CINXE.COM

Search results for: Operating System

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: Operating System</title> <meta name="description" content="Search results for: Operating System"> <meta name="keywords" content="Operating System"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="Operating System" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="Operating System"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 18981</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: Operating System</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18981</span> Analytical Study of CPU Scheduling Algorithms</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Keshav%20Rathi">Keshav Rathi</a>, <a href="https://publications.waset.org/abstracts/search?q=Aakriti%20Sharma"> Aakriti Sharma</a>, <a href="https://publications.waset.org/abstracts/search?q=Vinayak%20R.%20Dinesh"> Vinayak R. Dinesh</a>, <a href="https://publications.waset.org/abstracts/search?q=Irfan%20Ramzan%20Parray"> Irfan Ramzan Parray</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Scheduling is a basic operating system function since practically all computer resources are scheduled before use. The CPU is one of the most important computer resources. Central Processing Unit (CPU) scheduling is vital because it allows the CPU to transition between processes. A processor is the most significant resource in a computer; the operating system can increase the computer's productivity. The objective of the operating system is to allow as many processes as possible to operate at the same time in order to maximize CPU utilization. The highly efficient CPU scheduler is based on the invention of high-quality scheduling algorithms that meet the scheduling objectives. In this paper, we reviewed various fundamental CPU scheduling algorithms for a single CPU and showed which algorithm is best for the particular situation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=computer%20science" title="computer science">computer science</a>, <a href="https://publications.waset.org/abstracts/search?q=Operating%20system" title=" Operating system"> Operating system</a>, <a href="https://publications.waset.org/abstracts/search?q=CPU%20scheduling" title=" CPU scheduling"> CPU scheduling</a>, <a href="https://publications.waset.org/abstracts/search?q=cpu%20algorithms" title=" cpu algorithms"> cpu algorithms</a> </p> <a href="https://publications.waset.org/abstracts/194885/analytical-study-of-cpu-scheduling-algorithms" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/194885.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">6</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18980</span> Water Distribution Uniformity of Solid-Set Sprinkler Irrigation under Low Operating Pressure </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Manal%20Osman">Manal Osman</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Sprinkler irrigation system became more popular to reduce water consumption and increase irrigation efficiency. The water distribution uniformity plays an important role in the performance of the sprinkler irrigation system. The use of low operating pressure instead of high operating pressure can be achieved many benefits including energy and water saving. An experimental study was performed to investigate the water distribution uniformity of the solid-set sprinkler irrigation system under low operating pressure. Different low operating pressures (62, 82, 102 and 122 kPa) were selected. The range of operating pressure was lower than the recommended in the previous studies to investigate the effect of low pressure on the water distribution uniformity. Different nozzle diameters (4, 5, 6 and 7 mm) were used. The outdoor single sprinkler test was performed. The water distribution of single sprinkler, the coefficients of uniformity such as coefficient of uniformity (CU), distribution uniformity of low quarter (DUlq), distribution uniformity of low half (DUlh), coefficient of variation (CV) and the distribution characteristics like rotation speed, throw radius and overlapping distance are presented in this paper. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=low%20operating%20pressure" title="low operating pressure">low operating pressure</a>, <a href="https://publications.waset.org/abstracts/search?q=sprinkler%20irrigation%20system" title=" sprinkler irrigation system"> sprinkler irrigation system</a>, <a href="https://publications.waset.org/abstracts/search?q=water%20distribution%20uniformity" title=" water distribution uniformity"> water distribution uniformity</a> </p> <a href="https://publications.waset.org/abstracts/7412/water-distribution-uniformity-of-solid-set-sprinkler-irrigation-under-low-operating-pressure" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/7412.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">589</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18979</span> Virtualization and Visualization Based Driver Configuration in Operating System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pavan%20Shah">Pavan Shah</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In an Embedded system, Virtualization and visualization technology can provide us an effective response and measurable work in a software development environment. In addition to work of virtualization and virtualization can be easily deserved to provide the best resource sharing between real-time hardware applications and a healthy environment. However, the virtualization is noticeable work to minimize the I/O work and utilize virtualization & virtualization technology for either a software development environment (SDE) or a runtime environment of real-time embedded systems (RTMES) or real-time operating system (RTOS) eras. In this Paper, we particularly focus on virtualization and visualization overheads data of network which generates the I/O and implementation of standardized I/O (i.e., Virto), which can work as front-end network driver in a real-time operating system (RTOS) hardware module. Even there have been several work studies are available based on the virtualization operating system environment, but for the Virto on a general-purpose OS, my implementation is on the open-source Virto for a real-time operating system (RTOS). In this paper, the measurement results show that implementation which can improve the bandwidth and latency of memory management of the real-time operating system environment (RTMES) for getting more accuracy of the trained model. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=virtualization" title="virtualization">virtualization</a>, <a href="https://publications.waset.org/abstracts/search?q=visualization" title=" visualization"> visualization</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20driver" title=" network driver"> network driver</a>, <a href="https://publications.waset.org/abstracts/search?q=operating%20system" title=" operating system"> operating system</a> </p> <a href="https://publications.waset.org/abstracts/146477/virtualization-and-visualization-based-driver-configuration-in-operating-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/146477.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">133</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18978</span> Experiential Learning: A Case Study for Teaching Operating System Using C and Unix</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shamshuddin%20K.">Shamshuddin K.</a>, <a href="https://publications.waset.org/abstracts/search?q=Nagaraj%20Vannal"> Nagaraj Vannal</a>, <a href="https://publications.waset.org/abstracts/search?q=Diwakar%20Kulkarni"> Diwakar Kulkarni</a>, <a href="https://publications.waset.org/abstracts/search?q=Raghavendra%20Nakod"> Raghavendra Nakod</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In most of the universities and colleges Operating System (OS) course is treated as theoretical and usually taught in a classroom using conventional teaching methods. In this paper we are presenting a new approach of teaching OS through experiential learning, the course is designed to suit the requirement of undergraduate engineering program of Instrumentation Technology. This new approach has benefited us to improve our student’s programming skills, presentation skills and understanding of the operating system concepts. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=pedagogy" title="pedagogy">pedagogy</a>, <a href="https://publications.waset.org/abstracts/search?q=interactive%20learning" title=" interactive learning"> interactive learning</a>, <a href="https://publications.waset.org/abstracts/search?q=experiential%20learning" title=" experiential learning"> experiential learning</a>, <a href="https://publications.waset.org/abstracts/search?q=OS" title=" OS"> OS</a>, <a href="https://publications.waset.org/abstracts/search?q=C" title=" C"> C</a>, <a href="https://publications.waset.org/abstracts/search?q=UNIX" title=" UNIX"> UNIX</a> </p> <a href="https://publications.waset.org/abstracts/21738/experiential-learning-a-case-study-for-teaching-operating-system-using-c-and-unix" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/21738.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">606</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18977</span> Linux Security Management: Research and Discussion on Problems Caused by Different Aspects</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ma%20Yuzhe">Ma Yuzhe</a>, <a href="https://publications.waset.org/abstracts/search?q=Burra%20Venkata%20Durga%20Kumar"> Burra Venkata Durga Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The computer is a great invention. As people use computers more and more frequently, the demand for PCs is growing, and the performance of computer hardware is also rising to face more complex processing and operation. However, the operating system, which provides the soul for computers, has stopped developing at a stage. In the face of the high price of UNIX (Uniplexed Information and Computering System), batch after batch of personal computer owners can only give up. Disk Operating System is too simple and difficult to bring innovation into play, which is not a good choice. And MacOS is a special operating system for Apple computers, and it can not be widely used on personal computers. In this environment, Linux, based on the UNIX system, was born. Linux combines the advantages of the operating system and is composed of many microkernels, which is relatively powerful in the core architecture. Linux system supports all Internet protocols, so it has very good network functions. Linux supports multiple users. Each user has no influence on their own files. Linux can also multitask and run different programs independently at the same time. Linux is a completely open source operating system. Users can obtain and modify the source code for free. Because of these advantages of Linux, it has also attracted a large number of users and programmers. The Linux system is also constantly upgraded and improved. It has also issued many different versions, which are suitable for community use and commercial use. Linux system has good security because it relies on a file partition system. However, due to the constant updating of vulnerabilities and hazards, the using security of the operating system also needs to be paid more attention to. This article will focus on the analysis and discussion of Linux security issues. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Linux" title="Linux">Linux</a>, <a href="https://publications.waset.org/abstracts/search?q=operating%20system" title=" operating system"> operating system</a>, <a href="https://publications.waset.org/abstracts/search?q=system%20management" title=" system management"> system management</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a> </p> <a href="https://publications.waset.org/abstracts/152889/linux-security-management-research-and-discussion-on-problems-caused-by-different-aspects" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/152889.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">108</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18976</span> Improving System Performance through User&#039;s Resource Access Patterns</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=K.%20C.%20Wong">K. C. Wong</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper demonstrates a number of examples in the hope to shed some light on the possibility of designing future operating systems in a more adaptation-based manner. A modern operating system, we conceive, should possess the capability of 'learning' in such a way that it can dynamically adjust its services and behavior according to the current status of the environment in which it operates. In other words, a modern operating system should play a more proactive role during the session of providing system services to users. As such, a modern operating system is expected to create a computing environment, in which its users are provided with system services more matching their dynamically changing needs. The examples demonstrated in this paper show that user's resource access patterns 'learned' and determined during a session can be utilized to improve system performance and hence to provide users with a better and more effective computing environment. The paper also discusses how to use the frequency, the continuity, and the duration of resource accesses in a session to quantitatively measure and determine user's resource access patterns for the examples shown in the paper. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=adaptation-based%20systems" title="adaptation-based systems">adaptation-based systems</a>, <a href="https://publications.waset.org/abstracts/search?q=operating%20systems" title=" operating systems"> operating systems</a>, <a href="https://publications.waset.org/abstracts/search?q=resource%20access%20patterns" title=" resource access patterns"> resource access patterns</a>, <a href="https://publications.waset.org/abstracts/search?q=system%20performance" title=" system performance"> system performance</a> </p> <a href="https://publications.waset.org/abstracts/111651/improving-system-performance-through-users-resource-access-patterns" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/111651.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">145</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18975</span> A Development of a Weight-Balancing Control System Based On Android Operating System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rattanathip%20Rattanachai">Rattanathip Rattanachai</a>, <a href="https://publications.waset.org/abstracts/search?q=Piyachai%20Petchyen"> Piyachai Petchyen</a>, <a href="https://publications.waset.org/abstracts/search?q=Kunyanuth%20Kularbphettong"> Kunyanuth Kularbphettong</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper describes the development of a Weight- Balancing Control System based on the Android Operating System and it provides recommendations on ways of balancing of user&rsquo;s weight based on daily metabolism process and need so that user can make informed decisions on his or her weight controls. The system also depicts more information on nutrition details. Furthermore, it was designed to suggest to users what kinds of foods they should eat and how to exercise in the right ways. We describe the design methods and functional components of this prototype. To evaluate the system performance, questionnaires for system usability and Black Box Testing were used to measure expert and user satisfaction. The results were satisfactory as followed: Means for experts and users were 3.94 and 4.07 respectively. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=weight-balancing%20control" title="weight-balancing control">weight-balancing control</a>, <a href="https://publications.waset.org/abstracts/search?q=Android%20operating%20system" title=" Android operating system"> Android operating system</a>, <a href="https://publications.waset.org/abstracts/search?q=daily%20metabolism" title=" daily metabolism"> daily metabolism</a>, <a href="https://publications.waset.org/abstracts/search?q=black%20box%20testing" title=" black box testing"> black box testing</a> </p> <a href="https://publications.waset.org/abstracts/9846/a-development-of-a-weight-balancing-control-system-based-on-android-operating-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/9846.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">471</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18974</span> The Determination of Operating Reserve in Small Power Systems Based on Reliability Criteria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=H.%20Falsafi%20Falsafizadeh">H. Falsafi Falsafizadeh</a>, <a href="https://publications.waset.org/abstracts/search?q=R.%20Zeinali%20Zeinali"> R. Zeinali Zeinali</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper focuses on determination of total Operating Reserve (OR) level, consisting of spinning and non-spinning reserves, in two small real power systems, in such a way that the system reliability indicator would comply with typical industry standards. For this purpose, the standard used by the North American Electric Reliability Corporation (NERC) – i.e., 1 day outage in 10 years or 0.1 days/year is relied. The simulation of system operation for these systems that was used for the determination of total operating reserve level was performed by industry standard production simulation software in this field, named PLEXOS. In this paper, the operating reserve which meets an annual Loss of Load Expectation (LOLE) of approximately 0.1 days per year is determined in the study year. This reserve is the minimum amount of reserve required in a power system and generally defined as a percentage of the annual peak. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=frequency%20control" title="frequency control">frequency control</a>, <a href="https://publications.waset.org/abstracts/search?q=LOLE" title=" LOLE"> LOLE</a>, <a href="https://publications.waset.org/abstracts/search?q=operating%20reserve" title=" operating reserve"> operating reserve</a>, <a href="https://publications.waset.org/abstracts/search?q=system%20reliability" title=" system reliability"> system reliability</a> </p> <a href="https://publications.waset.org/abstracts/67268/the-determination-of-operating-reserve-in-small-power-systems-based-on-reliability-criteria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/67268.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">343</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18973</span> Intelligent Decision Support for Wind Park Operation: Machine-Learning Based Detection and Diagnosis of Anomalous Operating States</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Angela%20Meyer">Angela Meyer</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The operation and maintenance cost for wind parks make up a major fraction of the park’s overall lifetime cost. To minimize the cost and risk involved, an optimal operation and maintenance strategy requires continuous monitoring and analysis. In order to facilitate this, we present a decision support system that automatically scans the stream of telemetry sensor data generated from the turbines. By learning decision boundaries and normal reference operating states using machine learning algorithms, the decision support system can detect anomalous operating behavior in individual wind turbines and diagnose the involved turbine sub-systems. Operating personal can be alerted if a normal operating state boundary is exceeded. The presented decision support system and method are applicable for any turbine type and manufacturer providing telemetry data of the turbine operating state. We demonstrate the successful detection and diagnosis of anomalous operating states in a case study at a German onshore wind park comprised of Vestas V112 turbines. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=anomaly%20detection" title="anomaly detection">anomaly detection</a>, <a href="https://publications.waset.org/abstracts/search?q=decision%20support" title=" decision support"> decision support</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=monitoring" title=" monitoring"> monitoring</a>, <a href="https://publications.waset.org/abstracts/search?q=performance%20optimization" title=" performance optimization"> performance optimization</a>, <a href="https://publications.waset.org/abstracts/search?q=wind%20turbines" title=" wind turbines "> wind turbines </a> </p> <a href="https://publications.waset.org/abstracts/118859/intelligent-decision-support-for-wind-park-operation-machine-learning-based-detection-and-diagnosis-of-anomalous-operating-states" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/118859.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">167</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18972</span> Stochastic Analysis of Linux Operating System through Copula Distribution</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Vijay%20Vir%20Singh">Vijay Vir Singh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This work is focused studying the Linux operating system connected in a LAN (local area network). The STAR topology (to be called subsystem-1) and BUS topology (to be called subsystem-2) are taken into account, which are placed at two different locations and connected to a server through a hub. In the both topologies BUS topology and STAR topology, we have assumed n clients. The system has two types of failures i.e. partial failure and complete failure. Further, the partial failure has been categorized as minor and major partial failure. It is assumed that the minor partial failure degrades the sub-systems and the major partial failure make the subsystem break down mode. The system may completely fail due to failure of server hacking and blocking etc. The system is studied using supplementary variable technique and Laplace transform by using different types of failure and two types of repair. The various measures of reliability for example, availability of system, reliability of system, MTTF, profit function for different parametric values have been discussed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=star%20topology" title="star topology">star topology</a>, <a href="https://publications.waset.org/abstracts/search?q=bus%20topology" title=" bus topology"> bus topology</a>, <a href="https://publications.waset.org/abstracts/search?q=blocking" title=" blocking"> blocking</a>, <a href="https://publications.waset.org/abstracts/search?q=hacking" title=" hacking"> hacking</a>, <a href="https://publications.waset.org/abstracts/search?q=Linux%20operating%20system" title=" Linux operating system"> Linux operating system</a>, <a href="https://publications.waset.org/abstracts/search?q=Gumbel-Hougaard%20family%20copula" title=" Gumbel-Hougaard family copula"> Gumbel-Hougaard family copula</a>, <a href="https://publications.waset.org/abstracts/search?q=supplementary%20variable" title=" supplementary variable"> supplementary variable</a> </p> <a href="https://publications.waset.org/abstracts/48060/stochastic-analysis-of-linux-operating-system-through-copula-distribution" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/48060.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">370</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18971</span> Experimental Performance of Vertical Diffusion Stills Utilizing Folded Sheets for Water Desalination </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20Mortada">M. Mortada</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Seleem"> A. Seleem</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20El-Morsi"> M. El-Morsi</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Younan"> M. Younan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The present study introduces the folding technology to be utilized for the first time in vertical diffusion stills. This work represents a model of the distillation process by utilizing chevron pattern of folded structure. An experimental setup has been constructed, to investigate the performance of the folded sheets in the vertical effect diffusion still for a specific range of operating conditions. An experimental comparison between the folded type and the flat type sheets has been carried out. The folded pattern showed a higher performance and there is an increase in the condensate to feed ratio that ranges from 20-30 % through the operating hot plate temperature that ranges through 60-90°C. In addition, a parametric analysis of the system using Design of Experiments statistical technique, has been developed using the experimental results to determine the effect of operating conditions on the system's performance and the best operating conditions of the system has been evaluated. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=chevron%20pattern" title="chevron pattern">chevron pattern</a>, <a href="https://publications.waset.org/abstracts/search?q=fold%20structure" title=" fold structure"> fold structure</a>, <a href="https://publications.waset.org/abstracts/search?q=solar%20distillation" title=" solar distillation"> solar distillation</a>, <a href="https://publications.waset.org/abstracts/search?q=vertical%20diffusion%20still" title=" vertical diffusion still"> vertical diffusion still</a> </p> <a href="https://publications.waset.org/abstracts/22638/experimental-performance-of-vertical-diffusion-stills-utilizing-folded-sheets-for-water-desalination" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/22638.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">462</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18970</span> Experimental Investigation on the Optimal Operating Frequency of a Thermoacoustic Refrigerator</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kriengkrai%20Assawamartbunlue">Kriengkrai Assawamartbunlue</a>, <a href="https://publications.waset.org/abstracts/search?q=Channarong%20Wantha"> Channarong Wantha</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper presents the effects of the mean operating pressure on the optimal operating frequency based on temperature differences across stack ends in a thermoacoustic refrigerator. In addition to the length of the resonance tube, components of the thermoacoustic refrigerator have an influence on the operating frequency due to their acoustic properties, i.e. absorptivity, reflectivity and transmissivity. The interference of waves incurs and distorts the original frequency generated by the driver so that the optimal operating frequency differs from the designs. These acoustic properties are not parameters in the designs and it is very complicated to infer their responses. A prototype thermoacoustic refrigerator is constructed and used to investigate its optimal operating frequency compared to the design at various operating pressures. Helium and air are used as working fluids during the experiments. The results indicate that the optimal operating frequency of the prototype thermoacoustic refrigerator using helium is at 6 bar and 490Hz or approximately 20% away from the design frequency. The optimal operating frequency at other mean pressures differs from the design in an unpredictable manner, however, the optimal operating frequency and pressure can be identified by testing. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=acoustic%20properties" title="acoustic properties">acoustic properties</a>, <a href="https://publications.waset.org/abstracts/search?q=Carnot%E2%80%99s%20efficiency" title=" Carnot’s efficiency"> Carnot’s efficiency</a>, <a href="https://publications.waset.org/abstracts/search?q=interference%20of%20waves" title=" interference of waves"> interference of waves</a>, <a href="https://publications.waset.org/abstracts/search?q=operating%20pressure" title=" operating pressure"> operating pressure</a>, <a href="https://publications.waset.org/abstracts/search?q=optimal%20operating%20frequency" title=" optimal operating frequency"> optimal operating frequency</a>, <a href="https://publications.waset.org/abstracts/search?q=stack%20performance" title=" stack performance"> stack performance</a>, <a href="https://publications.waset.org/abstracts/search?q=standing%20wave" title=" standing wave"> standing wave</a>, <a href="https://publications.waset.org/abstracts/search?q=thermoacoustic%20refrigerator" title=" thermoacoustic refrigerator"> thermoacoustic refrigerator</a> </p> <a href="https://publications.waset.org/abstracts/23908/experimental-investigation-on-the-optimal-operating-frequency-of-a-thermoacoustic-refrigerator" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/23908.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">486</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18969</span> The Effects of Aging on the Cost of Operating and Support: An Empirical Study Applied to Weapon Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Byungchae%20Kim">Byungchae Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=Jiwoo%20Nam"> Jiwoo Nam</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Aging of weapon systems can cause the failure and degeneration of components which results in increase of operating and support costs. However, whether this aging effect is significantly strong and it influences a lot on national defense spending due to the rapid increase in operating and support (O&S) costs is questionable. To figure out this, we conduct a literature review analyzing the aging effect of US weapon systems. We also conduct an empirical research using a maintenance database of Korean weapon systems, Defense Logistics Integrated Information System (DAIIS). We run regression of various types of O&S cost on weapon system age to investigate the statistical significance of aging effect and use generalized linear model to find relations between the failure of different priced components and the age. Our major finding is although aging effect exists, its impacts on weapon system cost seem to be not too large considering several characteristics of O&S cost elements not relying on the age. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=O%26S%20cost" title="O&amp;S cost">O&amp;S cost</a>, <a href="https://publications.waset.org/abstracts/search?q=aging%20effect" title=" aging effect"> aging effect</a>, <a href="https://publications.waset.org/abstracts/search?q=weapon%20system" title=" weapon system"> weapon system</a>, <a href="https://publications.waset.org/abstracts/search?q=GLM" title=" GLM"> GLM</a> </p> <a href="https://publications.waset.org/abstracts/121195/the-effects-of-aging-on-the-cost-of-operating-and-support-an-empirical-study-applied-to-weapon-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/121195.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">142</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18968</span> Performance Analysis of LINUX Operating System Connected in LAN Using Gumbel-Hougaard Family Copula Distribution</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=V.%20V.%20Singh">V. V. Singh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper we have focused on the study of a Linux operating system connected in a LAN (local area network). We have considered two different topologies STAR topology (subsystem-1) and BUS topology (subsystem-2) which are placed at two different places and connected to a server through a hub. In both topologies BUS topology and STAR topology, we have assumed 'n' clients. The system has two types of failure partial failure and complete failure. Further the partial failure has been categorized as minor partial failure and major partial failure. It is assumed that minor partial failure degrades the subsystem and the major partial failure brings the subsystem to break down mode. The system can completely failed due to failure of server hacking and blocking etc. The system is studied by supplementary variable technique and Laplace transform by taking different types of failure and two types of repairs. The various measures of reliability like availability of system, MTTF, profit function for different parametric values has been discussed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=star%20topology" title="star topology">star topology</a>, <a href="https://publications.waset.org/abstracts/search?q=bus%20topology" title=" bus topology"> bus topology</a>, <a href="https://publications.waset.org/abstracts/search?q=hacking" title=" hacking"> hacking</a>, <a href="https://publications.waset.org/abstracts/search?q=blocking" title=" blocking"> blocking</a>, <a href="https://publications.waset.org/abstracts/search?q=linux%20operating%20system" title=" linux operating system"> linux operating system</a>, <a href="https://publications.waset.org/abstracts/search?q=Gumbel-Hougaard%20family%20copula" title=" Gumbel-Hougaard family copula"> Gumbel-Hougaard family copula</a>, <a href="https://publications.waset.org/abstracts/search?q=supplementary%20variable" title=" supplementary variable "> supplementary variable </a> </p> <a href="https://publications.waset.org/abstracts/33606/performance-analysis-of-linux-operating-system-connected-in-lan-using-gumbel-hougaard-family-copula-distribution" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/33606.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">577</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18967</span> Study on Security and Privacy Issues of Mobile Operating Systems Based on Malware Attacks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Huang%20Dennis">Huang Dennis</a>, <a href="https://publications.waset.org/abstracts/search?q=Aurelio%20Aziel"> Aurelio Aziel</a>, <a href="https://publications.waset.org/abstracts/search?q=Burra%20Venkata%20Durga%20Kumar"> Burra Venkata Durga Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Nowadays, smartphones and mobile operating systems have been popularly widespread in our daily lives. As people use smartphones, they tend to store more private and essential data on their devices, because of this it is very important to develop more secure mobile operating systems and cloud storage to secure the data. However, several factors can cause security risks in mobile operating systems such as malware, malicious app, phishing attacks, ransomware, and more, all of which can cause a big problem for users as they can access the user's private data. Those problems can cause data loss, financial loss, identity theft, and other serious consequences. Other than that, during the pandemic, people will use their mobile devices more and do all sorts of transactions online, which may lead to more victims of online scams and inexperienced users being the target. With the increase in attacks, researchers have been actively working to develop several countermeasures to enhance the security of operating systems. This study aims to provide an overview of the security and privacy issues in mobile operating systems, identifying the potential risk of operating systems, and the possible solutions. By examining these issues, we want to provide an easy understanding to users and researchers to improve knowledge and develop more secure mobile operating systems. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20operating%20system" title="mobile operating system">mobile operating system</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy" title=" privacy"> privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=Malware" title=" Malware"> Malware</a> </p> <a href="https://publications.waset.org/abstracts/168876/study-on-security-and-privacy-issues-of-mobile-operating-systems-based-on-malware-attacks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/168876.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">88</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18966</span> Expert System: Debugging Using MD5 Process Firewall</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=C.%20U.%20Om%20Kumar">C. U. Om Kumar</a>, <a href="https://publications.waset.org/abstracts/search?q=S.%20Kishore"> S. Kishore</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Geetha"> A. Geetha</a> </p> <p class="card-text"><strong>Abstract:</strong></p> An Operating system (OS) is software that manages computer hardware and software resources by providing services to computer programs. One of the important user expectations of the operating system is to provide the practice of defending information from unauthorized access, disclosure, modification, inspection, recording or destruction. Operating system is always vulnerable to the attacks of malwares such as computer virus, worm, Trojan horse, backdoors, ransomware, spyware, adware, scareware and more. And so the anti-virus software were created for ensuring security against the prominent computer viruses by applying a dictionary based approach. The anti-virus programs are not always guaranteed to provide security against the new viruses proliferating every day. To clarify this issue and to secure the computer system, our proposed expert system concentrates on authorizing the processes as wanted and unwanted by the administrator for execution. The Expert system maintains a database which consists of hash code of the processes which are to be allowed. These hash codes are generated using MD5 message-digest algorithm which is a widely used cryptographic hash function. The administrator approves the wanted processes that are to be executed in the client in a Local Area Network by implementing Client-Server architecture and only the processes that match with the processes in the database table will be executed by which many malicious processes are restricted from infecting the operating system. The add-on advantage of this proposed Expert system is that it limits CPU usage and minimizes resource utilization. Thus data and information security is ensured by our system along with increased performance of the operating system. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=virus" title="virus">virus</a>, <a href="https://publications.waset.org/abstracts/search?q=worm" title=" worm"> worm</a>, <a href="https://publications.waset.org/abstracts/search?q=Trojan%20horse" title=" Trojan horse"> Trojan horse</a>, <a href="https://publications.waset.org/abstracts/search?q=back%20doors" title=" back doors"> back doors</a>, <a href="https://publications.waset.org/abstracts/search?q=Ransomware" title=" Ransomware"> Ransomware</a>, <a href="https://publications.waset.org/abstracts/search?q=Spyware" title=" Spyware"> Spyware</a>, <a href="https://publications.waset.org/abstracts/search?q=Adware" title=" Adware"> Adware</a>, <a href="https://publications.waset.org/abstracts/search?q=Scareware" title=" Scareware"> Scareware</a>, <a href="https://publications.waset.org/abstracts/search?q=sticky%20software" title=" sticky software"> sticky software</a>, <a href="https://publications.waset.org/abstracts/search?q=process%20table" title=" process table"> process table</a>, <a href="https://publications.waset.org/abstracts/search?q=MD5" title=" MD5"> MD5</a>, <a href="https://publications.waset.org/abstracts/search?q=CPU%20usage%20and%20resource%20utilization" title="CPU usage and resource utilization ">CPU usage and resource utilization </a> </p> <a href="https://publications.waset.org/abstracts/15661/expert-system-debugging-using-md5-process-firewall" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/15661.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">427</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18965</span> The Design and Applied of Learning Management System via Social Media on Internet: Case Study of Operating System for Business Subject</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pimploi%20Tirastittam">Pimploi Tirastittam</a>, <a href="https://publications.waset.org/abstracts/search?q=Sawanath%20Treesathon"> Sawanath Treesathon</a>, <a href="https://publications.waset.org/abstracts/search?q=Amornrath%20Ongkawat"> Amornrath Ongkawat</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Learning Management System (LMS) is the system which uses to manage the learning in order to grouping the content and learning activity between the lecturer and learner including online examination and evaluation. Nowadays, it is the borderless learning era so the learning activities can be accessed from everywhere in the world and also anytime via the information technology and media. The learner can easily access to the knowledge so the different in time and distance is not a constraint for learning anymore. The learning pattern which was used in this research is the integration of the in-class learning and online learning via internet and will be able to monitor the progress by the Learning management system which will create the fast response and accessible learning process via the social media. In order to increase the capability and freedom of the learner, the system can show the current and history of the learning document, video conference and also has the chat room for the learner and lecturer to interact to each other. So the objectives of the “The Design and Applied of Learning Management System via Social Media on Internet: Case Study of Operating System for Business Subject” are to expand the opportunity of learning and to increase the efficiency of learning as well as increase the communication channel between lecturer and student. The data of this research was collect from 30 users of the system which are students who enroll in the subject. And the result of the research is in the “Very Good” which is conformed to the hypothesis. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Learning%20Management%20System" title="Learning Management System">Learning Management System</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20media" title=" social media"> social media</a>, <a href="https://publications.waset.org/abstracts/search?q=Operating%20System" title=" Operating System"> Operating System</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20technology" title=" information technology "> information technology </a> </p> <a href="https://publications.waset.org/abstracts/27247/the-design-and-applied-of-learning-management-system-via-social-media-on-internet-case-study-of-operating-system-for-business-subject" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/27247.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">355</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18964</span> Educating Children with the Child-Friendly Smartphone Operation System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Wildan%20Maulana%20Wildan">Wildan Maulana Wildan</a>, <a href="https://publications.waset.org/abstracts/search?q=Siti%20Annisa%20Rahmayani%20Icha"> Siti Annisa Rahmayani Icha</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Nowadays advances in information technology are needed by all the inhabitants of the earth for the sake of ease all their work, but it is worth to introduced the technological advances in the world of children. Before the technology is growing rapidly, children busy with various of traditional games and have high socialization. Moreover, after it presence, almost all of children spend more their time for playing gadget, It can affect the education of children and will change the character and personality children. However, children also can not be separated with the technology. Because the technology insight knowledge of children will be more extensive. Because the world can not be separated with advances in technology as well as with children, there should be developed a smartphone operating system that is child-friendly. The operating system is able to filter contents that do not deserve children, even in this system there is a reminder of a time study, prayer time and play time for children and there are interactive contents that will help the development of education and children's character. Children need technology, and there are some ways to introduce it to children. We must look at the characteristics of children in different environments. Thus advances in technology can be beneficial to the world children and their parents, and educators do not have to worry about advances in technology. We should be able to take advantage of advances in technology best possible. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=information%20technology" title="information technology">information technology</a>, <a href="https://publications.waset.org/abstracts/search?q=smartphone%20operating%20system" title=" smartphone operating system"> smartphone operating system</a>, <a href="https://publications.waset.org/abstracts/search?q=education" title=" education"> education</a>, <a href="https://publications.waset.org/abstracts/search?q=character" title=" character"> character</a> </p> <a href="https://publications.waset.org/abstracts/54719/educating-children-with-the-child-friendly-smartphone-operation-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/54719.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">512</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18963</span> The Use of Water Resources Yield Model at Kleinfontein Dam</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lungile%20Maliba">Lungile Maliba</a>, <a href="https://publications.waset.org/abstracts/search?q=O.%20I.%20Nkwonta"> O. I. Nkwonta</a>, <a href="https://publications.waset.org/abstracts/search?q=E%20Onyari"> E Onyari</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Water resources development and management are regarded as crucial for poverty reduction in many developing countries and sustainable economic growth such as South Africa. The contribution of large hydraulic infrastructure and management of it, particularly reservoirs, to development remains controversial. This controversy stems from the fact that from a historical point of view construction of reservoirs has brought fewer benefits than envisaged and has resulted in significant environmental and social costs. A further complexity in reservoir management is the variety of stakeholders involved, all with different objectives, including domestic and industrial water use, flood control, irrigation and hydropower generation. The objective was to evaluate technical adaptation options for kleinfontein Dam’s current operating rule curves. To achieve this objective, the current operating rules curves being used in the sub-basin were analysed. An objective methodology was implemented in other to get the operating rules with regards to the target storage curves. These were derived using the Water Resources Yield/Planning Model (WRY/PM), with the aim of maximising of releases to demand zones. The result showed that the system is over allocated and in addition the demands exceed the long-term yield that is available for the system. It was concluded that the current operating rules in the system do not produce the optimum operation such as target storage curves to avoid supply failures in the system. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=infrastructure" title="infrastructure">infrastructure</a>, <a href="https://publications.waset.org/abstracts/search?q=Kleinfontein%20dam" title=" Kleinfontein dam"> Kleinfontein dam</a>, <a href="https://publications.waset.org/abstracts/search?q=operating%20rule%20curve" title=" operating rule curve"> operating rule curve</a>, <a href="https://publications.waset.org/abstracts/search?q=water%20resources%20yield%20and%20planning%20model" title=" water resources yield and planning model"> water resources yield and planning model</a> </p> <a href="https://publications.waset.org/abstracts/143213/the-use-of-water-resources-yield-model-at-kleinfontein-dam" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/143213.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">139</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18962</span> Analysis of Heat Exchanger Area of Two Stage Cascade Refrigeration System Using Taguchi</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=A.%20D.%20Parekh">A. D. Parekh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The present work describes relative contributions of operating parameters on required heat transfer area of three heat exchangers viz. evaporator, condenser and cascade condenser of two stage R404A-R508B cascade refrigeration system using Taguchi method. The operating parameters considered in present study includes (1) condensing temperature of high temperature cycle and low temperature cycle (2) evaporating temperature of low temperature cycle (3) degree of superheating in low temperature cycle (4) refrigerating effect. Heat transfer areas of three heat exchangers are studied with variation of above operating parameters and also optimum working levels of each operating parameter has been obtained for minimum heat transfer area of each heat exchanger using Taguchi method. The analysis using Taguchi method reveals that evaporating temperature of low temperature cycle and refrigerating effect contribute relatively largely on the area of evaporator. Condenser area is mainly influenced by both condensing temperature of high temperature cycle and refrigerating effect. Area of cascade condenser is mainly affected by refrigerating effect and the effects of other operating parameters are minimal. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cascade%20refrigeration%20system" title="cascade refrigeration system">cascade refrigeration system</a>, <a href="https://publications.waset.org/abstracts/search?q=Taguchi%20method" title=" Taguchi method"> Taguchi method</a>, <a href="https://publications.waset.org/abstracts/search?q=heat%20transfer%20area" title=" heat transfer area"> heat transfer area</a>, <a href="https://publications.waset.org/abstracts/search?q=ANOVA" title=" ANOVA"> ANOVA</a>, <a href="https://publications.waset.org/abstracts/search?q=optimal%20solution" title=" optimal solution"> optimal solution</a> </p> <a href="https://publications.waset.org/abstracts/12558/analysis-of-heat-exchanger-area-of-two-stage-cascade-refrigeration-system-using-taguchi" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/12558.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">338</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18961</span> Analysis of Heat Exchanger Area of Two Stage Cascade Refrigeration System Using Taguchi Methodology</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=A.%20D.%20Parekh">A. D. Parekh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The present work describes relative contributions of operating parameters on required heat transfer area of three heat exchangers viz. evaporator, condenser and cascade condenser of two stage R404A-R508B cascade refrigeration system using Taguchi method. The operating parameters considered in present study includes (1) condensing temperature of high temperature cycle and low temperature cycle (2) evaporating temperature of low temperature cycle (3) degree of superheating in low temperature cycle (4) refrigerating effect. Heat transfer areas of three heat exchangers are studied with variation of above operating parameters and also optimum working levels of each operating parameter has been obtained for minimum heat transfer area of each heat exchanger using Taguchi method. The analysis using Taguchi method reveals that evaporating temperature of low temperature cycle and refrigerating effect contribute relatively largely on the area of evaporator. Condenser area is mainly influenced by both condensing temperature of high temperature cycle and refrigerating effect. Area of cascade condenser is mainly affected by refrigerating effect and the effects of other operating parameters are minimal. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cascade%20refrigeration%20system" title="cascade refrigeration system">cascade refrigeration system</a>, <a href="https://publications.waset.org/abstracts/search?q=Taguchi%20method" title=" Taguchi method"> Taguchi method</a>, <a href="https://publications.waset.org/abstracts/search?q=heat%20transfer%20area" title=" heat transfer area"> heat transfer area</a>, <a href="https://publications.waset.org/abstracts/search?q=ANOVA" title=" ANOVA"> ANOVA</a>, <a href="https://publications.waset.org/abstracts/search?q=optimal%20solution" title=" optimal solution"> optimal solution</a> </p> <a href="https://publications.waset.org/abstracts/10978/analysis-of-heat-exchanger-area-of-two-stage-cascade-refrigeration-system-using-taguchi-methodology" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/10978.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">384</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18960</span> Self-Tuning Power System Stabilizer Based on Recursive Least Square Identification and Linear Quadratic Regulator</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=J.%20Ritonja">J. Ritonja</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Available commercial applications of power system stabilizers assure optimal damping of synchronous generator&rsquo;s oscillations only in a small part of operating range. Parameters of the power system stabilizer are usually tuned for the selected operating point. Extensive variations of the synchronous generator&rsquo;s operation result in changed dynamic characteristics. This is the reason that the power system stabilizer tuned for the nominal operating point does not satisfy preferred damping in the overall operation area. The small-signal stability and the transient stability of the synchronous generators have represented an attractive problem for testing different concepts of the modern control theory. Of all the methods, the adaptive control has proved to be the most suitable for the design of the power system stabilizers. The adaptive control has been used in order to assure the optimal damping through the entire synchronous generator&rsquo;s operating range. The use of the adaptive control is possible because the loading variations and consequently the variations of the synchronous generator&rsquo;s dynamic characteristics are, in most cases, essentially slower than the adaptation mechanism. The paper shows the development and the application of the self-tuning power system stabilizer based on recursive least square identification method and linear quadratic regulator. Identification method is used to calculate the parameters of the Heffron-Phillips model of the synchronous generator. On the basis of the calculated parameters of the synchronous generator&rsquo;s mathematical model, the synthesis of the linear quadratic regulator is carried-out. The identification and the synthesis are implemented on-line. In this way, the self-tuning power system stabilizer adapts to the different operating conditions. A purpose of this paper is to contribute to development of the more effective power system stabilizers, which would replace currently used linear stabilizers. The presented self-tuning power system stabilizer makes the tuning of the controller parameters easier and assures damping improvement in the complete operating range. The results of simulations and experiments show essential improvement of the synchronous generator&rsquo;s damping and power system stability. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=adaptive%20control" title="adaptive control">adaptive control</a>, <a href="https://publications.waset.org/abstracts/search?q=linear%20quadratic%20regulator" title=" linear quadratic regulator"> linear quadratic regulator</a>, <a href="https://publications.waset.org/abstracts/search?q=power%20system%20stabilizer" title=" power system stabilizer"> power system stabilizer</a>, <a href="https://publications.waset.org/abstracts/search?q=recursive%20least%20square%20identification" title=" recursive least square identification"> recursive least square identification</a> </p> <a href="https://publications.waset.org/abstracts/52084/self-tuning-power-system-stabilizer-based-on-recursive-least-square-identification-and-linear-quadratic-regulator" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/52084.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">247</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18959</span> TACTICAL: Ram Image Retrieval in Linux Using Protected Mode Architecture’s Paging Technique</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sedat%20Aktas">Sedat Aktas</a>, <a href="https://publications.waset.org/abstracts/search?q=Egemen%20Ulusoy"> Egemen Ulusoy</a>, <a href="https://publications.waset.org/abstracts/search?q=Remzi%20Yildirim"> Remzi Yildirim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This article explains how to get a ram image from a computer with a Linux operating system and what steps should be followed while getting it. What we mean by taking a ram image is the process of dumping the physical memory instantly and writing it to a file. This process can be likened to taking a picture of everything in the computer’s memory at that moment. This process is very important for tools that analyze ram images. Volatility can be given as an example because before these tools can analyze ram, images must be taken. These tools are used extensively in the forensic world. Forensic, on the other hand, is a set of processes for digitally examining the information on any computer or server on behalf of official authorities. In this article, the protected mode architecture in the Linux operating system is examined, and the way to save the image sample of the kernel driver and system memory to disk is followed. Tables and access methods to be used in the operating system are examined based on the basic architecture of the operating system, and the most appropriate methods and application methods are transferred to the article. Since there is no article directly related to this study on Linux in the literature, it is aimed to contribute to the literature with this study on obtaining ram images. LIME can be mentioned as a similar tool, but there is no explanation about the memory dumping method of this tool. Considering the frequency of use of these tools, the contribution of the study in the field of forensic medicine has been the main motivation of the study due to the intense studies on ram image in the field of forensics. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=linux" title="linux">linux</a>, <a href="https://publications.waset.org/abstracts/search?q=paging" title=" paging"> paging</a>, <a href="https://publications.waset.org/abstracts/search?q=addressing" title=" addressing"> addressing</a>, <a href="https://publications.waset.org/abstracts/search?q=ram-image" title=" ram-image"> ram-image</a>, <a href="https://publications.waset.org/abstracts/search?q=memory%20dumping" title=" memory dumping"> memory dumping</a>, <a href="https://publications.waset.org/abstracts/search?q=kernel%20modules" title=" kernel modules"> kernel modules</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic" title=" forensic"> forensic</a> </p> <a href="https://publications.waset.org/abstracts/153801/tactical-ram-image-retrieval-in-linux-using-protected-mode-architectures-paging-technique" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/153801.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">117</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18958</span> Design of a Real Time Closed Loop Simulation Test Bed on a General Purpose Operating System: Practical Approaches</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pratibha%20Srivastava">Pratibha Srivastava</a>, <a href="https://publications.waset.org/abstracts/search?q=Chithra%20V.%20J."> Chithra V. J.</a>, <a href="https://publications.waset.org/abstracts/search?q=Sudhakar%20S."> Sudhakar S.</a>, <a href="https://publications.waset.org/abstracts/search?q=Nitin%20K.%20D."> Nitin K. D.</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A closed-loop system comprises of a controller, a response system, and an actuating system. The controller, which is the system under test for us, excites the actuators based on feedback from the sensors in a periodic manner. The sensors should provide the feedback to the System Under Test (SUT) within a deterministic time post excitation of the actuators. Any delay or miss in the generation of response or acquisition of excitation pulses may lead to control loop controller computation errors, which can be catastrophic in certain cases. Such systems categorised as hard real-time systems that need special strategies. The real-time operating systems available in the market may be the best solutions for such kind of simulations, but they pose limitations like the availability of the X Windows system, graphical interfaces, other user tools. In this paper, we present strategies that can be used on a general purpose operating system (Bare Linux Kernel) to achieve a deterministic deadline and hence have the added advantages of a GPOS with real-time features. Techniques shall be discussed how to make the time-critical application run with the highest priority in an uninterrupted manner, reduced network latency for distributed architecture, real-time data acquisition, data storage, and retrieval, user interactions, etc. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=real%20time%20data%20acquisition" title="real time data acquisition">real time data acquisition</a>, <a href="https://publications.waset.org/abstracts/search?q=real%20time%20kernel%20preemption" title=" real time kernel preemption"> real time kernel preemption</a>, <a href="https://publications.waset.org/abstracts/search?q=scheduling" title=" scheduling"> scheduling</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20latency" title=" network latency"> network latency</a> </p> <a href="https://publications.waset.org/abstracts/117763/design-of-a-real-time-closed-loop-simulation-test-bed-on-a-general-purpose-operating-system-practical-approaches" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/117763.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">147</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18957</span> An Analytical Approach to Assess and Compare the Vulnerability Risk of Operating Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pubudu%20K.%20Hitigala%20Kaluarachchilage">Pubudu K. Hitigala Kaluarachchilage</a>, <a href="https://publications.waset.org/abstracts/search?q=Champike%20Attanayake"> Champike Attanayake</a>, <a href="https://publications.waset.org/abstracts/search?q=Sasith%20Rajasooriya"> Sasith Rajasooriya</a>, <a href="https://publications.waset.org/abstracts/search?q=Chris%20P.%20Tsokos"> Chris P. Tsokos</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Operating system (OS) security is a key component of computer security. Assessing and improving OSs strength to resist against vulnerabilities and attacks is a mandatory requirement given the rate of new vulnerabilities discovered and attacks occurring. Frequency and the number of different kinds of vulnerabilities found in an OS can be considered an index of its information security level. In the present study five mostly used OSs, Microsoft Windows (windows 7, windows 8 and windows 10), Apple’s Mac and Linux are assessed for their discovered vulnerabilities and the risk associated with each. Each discovered and reported vulnerability has an exploitability score assigned in CVSS score of the national vulnerability database. In this study the risk from vulnerabilities in each of the five Operating Systems is compared. Risk Indexes used are developed based on the Markov model to evaluate the risk of each vulnerability. Statistical methodology and underlying mathematical approach is described. Initially, parametric procedures are conducted and measured. There were, however, violations of some statistical assumptions observed. Therefore the need for non-parametric approaches was recognized. 6838 vulnerabilities recorded were considered in the analysis. According to the risk associated with all the vulnerabilities considered, it was found that there is a statistically significant difference among average risk levels for some operating systems, indicating that according to our method some operating systems have been more risk vulnerable than others given the assumptions and limitations. Relevant test results revealing a statistically significant difference in the Risk levels of different OSs are presented. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title="cybersecurity">cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=Markov%20chain" title=" Markov chain"> Markov chain</a>, <a href="https://publications.waset.org/abstracts/search?q=non-parametric%20analysis" title=" non-parametric analysis"> non-parametric analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=vulnerability" title=" vulnerability"> vulnerability</a>, <a href="https://publications.waset.org/abstracts/search?q=operating%20system" title=" operating system"> operating system</a> </p> <a href="https://publications.waset.org/abstracts/141343/an-analytical-approach-to-assess-and-compare-the-vulnerability-risk-of-operating-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/141343.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">183</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18956</span> Robust Fuzzy PID Stabilizer: Modified Shuffled Frog Leaping Algorithm </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Oveis%20Abedinia">Oveis Abedinia</a>, <a href="https://publications.waset.org/abstracts/search?q=Noradin%20Ghadimi"> Noradin Ghadimi</a>, <a href="https://publications.waset.org/abstracts/search?q=Nasser%20Mikaeilvand"> Nasser Mikaeilvand</a>, <a href="https://publications.waset.org/abstracts/search?q=Roza%20Poursoleiman"> Roza Poursoleiman</a>, <a href="https://publications.waset.org/abstracts/search?q=Asghar%20Poorfaraj"> Asghar Poorfaraj </a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper a robust Fuzzy Proportional Integral Differential (PID) controller is applied to multi-machine power system based on Modified Shuffled Frog Leaping (MSFL) algorithm. This newly proposed controller is more efficient because it copes with oscillations and different operating points. In this strategy the gains of the PID controller is optimized using the proposed technique. The nonlinear problem is formulated as an optimization problem for wide ranges of operating conditions using the MSFL algorithm. The simulation results demonstrate the effectiveness, good robustness and validity of the proposed method through some performance indices such as ITAE and FD under wide ranges operating conditions in comparison with TS and GSA techniques. The single-machine infinite bus system and New England 10-unit 39-bus standard power system are employed to illustrate the performance of the proposed method. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=fuzzy%20PID" title="fuzzy PID">fuzzy PID</a>, <a href="https://publications.waset.org/abstracts/search?q=MSFL" title=" MSFL"> MSFL</a>, <a href="https://publications.waset.org/abstracts/search?q=multi-machine" title=" multi-machine"> multi-machine</a>, <a href="https://publications.waset.org/abstracts/search?q=low%20frequency%20oscillation" title=" low frequency oscillation"> low frequency oscillation</a> </p> <a href="https://publications.waset.org/abstracts/13638/robust-fuzzy-pid-stabilizer-modified-shuffled-frog-leaping-algorithm" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/13638.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">429</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18955</span> Evaluation of Transfer Capability Considering Uncertainties of System Operating Condition and System Cascading Collapse</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nur%20Ashida%20Salim">Nur Ashida Salim</a>, <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Murtadha%20Othman"> Muhammad Murtadha Othman</a>, <a href="https://publications.waset.org/abstracts/search?q=Ismail%20Musirin"> Ismail Musirin</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohd%20Salleh%20Serwan"> Mohd Salleh Serwan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Over the past few decades, the power system industry in many developing and developed countries has gone through a restructuring process of the industry where they are moving towards a deregulated power industry. This situation will lead to competition among the generation and distribution companies to achieve a certain objective which is to provide quality and efficient production of electric energy, which will reduce the price of electricity. Therefore it is important to obtain an accurate value of the Available Transfer Capability (ATC) and Transmission Reliability Margin (TRM) in order to ensure the effective power transfer between areas during the occurrence of uncertainties in the system. In this paper, the TRM and ATC is determined by taking into consideration the uncertainties of the system operating condition and system cascading collapse by applying the bootstrap technique. A case study of the IEEE RTS-79 is employed to verify the robustness of the technique proposed in the determination of TRM and ATC. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=available%20transfer%20capability" title="available transfer capability">available transfer capability</a>, <a href="https://publications.waset.org/abstracts/search?q=bootstrap%20technique" title=" bootstrap technique"> bootstrap technique</a>, <a href="https://publications.waset.org/abstracts/search?q=cascading%20collapse" title=" cascading collapse"> cascading collapse</a>, <a href="https://publications.waset.org/abstracts/search?q=transmission%20reliability%20margin" title=" transmission reliability margin"> transmission reliability margin</a> </p> <a href="https://publications.waset.org/abstracts/4347/evaluation-of-transfer-capability-considering-uncertainties-of-system-operating-condition-and-system-cascading-collapse" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/4347.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">408</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18954</span> Improving Communication System through Router Configuration: The Nigerian Navy Experience</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Saidu%20I.%20Rambo">Saidu I. Rambo</a>, <a href="https://publications.waset.org/abstracts/search?q=Emmanuel%20O.%20Ibam"> Emmanuel O. Ibam</a>, <a href="https://publications.waset.org/abstracts/search?q=Sunday%20O.%20Adewale"> Sunday O. Adewale</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The configuration of routers for effective communication in the Nigerian Navy (NN) enables the navy to improve on the current communication systems. The current system is faced with challenges that make the systems partially effective. The major implementation of the system is to configure routers using hierarchical model and obtaining a VSAT option on C-band platform. These routers will act as a link between Naval Headquarters and the Commands under it. The routers main responsibilities are to forward packets from source location to destination using a Link State Routing Protocol (LSRP). Also using the Point to Point Protocol (PPP), creates a strong encrypted password using Challenge Handshake Authentication Protocol (CHAP) which uses one-way hash function of Message Digest 5 (MD5) to provide complete protection against hackers/intruders. Routers can be configured using a Linux operating system or internet work operating system in the Microsoft platform. With this, system packets can be forwarded to various locations more effectively than the present system being used. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=C-band" title="C-band">C-band</a>, <a href="https://publications.waset.org/abstracts/search?q=communication" title=" communication"> communication</a>, <a href="https://publications.waset.org/abstracts/search?q=router" title=" router"> router</a>, <a href="https://publications.waset.org/abstracts/search?q=VSAT" title=" VSAT"> VSAT</a> </p> <a href="https://publications.waset.org/abstracts/9952/improving-communication-system-through-router-configuration-the-nigerian-navy-experience" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/9952.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">366</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18953</span> Android Application on Checking Halal Product Based on Augmented Reality </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Saidatul%20A%27isyah%20Ahmad%20Shukri">Saidatul A&#039;isyah Ahmad Shukri</a>, <a href="https://publications.waset.org/abstracts/search?q=Haslina%20Arshad"> Haslina Arshad </a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study was conducted to develop an application that provides Augmented Reality experience in identifying halal food products and beverages based on Malaysian Islamic Development Department (JAKIM) database for Muslim consumers in Malaysia. The applications is operating on the mobile device using the Android platform. This application aims to provide a new experience to the user how to use the Android application implements Augmentation Reality technology The methodology used is object-oriented analysis and design (OOAD). The programming language used is JAVA programming using the Android Software Development Kit (SDK) and XML. Android operating system is selected, and it is an open source operating system. Results from the study are implemented to further enhance diversity in presentation of information contained in this application and so can bring users using these applications from different angles. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=android" title="android">android</a>, <a href="https://publications.waset.org/abstracts/search?q=augmented%20reality" title=" augmented reality"> augmented reality</a>, <a href="https://publications.waset.org/abstracts/search?q=food" title=" food"> food</a>, <a href="https://publications.waset.org/abstracts/search?q=halal" title=" halal"> halal</a>, <a href="https://publications.waset.org/abstracts/search?q=Malaysia" title=" Malaysia"> Malaysia</a>, <a href="https://publications.waset.org/abstracts/search?q=products" title=" products"> products</a>, <a href="https://publications.waset.org/abstracts/search?q=XML" title=" XML"> XML</a> </p> <a href="https://publications.waset.org/abstracts/40664/android-application-on-checking-halal-product-based-on-augmented-reality" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/40664.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">455</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18952</span> Protection System Mis-operations: Fundamental Concepts and Learning from Indian Power Sector</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pankaj%20Kumar%20Jha">Pankaj Kumar Jha</a>, <a href="https://publications.waset.org/abstracts/search?q=Mahendra%20Singh%20Hada"> Mahendra Singh Hada</a>, <a href="https://publications.waset.org/abstracts/search?q=Brijendra%20Singh"> Brijendra Singh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Protection system is an essential feature of the electrical system which helps in detection and removal of faults. Protection system consists of many subsystems like relays, circuit breakers, instrument transformers, auxiliary DC system, auxiliary relays etc. Although the fundamental protective and relay operating concepts are similar throughout the world, there are very significant differences in their implementation. These differences arise through different traditions, operating philosophies, experiences and national standards. Protection system mis-operation due to problem in one or more of its subsystem or inadequate knowledge of numerical relay settings and configuration are very common throughout the world. Protection system mis-operation leads to unstable and unreliable grid operation. In this paper we will discuss about the fundamental concepts of protective relaying and the reasons for protection system mis-operation due to one or more of its subsystems. Many real-world case studies of protection system mis-operation from Indian power sector are discussed in detail in this paper. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=auxiliary%20trip%20relays" title="auxiliary trip relays">auxiliary trip relays</a>, <a href="https://publications.waset.org/abstracts/search?q=bus%20zone" title=" bus zone"> bus zone</a>, <a href="https://publications.waset.org/abstracts/search?q=check%20zone" title=" check zone"> check zone</a>, <a href="https://publications.waset.org/abstracts/search?q=CT%20saturation" title=" CT saturation"> CT saturation</a>, <a href="https://publications.waset.org/abstracts/search?q=dead%20zone%20protection" title=" dead zone protection"> dead zone protection</a>, <a href="https://publications.waset.org/abstracts/search?q=DC%20ground%20faults" title=" DC ground faults"> DC ground faults</a>, <a href="https://publications.waset.org/abstracts/search?q=DMT" title=" DMT"> DMT</a>, <a href="https://publications.waset.org/abstracts/search?q=DR" title=" DR"> DR</a>, <a href="https://publications.waset.org/abstracts/search?q=end%20fault%20protection" title=" end fault protection"> end fault protection</a>, <a href="https://publications.waset.org/abstracts/search?q=instrument%20transformer" title=" instrument transformer"> instrument transformer</a>, <a href="https://publications.waset.org/abstracts/search?q=SOTF" title=" SOTF"> SOTF</a>, <a href="https://publications.waset.org/abstracts/search?q=STUB" title=" STUB"> STUB</a> </p> <a href="https://publications.waset.org/abstracts/171178/protection-system-mis-operations-fundamental-concepts-and-learning-from-indian-power-sector" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/171178.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">76</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Operating%20System&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Operating%20System&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Operating%20System&amp;page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Operating%20System&amp;page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Operating%20System&amp;page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Operating%20System&amp;page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Operating%20System&amp;page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Operating%20System&amp;page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Operating%20System&amp;page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Operating%20System&amp;page=632">632</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Operating%20System&amp;page=633">633</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Operating%20System&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10