6,608 research outputs found
Properties of concrete containing recycled PET bottles as sand replacement
The modern lifestyle along with the new technologies have contributed the increasing of waste materials production. Plastic is one of the waste materials which is non-disposal and non-biodegradable material that can remain on earth without degradation. The world produces nearly 150 million tonnes of plastics per year, which is nearly 4.8 tonnes per second and a per capita production of 25 kg/year [1]. The Malaysian Plastic Industry (2012), reported that Malaysia is one of the largest plastics producers in Asia [2]. In Malaysia, extensive consumption of PET bottle is one of the contribution to the increasing growth of plastic waste disposed in landfills. Reutilization of PET wastes in concrete technology is one of the innovative solution for reduce the materials cost and solve some of the plastics waste problems .
Optimal design of switched reluctance motors
The fundamental theory of the switched reluctance motor is presented with a number of new equations. It is used to show how the practical development of a design calculation should proceed, and this leads to a discussion of physical characteristics required to achieve satisfactory performance and to reduce acoustic noise. The paper makes a few generic observations on the characteristics of successful products that use switched reluctance motors. It is written at a basic engineering level and makes no attempt to apply sophisticated optimization theory
Incremental learning for large-scale stream data and its application to cybersecurity
As many human currently depend on technologies to assist with daily tasks,
there are more and more applications which have been developed to be fit in one
small gadget such as smart phone and tablet. Thus, by carrying this small gadget
alone, most of our tasks are able to be settled efficiently and fast. Until the end
of 20th century, mobile phones are only used to call and to send short message
service (sms). However, in early 21st century, a rapid revolution of communi�cation technology from mobile phone into smart phone has been seen in which
the smart phone is equipped by 4G Internet line along with the telephone service
provider line. Thus, the users are able to make a phone call, send messages using
variety of application such as Whatsapp and Line, send email, serving websites,
accessing maps and handling some daily tasks via online using online banking,
online shopping and online meetings via video conferences. In previous years, if
there are cases of missing children or missing cars, the victims would rely on the
police investigation. But now, as easy as uploading a notification about the loss
on Facebook and spread the news among Facebook users, there are more people
are able to help in the search. Despite the advantages that can be obtained using
these technologies, there are a group of irresponsible people who take advan�tage of current technologies for their own self-interest. Among the applications
that are usually being used by almost Internet users and also are often misused
by cyber criminals are email and websites. Therefore, we take this initiative to
make enhancement in cyber security application to avoid the Internet users from
being trapped and deceived by the trick of cyber criminals by developing detec�tion system of malicious spam email and Distributed Denial of Services (DDoS) 377.1781.8781$0,1$+
iii
backscatter.
Imagine that a notice with a logo of Mobile Phone company is received by
an email informing that the customer had recently run up a large mobile phone
bill. A link regarding the bill is attached for him/her to find out the details.
Since, the customer thinks that the billing might be wrong, thus the link is
clicked. However, the link is directed to a webpage which displays a status that
currently the webpage is under construction. Then the customer closes the page
and thinking of to visit the website again at other time. Unfortunately, after
a single click actually a malicious file is downloaded and installed without the
customer aware of it. That malicious file most probably is a Trojan that capable
to steal confidential information from victim’s computer. On the next day, when
the same person is using the same computer to log in the online banking, all
of a sudden find out that his/her money is lost totally. This is one of a worst
case scenario of malicious spam email which is usually handled by cybersecurity
field. Another different case of cybersecurity is the Distributed Denial of Services
(DDoS) attack. Let say, Company X is selling flowers via online in which the
market is from the local and international customer. The online business of
Company X is running normally as usual, until a day before mother’s day, the
webpage of Company X is totally down and the prospective customers could not
open the webpage to make order to be sent specially for their beloved mother.
Thus, the customers would search another company that sells the same item. The
Company X server is down, most probably because of the DDoS attack where a
junk traffic is sent to that company server which makes that server could not
serve the request by the legitimate customers. This attack effect not only the
profit of the company, but also reputation damage, regular customer turnover
and productivity decline.
Unfortunately, it is difficult for a normal user like us to detect malicious spam 377$
3(53867$.1781.8781+
email or DDoS attack with naked eyes. It is because recently the spammers
and attacker had improved their strategy so that the malicious email and the
DDoS packets are hardly able to be differentiated with the normal email and
data packets. Once the Social Engineering is used by the spammers to create
relevant email content in the malicious spam email and when a new campaign
of DDoS attack is launched by the attacker, no normal users are capable to
distinguish the benign and malicious email or data packets. This is where my
Ph.D project comes in handy. My Ph.d is focusing on constructing a detection
system of malicious spam email and DDoS attack using a large number of dataset
which are obtained by a server that collect double-bounce email and darknet for
malicious spam email detection system and DDoS backscatter detection system,
respectively. As many up-to-date data are used during the learning, the detection
system would become more robust to the latest strategy of the cybercriminal.
Therefore, the scenario mentioned above can be avoided by assisting the user
with important information at the user-end such as malicious spam email filter
or at the server firewall. First of all, the method to learn large-scale stream
data must be solved before implementing it in the detection system. Therefore,
in Chapter 2, the general learning strategy of large-scale data is introduced to
be used in the cybersecurity applications which are discussed in Chapter 3 and
Chapter 4, respectively.
One of a critical criterion of the detection system is capable to learn fast because
after the learning, the updated information needs to be passed to user to avoid
the user from being deceived by the cybercriminal. To process large-scale data
sequences, it is important to choose a suitable learning algorithm that is capable
to learn in real time. Incremental learning has an ability to process large data
in chunk and update the parameters after learning each chunk. Such type of
learning keep and update only the minimum information on a classifier model. 377.1781.8781$0,1$+
Therefore, it requires relatively small memory and short learning time. On the
other hand, batch learning is not suitable because it needs to store all training
data, which consume a large memory capacity. Due to the limited memory, it is
certainly impossible to process online large-scale data sequences using the batch
learning. Therefore, the learning of large-scale stream data should be conducted
incrementally.
This dissertation contains of five chapters. In Chapter 1, the concept of in�cremental learning is briefly described and basic theories on Resource Allocating
Network (RAN) and conventional data selection method are discussed in this
chapter. Besides that, the overview of this dissertation is also elaborated in this
chapter. In Chapter 2, we propose a new algorithm based on incremental Radial
Basis Function Network (RBFN) to accelerate the learning in stream data. The
data sequences are represented as a large chunk size of data given continuously
within a short time. In order to learn such data, the learning should be carried
out incrementally. Since it is certainly impossible to learn all data in a short pe�riod, selecting essential data from a given chunk can shorten the learning time. In
our method, we select data that are located in untrained or “not well-learned”
region and discard data at trained or “well-learned” region. These regions are
represented by margin flag. Each region is consisted of similar data which are
near to each other. To search the similar data, the well-known LSH method pro�posed by Andoni et al. is used. The LSH method indeed has proven be able to
quickly find similar objects in a large database. Moreover, we utilize the LSH ĘĽs
properties; hash value and Hash Table to further reduced the processing time. A
flag as a criterion to decide whether to choose or not the training data is added in
the Hash Table and is updated in each chunk sequence. Whereas, the hash value
of RBF bases that is identical with the hash value of the training data is used to
select the RBF bases that is near to the training data. The performance results of 377$
3(53867$.1781.8781+
vi
the numerical simulation on nine UC Irvine (UCI) Machine Learning Repository
datasets indicate that the proposed method can reduce the learning time, while
keeping the similar accuracy rate to the conventional method. These results indi�cate that the proposed method can improve the RAN learning algorithm towards
the large-scale stream data processing.
In Chapter 3, we propose a new online system to detect malicious spam emails
and to adapt to the changes of malicious URLs in the body of spam emails by
updating the system daily. For this purpose, we develop an autonomous system
that learns from double-bounce emails collected at a mail server. To adapt to new
malicious campaigns, only new types of spam emails are learned by introducing an
active learning scheme into a classifier model. Here, we adopt Resource Allocating
Network with Locality Sensitive Hashing (RAN-LSH) as a classifier model with
data selection. In this data selection, the same or similar spam emails that
have already been learned are quickly searched for a hash table using Locally
Sensitive Hashing, and such spam emails are discarded without learning. On
the other hand, malicious spam emails are sometimes drastically changed along
with a new arrival of malicious campaign. In this case, it is not appropriate to
classify such spam emails into malicious or benign by a classifier. It should be
analyzed by using a more reliable method such as a malware analyzer. In order
to find new types of spam emails, an outlier detection mechanism is implemented
in RAN-LSH. To analyze email contents, we adopt the Bag-of-Words (BoW)
approach and generate feature vectors whose attributes are transformed based
on the normalized term frequency-inverse document frequency. To evaluate the
developed system, we use a dataset of double-bounce spam emails which are
collected from March 1, 2013 to May 10, 2013. In the experiment, we study the
effect of introducing the outlier detection in RAN-LSH. As a result, by introducing
the outlier detection, we confirm that the detection accuracy is enhanced on 377.1781.8781+
average over the testing period.
In Chapter 4, we propose a fast Distributed Denial of Service (DDoS) backscat�ter detection system to detect DDoS backscatter from a combination of protocols
and ports other than the following two labeled packets: Transmission Control
Protocol (TCP) Port 80 (80/TCP) and User datagram Protocol (UDP) Port 53
(53/UDP). Usually, it is hard to detect DDoS backscatter from the unlabeled
packets, where an expert is needed to analyze every packet manually. Since it
is a costly approach, we propose a detection system using Resource Allocating
Network (RAN) with data selection to select essential data. Using this method,
the learning time is shorten, and thus, the DDoS backscatter can be detected
fast. This detection system consists of two modules which are pre-processing
and classifier. With the former module, the packets information are transformed
into 17 feature-vectors. With the latter module, the RAN-LSH classifier is used,
where only data located at untrained region are selected. The performance of the
proposed detection system is evaluated using 9,968 training data from 80/TCP
and 53/UDP, whereas 5,933 test data are from unlabeled packets which are col�lected from January 1st, 2013 until January 20th, 2014 at National Institute of
Information and Communications Technology (NICT), Japan. The results indi�cate that detection system can detect the DDoS backscatter from both labeled
and unlabeled packets with high recall and precision rate within a short time.
Finally, in Chapter 5, we discussed the conclusions and the future work of our
study: RAN-LSH classifier, malicious spam email detection system and DDoS
backscatter detection system
A comprehensive review on brushless doubly-fed reluctance machine
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. The Brushless Doubly-Fed Reluctance Machine (BDFRM) has been widely investigated in numerous research studies since it is brushless and cageless and there is no winding on the rotor of this emerging machine. This feature leads to several advantages for this machine in comparison with its induction counterpart, i.e., Brushless Doubly-Fed Induction Machine (BDFIM). Less maintenance, less power losses, and also more reliability are the major advantages of BDFRM compared to BDFIM. The design complexity of its reluctance rotor, as well as flux patterns for indirect connection between the two windings mounted on the stator including power winding and control winding, have restricted the development of this machine technology. In the literature, there is not a comprehensive review of the research studies related to BDFRM. In this paper, the previous research studies are reviewed from different points of view, such as operation, design, control, transient model, dynamic model, power factor, Maximum Power Point Tracking (MPPT), and losses. It is revealed that the BDFRM is still evolving since the theoretical results have shown that this machine operates efficiently if it is well-designed
Multi-phase inverter-controlled induction machine at varied rotor parameters
This paper presents a step-wise modelling of a symmetrical six-phase induction machine driven by a six-phase diode clamped multi-level inverter at a varying rotor resistance and motor inertia. The machine drive process was considered in two stages. The first stage presents the dynamic behavior of the machine when a load torque of 0 Nm and 100 Nm is applied at a varied rotor external resistance value of (0.8 and 3.2) Ω with constant motor inertia. The second stage showcased the variations in the speed, electromagnetic torque and rotor current when motor inertia is varied at (0.5 and 1.5) Kg-m2 with rotor resistance held constant. A six-phase five-level diode clamped converter phase displaced by sixty degrees with a modulation index of 0.8 was modeled to drive the poly-phase machine at a reduced %THD. All machine models were simulated in MATLAB 7.11. The simulation results showed that reduced oscillations in rotor current, motor speed and torque pulsations were achieved at a varied external rotor resistance and motor inertia
PV Array Driven Adjustable Speed Drive for a Lunar Base Heat Pump
A study of various aspects of Adjustable Speed Drives (ASD) is presented. A summary of the relative merits of different ASD systems presently in vogue is discussed. The advantages of using microcomputer based ASDs is now widely understood and accepted. Of the three most popular drive systems, namely the Induction Motor Drive, Switched Reluctance Motor Drive and Brushless DC Motor Drive, any one may be chosen. The choice would depend on the nature of the application and its requirements. The suitability of the above mentioned drive systems for a photovoltaic array driven ASD for an aerospace application are discussed. The discussion is based on the experience of the authors, various researchers and industry. In chapter 2 a PV array power supply scheme has been proposed, this scheme will have an enhanced reliability in addition to the other known advantages of the case where a stand alone PV array is feeding the heat pump. In chapter 3 the results of computer simulation of PV array driven induction motor drive system have been included. A discussion on these preliminary simulation results have also been included in this chapter. Chapter 4 includes a brief discussion on various control techniques for three phase induction motors. A discussion on different power devices and their various performance characteristics is given in Chapter 5
An On-line Diagnostic Method for Open-circuit Switch Faults in NPC Multilevel Converters
On-line condition monitoring is of paramount importance for multilevel converters used in safety-critical applications. A novel on-line diagnostic method for detecting open-circuit switch faults in neutral-point-clamped (NPC) multilevel converters is introduced in this paper. The principle of this method is based on monitoring the abnormal variation of the dc-bus neutral-point current in combination with the existing information on instantaneous switching states and phase currents. Advantages of this method include simpler implementation and faster detection speed compared to other existing diagnostic methods in the literature. In this method, only one additional current sensor is required for measuring the dc-bus neutral-point current, therefore the implementation cost is low. Simulation and experimental results based on a lab-scale 50 kVA adjustable speed drive (ASD) with a three-level NPC inverter validate the efficacy of this novel diagnostic method
Field oriented control of permanent magnet synchronous motor with third-harmonic injection pulse width modulation to reduce quadrotors’ speed ripples
The world’s commercial unmanned aerial vehicle (UAV) industry has witnessed unprecedented boom in recent years. Delighted with an ample supply of this excellent high-tech product, global consumers are paying more attention on UAVs. Civilian UAVs now vastly outnumber military ones, with the estimate of over a million sold by 2016. An UAV has various degrees of autonomy as enabled by the use and precise control of motors. Traditional Direct Current (DC) motors are replaced by permanent magnet synchronous motors (PMSM) associated with the new power electronic inverters. Because of a PMSM’s higher power density than a DC motor, it reduces the rotor losses, thus improving its efficiency. The other improvement comes from the advanced control methods. The simple drive system based on a DC motor with open-loop control is outdated. High frequency switches in power electronic inverters offer an opportunity to change motor input voltage values and frequencies faster than ever before. Vector control approaches are employed with closed-loop feedback control, which brings high precision and good dynamics. Integrated inverter-motor drive systems are in progress. This thesis focuses on how to control PMSM installed in the UVAs with a high performance of dynamic response and fewer speed ripples. Field Oriented Control (FOC) is one type of vector controls to control a PMSM in a quadrotor. FOC of PMSM and Pulse Width Modulation (PWM) are introduced. The simulation results of FOC of PMSM with third-harmonic injection PWM and traditional FOC are compared. This comparison proves that FOC of PMSM with third-harmonic injection provides a better dynamic response for a quadrotor’s movement in vertical direction. In addition, since PWM is helpful to reduce the speed ripples, PMSM has a better steady-state response during operations
Asenkron motorlar için ayarlanabilir gerilim uygulamalı V/f tabanlı hız denetiminde farklı PWM tekniklerinin performans analizi
This paper presents a comparative study and a method to improve Volt-Hertz (V/f) based speed control of Induction Motors (IMs). For this purpose, Sinusoidal Pulse Width Modulation (SPWM) and space vector pulse width modulation (SVPWM) techniques are investigated and evaluated, especially from the point of their control performance on the V/f-based control for three-phase IMs working at different load and speed conditions. From this aspect, it is a different study from the literature. Steady and transient effects of both techniques on the above mentioned control methods are analyzed for several case studies. Afterwards, adjustable boost voltage application with modified reference commands technique is proposed for both PWM methods in order to improve start-up performance. All investigations for both PWM models are carried out under the same conditions. Although SVPWM technique gives more effective results in many cases, the proposed method provides noticeable improvements on SPWM-based applications from point of performance on the control method. As a novelty of this study, it is shown that, the bad performance of the control method at low frequency in SPWM application, which has lower computational burden for low cost microcontroller, can be improved by applying adjustable boost voltage along with modified references that are proportional to the DC bus current
- …