首页 > 最新文献

2009 Second International Conference on Computer and Electrical Engineering最新文献

英文 中文
GLS Optimization Algorithm for Solving Travelling Salesman Problem 求解旅行商问题的GLS优化算法
Pub Date : 2009-12-28 DOI: 10.1109/ICCEE.2009.102
Nourolhoda Alemi Neissi, M. Mazloom
Travelling salesman problem (TSP) is well known as one of the combinatorial optimization problems. There are many approaches for finding solution to the TSP. In this paper we used combination of local search heuristics and genetic algorithm (GLS) that has been shown to be an efficient algorithm for finding near optimal to the TSP. We also evaluate the run time behavior and fitness of our approach and compare it with other methods. A reasonable result is obtained and the proposed algorithm is able to get to a better solution in less time.
旅行商问题(TSP)是组合优化问题中的一种。寻找TSP的解决方案有许多方法。在本文中,我们将局部搜索启发式和遗传算法(GLS)相结合,这已被证明是一种有效的算法来寻找接近最优的TSP。我们还评估了我们的方法的运行时行为和适应度,并将其与其他方法进行了比较。结果表明,该算法能够在较短的时间内得到较好的解。
{"title":"GLS Optimization Algorithm for Solving Travelling Salesman Problem","authors":"Nourolhoda Alemi Neissi, M. Mazloom","doi":"10.1109/ICCEE.2009.102","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.102","url":null,"abstract":"Travelling salesman problem (TSP) is well known as one of the combinatorial optimization problems. There are many approaches for finding solution to the TSP. In this paper we used combination of local search heuristics and genetic algorithm (GLS) that has been shown to be an efficient algorithm for finding near optimal to the TSP. We also evaluate the run time behavior and fitness of our approach and compare it with other methods. A reasonable result is obtained and the proposed algorithm is able to get to a better solution in less time.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117133379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Surge control of natural gas centrifugal compressor 天然气离心式压缩机喘振控制
Pub Date : 2009-12-28 DOI: 10.1109/ICCEE.2009.112
D. Mudroncík, P. Tanuška, Martin Galik
The paper presents the design of control system for centrifugal compressor surge avoidance. The presented solution of the surge problem is illustrated on an example of real application.
介绍了离心式压缩机防喘振控制系统的设计。通过一个实际应用实例说明了所提出的电涌问题的解决方法。
{"title":"Surge control of natural gas centrifugal compressor","authors":"D. Mudroncík, P. Tanuška, Martin Galik","doi":"10.1109/ICCEE.2009.112","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.112","url":null,"abstract":"The paper presents the design of control system for centrifugal compressor surge avoidance. The presented solution of the surge problem is illustrated on an example of real application.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115009263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Power Amplifiers Linearization Based on Digital Predistortion with Memory Effects 基于记忆效应的数字预失真功率放大器线性化
Pub Date : 2009-12-28 DOI: 10.1109/ICCEE.2009.141
A. Barahimi, S. Mirzakuchaki, Saeid Karami
Power amplifiers require linearization in order to reduce adjacent inter-modulation distortion without losing efficiency. Digital predistortion is a cost effective method to achieve this goal and it needs an accurate model of the amplifier. Most of the amplifier models are based on memoryless modeling. This kind of modeling is simple but it’s not accurate enough if linearization is important; and also for wide band modulations like QAM, we should consider the memory effects of power amplifiers.
功率放大器需要线性化,以便在不损失效率的情况下减少相邻的调制间失真。数字预失真是实现这一目标的一种经济有效的方法,它需要一个精确的放大器模型。大多数放大器模型都是基于无内存建模的。这种建模很简单,但如果线性化很重要,它就不够精确;对于像QAM这样的宽带调制,我们应该考虑功率放大器的记忆效应。
{"title":"Power Amplifiers Linearization Based on Digital Predistortion with Memory Effects","authors":"A. Barahimi, S. Mirzakuchaki, Saeid Karami","doi":"10.1109/ICCEE.2009.141","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.141","url":null,"abstract":"Power amplifiers require linearization in order to reduce adjacent inter-modulation distortion without losing efficiency. Digital predistortion is a cost effective method to achieve this goal and it needs an accurate model of the amplifier. Most of the amplifier models are based on memoryless modeling. This kind of modeling is simple but it’s not accurate enough if linearization is important; and also for wide band modulations like QAM, we should consider the memory effects of power amplifiers.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124744701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Text Steganography System Using Font Color of the Invisible Characters in Microsoft Word Documents 一种利用Microsoft Word文档中不可见字符字体颜色的文本隐写系统
Pub Date : 2009-12-28 DOI: 10.1109/ICCEE.2009.127
Md. Khairullah
Steganography can be defined as a method of hiding data within a cover media so that other individuals fail to realize their existence. Image, audio and video are some popular media for steganography. But text is ideal for steganography due to its ubiquity and smaller size compared to these media. However, text communication channels do not necessarily provide sufficient redundancy for covert communication. In this paper, a new approach for steganography in Microsoft Word documents is proposed. The main idea is that setting any foreground color for invisible characters such as the space or the carriage return is not reflected or viewed in the document.
隐写术可以定义为一种将数据隐藏在掩护介质内的方法,使其他人无法意识到它们的存在。图像、音频和视频是常用的隐写技术。但是文本是理想的隐写术,因为它无处不在,与这些媒体相比尺寸更小。然而,文本通信信道并不一定能为隐蔽通信提供足够的冗余。本文提出了一种新的Microsoft Word文档隐写方法。其主要思想是,为不可见字符(如空格或回车)设置任何前景色都不会在文档中反映或查看。
{"title":"A Novel Text Steganography System Using Font Color of the Invisible Characters in Microsoft Word Documents","authors":"Md. Khairullah","doi":"10.1109/ICCEE.2009.127","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.127","url":null,"abstract":"Steganography can be defined as a method of hiding data within a cover media so that other individuals fail to realize their existence. Image, audio and video are some popular media for steganography. But text is ideal for steganography due to its ubiquity and smaller size compared to these media. However, text communication channels do not necessarily provide sufficient redundancy for covert communication. In this paper, a new approach for steganography in Microsoft Word documents is proposed. The main idea is that setting any foreground color for invisible characters such as the space or the carriage return is not reflected or viewed in the document.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124822691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Student Project Allocation with Preference Lists over (Student, Project) Pairs 学生专题分配偏好列表超过(学生,专题)对
Pub Date : 2009-12-28 DOI: 10.1109/ICCEE.2009.63
Ahmed H. Abu El-Atta, M. Moussa
Student project allocations models (SPA) in which lecturers have preferences over students (projects) have been studied in [2, 3]. We present new method to construct a general student project allocation model (SPA-(s, p)) in which the lecturers have preference lists over pairs (student, project), and the students have preference lists over projects. SPA-(s, p) is turned out to be very useful in combination between the student project allocation models with preference lists over students (or projects). Our model proposes several ways to construct the lecturer's preference lists which give us higher efficiency and accurate results. Furthermore, we present algorithmic issues for SPA-(s, p), the algorithm yields a stable matching of students to projects, which respects the preference lists and capacity constraints.
[2,3]研究了讲师对学生(项目)有偏好的学生项目分配模型(SPA)。我们提出了一种新的方法来构建一个一般的学生项目分配模型(SPA-(s, p)),其中讲师对配对(学生,项目)有偏好列表,学生对项目有偏好列表。SPA-(s, p)在学生项目分配模型与学生(或项目)偏好列表的组合中非常有用。我们的模型提出了几种构建讲师偏好列表的方法,使我们的效率更高,结果更准确。此外,我们提出了SPA-(s, p)的算法问题,该算法产生学生与项目的稳定匹配,这尊重偏好列表和容量约束。
{"title":"Student Project Allocation with Preference Lists over (Student, Project) Pairs","authors":"Ahmed H. Abu El-Atta, M. Moussa","doi":"10.1109/ICCEE.2009.63","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.63","url":null,"abstract":"Student project allocations models (SPA) in which lecturers have preferences over students (projects) have been studied in [2, 3]. We present new method to construct a general student project allocation model (SPA-(s, p)) in which the lecturers have preference lists over pairs (student, project), and the students have preference lists over projects. SPA-(s, p) is turned out to be very useful in combination between the student project allocation models with preference lists over students (or projects). Our model proposes several ways to construct the lecturer's preference lists which give us higher efficiency and accurate results. Furthermore, we present algorithmic issues for SPA-(s, p), the algorithm yields a stable matching of students to projects, which respects the preference lists and capacity constraints.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122502886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
A New System Design of Network Invasion Forensics 网络入侵取证新系统设计
Pub Date : 2009-12-28 DOI: 10.1109/ICCEE.2009.257
Hou Ming, Lizhong Shen
With the development and progress of science and technology, human are coming into information society, the data safety problem which is brought by rapid development of computer technology has become an outstanding problem. A system structure model of network invasion forensics is designed in this text. The model analyze the invasion detecting, at the mean time, collect all network data of target system to support network forensics, realizing on-line invasion detecting, off-line forensics analysis. This text elaborates the system architecture of model and discusses the model characteristics and existing problem.
随着科学技术的发展和进步,人类进入了信息社会,计算机技术的飞速发展所带来的数据安全问题已经成为一个突出的问题。本文设计了网络入侵取证的系统结构模型。该模型对入侵检测进行分析,同时收集目标系统的所有网络数据,支持网络取证,实现在线入侵检测、离线取证分析。本文阐述了模型的系统架构,讨论了模型的特点和存在的问题。
{"title":"A New System Design of Network Invasion Forensics","authors":"Hou Ming, Lizhong Shen","doi":"10.1109/ICCEE.2009.257","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.257","url":null,"abstract":"With the development and progress of science and technology, human are coming into information society, the data safety problem which is brought by rapid development of computer technology has become an outstanding problem. A system structure model of network invasion forensics is designed in this text. The model analyze the invasion detecting, at the mean time, collect all network data of target system to support network forensics, realizing on-line invasion detecting, off-line forensics analysis. This text elaborates the system architecture of model and discusses the model characteristics and existing problem.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122551796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Parallelizing Motion JPEG 2000 with CUDA 并行运动JPEG 2000与CUDA
Pub Date : 2009-12-28 DOI: 10.1109/ICCEE.2009.277
S. Datla, Naga Sathish Gidijala
Due to the rapid growth of Graphics Processing Unit (GPU) processing capability, using GPU as a coprocessor for assisting the CPU in computing massive data has become indispensable. Nvidia’s CUDA general-purpose graphical processing unit (GPGPU) architecture can greatly benefit single instruction multiple thread (SIMT) styled, computationally expensive programs. Video encoding, to an extent, is an excellent example of such an application which can see impressive performance gains from CUDA optimization. This paper details the experience of porting the motion JPEG 2000 reference encoder to the CUDA architecture. Each major structural/computational unit of JPEG 2000 is discussed in the CUDA framework and the results are provided wherever required. Our experimental results demonstrate that the CUDA based implementation works 20.7 times faster than the original implementation on the CPU.
随着图形处理单元(Graphics Processing Unit, GPU)处理能力的快速增长,使用GPU作为协处理器来辅助CPU进行海量数据的计算已经变得必不可少。英伟达的CUDA通用图形处理单元(GPGPU)架构可以极大地有利于单指令多线程(SIMT)风格的计算昂贵的程序。视频编码,在某种程度上,是这样一个应用程序的一个很好的例子,可以看到令人印象深刻的性能提升从CUDA优化。本文详细介绍了将运动JPEG 2000参考编码器移植到CUDA架构的经验。在CUDA框架中讨论了JPEG 2000的每个主要结构/计算单元,并在需要的地方提供了结果。我们的实验结果表明,基于CUDA的实现比CPU上的原始实现快20.7倍。
{"title":"Parallelizing Motion JPEG 2000 with CUDA","authors":"S. Datla, Naga Sathish Gidijala","doi":"10.1109/ICCEE.2009.277","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.277","url":null,"abstract":"Due to the rapid growth of Graphics Processing Unit (GPU) processing capability, using GPU as a coprocessor for assisting the CPU in computing massive data has become indispensable. Nvidia’s CUDA general-purpose graphical processing unit (GPGPU) architecture can greatly benefit single instruction multiple thread (SIMT) styled, computationally expensive programs. Video encoding, to an extent, is an excellent example of such an application which can see impressive performance gains from CUDA optimization. This paper details the experience of porting the motion JPEG 2000 reference encoder to the CUDA architecture. Each major structural/computational unit of JPEG 2000 is discussed in the CUDA framework and the results are provided wherever required. Our experimental results demonstrate that the CUDA based implementation works 20.7 times faster than the original implementation on the CPU.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124165793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Reference Point and Orientation Detection of Fingerprints 指纹参考点和方向检测
Pub Date : 2009-12-28 DOI: 10.1109/ICCEE.2009.153
S. Mohammadi, A. Farajzadeh
In this paper we suggest a novel approach for detection of a unique reference point and computation of a unique reference orientation of fingerprints for feature extraction in polar coordinates. After finding orientation field of the fingerprint the curvature measurement is done on the result. By using this information it is possible to determine the exact location of the singular points. Based on this information finally the reference point and reference orientation will be obtained. The proposed method is of high accuracy and performance and at the meantime tolerates displacement and rotation of the input fingerprint. This can be applied to all classes of fingerprints especially to problematic arch class ones.
在本文中,我们提出了一种新的方法来检测唯一参考点和计算唯一参考方向的指纹在极坐标下的特征提取。找到指纹的方向场后,对结果进行曲率测量。利用这些信息,就有可能确定奇异点的确切位置。最后根据这些信息得到参考点和参考方向。该方法精度高,性能好,同时能承受输入指纹的位移和旋转。这可以应用于所有类别的指纹,特别是有问题的拱形类指纹。
{"title":"Reference Point and Orientation Detection of Fingerprints","authors":"S. Mohammadi, A. Farajzadeh","doi":"10.1109/ICCEE.2009.153","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.153","url":null,"abstract":"In this paper we suggest a novel approach for detection of a unique reference point and computation of a unique reference orientation of fingerprints for feature extraction in polar coordinates. After finding orientation field of the fingerprint the curvature measurement is done on the result. By using this information it is possible to determine the exact location of the singular points. Based on this information finally the reference point and reference orientation will be obtained. The proposed method is of high accuracy and performance and at the meantime tolerates displacement and rotation of the input fingerprint. This can be applied to all classes of fingerprints especially to problematic arch class ones.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130182192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Advanced Encryption Standard Implemented on FPGA 基于FPGA实现的高级加密标准
Pub Date : 2009-12-28 DOI: 10.1109/ICCEE.2009.231
Sujatha Hiremath, M. Suma
Advanced Encryption Standard (AES), a Federal Information Processing Standard (FIPS), and categorized as Computer Security Standard. The AES algorithm is a block cipher that can encrypt and decrypt digital information. The AES algorithm is capable of using cryptographic keys of 128, 192, and 256 bits. The Rijndael cipher has been selected as the official Advanced Encryption Standard (AES) and it is well suited for hardware. This paper talks of AES 128 bit block and 128 bit cipher key and is implemented on Spartan 3 FPGA. Synthesis results in the use of 2509 slices, 712 Flip flops, and 4762- 4 input Look Up Tables. The design target is optimization of speed and cost.
高级加密标准(AES),联邦信息处理标准(FIPS),并归类为计算机安全标准。AES算法是一种分组密码,可以对数字信息进行加密和解密。AES算法可以使用128位、192位和256位的密钥。Rijndael密码已被选为官方高级加密标准(AES),它非常适合硬件。本文讨论了AES 128位分组和128位密钥,并在Spartan 3 FPGA上实现。合成结果使用了2509个切片,712个触发器和4762- 4个输入查找表。设计目标是速度和成本的优化。
{"title":"Advanced Encryption Standard Implemented on FPGA","authors":"Sujatha Hiremath, M. Suma","doi":"10.1109/ICCEE.2009.231","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.231","url":null,"abstract":"Advanced Encryption Standard (AES), a Federal Information Processing Standard (FIPS), and categorized as Computer Security Standard. The AES algorithm is a block cipher that can encrypt and decrypt digital information. The AES algorithm is capable of using cryptographic keys of 128, 192, and 256 bits. The Rijndael cipher has been selected as the official Advanced Encryption Standard (AES) and it is well suited for hardware. This paper talks of AES 128 bit block and 128 bit cipher key and is implemented on Spartan 3 FPGA. Synthesis results in the use of 2509 slices, 712 Flip flops, and 4762- 4 input Look Up Tables. The design target is optimization of speed and cost.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124640291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Diagnosis and Detection of Short-Circuit in a Three-Phase Induction Machine 三相感应电机短路的诊断与检测
Pub Date : 2009-12-28 DOI: 10.1109/ICCEE.2009.113
Y. Soufi, T. Bahi, Mohamed Faouzi Harkat, H. Merabet
Due to its simple construction, low cost, manufacture, and its robustness. The use of induction motors is rapidly and increasingly growing in the industry especially in highly important sectors. This leads us to a serious focus on their operation and their availability. The early detection for motor deterioration can increase plant availability and safety in economical way, help to avoid expensive failures, reduce coasts and the fault number. Many publications have investigated the detection and diagnosis of short circuit fault in electrical machines supplied directly online. This paper presents a technique based on spectral analysis of stator currents to detect short-circuit fault in the stator using a mathematical model of three-phase squirrel cage induction motor under stator short-circuit fault. The simulation show the impact and the effectiveness of failure. The tests are validated by numerical simulation and the obtained results clearly show the possibility of extracting signatures to detect and locate faults.
由于其结构简单,成本低,制造方便,坚固耐用。感应电机的使用在工业中迅速增长,特别是在高度重要的部门。这导致我们认真关注它们的操作和可用性。电动机劣化的早期检测可以以经济的方式提高设备的可用性和安全性,有助于避免昂贵的故障,减少损失和故障数量。许多出版物对在线直供电机短路故障的检测与诊断进行了研究。本文利用三相鼠笼式异步电动机定子短路故障的数学模型,提出了一种基于定子电流谱分析的定子短路故障检测技术。仿真结果表明了故障的影响和有效性。通过数值模拟验证了试验结果,结果清楚地表明了提取特征来检测和定位故障的可能性。
{"title":"Diagnosis and Detection of Short-Circuit in a Three-Phase Induction Machine","authors":"Y. Soufi, T. Bahi, Mohamed Faouzi Harkat, H. Merabet","doi":"10.1109/ICCEE.2009.113","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.113","url":null,"abstract":"Due to its simple construction, low cost, manufacture, and its robustness. The use of induction motors is rapidly and increasingly growing in the industry especially in highly important sectors. This leads us to a serious focus on their operation and their availability. The early detection for motor deterioration can increase plant availability and safety in economical way, help to avoid expensive failures, reduce coasts and the fault number. Many publications have investigated the detection and diagnosis of short circuit fault in electrical machines supplied directly online. This paper presents a technique based on spectral analysis of stator currents to detect short-circuit fault in the stator using a mathematical model of three-phase squirrel cage induction motor under stator short-circuit fault. The simulation show the impact and the effectiveness of failure. The tests are validated by numerical simulation and the obtained results clearly show the possibility of extracting signatures to detect and locate faults.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130602639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2009 Second International Conference on Computer and Electrical Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1