The paper describes the model of a two flexible joint manipulator and the development of a nonlinear passivity based control method for that model. For dynamic modeling, the Euler-Language approach is selected to model flexible joint manipulator. Since lightweight materials are employed in the construction of manipulator, the assumption that negligible link deformation no longer applies. A nonlinear passivity-based control method for rigid flexible joint as well as flexible link is proposed here. The main idea of Passivity Based Controller (PBC) is to use energy state of a system to provide stabilization. The PBC is developed to achieve two goals: set point regulation and trajectory tracking. The controller brings the end point from unstable position to a certain stable position. Beside that, the controller are developed to control the position of there end-point in such a way that it tracks the desired trajectory which are tested by simulations.
{"title":"Modeling and Control of a Multi Degree of Freedom Flexible Joint Manipulator","authors":"M. Akhtaruzzaman, Rini Akmeliawati, Teh Wai Yee","doi":"10.1109/ICCEE.2009.100","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.100","url":null,"abstract":"The paper describes the model of a two flexible joint manipulator and the development of a nonlinear passivity based control method for that model. For dynamic modeling, the Euler-Language approach is selected to model flexible joint manipulator. Since lightweight materials are employed in the construction of manipulator, the assumption that negligible link deformation no longer applies. A nonlinear passivity-based control method for rigid flexible joint as well as flexible link is proposed here. The main idea of Passivity Based Controller (PBC) is to use energy state of a system to provide stabilization. The PBC is developed to achieve two goals: set point regulation and trajectory tracking. The controller brings the end point from unstable position to a certain stable position. Beside that, the controller are developed to control the position of there end-point in such a way that it tracks the desired trajectory which are tested by simulations.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122364484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The problem of malicious contents in blogs has reached epic proportions and various efforts are underway to fight it. Blog classification using machine learning techniques is a key method towards doing it. We have devised a machine learning algorithm where features are created from individual sentences in the body of a blog by taking one word at a time. Weights are assigned to the features based on the strength of their predictive capabilities for illegitimate/legitimate determination. The predictive capabilities are estimated by the frequency of occurrence of the feature in illegitimate/legitimate collections. During classification, total illegitimate and legitimate evidence in the blog is obtained by summing up the weights of extracted features of each class and the message is classified into whichever class accumulates the greater sum. We compared the algorithm against the popular Naive Bayes algorithm and found its performance does not deteriorate in the least than that of Naive Bayes algorithm both in terms of catching blog spam and for reducing false positives.
{"title":"A New Approach Towards Text Filtering","authors":"Pinky Roy, Amrit Roy, Vineet Thirani","doi":"10.1109/ICCEE.2009.202","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.202","url":null,"abstract":"The problem of malicious contents in blogs has reached epic proportions and various efforts are underway to fight it. Blog classification using machine learning techniques is a key method towards doing it. We have devised a machine learning algorithm where features are created from individual sentences in the body of a blog by taking one word at a time. Weights are assigned to the features based on the strength of their predictive capabilities for illegitimate/legitimate determination. The predictive capabilities are estimated by the frequency of occurrence of the feature in illegitimate/legitimate collections. During classification, total illegitimate and legitimate evidence in the blog is obtained by summing up the weights of extracted features of each class and the message is classified into whichever class accumulates the greater sum. We compared the algorithm against the popular Naive Bayes algorithm and found its performance does not deteriorate in the least than that of Naive Bayes algorithm both in terms of catching blog spam and for reducing false positives.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122543598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Farbod Larki, H. M. Kelk, M. Pishvaei, A. Johar, M. Joorabian
This paper presents a new approach for identification of optimal locations of STATCOM and SVC. The power system operates in stability boundary and system probably loses its stability by occurring disturbance, so considering contingency outage and recognition of voltage instability in allocation of shunt FACTS devices has importance. This paper by considering of power system contingencies based on the effects of them on static voltage stability specifies optimal location for installation SVC and STATCOM. The method for analyze voltage stability is continuation power flow and simulated case studies conducted on Kouzestan power networks in Iran based on the proposed techniques.
{"title":"Optimal Location of STATCOM and SVC Based on Contingency Voltage Stability by Using Continuation Power Flow: Case Studies of Khouzestan Power Networks in Iran","authors":"Farbod Larki, H. M. Kelk, M. Pishvaei, A. Johar, M. Joorabian","doi":"10.1109/ICCEE.2009.84","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.84","url":null,"abstract":"This paper presents a new approach for identification of optimal locations of STATCOM and SVC. The power system operates in stability boundary and system probably loses its stability by occurring disturbance, so considering contingency outage and recognition of voltage instability in allocation of shunt FACTS devices has importance. This paper by considering of power system contingencies based on the effects of them on static voltage stability specifies optimal location for installation SVC and STATCOM. The method for analyze voltage stability is continuation power flow and simulated case studies conducted on Kouzestan power networks in Iran based on the proposed techniques.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122897436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In light of the present situation research on distance learning system at home and abroad, this paper has put forward a new application mode of pattern recognition technology in distance learning system. It can track and judge the learner’s attention by analyzing learner’s face image based on the pattern recognition technology to give the prompt or the warning. This study includes three categories, such as image acquisition, imagery processing and attention analysis. We respectively introduce the implementation method and corresponding algorithm of the three categories in detail. Experimental results show that this study is effective and practical in the application. To a certain extent, it has solved the problem that the learner is scatterbrained and cooperate less positively in distance learning.
{"title":"Study on the Application of Pattern Recognition Technology in Distance Education System","authors":"Tianyang Zheng, Wei Pan, B. Jia","doi":"10.1109/ICCEE.2009.92","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.92","url":null,"abstract":"In light of the present situation research on distance learning system at home and abroad, this paper has put forward a new application mode of pattern recognition technology in distance learning system. It can track and judge the learner’s attention by analyzing learner’s face image based on the pattern recognition technology to give the prompt or the warning. This study includes three categories, such as image acquisition, imagery processing and attention analysis. We respectively introduce the implementation method and corresponding algorithm of the three categories in detail. Experimental results show that this study is effective and practical in the application. To a certain extent, it has solved the problem that the learner is scatterbrained and cooperate less positively in distance learning.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114366884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Starting with the information requirement of enterprises' technological innovation, this paper analyzes public service of science and technology information which includes three aspects—research on the development strategies of the industries, information provision of enterprises' technological innovation and support of the management ability of enterprises' technological innovation. Then it constructs the model of public service of science and technology information, using the actual effect of public service of science and technology information in Hunan Province proves its feasibility. Finally, it prospects the future development of public service of science and technology information.
{"title":"Research on the Mode of Public Service of Science and Technology Information Based on Enterprises' Technological Innovation in China","authors":"Jian Luo, Xuekui Xiao, Min Shi","doi":"10.1109/ICCEE.2009.161","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.161","url":null,"abstract":"Starting with the information requirement of enterprises' technological innovation, this paper analyzes public service of science and technology information which includes three aspects—research on the development strategies of the industries, information provision of enterprises' technological innovation and support of the management ability of enterprises' technological innovation. Then it constructs the model of public service of science and technology information, using the actual effect of public service of science and technology information in Hunan Province proves its feasibility. Finally, it prospects the future development of public service of science and technology information.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121969561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Three different types of microstrip patch antennas are designed and simulated using High Frequency Structure Simulator (HFSS) software. All these antennas are designed at 10GHz in the range of X-band. A comparative analysis of designed antennas is presented.
{"title":"Gain and Bandwidth Enhancement of Patch Antenna Fed by Coplanar Waveguide at 10GHz","authors":"Faisal Habib, M. Zafrullah, Muhammad Khawar Islam","doi":"10.1109/ICCEE.2009.203","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.203","url":null,"abstract":"Three different types of microstrip patch antennas are designed and simulated using High Frequency Structure Simulator (HFSS) software. All these antennas are designed at 10GHz in the range of X-band. A comparative analysis of designed antennas is presented.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"28 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116593715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes a novel architecture for sampling rate converter of the demodulator for processing satellite data communication. The overall receiver algorithm is divided into two parts: one to be implemented on an FPGA and the other on a DSP processor. A new distributed arithmetic based architecture for implementing a Sampling Rate Converter is also proposed. The main advantage of this architecture is that it does not employ any MAC unit, whose operational speed is, generally, a bottleneck for high filter throughput. Instead, it makes extensive use of LUTs and hence is ideally suited for FPGA implementation. The main design goals in this work were to maintain low system complexity and reduce power consumption and chip area requirements.
{"title":"Design of Architecture for Sampling Rate Converter of Demodulator","authors":"K. Nataraj, S. Ramachandran, B. S. Nagabushan","doi":"10.1109/ICCEE.2009.262","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.262","url":null,"abstract":"This paper proposes a novel architecture for sampling rate converter of the demodulator for processing satellite data communication. The overall receiver algorithm is divided into two parts: one to be implemented on an FPGA and the other on a DSP processor. A new distributed arithmetic based architecture for implementing a Sampling Rate Converter is also proposed. The main advantage of this architecture is that it does not employ any MAC unit, whose operational speed is, generally, a bottleneck for high filter throughput. Instead, it makes extensive use of LUTs and hence is ideally suited for FPGA implementation. The main design goals in this work were to maintain low system complexity and reduce power consumption and chip area requirements.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129360324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Grid is concerned with the sharing and coordinated use of diverse resources in distributed "virtual organizations.” The dynamic and multi-institutional nature of these environments introduces challenging security issues that demand new technical approaches. In particular, one must deal with diverse local mechanisms, support dynamic creation of services, and enable dynamic creation of trust domains. As Grid services are adopted and applied widely, as definition of an organizational boundary fade away in support of virtual organizations, as virtual organizations continue to evolve to support intermediaries such as firewalls, load balancers, and messaging hubs, and as awareness of the threats organizations face becomes more well understood, the need for a security model within Grid services grows clear. This paper reflects the challenges and requirements we have identified in a Grid environment. Based on those requirements, the proposed security architecture, by extending and leveraging (rather than replacing) existing security technology and assets, will enable businesses and organizations to more rapidly develop secure, interoperable Grid services. Because of the important role of message in Grid services, we limit our scope to message level security when developing our security model.
{"title":"Message-Based Security Model for Grid Services","authors":"Azadeh Iranmehr, Arya Iranmehr, M.B. Sharifnia","doi":"10.1109/ICCEE.2009.244","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.244","url":null,"abstract":"Grid is concerned with the sharing and coordinated use of diverse resources in distributed \"virtual organizations.” The dynamic and multi-institutional nature of these environments introduces challenging security issues that demand new technical approaches. In particular, one must deal with diverse local mechanisms, support dynamic creation of services, and enable dynamic creation of trust domains. As Grid services are adopted and applied widely, as definition of an organizational boundary fade away in support of virtual organizations, as virtual organizations continue to evolve to support intermediaries such as firewalls, load balancers, and messaging hubs, and as awareness of the threats organizations face becomes more well understood, the need for a security model within Grid services grows clear. This paper reflects the challenges and requirements we have identified in a Grid environment. Based on those requirements, the proposed security architecture, by extending and leveraging (rather than replacing) existing security technology and assets, will enable businesses and organizations to more rapidly develop secure, interoperable Grid services. Because of the important role of message in Grid services, we limit our scope to message level security when developing our security model.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"230 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126798243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Shahgholian, Pegah Shafaghi, Sepehr Moalem, M. Mahdavian
The aim of this paper is dynamic modeling and analysis of STATCOM for a single-machine infinite-bus (SMIB) power system. Also the study the applicability of PID type in dynamic performance enhancement with eigenvalue analysis is shown. Non-linear and linear models of a single machine have been derived. The STATCOM is modeled as a reactive current source with a time delay. A comparative study for two control inputs, one in the speed loop and the other in the voltage loop, for STATCOM controller using eigenvalues analysis is shown.
{"title":"Damping Power System Oscillations in Single-Machine Infinite-Bus Power System Using a STATCOM","authors":"G. Shahgholian, Pegah Shafaghi, Sepehr Moalem, M. Mahdavian","doi":"10.1109/ICCEE.2009.30","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.30","url":null,"abstract":"The aim of this paper is dynamic modeling and analysis of STATCOM for a single-machine infinite-bus (SMIB) power system. Also the study the applicability of PID type in dynamic performance enhancement with eigenvalue analysis is shown. Non-linear and linear models of a single machine have been derived. The STATCOM is modeled as a reactive current source with a time delay. A comparative study for two control inputs, one in the speed loop and the other in the voltage loop, for STATCOM controller using eigenvalues analysis is shown.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"1049 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123148950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Transient Visual Evoked Potential (TVEP) is an important diagnostic test for specific ophthalmologic and neurological disorders. Normally the procedure time to perform TVEP takes about 30 to 60 minutes. In order to reduce the procedure time, we use to go for higher rate to stimulation. In this paper we present the comparative study on effect of rate of stimulation on TVEP using Magnitude and Phase spectral analysis. It has been shown that both the measures having the positive correlation with the rate of stimulation.
{"title":"Analysis of Transient Visual Evoked Potential at Different Rate of Stimulation","authors":"R. Sivakumar","doi":"10.1109/ICCEE.2009.69","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.69","url":null,"abstract":"Transient Visual Evoked Potential (TVEP) is an important diagnostic test for specific ophthalmologic and neurological disorders. Normally the procedure time to perform TVEP takes about 30 to 60 minutes. In order to reduce the procedure time, we use to go for higher rate to stimulation. In this paper we present the comparative study on effect of rate of stimulation on TVEP using Magnitude and Phase spectral analysis. It has been shown that both the measures having the positive correlation with the rate of stimulation.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121659205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}