability of the design when applied to the Neural-Network applications with different architectures. Our proposed implementations circumvent both issues. The designs' scalability allows the user to program and implement different applications with variable number of neurons, starting from one neuron to the maximum number of neurons in any layer, this is performed with programming-like ease and flexibility. A GUI was implemented to allow automatic configuration of the processors for different applications. Finally, Propositions for future work are outlined.","PeriodicalId":225159,"journal":{"name":"2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology","volume":"1998 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131086489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hashini Senaratne, Pubudu Gunatilaka, Udith Gunaratna, Yasura Vithana, Chathura De Silva, Piyum Fernando
{"title":"SiFEB -- A Simple, Interactive and Extensible Robot Playmate for Kids","authors":"Hashini Senaratne, Pubudu Gunatilaka, Udith Gunaratna, Yasura Vithana, Chathura De Silva, Piyum Fernando","doi":"10.1109/ICAIET.2014.32","DOIUrl":"https://doi.org/10.1109/ICAIET.2014.32","url":null,"abstract":"In this paper we present work in progress on SiFEB, a simple, interactive and extensible robot playmate for kids intended to nurture the engagement in STEM (Science, Technology, Engineering and Mathematics) related activities through playing. SiFEB's simplified and interactive hardware and software modules present users without prior experience, with the ability to build robots without going deep in either aspect. Kids can build robots of their interest using attachable hardware modules and related programming components using an easy to understand visual programming language that resembles natural commands. The potential developers may utilize the framework provided, to build hardware and software components to the system expanding the existing capabilities. Preliminary results from the prototypes show that SiFEB has the potential of being an effective learning platform for young children in STEM related areas.","PeriodicalId":225159,"journal":{"name":"2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132393319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Linear Model of Flicker Due to Vertical Wind Shear for a Turbine Mounted on a Green Building","authors":"Dr. Prof. Datta S Chavan Ph.D., P. Karandikar","doi":"10.1109/ICAIET.2014.49","DOIUrl":"https://doi.org/10.1109/ICAIET.2014.49","url":null,"abstract":"Use of wind energy is increased day by day. Power quality is one of the prime issues. Computation of flicker is very necessary to improve the quality of wind power generation. In this paper flicker is computed with linear approach. Vertical wind shear has major impact on the production of the flicker in wind generation. Computation of flicker in this paper is carried out considering impact of vertical wind shear. Other parameters considered for computation of flicker are turbine blade length and tower height. Mathematical model to compute the flicker is developed using these parameters. Validation of the model is also done.","PeriodicalId":225159,"journal":{"name":"2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131745850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Verifying Solutions to the Dining Philosophers Problem with Activity-Oriented Petri Nets","authors":"R. Davidrajuh","doi":"10.1109/ICAIET.2014.35","DOIUrl":"https://doi.org/10.1109/ICAIET.2014.35","url":null,"abstract":"Petri Nets is a family of modeling formalisms, consisting of various types of Petri nets with different interpretations and abstraction levels. General Purpose Petri Net Simulator (GPen SIM) is a new Petri Net simulator that implements many of the Petri Net types. Activity-Oriented Petri Nets (AOPN) is a new approach that facilitates modeling of some specific problems (e.g. Modeling systems that include large number of resources), AOPN is also implemented in GPen SIM. In this paper, firstly, a short introduction to AOPN is given. Secondly, the modeling capability of AOPN is tested using the classical benchmark known as the Dining Philosophers Problem. The modeling approach shown in this paper proves that AOPN can be conveniently used for modeling of discrete event systems.","PeriodicalId":225159,"journal":{"name":"2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127823362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trajectory Clustering for Behavioral Pattern Learning in Transportation Surveillance","authors":"M. Y. Choong, R. Chin, K. Yeo, K. Teo","doi":"10.1109/ICAIET.2014.41","DOIUrl":"https://doi.org/10.1109/ICAIET.2014.41","url":null,"abstract":"The development of an efficient traffic flow monitoring system has been the main focus for many researchers working in the field. Due to the rapid development in urbanization, the complexity of traffic intersections provides challenges for researchers to detect the underlying traffic scenes. With the emerging video based surveillance system, vehicle trajectory can be extracted for observation and prediction via behavioral pattern learning. Prior to the learning, clustering of the extracted vehicle trajectory data is performed to group the data based on similarity measures. In this paper, the implementation of clustering algorithm on the trajectory data is analyzed and issues concerning the trajectory clustering are discussed.","PeriodicalId":225159,"journal":{"name":"2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116379383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. D., Rajashe Karappa, K. Soyjaudah, Sumithra Devi K A
{"title":"Partial Image Encryption Algorithm Using Pixel Position Manipulation Technique: The SMART Copyback System","authors":"P. D., Rajashe Karappa, K. Soyjaudah, Sumithra Devi K A","doi":"10.1109/ICAIET.2014.37","DOIUrl":"https://doi.org/10.1109/ICAIET.2014.37","url":null,"abstract":"Nowadays, the most important locomotive to provide confidentiality is image encryption. In real-time applications the classical and modern ciphers are not appropriate because of vast quantity of data. However, certain applications like Pay-TV or Payable Internet Imaging Albums do not require entire part of an encryption, but requires a part of the image to be transparent to all users. Partial encryption is an approach to encode only the most essential portion of the data in order to afford a proportional confidentiality and to trim down the computational requirements and also execution time for encryption is reduced. In this paper, partial image encryption of color images using pixel position manipulation technique based on region of interest is proposed. It offers the amenities of partial encryption and reconstructs the images partially. Here input image is divided into sub blocks, and then selected blocks are encrypted using the proposed technique. The proposed technique achieves quick security by encrypting the selected blocks of an image. Encrypted data can be store long term without fail using SMART (Self Monitoring Analysis and Reporting Technology Copyback) system.","PeriodicalId":225159,"journal":{"name":"2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125441530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}