Pub Date : 2006-03-20DOI: 10.1109/IEEEGCC.2006.5686225
J. AlMutawa
In this paper, we develop a subspace system identification algorithm for the Errors-In-Variables (EIV) model subject to observation noise with outliers. To this end, we proposed the random search algorithm in order to solve the Minimum-Covariance-Determinant (MCD) problem. By using the MCD, we identify and delete the outliers, and then we apply the classical EIV subspace system identification algorithms to get state space model. In addition, we show that the problem of detecting the outliers in the closed loop systems is especial case of the EIV model. The propose algorithm has been applied to heat exchanger data.
{"title":"Identification of errors-in-variables model with observation outlier based on MCD","authors":"J. AlMutawa","doi":"10.1109/IEEEGCC.2006.5686225","DOIUrl":"https://doi.org/10.1109/IEEEGCC.2006.5686225","url":null,"abstract":"In this paper, we develop a subspace system identification algorithm for the Errors-In-Variables (EIV) model subject to observation noise with outliers. To this end, we proposed the random search algorithm in order to solve the Minimum-Covariance-Determinant (MCD) problem. By using the MCD, we identify and delete the outliers, and then we apply the classical EIV subspace system identification algorithms to get state space model. In addition, we show that the problem of detecting the outliers in the closed loop systems is especial case of the EIV model. The propose algorithm has been applied to heat exchanger data.","PeriodicalId":433452,"journal":{"name":"2006 IEEE GCC Conference (GCC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115302516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-03-20DOI: 10.1109/IEEEGCC.2006.5686252
A. Vallavaraj, B. Stewart, D. K. Harrison, F. G. McIntosh
In this paper various phasing schemes that reduce the Peak-to-Average Power Ratio (PAPR) within OFDM systems are discussed. Simulation results on the effect of these phasing schemes in reducing PAPR are also presented. Companding OFDM symbols prior to transmission using the μ-Law has also been shown in previous papers to further reduce the PAPR. This paper now presents the results of combining both companding with various phasing schemes. The Bit-Error Rate (BER) performance of various PAPR reduction techniques in an Additive White Gaussian Noise (AWGN) channel is also presented. It is shown that combining companding and the application of phasing schemes can significantly improve further PAPR reduction as well as improve the BER performance.
{"title":"Reduction of Peak-to-Average Power Ratio of OFDM symbols using phasing schemes combined with companding","authors":"A. Vallavaraj, B. Stewart, D. K. Harrison, F. G. McIntosh","doi":"10.1109/IEEEGCC.2006.5686252","DOIUrl":"https://doi.org/10.1109/IEEEGCC.2006.5686252","url":null,"abstract":"In this paper various phasing schemes that reduce the Peak-to-Average Power Ratio (PAPR) within OFDM systems are discussed. Simulation results on the effect of these phasing schemes in reducing PAPR are also presented. Companding OFDM symbols prior to transmission using the μ-Law has also been shown in previous papers to further reduce the PAPR. This paper now presents the results of combining both companding with various phasing schemes. The Bit-Error Rate (BER) performance of various PAPR reduction techniques in an Additive White Gaussian Noise (AWGN) channel is also presented. It is shown that combining companding and the application of phasing schemes can significantly improve further PAPR reduction as well as improve the BER performance.","PeriodicalId":433452,"journal":{"name":"2006 IEEE GCC Conference (GCC)","volume":"249 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122657596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-03-20DOI: 10.1109/IEEEGCC.2006.5686250
M N Noaman, A. M. Omar
The design of fuzzy controller can be supported by comparing the signal with the neural network controller. Such approaches are usually called hybrid neural - fuzzy controller or multi controller. The hybrid model is able to compare the signal from the fuzzy controller and neural network learning with back propagation method. In this paper the plant is a DC motor base assembly with Pittman gear head servomotor using in robot and another applications, in order to evaluate the system performance when the motor load is changing. Due to this change the speed of the motor will be decreasing and the plant parameter is changed. Therefore, adaptive hybrid neural fuzzy controller is designed to adapt this system change using augmented error method.
{"title":"Adaptive hybrid neural fuzzy controller using augmented error method","authors":"M N Noaman, A. M. Omar","doi":"10.1109/IEEEGCC.2006.5686250","DOIUrl":"https://doi.org/10.1109/IEEEGCC.2006.5686250","url":null,"abstract":"The design of fuzzy controller can be supported by comparing the signal with the neural network controller. Such approaches are usually called hybrid neural - fuzzy controller or multi controller. The hybrid model is able to compare the signal from the fuzzy controller and neural network learning with back propagation method. In this paper the plant is a DC motor base assembly with Pittman gear head servomotor using in robot and another applications, in order to evaluate the system performance when the motor load is changing. Due to this change the speed of the motor will be decreasing and the plant parameter is changed. Therefore, adaptive hybrid neural fuzzy controller is designed to adapt this system change using augmented error method.","PeriodicalId":433452,"journal":{"name":"2006 IEEE GCC Conference (GCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130718487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-03-20DOI: 10.1109/IEEEGCC.2006.5686257
A. Farah, H. Khali
This paper presents a scheme for joint signing/verifying a message by many signers to provide data authenticity, integrity, and non-repudiation for a group of people. The signature security is based on the computational intractability of the discrete logarithm problem (DLP) in prime order subgroup of Z*p as in Digital Signature Algorithm (DSA) scheme. The proposed scheme is an extension of DSA to a group of signers who jointly sign the message. The Signature of a message can be verified individually for each signer, or collectively for a subgroup or entire group. Moreover, the scheme can be used for group membership authentication. Finally, the proposed scheme can be used in many applications, such as E-commerce and E-government.
{"title":"Joint Multiple signature scheme for group-oriented authentication and non-repudiation","authors":"A. Farah, H. Khali","doi":"10.1109/IEEEGCC.2006.5686257","DOIUrl":"https://doi.org/10.1109/IEEEGCC.2006.5686257","url":null,"abstract":"This paper presents a scheme for joint signing/verifying a message by many signers to provide data authenticity, integrity, and non-repudiation for a group of people. The signature security is based on the computational intractability of the discrete logarithm problem (DLP) in prime order subgroup of Z*p as in Digital Signature Algorithm (DSA) scheme. The proposed scheme is an extension of DSA to a group of signers who jointly sign the message. The Signature of a message can be verified individually for each signer, or collectively for a subgroup or entire group. Moreover, the scheme can be used for group membership authentication. Finally, the proposed scheme can be used in many applications, such as E-commerce and E-government.","PeriodicalId":433452,"journal":{"name":"2006 IEEE GCC Conference (GCC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133523434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-03-20DOI: 10.1109/IEEEGCC.2006.5686177
W. Aljaism, M. Nagrial, J. Rizk
This paper presents the results of an investigation of torque development in the air gap of a 6/4 and 8/6 switched reluctance machines (SRM). Due to the force components acting on the rotor enables us to provide more accurate picture of the torque generation and vibration in this family of electric machines. The analysis for the torque is computed by finite element method. The torque optimisation is investigated by changing the pole arc/pole pitch ratio (y) of the stator, rotor and yoke dimensions.
{"title":"Investigation of torque development in SRM under single phase excitation","authors":"W. Aljaism, M. Nagrial, J. Rizk","doi":"10.1109/IEEEGCC.2006.5686177","DOIUrl":"https://doi.org/10.1109/IEEEGCC.2006.5686177","url":null,"abstract":"This paper presents the results of an investigation of torque development in the air gap of a 6/4 and 8/6 switched reluctance machines (SRM). Due to the force components acting on the rotor enables us to provide more accurate picture of the torque generation and vibration in this family of electric machines. The analysis for the torque is computed by finite element method. The torque optimisation is investigated by changing the pole arc/pole pitch ratio (y) of the stator, rotor and yoke dimensions.","PeriodicalId":433452,"journal":{"name":"2006 IEEE GCC Conference (GCC)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133830391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-03-20DOI: 10.1109/IEEEGCC.2006.5686242
D. Boughaci, H. Drias
Electronic commerce is an Internet-based business transactions performed electronically by individuals, companies, corporations and governments utilizing information and communication technologies. The most important obstacle to further expansion for e-commerce has been the lack of adequate security protections. When sending secure data via the Web, four items, no provided by Internet, are needed: confidentiality, Integrity, Authentication, and non-repudiability. This paper describes them, briefly summarizes some relevant cryptographic technologies and proposes a novel cryptographic-based model to support a secure e-commerce. More precisely, our proposed model uses XML combined with cryptographic techniques to create a secure session between partners in which the traffic between the partners is encrypted and only the adequate participants can decrypt it, to transmit structured data across the Web and to further improve the security of the exchanged documents.
{"title":"A secure e-transaction model for e-commerce","authors":"D. Boughaci, H. Drias","doi":"10.1109/IEEEGCC.2006.5686242","DOIUrl":"https://doi.org/10.1109/IEEEGCC.2006.5686242","url":null,"abstract":"Electronic commerce is an Internet-based business transactions performed electronically by individuals, companies, corporations and governments utilizing information and communication technologies. The most important obstacle to further expansion for e-commerce has been the lack of adequate security protections. When sending secure data via the Web, four items, no provided by Internet, are needed: confidentiality, Integrity, Authentication, and non-repudiability. This paper describes them, briefly summarizes some relevant cryptographic technologies and proposes a novel cryptographic-based model to support a secure e-commerce. More precisely, our proposed model uses XML combined with cryptographic techniques to create a secure session between partners in which the traffic between the partners is encrypted and only the adequate participants can decrypt it, to transmit structured data across the Web and to further improve the security of the exchanged documents.","PeriodicalId":433452,"journal":{"name":"2006 IEEE GCC Conference (GCC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134604323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-03-20DOI: 10.1109/IEEEGCC.2006.5686237
M. Mir, T. Sharif, Z. Ahmadian, A. Hassanpour
This paper describes the development and testing of a web-based remote laboratory for performing experiments in basic electrical engineering courses. The prototype experiments are from a variety of courses including circuit analysis, logic design, analog electronics, digital electronics, and industrial control. In addition to observing the waveforms and reading the measured voltage and current values, the remote user can also change certain parameters of the experiment such as signal frequency, amplitude, gain, and digital inputs. A digital camera in the laboratory provides the remote user updated video images of the experimental setup. Audio instructions about the selected experiment are also provided. Some test results are described and limitations of the presented laboratory setup are discussed.
{"title":"A web-based remote laboratory for performing experiments in basic electrical engineering courses","authors":"M. Mir, T. Sharif, Z. Ahmadian, A. Hassanpour","doi":"10.1109/IEEEGCC.2006.5686237","DOIUrl":"https://doi.org/10.1109/IEEEGCC.2006.5686237","url":null,"abstract":"This paper describes the development and testing of a web-based remote laboratory for performing experiments in basic electrical engineering courses. The prototype experiments are from a variety of courses including circuit analysis, logic design, analog electronics, digital electronics, and industrial control. In addition to observing the waveforms and reading the measured voltage and current values, the remote user can also change certain parameters of the experiment such as signal frequency, amplitude, gain, and digital inputs. A digital camera in the laboratory provides the remote user updated video images of the experimental setup. Audio instructions about the selected experiment are also provided. Some test results are described and limitations of the presented laboratory setup are discussed.","PeriodicalId":433452,"journal":{"name":"2006 IEEE GCC Conference (GCC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131803662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-03-20DOI: 10.1109/IEEEGCC.2006.5686233
V. Farahani, A. Kazemi
The restructuring of the electric power industry has involved paradigm shifts in the real time control activities of the power grids. Managing dispatch is one of the important control activities in a power system. With the trend of an increasing number of bilateral contracts being signed for electricity market trades, the possibility of insufficient resources leading to network congestion may be unavoidable. In this scenario, congestion management becomes an important issue. Real-time transmission congestion can be defined as the operating condition in which there is not enough transmission capability to implement all the traded transactions. It may be alleviated by incorporating line capacity constraints in the dispatch and scheduling process. This may involve redispatch of generation or load curtailment. Other possible means for relieving congestion are operation of FACTS devices (TCSC), these two ways are compared in this paper.
{"title":"Comparing two ways of congestion management in bilateral based power market","authors":"V. Farahani, A. Kazemi","doi":"10.1109/IEEEGCC.2006.5686233","DOIUrl":"https://doi.org/10.1109/IEEEGCC.2006.5686233","url":null,"abstract":"The restructuring of the electric power industry has involved paradigm shifts in the real time control activities of the power grids. Managing dispatch is one of the important control activities in a power system. With the trend of an increasing number of bilateral contracts being signed for electricity market trades, the possibility of insufficient resources leading to network congestion may be unavoidable. In this scenario, congestion management becomes an important issue. Real-time transmission congestion can be defined as the operating condition in which there is not enough transmission capability to implement all the traded transactions. It may be alleviated by incorporating line capacity constraints in the dispatch and scheduling process. This may involve redispatch of generation or load curtailment. Other possible means for relieving congestion are operation of FACTS devices (TCSC), these two ways are compared in this paper.","PeriodicalId":433452,"journal":{"name":"2006 IEEE GCC Conference (GCC)","volume":"388 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124809232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-03-20DOI: 10.1109/IEEEGCC.2006.5686211
K. Al-Dhmani, M. Al-Mualla
The Barni method has been proposed in the literature for watermarking still images. In our previous work, we have extended this method to work for image sequences (video). However, it was found that this extended frame-based version fails under video compression attacks. In this paper, we present a block-based version to improve robustness against such attacks.
{"title":"A block-based Barni watermarking method for improved robustness under video compression attacks","authors":"K. Al-Dhmani, M. Al-Mualla","doi":"10.1109/IEEEGCC.2006.5686211","DOIUrl":"https://doi.org/10.1109/IEEEGCC.2006.5686211","url":null,"abstract":"The Barni method has been proposed in the literature for watermarking still images. In our previous work, we have extended this method to work for image sequences (video). However, it was found that this extended frame-based version fails under video compression attacks. In this paper, we present a block-based version to improve robustness against such attacks.","PeriodicalId":433452,"journal":{"name":"2006 IEEE GCC Conference (GCC)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124717162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-03-20DOI: 10.1109/IEEEGCC.2006.5686249
M. Taleb, Mohamed Jassim Ditto, T. Bouthiba
Performance of a short transmission line models is investigated in this paper. The performance accuracy is assessed by considering three dynamic models for the line. Computer simulations show that the results of the dynamic models agree with the results of the standard line model during steady state operations but they disagree with it during transient circumstances. In controlling the level of transients, the paper results recommend that in energizing a line, it is preferable to switch-on the poles of circuit breaker in a sequential manner rather than in a simultaneous manner. Also, simulation results show that transient voltages in a loaded line case are more severe than the unloaded line case.
{"title":"Performance of short transmission lines models","authors":"M. Taleb, Mohamed Jassim Ditto, T. Bouthiba","doi":"10.1109/IEEEGCC.2006.5686249","DOIUrl":"https://doi.org/10.1109/IEEEGCC.2006.5686249","url":null,"abstract":"Performance of a short transmission line models is investigated in this paper. The performance accuracy is assessed by considering three dynamic models for the line. Computer simulations show that the results of the dynamic models agree with the results of the standard line model during steady state operations but they disagree with it during transient circumstances. In controlling the level of transients, the paper results recommend that in energizing a line, it is preferable to switch-on the poles of circuit breaker in a sequential manner rather than in a simultaneous manner. Also, simulation results show that transient voltages in a loaded line case are more severe than the unloaded line case.","PeriodicalId":433452,"journal":{"name":"2006 IEEE GCC Conference (GCC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125251565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}