Pub Date : 2015-11-01DOI: 10.1109/KBEI.2015.7436016
G. D'Antona, L. Perfetto
The State Estimation (SE) problem in electric power systems consists of three main functions: estimation, bad data detection and identification. D'Antona formalized the estimation procedure considering the contribution of both the measurement and the network parameters to uncertainty, in the so called extended SE. This paper presents an investigation of the effectiveness of data detection and identification in the extended SE. Some results ona simple three buses network are given as a test case of the proposed approach.
{"title":"Bad data detection and identification in power system state estimation with network parameters uncertainty","authors":"G. D'Antona, L. Perfetto","doi":"10.1109/KBEI.2015.7436016","DOIUrl":"https://doi.org/10.1109/KBEI.2015.7436016","url":null,"abstract":"The State Estimation (SE) problem in electric power systems consists of three main functions: estimation, bad data detection and identification. D'Antona formalized the estimation procedure considering the contribution of both the measurement and the network parameters to uncertainty, in the so called extended SE. This paper presents an investigation of the effectiveness of data detection and identification in the extended SE. Some results ona simple three buses network are given as a test case of the proposed approach.","PeriodicalId":168295,"journal":{"name":"2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI)","volume":"18 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125619269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/KBEI.2015.7436093
Navid Haghighat Nazar, Mohammad Reza Heydarinezhad
Wireless Sensor Network is a specific kind of Wireless Networks that has been taken into consideration by various sciences in recent years. These Networks could be used in environmental monitoring, agricultural science, industry, medical science, etc. position of sink could be static or mobile. Communication between nodes could be multi-hop or in clustering-mode and sending data to sink could be done single-step or multi-hop. A crucial issue of these networks is their limited lifetime due to using batteries with limited energy. As a consequence, various protocols have been proposed considering energy efficiency. In this paper, MDCA algorithm is proposed to integrate data using some mobile sinks. In proposed method, managing movement of sinks in network environment is done, led to load and energy regulation. We tried to improve network efficiency by determining an appropriate rout for sinks movement. Duty cycling mechanism is used for decreasing energy consumption. In this way, a percent of sensor nodes are going to sleep mode (in the network's runtime). Routing algorithm is considered based on distance and remaining energy of sensor node, so more appropriate routs are selected during runtime. Simulation and evaluation results show that our proposed method performs better than other methods that have been mentioned here.
{"title":"Enhancement lifetime of wireless sensor networks with mobile sink managed and improved routing and control Power Consumption","authors":"Navid Haghighat Nazar, Mohammad Reza Heydarinezhad","doi":"10.1109/KBEI.2015.7436093","DOIUrl":"https://doi.org/10.1109/KBEI.2015.7436093","url":null,"abstract":"Wireless Sensor Network is a specific kind of Wireless Networks that has been taken into consideration by various sciences in recent years. These Networks could be used in environmental monitoring, agricultural science, industry, medical science, etc. position of sink could be static or mobile. Communication between nodes could be multi-hop or in clustering-mode and sending data to sink could be done single-step or multi-hop. A crucial issue of these networks is their limited lifetime due to using batteries with limited energy. As a consequence, various protocols have been proposed considering energy efficiency. In this paper, MDCA algorithm is proposed to integrate data using some mobile sinks. In proposed method, managing movement of sinks in network environment is done, led to load and energy regulation. We tried to improve network efficiency by determining an appropriate rout for sinks movement. Duty cycling mechanism is used for decreasing energy consumption. In this way, a percent of sensor nodes are going to sleep mode (in the network's runtime). Routing algorithm is considered based on distance and remaining energy of sensor node, so more appropriate routs are selected during runtime. Simulation and evaluation results show that our proposed method performs better than other methods that have been mentioned here.","PeriodicalId":168295,"journal":{"name":"2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI)","volume":"428 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122797343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/KBEI.2015.7436123
M. Hosseinzadeh, S. M. Hosseini Andargoli, S. H. Hojjati
Sensor localization in the sensor network with cooperative spectrum sensing is considered to detect a random geometric primary user (PU). The sensor's detection performance is an important issue which has attracted more attention in recent years. A crucial matter in this scenario is that we do not have any information about the position of primary user. Due to the random location of PU, we studied expectation of detection probability under OR fusion rule assumption and describe approximate theory for sensor's localization in the network. The simulation results confirm our theory on the various scenarios.
{"title":"Sensor localization for cooperative spectrum sensing in the network with random geometric primary","authors":"M. Hosseinzadeh, S. M. Hosseini Andargoli, S. H. Hojjati","doi":"10.1109/KBEI.2015.7436123","DOIUrl":"https://doi.org/10.1109/KBEI.2015.7436123","url":null,"abstract":"Sensor localization in the sensor network with cooperative spectrum sensing is considered to detect a random geometric primary user (PU). The sensor's detection performance is an important issue which has attracted more attention in recent years. A crucial matter in this scenario is that we do not have any information about the position of primary user. Due to the random location of PU, we studied expectation of detection probability under OR fusion rule assumption and describe approximate theory for sensor's localization in the network. The simulation results confirm our theory on the various scenarios.","PeriodicalId":168295,"journal":{"name":"2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127781397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/KBEI.2015.7436104
Somayeh Mohseni, A. F. Jahromi
The way of searching For outlier data based on distance is one of the attractive study in data mining during recent two decades, due to the wide range of applications, has been always investigated. But this wide scope has been limited to certain data, while the valuable ability of fuzzy data in analyzing and applying has been proven. Considering the effective performance of LDOF method as a distance based approach in identifying outlier data, the almost this article is to use the famous vortex metric, to provide a universalization of LDOF method for identifying outlier dataset of fuzzy data. Also performance and efficiency of the proposed method has been investigated in simulation.
{"title":"A new local distace-based outlier detection approach for fuzzy data by vertex metric","authors":"Somayeh Mohseni, A. F. Jahromi","doi":"10.1109/KBEI.2015.7436104","DOIUrl":"https://doi.org/10.1109/KBEI.2015.7436104","url":null,"abstract":"The way of searching For outlier data based on distance is one of the attractive study in data mining during recent two decades, due to the wide range of applications, has been always investigated. But this wide scope has been limited to certain data, while the valuable ability of fuzzy data in analyzing and applying has been proven. Considering the effective performance of LDOF method as a distance based approach in identifying outlier data, the almost this article is to use the famous vortex metric, to provide a universalization of LDOF method for identifying outlier dataset of fuzzy data. Also performance and efficiency of the proposed method has been investigated in simulation.","PeriodicalId":168295,"journal":{"name":"2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128003704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/KBEI.2015.7436205
Farzad Paridar, S. J. Mirabedini
Studies based on newly documented statistics suggest that a plethora of people suffer from psychological disorders. Violent behaviors are of symptoms reflecting these psychological disorders. In this paper, we design a gadget connecting to a smart operating system and counseling the one instantly and immediately in case of their violent behaviors. Using WBAN sensors we could measure the patients' vital signs including blood pressure and pulses, body temperature and heart beats and level of these measures leads the system to figure out their moods and provide them with a counseling option mitigating their fretful senses and moving them to relaxation.
{"title":"Using WBAN as an intelligent adviser gadget","authors":"Farzad Paridar, S. J. Mirabedini","doi":"10.1109/KBEI.2015.7436205","DOIUrl":"https://doi.org/10.1109/KBEI.2015.7436205","url":null,"abstract":"Studies based on newly documented statistics suggest that a plethora of people suffer from psychological disorders. Violent behaviors are of symptoms reflecting these psychological disorders. In this paper, we design a gadget connecting to a smart operating system and counseling the one instantly and immediately in case of their violent behaviors. Using WBAN sensors we could measure the patients' vital signs including blood pressure and pulses, body temperature and heart beats and level of these measures leads the system to figure out their moods and provide them with a counseling option mitigating their fretful senses and moving them to relaxation.","PeriodicalId":168295,"journal":{"name":"2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133447646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/KBEI.2015.7436190
M. Hashemi, R. Rafeh
Classification and sentiment analysis and research is one of the most important issues in recent times, especially in the realm of language is Persian. Identify the user sentiments about an issue through a process of expressing a sense of individual and output data analysis work is in the context of Hijab of natural language processing and computational linguistics, artificial intelligence is a subsidiary. The need to categorize and production data sources in our field and that's the dress code, according to the news raised in this context and user reaction to the news texts, to provide a data set with an algorithm that on it has been implemented. The algorithm proposed in this study using text mining techniques and algorithms applied weight to words and try to identify the type of polarization of the comments gathered from official sites built in 1000. Analysis on the words in the comments feature has been conducted. It focused on the importance of the word in a sentence.
{"title":"Using of emotion mining techniques for opinions analysis on the issue of Hijab","authors":"M. Hashemi, R. Rafeh","doi":"10.1109/KBEI.2015.7436190","DOIUrl":"https://doi.org/10.1109/KBEI.2015.7436190","url":null,"abstract":"Classification and sentiment analysis and research is one of the most important issues in recent times, especially in the realm of language is Persian. Identify the user sentiments about an issue through a process of expressing a sense of individual and output data analysis work is in the context of Hijab of natural language processing and computational linguistics, artificial intelligence is a subsidiary. The need to categorize and production data sources in our field and that's the dress code, according to the news raised in this context and user reaction to the news texts, to provide a data set with an algorithm that on it has been implemented. The algorithm proposed in this study using text mining techniques and algorithms applied weight to words and try to identify the type of polarization of the comments gathered from official sites built in 1000. Analysis on the words in the comments feature has been conducted. It focused on the importance of the word in a sentence.","PeriodicalId":168295,"journal":{"name":"2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI)","volume":"284 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116099702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/KBEI.2015.7436090
Mehrnaz Bahrieh, A. Fakharzadeh
A mathematical model can appropriately describe the metastatic growth process in bones, which is regarded as a cancer case. This article proposes to describe a dynamic model for bone metastas by a system of partial differential equations. Based on the interaction between osteoclasts, cancer cells, PTHrP, OPG, RANKL cells and the other relations therein, This model describe the manner in which osteoclasts resorb the bone to make place for growing cancer cells. Here, tumor growth during ninety days of appearance and for different locations of bone of a patient has been set out by numerical simulations that make use of the finite difference method. Moreover, tumor density throughout the bone after ninety days has been also investigated.
{"title":"A survey on bone metastasis by finite difference method","authors":"Mehrnaz Bahrieh, A. Fakharzadeh","doi":"10.1109/KBEI.2015.7436090","DOIUrl":"https://doi.org/10.1109/KBEI.2015.7436090","url":null,"abstract":"A mathematical model can appropriately describe the metastatic growth process in bones, which is regarded as a cancer case. This article proposes to describe a dynamic model for bone metastas by a system of partial differential equations. Based on the interaction between osteoclasts, cancer cells, PTHrP, OPG, RANKL cells and the other relations therein, This model describe the manner in which osteoclasts resorb the bone to make place for growing cancer cells. Here, tumor growth during ninety days of appearance and for different locations of bone of a patient has been set out by numerical simulations that make use of the finite difference method. Moreover, tumor density throughout the bone after ninety days has been also investigated.","PeriodicalId":168295,"journal":{"name":"2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI)","volume":"518 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116246214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/KBEI.2015.7436128
P. Kakvand, M. Jaberzadeh, Mohamed Madadpour Inallou, Y. Alborz
This paper outlines the design and manufacture of Unmanned Aircraft Vehicle (UAV) that the require to a separate ground station for data (output data of parameter measurement in rotational and linear motion and image data) processing is completely removed, and all the flying robot operations became autonomously from take-off to the end of the progress to determine the distance towards the objects for obtaining coordinates (current location), calculates the distance from the object and pursues it by on-board process. Played as a result, in addition to reducing errors in data transmission process, the cost will be reduced. A PID controller designed the combined use of feedback in two phases, Flight Controller (IMU module output data and programmed algorithms for spiral movement and distance calculation algorithm by the means of counting sent and received radio pulses) and video data processing, may reduce performance errors in the addressed projects in comparison to other similar smart systems.
{"title":"Smart on-board UAV system: Using computer vision system to find a movable and stationary target","authors":"P. Kakvand, M. Jaberzadeh, Mohamed Madadpour Inallou, Y. Alborz","doi":"10.1109/KBEI.2015.7436128","DOIUrl":"https://doi.org/10.1109/KBEI.2015.7436128","url":null,"abstract":"This paper outlines the design and manufacture of Unmanned Aircraft Vehicle (UAV) that the require to a separate ground station for data (output data of parameter measurement in rotational and linear motion and image data) processing is completely removed, and all the flying robot operations became autonomously from take-off to the end of the progress to determine the distance towards the objects for obtaining coordinates (current location), calculates the distance from the object and pursues it by on-board process. Played as a result, in addition to reducing errors in data transmission process, the cost will be reduced. A PID controller designed the combined use of feedback in two phases, Flight Controller (IMU module output data and programmed algorithms for spiral movement and distance calculation algorithm by the means of counting sent and received radio pulses) and video data processing, may reduce performance errors in the addressed projects in comparison to other similar smart systems.","PeriodicalId":168295,"journal":{"name":"2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI)","volume":"280 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123089537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/KBEI.2015.7436208
F. Halataei, A. Kayhani
Humanoid locomotion of biped robots is an interesting research area due to its similarity to human walking. Furthermore, wide application of humanoid locomotion especially in robocup competitions made it more interesting for several researchers in the fields of electronics, mechanics and computer science, although it has its own complexity. This paper proposes a novel approach that optimizes the walking speed and stability for NAO biped robots. This method has been implemented on simulated NAO robot in Robocup 3D simulation environment (rcsssever3d). We have used Artificially Bee Colony (ABC) algorithm in order to achieve full stability and considerable fast walking speed without any external disturbances. Experimental results show that using this approach also, significantly decreased optimization time in order to get optimal values for parameters in our fitness function. At end a comparison has been made between the described optimization solution and GA optimization, while same walking method and foot trajectory formula has been used.
{"title":"Optimizing NAO humanoid walking using ABC algorithm","authors":"F. Halataei, A. Kayhani","doi":"10.1109/KBEI.2015.7436208","DOIUrl":"https://doi.org/10.1109/KBEI.2015.7436208","url":null,"abstract":"Humanoid locomotion of biped robots is an interesting research area due to its similarity to human walking. Furthermore, wide application of humanoid locomotion especially in robocup competitions made it more interesting for several researchers in the fields of electronics, mechanics and computer science, although it has its own complexity. This paper proposes a novel approach that optimizes the walking speed and stability for NAO biped robots. This method has been implemented on simulated NAO robot in Robocup 3D simulation environment (rcsssever3d). We have used Artificially Bee Colony (ABC) algorithm in order to achieve full stability and considerable fast walking speed without any external disturbances. Experimental results show that using this approach also, significantly decreased optimization time in order to get optimal values for parameters in our fitness function. At end a comparison has been made between the described optimization solution and GA optimization, while same walking method and foot trajectory formula has been used.","PeriodicalId":168295,"journal":{"name":"2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121075942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/KBEI.2015.7436036
A. Gholami, Mostafa Ghobaei Arani
In recent years, cloud computing technology has been increasingly embraced by people and most organizations tend to use this technology in their business processes. On the other hand, the use of this technology is not so easy and many organizations are concerned about the storage of their sensitive data in their data centers instead of storing them in the cloud storage centers. Today, one of the most important factors for the success of cloud computing is to create trust and security. Cloud computing will face a lot of challenges when the key element trust is absent. Trust is one of the most important ways to improve the reliability of cloud computing resources provided in the cloud environment and plays an important role in business carried out in the cloud business environments. User trust contributes to selection of appropriate sources in heterogeneous cloud infrastructure. In this paper, we present the trust model based on standards of appropriate service quality and speed of implementation for choose the best source. The proposed approach, in addition to taking into account criteria of quality of service such as cost, response time, bandwidth, and processor speed. Simulation results show that the proposed approach compared with similar approaches, in addition to taking into account measures of the quality of service, selects the most reliable source in a cloud environment by taking into account the speed of things.
{"title":"A trust model for resource selection in cloud computing environment","authors":"A. Gholami, Mostafa Ghobaei Arani","doi":"10.1109/KBEI.2015.7436036","DOIUrl":"https://doi.org/10.1109/KBEI.2015.7436036","url":null,"abstract":"In recent years, cloud computing technology has been increasingly embraced by people and most organizations tend to use this technology in their business processes. On the other hand, the use of this technology is not so easy and many organizations are concerned about the storage of their sensitive data in their data centers instead of storing them in the cloud storage centers. Today, one of the most important factors for the success of cloud computing is to create trust and security. Cloud computing will face a lot of challenges when the key element trust is absent. Trust is one of the most important ways to improve the reliability of cloud computing resources provided in the cloud environment and plays an important role in business carried out in the cloud business environments. User trust contributes to selection of appropriate sources in heterogeneous cloud infrastructure. In this paper, we present the trust model based on standards of appropriate service quality and speed of implementation for choose the best source. The proposed approach, in addition to taking into account criteria of quality of service such as cost, response time, bandwidth, and processor speed. Simulation results show that the proposed approach compared with similar approaches, in addition to taking into account measures of the quality of service, selects the most reliable source in a cloud environment by taking into account the speed of things.","PeriodicalId":168295,"journal":{"name":"2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122919100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}