Pub Date : 2013-04-23DOI: 10.1109/ICIT.2013.6505917
K. Kandasamy, D. Vilathgamuwa, G. Foo
State of Charge (SoC) imbalance between battery modules is unavoidable in high capacity Battery Energy Storage Systems (BESS). This paper investigates a module level SoC balancing control in cascaded H-bridge inverter (CHB) based BESS using multi-dimensional modulation technique. Multi-dimensional modulation is a generalized modulation strategy for cascaded H-bridge inverters. With the proposed control strategy, SoC can be equalized between the battery modules in a phase leg of CHB. The performance of the proposed control strategy under faulty cell operation is also studied. The multi-dimensional modulation strategy and the SoC balancing control are explained and the simulation results are given in this paper.
{"title":"Inter-module SoC balancing control for CHB based BESS using multi-dimensional modulation","authors":"K. Kandasamy, D. Vilathgamuwa, G. Foo","doi":"10.1109/ICIT.2013.6505917","DOIUrl":"https://doi.org/10.1109/ICIT.2013.6505917","url":null,"abstract":"State of Charge (SoC) imbalance between battery modules is unavoidable in high capacity Battery Energy Storage Systems (BESS). This paper investigates a module level SoC balancing control in cascaded H-bridge inverter (CHB) based BESS using multi-dimensional modulation technique. Multi-dimensional modulation is a generalized modulation strategy for cascaded H-bridge inverters. With the proposed control strategy, SoC can be equalized between the battery modules in a phase leg of CHB. The performance of the proposed control strategy under faulty cell operation is also studied. The multi-dimensional modulation strategy and the SoC balancing control are explained and the simulation results are given in this paper.","PeriodicalId":192784,"journal":{"name":"2013 IEEE International Conference on Industrial Technology (ICIT)","volume":"505 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122754559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-04-23DOI: 10.1109/ICIT.2013.6505900
O. Adewumi, Karim D Djouani, A. Kurien
Research has revealed that the correlation between distance and RSSI (Received Signal Strength Indication) values is the key of ranging and localization technologies in wireless sensor networks (WSNs). In this paper, an RSSI model that estimates the distance between sensor nodes in WSNs is presented. The performance of this model is evaluated and analyzed in a real system deployment in an indoor and outdoor environment by performing an empirical measurement using Crossbow IRIS wireless sensor motes. Our result shows that there is less error in distance estimation in an outdoor environment compared to indoor environment. The results of these evaluations would contribute towards obtaining accurate locations of wireless sensor nodes.
{"title":"RSSI based indoor and outdoor distance estimation for localization in WSN","authors":"O. Adewumi, Karim D Djouani, A. Kurien","doi":"10.1109/ICIT.2013.6505900","DOIUrl":"https://doi.org/10.1109/ICIT.2013.6505900","url":null,"abstract":"Research has revealed that the correlation between distance and RSSI (Received Signal Strength Indication) values is the key of ranging and localization technologies in wireless sensor networks (WSNs). In this paper, an RSSI model that estimates the distance between sensor nodes in WSNs is presented. The performance of this model is evaluated and analyzed in a real system deployment in an indoor and outdoor environment by performing an empirical measurement using Crossbow IRIS wireless sensor motes. Our result shows that there is less error in distance estimation in an outdoor environment compared to indoor environment. The results of these evaluations would contribute towards obtaining accurate locations of wireless sensor nodes.","PeriodicalId":192784,"journal":{"name":"2013 IEEE International Conference on Industrial Technology (ICIT)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122764340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-04-23DOI: 10.1504/IJAAC.2015.068043
Fatima Zohra Daikh, Fayçal Khelfi
In this paper, we try to present a sliding mode with fuzzy-neural network controller for nonlinear systems. It is a special nonlinear control method (SMC) which has quick response, insensitive to parameters variation and disturbance. Online identification for plants is not needed, it's very suitable for nonlinear system control, but in reality using the chattering reduction and elimination are key problem in SMC. By using a function-augmented sliding hyper plane, it is guaranteed that the output tracking error converges to zero in finite time which can be set arbitrarily. The fuzzy-neural network mainly Self Tuning Fuzzy Inference System (STFIS) is used to approximate the unknown system functions and switch item. Finally, the sliding-mode with fuzzy-neural network control is used to control single inverted pendulum and confirms the validity of the proposals. Results of simulations containing tests of robustness are presented and realized in MATLAB environment.
{"title":"Sliding mode with neuro-fuzzy network controller for inverted pendulem","authors":"Fatima Zohra Daikh, Fayçal Khelfi","doi":"10.1504/IJAAC.2015.068043","DOIUrl":"https://doi.org/10.1504/IJAAC.2015.068043","url":null,"abstract":"In this paper, we try to present a sliding mode with fuzzy-neural network controller for nonlinear systems. It is a special nonlinear control method (SMC) which has quick response, insensitive to parameters variation and disturbance. Online identification for plants is not needed, it's very suitable for nonlinear system control, but in reality using the chattering reduction and elimination are key problem in SMC. By using a function-augmented sliding hyper plane, it is guaranteed that the output tracking error converges to zero in finite time which can be set arbitrarily. The fuzzy-neural network mainly Self Tuning Fuzzy Inference System (STFIS) is used to approximate the unknown system functions and switch item. Finally, the sliding-mode with fuzzy-neural network control is used to control single inverted pendulum and confirms the validity of the proposals. Results of simulations containing tests of robustness are presented and realized in MATLAB environment.","PeriodicalId":192784,"journal":{"name":"2013 IEEE International Conference on Industrial Technology (ICIT)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122876257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-04-23DOI: 10.1109/ICIT.2013.6505934
S. Dasgupta, S. N. Mohan, S. K. Sahoo, S. K. Panda
In this paper, a p-q theory based approach, using Complex Notch Filter, is proposed to control active and reactive power flow of a distributed generator connected to a generalized unbalanced grid. The proposed method facilitates high bandwidth grid power flow control along with maintaining sinusoidal grid currents by finding suitable inverter current references directly in the a-b-c frame. The proposed method is faster than the conventional methods because of the absence of the Phase Lock Loop and Park's transformation requirement. A novel method of extracting the phase angle of the fundamental grid voltage is proposed. A Complex Notch Filter based method for extracting positive and negative sequence components together with filtering grid voltage harmonics is also proposed to reduce the computational burden on the processor. The method is devised for a generalized three-phase system. The proposed method is validated through rigorous tests and experimental results presented depict the efficacy of the proposed method.
{"title":"A complex notch filter based approach to device the control strategy for a generalized unbalanced grid connected distributed generator","authors":"S. Dasgupta, S. N. Mohan, S. K. Sahoo, S. K. Panda","doi":"10.1109/ICIT.2013.6505934","DOIUrl":"https://doi.org/10.1109/ICIT.2013.6505934","url":null,"abstract":"In this paper, a p-q theory based approach, using Complex Notch Filter, is proposed to control active and reactive power flow of a distributed generator connected to a generalized unbalanced grid. The proposed method facilitates high bandwidth grid power flow control along with maintaining sinusoidal grid currents by finding suitable inverter current references directly in the a-b-c frame. The proposed method is faster than the conventional methods because of the absence of the Phase Lock Loop and Park's transformation requirement. A novel method of extracting the phase angle of the fundamental grid voltage is proposed. A Complex Notch Filter based method for extracting positive and negative sequence components together with filtering grid voltage harmonics is also proposed to reduce the computational burden on the processor. The method is devised for a generalized three-phase system. The proposed method is validated through rigorous tests and experimental results presented depict the efficacy of the proposed method.","PeriodicalId":192784,"journal":{"name":"2013 IEEE International Conference on Industrial Technology (ICIT)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122915163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-04-23DOI: 10.1504/IJISE.2014.060823
M. Mutingi, S. Matope
In the real world, the adoption of information technology (IT) innovations is a complex process involving three main entities: (i) promoters, who facilitate the adoption process, (ii) inhibitors, who oppose the adoption of technology, and (iii) imitators who are influenced by both promoters and inhibitors. In the presence of promoters and inhibitors, managing technology innovation and adoption is a complex task. Since most of the IT innovations are characterized by these actors, understanding the dynamics of their diffusion and adoption is imperative. This research seeks to develop a system dynamics model to capture the interactive dynamics of IT adoption in a complex environment involving promoters, inhibitors, and imitators. Based on a set of experiments, we investigate via simulation, the behavior of a typical diffusion and adoption process, drawing useful managerial implications for technology policy makers. What-if analyses experiments are carried out in order to obtain further insights into policy design and evaluation for effective technology management.
{"title":"Dynamics of information technology adoption in a complex environment","authors":"M. Mutingi, S. Matope","doi":"10.1504/IJISE.2014.060823","DOIUrl":"https://doi.org/10.1504/IJISE.2014.060823","url":null,"abstract":"In the real world, the adoption of information technology (IT) innovations is a complex process involving three main entities: (i) promoters, who facilitate the adoption process, (ii) inhibitors, who oppose the adoption of technology, and (iii) imitators who are influenced by both promoters and inhibitors. In the presence of promoters and inhibitors, managing technology innovation and adoption is a complex task. Since most of the IT innovations are characterized by these actors, understanding the dynamics of their diffusion and adoption is imperative. This research seeks to develop a system dynamics model to capture the interactive dynamics of IT adoption in a complex environment involving promoters, inhibitors, and imitators. Based on a set of experiments, we investigate via simulation, the behavior of a typical diffusion and adoption process, drawing useful managerial implications for technology policy makers. What-if analyses experiments are carried out in order to obtain further insights into policy design and evaluation for effective technology management.","PeriodicalId":192784,"journal":{"name":"2013 IEEE International Conference on Industrial Technology (ICIT)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125268322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-04-23DOI: 10.1109/ICIT.2013.6505669
J. Petereit, T. Emter, C. Frey
Safe and efficient path planning for mobile robots in dynamic environments is still a challenging research topic. Most approaches use separate algorithms for global path planning and local obstacle avoidance. Furthermore, planning a path for a sequence of goals is mostly done by planning to each next goal individually. These two strategies generally result in sub-optimal navigation strategies. In this paper, we present an algorithm which addresses these problems in a single combined approach. For this purpose, we model the static and dynamic risk of the environment in a consistent way and propose a novel graph structure based on a state × time × goal lattice with hybrid dimensionality. It allows the joint planning for multiple goals while incorporating collision risk due to dynamic and static obstacles. It computes hybrid solutions which are part trajectory and part path. Finally, we provide some results of our algorithm in action to prove its high quality solutions and real-time capability.
{"title":"Safe mobile robot motion planning for waypoint sequences in a dynamic environment","authors":"J. Petereit, T. Emter, C. Frey","doi":"10.1109/ICIT.2013.6505669","DOIUrl":"https://doi.org/10.1109/ICIT.2013.6505669","url":null,"abstract":"Safe and efficient path planning for mobile robots in dynamic environments is still a challenging research topic. Most approaches use separate algorithms for global path planning and local obstacle avoidance. Furthermore, planning a path for a sequence of goals is mostly done by planning to each next goal individually. These two strategies generally result in sub-optimal navigation strategies. In this paper, we present an algorithm which addresses these problems in a single combined approach. For this purpose, we model the static and dynamic risk of the environment in a consistent way and propose a novel graph structure based on a state × time × goal lattice with hybrid dimensionality. It allows the joint planning for multiple goals while incorporating collision risk due to dynamic and static obstacles. It computes hybrid solutions which are part trajectory and part path. Finally, we provide some results of our algorithm in action to prove its high quality solutions and real-time capability.","PeriodicalId":192784,"journal":{"name":"2013 IEEE International Conference on Industrial Technology (ICIT)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125279948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-04-23DOI: 10.1109/ICIT.2013.6505718
B. Riar, U. Madawala, D. Thrimawithana
The Modular Multi-level Converter (M2LC) topology promises to outperform other known converter topologies in various medium to high voltage applications. The topology requires a control scheme for controlling the voltage across module capacitors. This paper proposes a variant of the M2LC topology, which is based on Inductive Power Transfer (IPT) technology, to maintain the capacitor voltages within tight bounds. The proposed M2LC-IPT topology has the unique ability of independent control of capacitor voltages and load currents, and is even capable of producing a regulated output at low output frequency. To validate the proposed concept, simulated performance of a three-phase, three-level grid connected 2 kVA M2LC-IPT is presented with a discussion. A comparison with a conventional topology is also carried-out to demonstrate the improvements in performance associated with the M2LC-IPT.
{"title":"Analysis and control of a three-phase Modular Multi-level Converter based on Inductive Power Transfer technology (M2LC-IPT)","authors":"B. Riar, U. Madawala, D. Thrimawithana","doi":"10.1109/ICIT.2013.6505718","DOIUrl":"https://doi.org/10.1109/ICIT.2013.6505718","url":null,"abstract":"The Modular Multi-level Converter (M2LC) topology promises to outperform other known converter topologies in various medium to high voltage applications. The topology requires a control scheme for controlling the voltage across module capacitors. This paper proposes a variant of the M2LC topology, which is based on Inductive Power Transfer (IPT) technology, to maintain the capacitor voltages within tight bounds. The proposed M2LC-IPT topology has the unique ability of independent control of capacitor voltages and load currents, and is even capable of producing a regulated output at low output frequency. To validate the proposed concept, simulated performance of a three-phase, three-level grid connected 2 kVA M2LC-IPT is presented with a discussion. A comparison with a conventional topology is also carried-out to demonstrate the improvements in performance associated with the M2LC-IPT.","PeriodicalId":192784,"journal":{"name":"2013 IEEE International Conference on Industrial Technology (ICIT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129992951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-04-23DOI: 10.1109/ICIT.2013.6505846
S. Tamura, S. Taniguchi
This paper proposes a scheme for calculating aggregate values of data owned by anonymous entities. Linear mix-nets, an unknown unique number generator, and anonymous tag based credentials efficiently conceal not only identities of data owners but also linkages between data owned by same entities. Then, the scheme enables quick introduction of advancing information technologies to industrial applications while ensuring confidentiality of sensitive data, e.g. a machine maintenance company can monitor states of machines remotely without knowing secrets of machine owners, companies can outsource even their sensitive tasks without worrying about leaks of their secrets. The scheme is also applicable to tasks in e-governance systems such as tax-collections where privacies of individuals must be preserved.
{"title":"A scheme for collecting anonymous data","authors":"S. Tamura, S. Taniguchi","doi":"10.1109/ICIT.2013.6505846","DOIUrl":"https://doi.org/10.1109/ICIT.2013.6505846","url":null,"abstract":"This paper proposes a scheme for calculating aggregate values of data owned by anonymous entities. Linear mix-nets, an unknown unique number generator, and anonymous tag based credentials efficiently conceal not only identities of data owners but also linkages between data owned by same entities. Then, the scheme enables quick introduction of advancing information technologies to industrial applications while ensuring confidentiality of sensitive data, e.g. a machine maintenance company can monitor states of machines remotely without knowing secrets of machine owners, companies can outsource even their sensitive tasks without worrying about leaks of their secrets. The scheme is also applicable to tasks in e-governance systems such as tax-collections where privacies of individuals must be preserved.","PeriodicalId":192784,"journal":{"name":"2013 IEEE International Conference on Industrial Technology (ICIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129505652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-04-23DOI: 10.1109/ICIT.2013.6505850
D. Brevi, G. Gavilanes, C. Russo, R. Scopigno
Based on a real industrial case, we present a study on the application of WiFi to a delay-critical automation scenario. The primary purpose of the study was the identification of standard-compliant techniques, built on the top of IEEE 802.11, able to optimize the timing performance of the wireless network based on the application specific requirements. Several techniques are compared, all aimed at the consecutive polling of multiple stations by a central monitor node; basically the proposed techniques try to minimize the timing impact of CSMA/CA, proactively preventing collisions and soft synchronizing transmissions at upper layers.
{"title":"Comparison of WiFi-compliant techniques for delay-sensitive wireless monitoring","authors":"D. Brevi, G. Gavilanes, C. Russo, R. Scopigno","doi":"10.1109/ICIT.2013.6505850","DOIUrl":"https://doi.org/10.1109/ICIT.2013.6505850","url":null,"abstract":"Based on a real industrial case, we present a study on the application of WiFi to a delay-critical automation scenario. The primary purpose of the study was the identification of standard-compliant techniques, built on the top of IEEE 802.11, able to optimize the timing performance of the wireless network based on the application specific requirements. Several techniques are compared, all aimed at the consecutive polling of multiple stations by a central monitor node; basically the proposed techniques try to minimize the timing impact of CSMA/CA, proactively preventing collisions and soft synchronizing transmissions at upper layers.","PeriodicalId":192784,"journal":{"name":"2013 IEEE International Conference on Industrial Technology (ICIT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128572840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-04-23DOI: 10.1109/ICIT.2013.6505821
T. Vamsi, N. Kulshrestha, A. Mishra
This paper proposes an efficient and optimized architecture for the hardware implementation of the Kuwahara filter, which is used for edge-preserving noise removal of images. The algorithmic strength of the Kuwahara algorithm has been greatly reduced by various optimizations in the variance computation. A hybrid serial-parallel architecture is designed which takes advantage of the proposed optimizations. This results in a time and hardware efficient architecture. A comparative study of the proposed and traditional implementation has been done to demonstrate the efficacy of the architecture.
{"title":"An optimized implementation architecture for the Kuwahara filter","authors":"T. Vamsi, N. Kulshrestha, A. Mishra","doi":"10.1109/ICIT.2013.6505821","DOIUrl":"https://doi.org/10.1109/ICIT.2013.6505821","url":null,"abstract":"This paper proposes an efficient and optimized architecture for the hardware implementation of the Kuwahara filter, which is used for edge-preserving noise removal of images. The algorithmic strength of the Kuwahara algorithm has been greatly reduced by various optimizations in the variance computation. A hybrid serial-parallel architecture is designed which takes advantage of the proposed optimizations. This results in a time and hardware efficient architecture. A comparative study of the proposed and traditional implementation has been done to demonstrate the efficacy of the architecture.","PeriodicalId":192784,"journal":{"name":"2013 IEEE International Conference on Industrial Technology (ICIT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128678535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}