Pub Date : 2002-08-07DOI: 10.1109/HICSS.2002.993965
D. Wiegmann, A. M. Rich, T. Overbye, Y. Sun
This paper presents experimental results associated with the human factors aspects of using color contours to visualize electric power system bus voltage magnitude information. Participants were divided into three groups: the first group only one-line numeric data, the second only one-line contour data, while the third saw both. The purpose of the experiment was to determine how quickly participants could both acknowledge low voltage violations and perform corrective control actions. Results indicated the contour only visualization resulted in the quickest voltage violation acknowledgements, while the numeric data only visualization resulted in the quickest solution times. Testing was done using a modified version of the IEEE 118 bus system.
{"title":"Human factors aspects of power system voltage visualizations","authors":"D. Wiegmann, A. M. Rich, T. Overbye, Y. Sun","doi":"10.1109/HICSS.2002.993965","DOIUrl":"https://doi.org/10.1109/HICSS.2002.993965","url":null,"abstract":"This paper presents experimental results associated with the human factors aspects of using color contours to visualize electric power system bus voltage magnitude information. Participants were divided into three groups: the first group only one-line numeric data, the second only one-line contour data, while the third saw both. The purpose of the experiment was to determine how quickly participants could both acknowledge low voltage violations and perform corrective control actions. Results indicated the contour only visualization resulted in the quickest voltage violation acknowledgements, while the numeric data only visualization resulted in the quickest solution times. Testing was done using a modified version of the IEEE 118 bus system.","PeriodicalId":366006,"journal":{"name":"Proceedings of the 35th Annual Hawaii International Conference on System Sciences","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130194770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2002-08-07DOI: 10.1109/HICSS.2002.994024
H. Hlavacs, G. Haring, A. Kamra, M. Bansal
Future cellular mobile networks will be limited by the number of channels available in each cell. On the other hand, new broadband applications like video telephony will demand tight quality of service guarantees that must be met by the network at all times. Thus, advanced mechanisms for allocating these channels to incoming calls with different quality of service level will be of utmost importance. In this paper we introduce a new analytical model for cell channel allocation to multiclass traffic. Being based on Markov chains, the new model exploits the multi-class property and reduces the state space dramatically, thus enabling the solution of previously unsolvable problem classes. We additionally describe CECALL, a simulator implementing several different strategies for allocating cell channels to multiclass traffic, handoff pre-reservation and degradation of low-level call classes. The results of the analytical model are used for explaining important simulation results.
{"title":"Modelling resource management for multi-class traffic in mobile cellular networks","authors":"H. Hlavacs, G. Haring, A. Kamra, M. Bansal","doi":"10.1109/HICSS.2002.994024","DOIUrl":"https://doi.org/10.1109/HICSS.2002.994024","url":null,"abstract":"Future cellular mobile networks will be limited by the number of channels available in each cell. On the other hand, new broadband applications like video telephony will demand tight quality of service guarantees that must be met by the network at all times. Thus, advanced mechanisms for allocating these channels to incoming calls with different quality of service level will be of utmost importance. In this paper we introduce a new analytical model for cell channel allocation to multiclass traffic. Being based on Markov chains, the new model exploits the multi-class property and reduces the state space dramatically, thus enabling the solution of previously unsolvable problem classes. We additionally describe CECALL, a simulator implementing several different strategies for allocating cell channels to multiclass traffic, handoff pre-reservation and degradation of low-level call classes. The results of the analytical model are used for explaining important simulation results.","PeriodicalId":366006,"journal":{"name":"Proceedings of the 35th Annual Hawaii International Conference on System Sciences","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130727154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2002-08-07DOI: 10.1109/HICSS.2002.994194
W. S. Harrison, A. Krings, N. Hanebutte, M. McQueen
This research focusses on the performance and timing behavior of a two level survivability architecture. The lower level of the architecture involves attack analysis based on kernel attack signatures and survivability handlers. Higher level survivability mechanisms are implemented using migratory autonomous agents. The potential for fast response to, and recovery from, malicious attacks is the main motivation to implement attack detection and survivability mechanisms at the kernel level. A timing analysis is presented that suggests the real-time feasibility of the two level approach. The limits to real-time response are identified from the host and network point of view. The experimental data derived is important for risk management and analysis in the presence of malicious network and computer attacks.
{"title":"On the performance of a survivability architecture for networked computing systems","authors":"W. S. Harrison, A. Krings, N. Hanebutte, M. McQueen","doi":"10.1109/HICSS.2002.994194","DOIUrl":"https://doi.org/10.1109/HICSS.2002.994194","url":null,"abstract":"This research focusses on the performance and timing behavior of a two level survivability architecture. The lower level of the architecture involves attack analysis based on kernel attack signatures and survivability handlers. Higher level survivability mechanisms are implemented using migratory autonomous agents. The potential for fast response to, and recovery from, malicious attacks is the main motivation to implement attack detection and survivability mechanisms at the kernel level. A timing analysis is presented that suggests the real-time feasibility of the two level approach. The limits to real-time response are identified from the host and network point of view. The experimental data derived is important for risk management and analysis in the presence of malicious network and computer attacks.","PeriodicalId":366006,"journal":{"name":"Proceedings of the 35th Annual Hawaii International Conference on System Sciences","volume":"246 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132598127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2002-08-07DOI: 10.1109/HICSS.2002.993977
D. Newman, N. Sizemore, V. Lynch, B. Carreras
In a society in which information is one of the highest-valued commodities, information networks are the economic backbone. Therefore, network vulnerability is a major hazard. Analysis of communications system traffic suggests that there are a variety of similar dynamical characteristics in widely varying systems. There are some universal features of communication networks that may determine the main dynamics of communications. These are: (1) hardware limitations on network capacity; (2) forcing from the increasing number of users towards the network capacity; and (3) a high level of complexity in those systems. These common features may drive the system dynamics and determine its main intrinsic vulnerabilities. The nontrivial character of network dynamics has already been found in traffic analysis of local area networks that display self-similarities and long-range correlations. This suggests a complex dynamics in the traffic of packets over the network. In this work simple distribution network models with different levels of complexity are examined and compared to each other and to characteristics of real Internet data.
{"title":"Growth and propagation of disturbances in a communication network model","authors":"D. Newman, N. Sizemore, V. Lynch, B. Carreras","doi":"10.1109/HICSS.2002.993977","DOIUrl":"https://doi.org/10.1109/HICSS.2002.993977","url":null,"abstract":"In a society in which information is one of the highest-valued commodities, information networks are the economic backbone. Therefore, network vulnerability is a major hazard. Analysis of communications system traffic suggests that there are a variety of similar dynamical characteristics in widely varying systems. There are some universal features of communication networks that may determine the main dynamics of communications. These are: (1) hardware limitations on network capacity; (2) forcing from the increasing number of users towards the network capacity; and (3) a high level of complexity in those systems. These common features may drive the system dynamics and determine its main intrinsic vulnerabilities. The nontrivial character of network dynamics has already been found in traffic analysis of local area networks that display self-similarities and long-range correlations. This suggests a complex dynamics in the traffic of packets over the network. In this work simple distribution network models with different levels of complexity are examined and compared to each other and to characteristics of real Internet data.","PeriodicalId":366006,"journal":{"name":"Proceedings of the 35th Annual Hawaii International Conference on System Sciences","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132000836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2002-08-07DOI: 10.1109/HICSS.2002.994091
M. Crosby, M. Iding, Y. Waern
While the potential benefit of additional measurement tools and techniques has been recognized in numerous domains, many questions remain about what to measure and how to get meaningful measurements. Although the majority of researchers seem to agree that user interaction metrics are helpful, the forms of these metrics causes considerable debate. The relationship between humans and computers (HCI) provides a rich area of study from both a theoretical and a practical perspective. Results from HCI research can contribute to theories of human behavior during complex tasks and often the results can be applied to the design of computer systems. An objective in coordinating this mini-track is to encourage a variety of papers that address the need for enhanced, nontraditional measures of performance to evaluate how people use interactive computer systems. Contributions to this mini-track include a wide range of topics as well as evaluation metrics. The first set of papers concerns the evaluation of student learning. Tsaganou, Cavoura and Grigoriadou present a methodology for the experimental construction of a student model of historical text comprehension that was based on a model of comprehension of historical narration (MOCOHN). They conduct an experimental study of students' text comprehension that demonstrated the effectiveness of their proposed student model. Chou employed content analysis to investigate the patterns of student to student interactions in distance learning environments. Vick, using experience gained in face to face classes, judges collaborative knowledge construction using goal-based scenarios in a synchronous computer-mediated communication situations. The second set of papers relies on physiological measurements to assess either skills or mental processes. Serra and Muzio explore the challenges of designing software to assist in the rehabilitation of people who have suffered traumatic brain injuries. They discuss suggestions for ways in which software can minimize the detrimental effects of impaired cognitive functions. Because of the unique characteristics of their patient population, the researchers employ an informal evaluation method and adapt their software to the patients needs. Ark, uses functional Magnetic Resonance Imaging (fMRI) as a tool to understand the cognitive ability of mental rotation. She summarizes findings from recent mental rotation studies and discusses the possible confounds between the reported results. King explores consistencies of eye-movement patterns by building a neural network and using statistics to predict eye movement behavior in different searching tasks. The final two sets of papers involve guidelines for web based materials and the software architecture needed to support web based data collection. Sutcliffe proposes a three-phase model for web site evaluation. He defines usability as a trade-off between increasing the user's motivation and the costs of usability errors. His proposed heuristics
{"title":"Nontraditional approaches to analyzing design of computer support and user evaluation","authors":"M. Crosby, M. Iding, Y. Waern","doi":"10.1109/HICSS.2002.994091","DOIUrl":"https://doi.org/10.1109/HICSS.2002.994091","url":null,"abstract":"While the potential benefit of additional measurement tools and techniques has been recognized in numerous domains, many questions remain about what to measure and how to get meaningful measurements. Although the majority of researchers seem to agree that user interaction metrics are helpful, the forms of these metrics causes considerable debate. The relationship between humans and computers (HCI) provides a rich area of study from both a theoretical and a practical perspective. Results from HCI research can contribute to theories of human behavior during complex tasks and often the results can be applied to the design of computer systems. An objective in coordinating this mini-track is to encourage a variety of papers that address the need for enhanced, nontraditional measures of performance to evaluate how people use interactive computer systems. Contributions to this mini-track include a wide range of topics as well as evaluation metrics. The first set of papers concerns the evaluation of student learning. Tsaganou, Cavoura and Grigoriadou present a methodology for the experimental construction of a student model of historical text comprehension that was based on a model of comprehension of historical narration (MOCOHN). They conduct an experimental study of students' text comprehension that demonstrated the effectiveness of their proposed student model. Chou employed content analysis to investigate the patterns of student to student interactions in distance learning environments. Vick, using experience gained in face to face classes, judges collaborative knowledge construction using goal-based scenarios in a synchronous computer-mediated communication situations. The second set of papers relies on physiological measurements to assess either skills or mental processes. Serra and Muzio explore the challenges of designing software to assist in the rehabilitation of people who have suffered traumatic brain injuries. They discuss suggestions for ways in which software can minimize the detrimental effects of impaired cognitive functions. Because of the unique characteristics of their patient population, the researchers employ an informal evaluation method and adapt their software to the patients needs. Ark, uses functional Magnetic Resonance Imaging (fMRI) as a tool to understand the cognitive ability of mental rotation. She summarizes findings from recent mental rotation studies and discusses the possible confounds between the reported results. King explores consistencies of eye-movement patterns by building a neural network and using statistics to predict eye movement behavior in different searching tasks. The final two sets of papers involve guidelines for web based materials and the software architecture needed to support web based data collection. Sutcliffe proposes a three-phase model for web site evaluation. He defines usability as a trade-off between increasing the user's motivation and the costs of usability errors. His proposed heuristics","PeriodicalId":366006,"journal":{"name":"Proceedings of the 35th Annual Hawaii International Conference on System Sciences","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129217151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2002-08-07DOI: 10.1109/HICSS.2002.994265
B. Massetti, C. Barlow, Shane Thatcher
As the innovation rates in most markets increase, an organization's ability to sustain creativity in its products, processes and members becomes a significant competitive challenge. Often an organization is considered only to be as valuable as its last great idea. Recognizing that information technology (IT) has the capacity to enable innovative processes and products, many organizations are now looking for IT to directly support their creativity needs. Accordingly, the Creativity in Information Systems (CIS) Minitrack is interested in exploring a wide variety of topics involving when and how creativity can be sustained or enhanced by IT.Because creative people produce creative systems, one area of interest for the CIS Minitrack involves exploring ways to support creativity within the IT function. Not only must IT personnel find creative ways to enhance system acceptance, productivity and satisfaction, but they also are increasingly being expected to develop systems that can enhance the creativity of end users. Awareness and understanding of which tools and techniques best support creativity can help designers and developers create better applications.Another focus for the CIS Minitrack involves examining ways organizational processes have been re-conceptualized using information and communications technology. A consideration of the issues and challenges involved in recognizing the need for process change as well as determining exactly how communications and information technology applications might allow for new processes supports organizational efforts to perform effectively these dynamic times.Because of the variety of topics covered in this year's submissions, we are expecting very lively and interesting discussion. The session begins with a paper by Christopher Barlow from the Illinois Institute of Technology that explores how the approach taken to frame a problem often limits one's awareness of potential solutions. Dr. Barlow develops a model that re-frames the definition of a creative event from ?a newer and better idea? to ?a shift in perspective that makes new possibilities obvious?. He explores the research benefits that are likely to accrue from this shift and offers a preliminary assessment of its usefulness.The second paper, by Drs. Christopher Landauer and Kirstie Bellman from the Aerospace Corporation, discusses some of the challenges faced in developing systems to support human creativity. They describe a system infrastructure they have developed called ?wrapping? that can provide the richness and flexibility required for human support.The third paper, by Dr. Sherry M. B. Thatcher from the University of Arizona, explores the concept of ?identity fit? and its impact on creative performance. She uses the results of a field study to demonstrate how identity fit has a positive effect on creative performance.The fourth paper, by Drs. Keith S. Horton and Rick G. Dewar from Napier University, considers the use of patterns in relation to
随着大多数市场创新率的提高,一个组织在其产品、流程和成员中保持创造力的能力成为一个重大的竞争挑战。通常,人们认为一个组织的价值取决于它最后的好主意。认识到信息技术(IT)具有实现创新过程和产品的能力,许多组织现在正在寻找IT来直接支持他们的创造力需求。因此,信息系统中的创造力(CIS)迷你课程感兴趣的是探索各种各样的主题,包括何时以及如何通过IT来维持或增强创造力。因为有创造力的人会产生有创造力的系统,所以CIS Minitrack感兴趣的一个领域包括探索在IT功能中支持创造力的方法。IT人员不仅必须找到创造性的方法来提高系统的接受度、生产力和满意度,而且人们也越来越期望他们开发能够提高最终用户创造力的系统。了解和理解哪些工具和技术最能支持创造力,可以帮助设计师和开发人员创建更好的应用程序。独联体迷你轨道的另一个重点是审查利用信息和通信技术重新概念化组织过程的方式。在认识到流程变更的需要以及确定通信和信息技术应用程序如何允许新流程时,对所涉及的问题和挑战的考虑将支持组织努力在这些动态时期有效地执行。由于今年提交的作品涵盖了各种各样的主题,我们期待着非常生动有趣的讨论。会议以伊利诺斯理工学院的Christopher Barlow的一篇论文开始,该论文探讨了构建问题的方法如何限制了人们对潜在解决方案的认识。巴洛博士开发了一个模型,将“更新更好的想法”重新定义为“创造性事件”。转变观点,使新的可能性变得明显。他探讨了从这种转变中可能产生的研究效益,并对其有效性进行了初步评估。第二篇论文由dr。来自航空航天公司的Christopher Landauer和Kirstie Bellman讨论了开发支持人类创造力的系统所面临的一些挑战。他们描述了他们开发的一个系统基础设施,称为“包装”。这可以提供人力支持所需的丰富性和灵活性。第三篇论文由亚利桑那大学的Sherry M. B. Thatcher博士撰写,探讨了“身份契合”的概念。以及它对创造性表现的影响。她利用一项实地研究的结果来证明身份契合如何对创造性表现产生积极影响。第四篇论文,由dr。来自Napier大学的Keith S. Horton和Rick G. Dewar考虑了与信息系统战略制定相关的模式的使用,并将亚历山大模式的概念应用于一个实证案例研究,以证明反思和上下文的价值。
{"title":"Creativity in information systems","authors":"B. Massetti, C. Barlow, Shane Thatcher","doi":"10.1109/HICSS.2002.994265","DOIUrl":"https://doi.org/10.1109/HICSS.2002.994265","url":null,"abstract":"As the innovation rates in most markets increase, an organization's ability to sustain creativity in its products, processes and members becomes a significant competitive challenge. Often an organization is considered only to be as valuable as its last great idea. Recognizing that information technology (IT) has the capacity to enable innovative processes and products, many organizations are now looking for IT to directly support their creativity needs. Accordingly, the Creativity in Information Systems (CIS) Minitrack is interested in exploring a wide variety of topics involving when and how creativity can be sustained or enhanced by IT.Because creative people produce creative systems, one area of interest for the CIS Minitrack involves exploring ways to support creativity within the IT function. Not only must IT personnel find creative ways to enhance system acceptance, productivity and satisfaction, but they also are increasingly being expected to develop systems that can enhance the creativity of end users. Awareness and understanding of which tools and techniques best support creativity can help designers and developers create better applications.Another focus for the CIS Minitrack involves examining ways organizational processes have been re-conceptualized using information and communications technology. A consideration of the issues and challenges involved in recognizing the need for process change as well as determining exactly how communications and information technology applications might allow for new processes supports organizational efforts to perform effectively these dynamic times.Because of the variety of topics covered in this year's submissions, we are expecting very lively and interesting discussion. The session begins with a paper by Christopher Barlow from the Illinois Institute of Technology that explores how the approach taken to frame a problem often limits one's awareness of potential solutions. Dr. Barlow develops a model that re-frames the definition of a creative event from ?a newer and better idea? to ?a shift in perspective that makes new possibilities obvious?. He explores the research benefits that are likely to accrue from this shift and offers a preliminary assessment of its usefulness.The second paper, by Drs. Christopher Landauer and Kirstie Bellman from the Aerospace Corporation, discusses some of the challenges faced in developing systems to support human creativity. They describe a system infrastructure they have developed called ?wrapping? that can provide the richness and flexibility required for human support.The third paper, by Dr. Sherry M. B. Thatcher from the University of Arizona, explores the concept of ?identity fit? and its impact on creative performance. She uses the results of a field study to demonstrate how identity fit has a positive effect on creative performance.The fourth paper, by Drs. Keith S. Horton and Rick G. Dewar from Napier University, considers the use of patterns in relation to ","PeriodicalId":366006,"journal":{"name":"Proceedings of the 35th Annual Hawaii International Conference on System Sciences","volume":"26 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120912327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2002-08-07DOI: 10.1109/HICSS.2002.993971
Zhifang Wang, R. Thomas, Z. Haas
Bluetooth is a novel promising local area wireless technology designed to enable voice and data communication among various electronic devices. We believe that Bluetooth networks will provide reliable, flexible and cost-efficient telecommunication support for the post-deregulation electric power systems. Though not specified in version 1.0 of the Bluetooth specification, communication by way of multi-hop routing (characteristic of ad hoc networks) within a scatternet will offer a new and exciting extension to this technology. The topology of such an ad-hoc scatternet would have a significant effect on the overall performance of the network. We present "Bluenet" as a novel and practical scheme for building an efficient scatternet and discuss the basic rules followed by the Bluenet scheme. Two methods are introduced to evaluate the performance of the resulting scatternets based on average shortest path length and maximum traffic flows respectively. Finally the effectiveness of the Bluenet scheme is demonstrated through simulations and comparison.
{"title":"Bluenet - a new scatternet formation scheme","authors":"Zhifang Wang, R. Thomas, Z. Haas","doi":"10.1109/HICSS.2002.993971","DOIUrl":"https://doi.org/10.1109/HICSS.2002.993971","url":null,"abstract":"Bluetooth is a novel promising local area wireless technology designed to enable voice and data communication among various electronic devices. We believe that Bluetooth networks will provide reliable, flexible and cost-efficient telecommunication support for the post-deregulation electric power systems. Though not specified in version 1.0 of the Bluetooth specification, communication by way of multi-hop routing (characteristic of ad hoc networks) within a scatternet will offer a new and exciting extension to this technology. The topology of such an ad-hoc scatternet would have a significant effect on the overall performance of the network. We present \"Bluenet\" as a novel and practical scheme for building an efficient scatternet and discuss the basic rules followed by the Bluenet scheme. Two methods are introduced to evaluate the performance of the resulting scatternets based on average shortest path length and maximum traffic flows respectively. Finally the effectiveness of the Bluenet scheme is demonstrated through simulations and comparison.","PeriodicalId":366006,"journal":{"name":"Proceedings of the 35th Annual Hawaii International Conference on System Sciences","volume":"221 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123402188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2002-08-07DOI: 10.1109/HICSS.2002.993973
G. Escobar, A. Stanković, P. Mattavelli, R. Ortega
The paper reviews modeling of thyristor-controlled series capacitors (TCSC) which are highly nonlinear systems with continuous and discontinuous states, and proposes three nonlinear controllers for it: (1) an approximate feedback linearization control (FLC); (2) a sliding surface-like design; (3) control in transformed coordinates. Detailed (switched) time-domain simulations are used to verify the control performance achieved by the three controllers.
{"title":"On the nonlinear control of TCSC","authors":"G. Escobar, A. Stanković, P. Mattavelli, R. Ortega","doi":"10.1109/HICSS.2002.993973","DOIUrl":"https://doi.org/10.1109/HICSS.2002.993973","url":null,"abstract":"The paper reviews modeling of thyristor-controlled series capacitors (TCSC) which are highly nonlinear systems with continuous and discontinuous states, and proposes three nonlinear controllers for it: (1) an approximate feedback linearization control (FLC); (2) a sliding surface-like design; (3) control in transformed coordinates. Detailed (switched) time-domain simulations are used to verify the control performance achieved by the three controllers.","PeriodicalId":366006,"journal":{"name":"Proceedings of the 35th Annual Hawaii International Conference on System Sciences","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124784623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2002-08-07DOI: 10.1109/HICSS.2002.993972
Yiqiao Liang, S. Ayasun, C. Nwankpa
The critical clearing time, t/sub cc/, in power system transient stability analysis is modeled as a random variable due to the random nature of the power system load. A linear approximation approach that mainly involves the sensitivity calculation of the derivative of t/sub cc/ to the system load is developed to obtain the probability density function (PDF) of t/sub cc/ based on the PDF of the system load. A Monte Carlo simulation method is used to verify that this approach is accurate under the condition of small load deviation. The probability of the system being transiently stable for particular disturbances is calculated based on the PDF of t/sub cc/.
{"title":"Calculation of the probability density function of critical clearing time in transient stability analysis","authors":"Yiqiao Liang, S. Ayasun, C. Nwankpa","doi":"10.1109/HICSS.2002.993972","DOIUrl":"https://doi.org/10.1109/HICSS.2002.993972","url":null,"abstract":"The critical clearing time, t/sub cc/, in power system transient stability analysis is modeled as a random variable due to the random nature of the power system load. A linear approximation approach that mainly involves the sensitivity calculation of the derivative of t/sub cc/ to the system load is developed to obtain the probability density function (PDF) of t/sub cc/ based on the PDF of the system load. A Monte Carlo simulation method is used to verify that this approach is accurate under the condition of small load deviation. The probability of the system being transiently stable for particular disturbances is calculated based on the PDF of t/sub cc/.","PeriodicalId":366006,"journal":{"name":"Proceedings of the 35th Annual Hawaii International Conference on System Sciences","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128282559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2002-08-07DOI: 10.1109/HICSS.2002.993901
Carlos K. F. Cheung, M.K.O. Lee, Zhaohui Chen
In line with V. Venkatesh and M.G. Morris' (2000) study on gender differences in IT adoption, an augmented TAM was employed to scrutinize the gender differences in the student adoption of Internet-based learning medium (ILM). A total of 549 usable self-administered questionnaires were collected, and both psychometric properties and model testing were examined through the LISREL VIII framework. All measures have good psychometric properties and all models provide a good fit to the data with all path coefficients supported. Regardless of the gender, perceived usefulness remains the most important determinant in student adoption of ILM. However, inconsistent findings are found between Venkatesh and Morris' (2000) study and the study presented; we suspect that it may be the result of interaction effects between culture and gender in the determinants of IT adoption and usage. Detailed processes and mechanisms through which the interactions take place and how they act on different components of the TAM is an area calling for future investigations.
{"title":"Using the Internet as a learning medium: an exploration of gender difference in the adoption of FaBWeb","authors":"Carlos K. F. Cheung, M.K.O. Lee, Zhaohui Chen","doi":"10.1109/HICSS.2002.993901","DOIUrl":"https://doi.org/10.1109/HICSS.2002.993901","url":null,"abstract":"In line with V. Venkatesh and M.G. Morris' (2000) study on gender differences in IT adoption, an augmented TAM was employed to scrutinize the gender differences in the student adoption of Internet-based learning medium (ILM). A total of 549 usable self-administered questionnaires were collected, and both psychometric properties and model testing were examined through the LISREL VIII framework. All measures have good psychometric properties and all models provide a good fit to the data with all path coefficients supported. Regardless of the gender, perceived usefulness remains the most important determinant in student adoption of ILM. However, inconsistent findings are found between Venkatesh and Morris' (2000) study and the study presented; we suspect that it may be the result of interaction effects between culture and gender in the determinants of IT adoption and usage. Detailed processes and mechanisms through which the interactions take place and how they act on different components of the TAM is an area calling for future investigations.","PeriodicalId":366006,"journal":{"name":"Proceedings of the 35th Annual Hawaii International Conference on System Sciences","volume":"256 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125795309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}