Pub Date : 2014-05-14DOI: 10.1109/ECTICON.2014.6839863
P. Aree, Somboon Lhaksup
Self-excited induction generators (SEIG) are mostly exploited in isolated areas to generate electrical energy. Analyzing of a stand-alone SEIG dynamic performance is largely limited application of the SEIG to static load. This paper presents dynamic simulation of small SEIG feeding induction motor (IM) load. Mathematical models of SEIG, IM, and wind turbine are clearly implemented into Matlab/Simulink environment. The study results reveal that a great dip in SEIG voltage occurs when the IM load is suddenly connected to the SEIG since the excitation capacitor cannot provide sufficient reactive power support. By applying an additional paralleled-motor capacitor, the SEIG voltage dip can be alleviated and a faster acceleration of the IM load can be obtained.
{"title":"Dynamic simulation of self-excited induction generator feeding motor load using Matlab/Simulink","authors":"P. Aree, Somboon Lhaksup","doi":"10.1109/ECTICON.2014.6839863","DOIUrl":"https://doi.org/10.1109/ECTICON.2014.6839863","url":null,"abstract":"Self-excited induction generators (SEIG) are mostly exploited in isolated areas to generate electrical energy. Analyzing of a stand-alone SEIG dynamic performance is largely limited application of the SEIG to static load. This paper presents dynamic simulation of small SEIG feeding induction motor (IM) load. Mathematical models of SEIG, IM, and wind turbine are clearly implemented into Matlab/Simulink environment. The study results reveal that a great dip in SEIG voltage occurs when the IM load is suddenly connected to the SEIG since the excitation capacitor cannot provide sufficient reactive power support. By applying an additional paralleled-motor capacitor, the SEIG voltage dip can be alleviated and a faster acceleration of the IM load can be obtained.","PeriodicalId":347166,"journal":{"name":"2014 11th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125894388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-14DOI: 10.1109/ECTICON.2014.6839891
Pumipong Duangtang, P. Krachodnok, R. Wongsan
This paper presents the study of the new exciting method for improving gain of the conventional conical horn at C-band frequency by using mushroom-like Electromagnetic Band Gap (EBG). The important technique of this paper is to use the basic mushroom-like Electromagnetic Band Gap (EBG) on circular plate and connected to waveguide/coaxial adapter. From the study, we found that such technique can provide the better gain and small size when compare to the conventional conical horn antenna. From the simulated results by using the licensed Computational Simulation Software (CST), we found that this technique provides the gain around 19.3 dBi.
{"title":"Gain improvement for conventional conical horn by using mushroom-like electromagnetic band gap","authors":"Pumipong Duangtang, P. Krachodnok, R. Wongsan","doi":"10.1109/ECTICON.2014.6839891","DOIUrl":"https://doi.org/10.1109/ECTICON.2014.6839891","url":null,"abstract":"This paper presents the study of the new exciting method for improving gain of the conventional conical horn at C-band frequency by using mushroom-like Electromagnetic Band Gap (EBG). The important technique of this paper is to use the basic mushroom-like Electromagnetic Band Gap (EBG) on circular plate and connected to waveguide/coaxial adapter. From the study, we found that such technique can provide the better gain and small size when compare to the conventional conical horn antenna. From the simulated results by using the licensed Computational Simulation Software (CST), we found that this technique provides the gain around 19.3 dBi.","PeriodicalId":347166,"journal":{"name":"2014 11th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129438482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-14DOI: 10.1109/ECTICON.2014.6839810
Supaporn Tantanasiriwong, C. Haruechaiyasak
Recommending information across domains has recently gained much attention among research and academic communities. Traditionally, a cross-domain recommender system has emerged to assist users in finding relevant information from the target domain given the initial information from the source domain. However, in the area of citation recommendation, mapping terms across different domains could be problematic due to the term mismatch. In this paper, we propose a cross-domain citation recommendation framework to suggest relevant research publications given a patent as the source domain. Two main approaches are implemented and compared in this study. The first is a baseline approach which is based on simple keyword mapping technique. The second approach, Co-Citation Selection (CCS), is based on the collaborative filtering in which neighboring papers is selected and weighted into publication citation prediction. To compare between two approaches, we adopt the Cosine, Jaccard, and KL-Divergence as the similarity measurement. The evaluation results are reported in terms of mean precision, recall, F-measure, and reciprocal rank. The best improvement of 22.6% in mean reciprocal rank was achieved with the Jaccard similarity.
{"title":"Cross-domain citation recommendation based on Co-Citation Selection","authors":"Supaporn Tantanasiriwong, C. Haruechaiyasak","doi":"10.1109/ECTICON.2014.6839810","DOIUrl":"https://doi.org/10.1109/ECTICON.2014.6839810","url":null,"abstract":"Recommending information across domains has recently gained much attention among research and academic communities. Traditionally, a cross-domain recommender system has emerged to assist users in finding relevant information from the target domain given the initial information from the source domain. However, in the area of citation recommendation, mapping terms across different domains could be problematic due to the term mismatch. In this paper, we propose a cross-domain citation recommendation framework to suggest relevant research publications given a patent as the source domain. Two main approaches are implemented and compared in this study. The first is a baseline approach which is based on simple keyword mapping technique. The second approach, Co-Citation Selection (CCS), is based on the collaborative filtering in which neighboring papers is selected and weighted into publication citation prediction. To compare between two approaches, we adopt the Cosine, Jaccard, and KL-Divergence as the similarity measurement. The evaluation results are reported in terms of mean precision, recall, F-measure, and reciprocal rank. The best improvement of 22.6% in mean reciprocal rank was achieved with the Jaccard similarity.","PeriodicalId":347166,"journal":{"name":"2014 11th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON)","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123746645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-14DOI: 10.1109/ECTICON.2014.6839830
N. Soontranon, Panu Srestasathiern, P. Rakwatin
In this paper, a software program is developed to monitor rice growing stages. Images are required as input data for the software. Using field server equipment, the images are obtained from two rice fields located in Suphanburi and Roi Et provinces, Thailand. Each daily image covers approximately 100 × 100 m2 recorded by 720 × 480 pixels. Typically, a rice growing cycle is separated by three stages; seedling, tillering and heading. To define each stage, vegetation index is used for monitoring and analysing. In the prototype software, the vegetation index is computed from visible RGB channels. Our proposed diagram is described by three steps. a) Rice field segmentation is an initial step used to segment rice field region from the other regions (landscape, sky). b) Vegetation index computation is a measurement, which measures the levels of live green plants on the rice field region. c) Graph analysis is an algorithm used to determine and separate the rice growing stages. The experiments compared three vegetation indices; ExG-Excessive Green, NGRDI-Normalized Green Red Difference Index and ExGR-difference of ExG and ExR (Excessive Red). Relying on the images obtained from the field server, we found that the rice growing stages are able to monitor by using ExG index which is more efficient than the other two.
{"title":"Rice growing stage monitoring in small-scale region using ExG vegetation index","authors":"N. Soontranon, Panu Srestasathiern, P. Rakwatin","doi":"10.1109/ECTICON.2014.6839830","DOIUrl":"https://doi.org/10.1109/ECTICON.2014.6839830","url":null,"abstract":"In this paper, a software program is developed to monitor rice growing stages. Images are required as input data for the software. Using field server equipment, the images are obtained from two rice fields located in Suphanburi and Roi Et provinces, Thailand. Each daily image covers approximately 100 × 100 m2 recorded by 720 × 480 pixels. Typically, a rice growing cycle is separated by three stages; seedling, tillering and heading. To define each stage, vegetation index is used for monitoring and analysing. In the prototype software, the vegetation index is computed from visible RGB channels. Our proposed diagram is described by three steps. a) Rice field segmentation is an initial step used to segment rice field region from the other regions (landscape, sky). b) Vegetation index computation is a measurement, which measures the levels of live green plants on the rice field region. c) Graph analysis is an algorithm used to determine and separate the rice growing stages. The experiments compared three vegetation indices; ExG-Excessive Green, NGRDI-Normalized Green Red Difference Index and ExGR-difference of ExG and ExR (Excessive Red). Relying on the images obtained from the field server, we found that the rice growing stages are able to monitor by using ExG index which is more efficient than the other two.","PeriodicalId":347166,"journal":{"name":"2014 11th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON)","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122568068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-14DOI: 10.1109/ECTICON.2014.6839727
T. Seesaard, Sasiprapa Seaon, C. Khunarak, P. Lorwongtragool, T. Kerdcharoen
Thread-based gas sensor based on poly (styrenecomaleic acid) partial isobutyl/methyl mixed ester and multi-walled carbon nanotube (PSE/MWCNT) nanocomposite for NH3 detection has been designed and created from two simple processes; crochet and immersion (dip) coating processes. This new dimension of fabric-based gas sensors fabrication is suitable for integrating directly into the flexible substrates to be applied as wearable gas detection instruments such as gas-protective clothing, gas safety shoes and gas masks. Soft materials which do not irritate the wearer have been used for this sensor. This work opens a new perspective that overcomes the well-known limitation for creating a fabric-based gas sensor such as the complexity of the production process, high cost and high power consumption in operating. Thus it leads to an innovative integration between science and smart art. As a result, we can make a cheap wireless gas detector based on Xbee communication technology, with low power consumption. This sensor was tested for its selectivity and sensitivity performance toward several volatile compounds, namely ammonia, pyridine, acetic acid, ethanol and acetone. The results revealed that this sensor has higher sensitivity and specificity to NH3 than other gases. It is possible to monitor NH3 until it reaches a concentration of 5 ppm and also has the ability to recover as well.
{"title":"A novel creation of thread-based ammonia gas sensors for wearable wireless security system","authors":"T. Seesaard, Sasiprapa Seaon, C. Khunarak, P. Lorwongtragool, T. Kerdcharoen","doi":"10.1109/ECTICON.2014.6839727","DOIUrl":"https://doi.org/10.1109/ECTICON.2014.6839727","url":null,"abstract":"Thread-based gas sensor based on poly (styrenecomaleic acid) partial isobutyl/methyl mixed ester and multi-walled carbon nanotube (PSE/MWCNT) nanocomposite for NH3 detection has been designed and created from two simple processes; crochet and immersion (dip) coating processes. This new dimension of fabric-based gas sensors fabrication is suitable for integrating directly into the flexible substrates to be applied as wearable gas detection instruments such as gas-protective clothing, gas safety shoes and gas masks. Soft materials which do not irritate the wearer have been used for this sensor. This work opens a new perspective that overcomes the well-known limitation for creating a fabric-based gas sensor such as the complexity of the production process, high cost and high power consumption in operating. Thus it leads to an innovative integration between science and smart art. As a result, we can make a cheap wireless gas detector based on Xbee communication technology, with low power consumption. This sensor was tested for its selectivity and sensitivity performance toward several volatile compounds, namely ammonia, pyridine, acetic acid, ethanol and acetone. The results revealed that this sensor has higher sensitivity and specificity to NH3 than other gases. It is possible to monitor NH3 until it reaches a concentration of 5 ppm and also has the ability to recover as well.","PeriodicalId":347166,"journal":{"name":"2014 11th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122701791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-14DOI: 10.1109/ECTICON.2014.6839896
W. Sarikha, P. Krachodnok, R. Wongsan
This paper presents the study of new technique for exciting the 4×4 rectangular microstrip patches antenna (MSA) array by using a single patch, which is surrounded with metallic plate. The objective of this research is to explore the new technique for exciting any microstrip array instead of the conventional phasing line that have energy loss and narrow bandwidth occurred inside it. From many literatures, we found that the single patch of rectangular MSA can directly excite to them and reradiated to the free-space. However, if this patch is surrounded by metallic plate on the same layer, its gain can be increased more than using only single patch excited it. The exciting patch with surrounded metallic plate has been designed by using general PCB, which has the dielectric constant, equals to 2.2. While the 4×4 MSA array is designed by using FR4-PCB with dielectric constant equals to 4.4. The substrate thicknesses of both types of PCB are 1.6 mm. From the simulated results by using the licensed Computer Simulation Technology (CST) software, we found that the gain of antenna can be raised up from 11.68 dB (without metallic surrounded plate) to 13.42 dB at 10 GHz operating frequency. However, the required radiation patterns of MSA array antenna can be adjusted by using the general theoretical technique.
{"title":"Exciting technique for MSA array by using single patch with surrounded metallic plate","authors":"W. Sarikha, P. Krachodnok, R. Wongsan","doi":"10.1109/ECTICON.2014.6839896","DOIUrl":"https://doi.org/10.1109/ECTICON.2014.6839896","url":null,"abstract":"This paper presents the study of new technique for exciting the 4×4 rectangular microstrip patches antenna (MSA) array by using a single patch, which is surrounded with metallic plate. The objective of this research is to explore the new technique for exciting any microstrip array instead of the conventional phasing line that have energy loss and narrow bandwidth occurred inside it. From many literatures, we found that the single patch of rectangular MSA can directly excite to them and reradiated to the free-space. However, if this patch is surrounded by metallic plate on the same layer, its gain can be increased more than using only single patch excited it. The exciting patch with surrounded metallic plate has been designed by using general PCB, which has the dielectric constant, equals to 2.2. While the 4×4 MSA array is designed by using FR4-PCB with dielectric constant equals to 4.4. The substrate thicknesses of both types of PCB are 1.6 mm. From the simulated results by using the licensed Computer Simulation Technology (CST) software, we found that the gain of antenna can be raised up from 11.68 dB (without metallic surrounded plate) to 13.42 dB at 10 GHz operating frequency. However, the required radiation patterns of MSA array antenna can be adjusted by using the general theoretical technique.","PeriodicalId":347166,"journal":{"name":"2014 11th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127205181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-14DOI: 10.1109/ECTICON.2014.6839872
Wason Somkaew, Somchai Thepphaeng, C. Pirak
In this paper, the data security for advanced metering infrastructure (AMI) systems has been investigated and implemented. Specifically, this paper mainly focuses on the data security over the ZigBee network because this network part is very vulnerable, and it directly connects with the consumer's premises. Based on the recent advances in a protocol standard for AMI systems, i.e. the DLMS/COSEM protocol standard, the data security implementation guideline has been released, and it illustrates that the 128-bit AES GCM cryptography is recommended. Therefore, the implementation and performance evaluation of the 128-bit AES GCM cryptography have been conducted in this research work by using the advanced security IC. Specifically, the data encryption and decryption scheme are experimentally verified, and the performance comparison between the hardware-based and software-based crypto-engines is examined. The experimental results show that data encryption and decryption process are consistent, and the hardware-based crypto-engine is superior to the software-based crypto-engine in terms of processing time, in which the hardware-based scheme spends less processing time than software-based scheme. Furthermore, the power consumption of such security IC in the smart meter prototype is very low making it suitable and attractive for the deployment of millions of smart meter in the field.
{"title":"Data security implementation over ZigBee networks for AMI systems","authors":"Wason Somkaew, Somchai Thepphaeng, C. Pirak","doi":"10.1109/ECTICON.2014.6839872","DOIUrl":"https://doi.org/10.1109/ECTICON.2014.6839872","url":null,"abstract":"In this paper, the data security for advanced metering infrastructure (AMI) systems has been investigated and implemented. Specifically, this paper mainly focuses on the data security over the ZigBee network because this network part is very vulnerable, and it directly connects with the consumer's premises. Based on the recent advances in a protocol standard for AMI systems, i.e. the DLMS/COSEM protocol standard, the data security implementation guideline has been released, and it illustrates that the 128-bit AES GCM cryptography is recommended. Therefore, the implementation and performance evaluation of the 128-bit AES GCM cryptography have been conducted in this research work by using the advanced security IC. Specifically, the data encryption and decryption scheme are experimentally verified, and the performance comparison between the hardware-based and software-based crypto-engines is examined. The experimental results show that data encryption and decryption process are consistent, and the hardware-based crypto-engine is superior to the software-based crypto-engine in terms of processing time, in which the hardware-based scheme spends less processing time than software-based scheme. Furthermore, the power consumption of such security IC in the smart meter prototype is very low making it suitable and attractive for the deployment of millions of smart meter in the field.","PeriodicalId":347166,"journal":{"name":"2014 11th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125445662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-14DOI: 10.1109/ECTICON.2014.6839902
Sora Son, Sangwook Bae, Shimin Sun, Sunyoung Han
IPv6 has been developed to deal with the increase in number of hosts in the Internet. IPv6 address can be assigned to any network devices. IPv6 provides new function called SLAAC (Stateless Address Auto Configuration). SLAAC is a significant feature for host itself generating and configuring own addresses to enable communication. But this feature has drawbacks in term of security and management of networks. In this paper, we propose a blocking mechanism for malicious hosts using the feature of RA message in ICMPv6 (Internet Control Message Protocol version 6). It was experimented using Emulab testbed environment. And the result show that it can block malicious hosts successfully.
IPv6的发展是为了应对互联网中主机数量的增加。IPv6地址可以分配给任何网络设备。IPv6提供了名为SLAAC(无状态地址自动配置)的新功能。SLAAC是主机本身生成和配置自己的地址以启用通信的重要特性。但是这种特性在网络的安全性和管理方面存在缺陷。本文利用ICMPv6 (Internet Control message Protocol version 6)中的RA消息特性,提出了一种针对恶意主机的拦截机制,并在Emulab测试平台环境下进行了实验。实验结果表明,该算法能够成功拦截恶意主机。
{"title":"An address management mechanism for blocking external communications in IPv6 networks","authors":"Sora Son, Sangwook Bae, Shimin Sun, Sunyoung Han","doi":"10.1109/ECTICON.2014.6839902","DOIUrl":"https://doi.org/10.1109/ECTICON.2014.6839902","url":null,"abstract":"IPv6 has been developed to deal with the increase in number of hosts in the Internet. IPv6 address can be assigned to any network devices. IPv6 provides new function called SLAAC (Stateless Address Auto Configuration). SLAAC is a significant feature for host itself generating and configuring own addresses to enable communication. But this feature has drawbacks in term of security and management of networks. In this paper, we propose a blocking mechanism for malicious hosts using the feature of RA message in ICMPv6 (Internet Control Message Protocol version 6). It was experimented using Emulab testbed environment. And the result show that it can block malicious hosts successfully.","PeriodicalId":347166,"journal":{"name":"2014 11th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123763358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-14DOI: 10.1109/ECTICON.2014.6839874
Sekiya Noro, T. Funato, S. Aoi, K. Nakano, K. Tsuchiya
Human generates very slow (<;1[Hz]) and large (>20[mm]) body sway. This sway is considered to reflect the characteristic of human neural control. We propose a human control model with nonlinearlity and the effect of nonlinearlity is considered by mathematical analysis and simulation. As a result, we found that the proposed model has bifurcation structure with the magnitude of control gain. We consider that body sway is caused by this bifurcation structure. In order to verify the existence of such a nonlinear nature in human, we performed human experiment with two floor environments: fix and rotate floors. As a result, we verified the existence of nonlinearlity in human body sway and showed the potential existence of bifurcation structure.
{"title":"Experimental validation of nonlinear PID model for human standing with large body sway","authors":"Sekiya Noro, T. Funato, S. Aoi, K. Nakano, K. Tsuchiya","doi":"10.1109/ECTICON.2014.6839874","DOIUrl":"https://doi.org/10.1109/ECTICON.2014.6839874","url":null,"abstract":"Human generates very slow (<;1[Hz]) and large (>20[mm]) body sway. This sway is considered to reflect the characteristic of human neural control. We propose a human control model with nonlinearlity and the effect of nonlinearlity is considered by mathematical analysis and simulation. As a result, we found that the proposed model has bifurcation structure with the magnitude of control gain. We consider that body sway is caused by this bifurcation structure. In order to verify the existence of such a nonlinear nature in human, we performed human experiment with two floor environments: fix and rotate floors. As a result, we verified the existence of nonlinearlity in human body sway and showed the potential existence of bifurcation structure.","PeriodicalId":347166,"journal":{"name":"2014 11th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128761723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-14DOI: 10.1109/ECTICON.2014.6839736
T. Thanasaksiri
This paper analyzes the insulation level and air clearances of 230 kV air insulated substation. In order to get the BIL, the crest voltage at any equipment are required. By applying simplified calculation method taken from IEEE Std. 1313.2-1999 and IEEE Std. 1427-2006 compared with digital simulation. The simulations have been implemented using simplified models via EMTP-ATP. The BIL required and BIL selected from simplified calculation may give the insulation level not in the range, so the digital simulation would be the better choice. The effect of elevation from sea level as well as the switching surge have been considered for insulation levels and clearances.
{"title":"Insulation level and clearances for 230 kV air insulated substation","authors":"T. Thanasaksiri","doi":"10.1109/ECTICON.2014.6839736","DOIUrl":"https://doi.org/10.1109/ECTICON.2014.6839736","url":null,"abstract":"This paper analyzes the insulation level and air clearances of 230 kV air insulated substation. In order to get the BIL, the crest voltage at any equipment are required. By applying simplified calculation method taken from IEEE Std. 1313.2-1999 and IEEE Std. 1427-2006 compared with digital simulation. The simulations have been implemented using simplified models via EMTP-ATP. The BIL required and BIL selected from simplified calculation may give the insulation level not in the range, so the digital simulation would be the better choice. The effect of elevation from sea level as well as the switching surge have been considered for insulation levels and clearances.","PeriodicalId":347166,"journal":{"name":"2014 11th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114935419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}