首页 > 最新文献

2009 IEEE Symposium on Industrial Electronics & Applications最新文献

英文 中文
Analytical solution for anthropomorphic limbs model, (IK of human arm) 拟人肢体模型的解析解(IK of human arm)
Pub Date : 2009-12-18 DOI: 10.1109/ISIEA.2009.5356374
M. Z. Al-Faiz, Y. Al-Mashhadany
This paper considers a proposed algorithm for computation of the inverse kinematic(IK) model of the human arm. This algorithm introduces a new IK method suitable for reaching tasks performed by autonomous and interactive virtual humans. The basic problem is to pose the character in such a way that arm hand reaches the target ( position and orientation ) in space. The algorithm is composed of two phases. The first phase is the limitation of real task which concerning the human arm movement and the second phase presents the analytical solution for inverse kinematic problem (IKP) by trigonometric relations and algebraic solution according to limitation of joints. This algorithm is simulated by using MATLAB Ver. R2008a, and satisfied results are obtained, that explains the ability of the proposed algorithm to solve the inverse kinematic problem for real human arm.
本文提出了一种计算人体手臂逆运动学模型的算法。该算法引入了一种新的IK方法,适用于由自主交互的虚拟人完成的任务。最基本的问题是让角色的手能够到达目标(位置和方向)。该算法分为两个阶段。第一阶段是关于人体手臂运动的实际任务的限制,第二阶段是根据关节的限制,用三角关系和代数方法给出运动学逆问题的解析解。利用MATLAB对该算法进行了仿真。R2008a,得到了满意的结果,说明了该算法求解真实人体手臂逆运动问题的能力。
{"title":"Analytical solution for anthropomorphic limbs model, (IK of human arm)","authors":"M. Z. Al-Faiz, Y. Al-Mashhadany","doi":"10.1109/ISIEA.2009.5356374","DOIUrl":"https://doi.org/10.1109/ISIEA.2009.5356374","url":null,"abstract":"This paper considers a proposed algorithm for computation of the inverse kinematic(IK) model of the human arm. This algorithm introduces a new IK method suitable for reaching tasks performed by autonomous and interactive virtual humans. The basic problem is to pose the character in such a way that arm hand reaches the target ( position and orientation ) in space. The algorithm is composed of two phases. The first phase is the limitation of real task which concerning the human arm movement and the second phase presents the analytical solution for inverse kinematic problem (IKP) by trigonometric relations and algebraic solution according to limitation of joints. This algorithm is simulated by using MATLAB Ver. R2008a, and satisfied results are obtained, that explains the ability of the proposed algorithm to solve the inverse kinematic problem for real human arm.","PeriodicalId":6447,"journal":{"name":"2009 IEEE Symposium on Industrial Electronics & Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87753187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Voltage rise due to inter-connection of embedded generators to distribution network on weak feeder 在弱馈线上,嵌入式发电机与配电网互连导致电压上升
Pub Date : 2009-12-18 DOI: 10.1109/ISIEA.2009.5356314
Saad Mekhilef, T. R. Chard, V. Ramachandramurthy
This paper presents voltage rise due to inter-connection of embedded generators to distribution network on weak feeder. Studies were performed on Malaysia's 11kV network using a simulation tool called PSS ADEPTTM. Various scenarios were investigated such as EG penetration level, location of EG plant, sizing of feeder (distance from MAIN substation), loading of network, Automatic Voltage Control relay set point at MAIN substation, power factor of network and various operating mode of EG. It is concluded that the introduction of EG at the distribution network will cause voltage rise and this leads to customer voltages being out of the allowable range. Through careful design of the connection arrangement, Distribution Network Operator (DNO) can ensure that the new EG connection does not cause problems and at the same time, enhance the performance of the network.
本文介绍了嵌入式发电机在弱馈线上与配电网互连时产生的电压上升问题。研究使用了一种名为PSS ADEPTTM的模拟工具在马来西亚的11kV网络上进行。研究了EG的渗透水平、EG厂位置、馈线尺寸(与主变电站的距离)、电网负荷、主变电站电压自动控制继电器设定点、电网功率因数和EG的各种运行模式等各种场景。结果表明,在配电网中引入EG会引起电压上升,从而导致用户电压超出允许范围。配电网运营商(DNO)通过对接线布置的精心设计,可以保证新的EG接线不会产生问题,同时提高电网的性能。
{"title":"Voltage rise due to inter-connection of embedded generators to distribution network on weak feeder","authors":"Saad Mekhilef, T. R. Chard, V. Ramachandramurthy","doi":"10.1109/ISIEA.2009.5356314","DOIUrl":"https://doi.org/10.1109/ISIEA.2009.5356314","url":null,"abstract":"This paper presents voltage rise due to inter-connection of embedded generators to distribution network on weak feeder. Studies were performed on Malaysia's 11kV network using a simulation tool called PSS ADEPTTM. Various scenarios were investigated such as EG penetration level, location of EG plant, sizing of feeder (distance from MAIN substation), loading of network, Automatic Voltage Control relay set point at MAIN substation, power factor of network and various operating mode of EG. It is concluded that the introduction of EG at the distribution network will cause voltage rise and this leads to customer voltages being out of the allowable range. Through careful design of the connection arrangement, Distribution Network Operator (DNO) can ensure that the new EG connection does not cause problems and at the same time, enhance the performance of the network.","PeriodicalId":6447,"journal":{"name":"2009 IEEE Symposium on Industrial Electronics & Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80043733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Microvolt T-wave alternans analysis using Lyapunov exponents 利用李亚普诺夫指数分析微伏t波交流电
Pub Date : 2009-12-18 DOI: 10.1109/ISIEA.2009.5356488
Roozbeh Rajabi, H. Ghassemian
T-wave alternans (TWA) is a marker of cardiac instability and high risk of sudden cardiac death. In this paper we propose a new approach for the TWA detection. For this purpose Lyapunov spectrum was calculated from T-wave time series. To evaluate the detector performance, simulated T-waves based on the real ECG signals were used. Detected and simulated episodes were compared, in terms of sensitivity and positive predictivity. The results show that this method can reliably detect T-wave alternans episodes.
t波交替(TWA)是心脏不稳定和心源性猝死高风险的标志。本文提出了一种新的TWA检测方法。为此,李雅普诺夫谱由t波时间序列计算。为了评估检测器的性能,我们使用了基于真实心电信号的模拟t波。在敏感性和积极预测方面,比较检测到的和模拟的发作。结果表明,该方法能可靠地检测出t波交替发作。
{"title":"Microvolt T-wave alternans analysis using Lyapunov exponents","authors":"Roozbeh Rajabi, H. Ghassemian","doi":"10.1109/ISIEA.2009.5356488","DOIUrl":"https://doi.org/10.1109/ISIEA.2009.5356488","url":null,"abstract":"T-wave alternans (TWA) is a marker of cardiac instability and high risk of sudden cardiac death. In this paper we propose a new approach for the TWA detection. For this purpose Lyapunov spectrum was calculated from T-wave time series. To evaluate the detector performance, simulated T-waves based on the real ECG signals were used. Detected and simulated episodes were compared, in terms of sensitivity and positive predictivity. The results show that this method can reliably detect T-wave alternans episodes.","PeriodicalId":6447,"journal":{"name":"2009 IEEE Symposium on Industrial Electronics & Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80120000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Study of mixed mode scenarios with IEEE 802.11 networks and Bluetooth network IEEE 802.11网络和蓝牙网络混合模式场景的研究
Pub Date : 2009-12-18 DOI: 10.1109/ISIEA.2009.5356454
B. Issac
Wireless networks are increasingly being implemented and its acceptance in the society is booming. In this paper, the performance analysis of 802.11 networks was done for different standards like IEEE 802.11a, 802.11b, and 802.11g in different scenarios. The throughput and traffic dropped for such networks in homogeneous and heterogeneous groupings were studied. Also Bluetooth nodes were tested with 802.11b nodes and the network performance was analyzed. Observations on performance were eventually done based on these network simulations that were implemented using existing network models.
无线网络的应用越来越广泛,在社会上的接受度也越来越高。本文针对IEEE 802.11a、802.11b和802.11g等不同标准在不同场景下对802.11网络进行了性能分析。研究了同质分组和异质分组下网络的吞吐量和流量下降情况。对蓝牙节点与802.11b节点进行了测试,并对网络性能进行了分析。对性能的观察最终基于使用现有网络模型实现的这些网络模拟。
{"title":"Study of mixed mode scenarios with IEEE 802.11 networks and Bluetooth network","authors":"B. Issac","doi":"10.1109/ISIEA.2009.5356454","DOIUrl":"https://doi.org/10.1109/ISIEA.2009.5356454","url":null,"abstract":"Wireless networks are increasingly being implemented and its acceptance in the society is booming. In this paper, the performance analysis of 802.11 networks was done for different standards like IEEE 802.11a, 802.11b, and 802.11g in different scenarios. The throughput and traffic dropped for such networks in homogeneous and heterogeneous groupings were studied. Also Bluetooth nodes were tested with 802.11b nodes and the network performance was analyzed. Observations on performance were eventually done based on these network simulations that were implemented using existing network models.","PeriodicalId":6447,"journal":{"name":"2009 IEEE Symposium on Industrial Electronics & Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87091452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A new Shifted Scaled LS channel estimator for Rician flat fading MIMO channel 一种新的平移比例LS信道估计器用于平坦衰落MIMO信道
Pub Date : 2009-12-18 DOI: 10.1109/ISIEA.2009.5356473
H. Nooralizadeh, S. Moghaddam
In this paper, Training-Based Channel Estimation (TBCE) method is considered in the Rician flat fading Multiple-Input Multiple-Output (MIMO) channels. In this channel model, the performance of the conventional Least Squares (LS) channel estimator is probed first. A new shifted type of Scaled Least Squares (SLS) channel estimator, entitled as SSLS, is then proposed. It is a generalized form of the SLS technique. The optimal choice of training signals using Mean Square Error (MSE) criterion is also achieved. It is observed that the LS estimator cannot exploit the knowledge of channel statistics. However, the SSLS estimator exploits the trace of a specifically defined matrix of the channel covariance and the receiver noise power as well as the knowledge of first-order statistics about the channel. It is shown that in the Rician fading MIMO channel, the new channel estimator has better performance than the popular LS and SLS techniques. Theoretical analysis and simulation results demonstrate that increasing Rice factor is a reason for decreasing MSE of the proposed estimator.
本文研究了基于训练的信道估计(TBCE)方法在平坦衰落多输入多输出(MIMO)信道中的应用。在该信道模型中,首先探讨了传统最小二乘信道估计器的性能。然后,提出了一种新的移位型按比例最小二乘(SLS)信道估计器,称为SSLS。它是SLS技术的一种广义形式。利用均方误差(MSE)准则实现了训练信号的最优选择。观察到LS估计器不能利用信道统计的知识。然而,SSLS估计器利用信道协方差和接收机噪声功率的特定定义矩阵的跟踪,以及信道的一阶统计信息。结果表明,在渐近衰落的MIMO信道中,该信道估计器比常用的LS和SLS信道估计器具有更好的性能。理论分析和仿真结果表明,Rice因子的增加是导致估计器MSE降低的原因之一。
{"title":"A new Shifted Scaled LS channel estimator for Rician flat fading MIMO channel","authors":"H. Nooralizadeh, S. Moghaddam","doi":"10.1109/ISIEA.2009.5356473","DOIUrl":"https://doi.org/10.1109/ISIEA.2009.5356473","url":null,"abstract":"In this paper, Training-Based Channel Estimation (TBCE) method is considered in the Rician flat fading Multiple-Input Multiple-Output (MIMO) channels. In this channel model, the performance of the conventional Least Squares (LS) channel estimator is probed first. A new shifted type of Scaled Least Squares (SLS) channel estimator, entitled as SSLS, is then proposed. It is a generalized form of the SLS technique. The optimal choice of training signals using Mean Square Error (MSE) criterion is also achieved. It is observed that the LS estimator cannot exploit the knowledge of channel statistics. However, the SSLS estimator exploits the trace of a specifically defined matrix of the channel covariance and the receiver noise power as well as the knowledge of first-order statistics about the channel. It is shown that in the Rician fading MIMO channel, the new channel estimator has better performance than the popular LS and SLS techniques. Theoretical analysis and simulation results demonstrate that increasing Rice factor is a reason for decreasing MSE of the proposed estimator.","PeriodicalId":6447,"journal":{"name":"2009 IEEE Symposium on Industrial Electronics & Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73478099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Reliability of recursive concentrator 递归浓缩器的可靠性
Pub Date : 2009-12-18 DOI: 10.1109/ISIEA.2009.5356460
Sa'ed Abed, S. Alouneh, O. Ait Mohamed
The inverse omega network possesses various attractive properties and its constituent node has a fixed degree independent of the system size. In this paper, a proof for a technique applied recursively to construct an N -input concentrator switching network which is similar in topology to the inverse omega network will be introduced. Also an examination of a reliable inverse omega network in the presence of any single node failure will be presented. The new configuration of the system ensures providing the same high performance results obtained before the failure. In this paper, we show how to check the passibility by the inverse omega network of any given connection set and list some of the general patterns passable by this network. We also show that the concentrate operation passable by the inverse omega network is just a special case of the more general alternate sequence operation.
逆欧米伽网络具有各种吸引特性,其组成节点具有与系统大小无关的固定度。本文介绍了一种递归构造N输入集中器交换网络的技术,该网络的拓扑结构与逆网络相似。此外,在存在任何单节点故障的情况下,将介绍可靠的逆ω网络的检查。系统的新配置确保提供与故障前相同的高性能结果。在本文中,我们给出了如何用逆网络来检验任意给定连接集的可通过性,并列出了该网络可通过的一些一般模式。我们还证明了逆网络可通过的集中操作只是更一般的交替序列操作的一个特例。
{"title":"Reliability of recursive concentrator","authors":"Sa'ed Abed, S. Alouneh, O. Ait Mohamed","doi":"10.1109/ISIEA.2009.5356460","DOIUrl":"https://doi.org/10.1109/ISIEA.2009.5356460","url":null,"abstract":"The inverse omega network possesses various attractive properties and its constituent node has a fixed degree independent of the system size. In this paper, a proof for a technique applied recursively to construct an N -input concentrator switching network which is similar in topology to the inverse omega network will be introduced. Also an examination of a reliable inverse omega network in the presence of any single node failure will be presented. The new configuration of the system ensures providing the same high performance results obtained before the failure. In this paper, we show how to check the passibility by the inverse omega network of any given connection set and list some of the general patterns passable by this network. We also show that the concentrate operation passable by the inverse omega network is just a special case of the more general alternate sequence operation.","PeriodicalId":6447,"journal":{"name":"2009 IEEE Symposium on Industrial Electronics & Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88801212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Immune-inspired framework for securing hybrid MANET 免疫启发的混合MANET安全框架
Pub Date : 2009-12-18 DOI: 10.1109/ISIEA.2009.5356451
Y. Mohamed, A. Abdullah
A malicious node in mobile ad hoc networks (MANETs) can falsify a route advertisement, overwhelming traffic without forwarding it, helps in forwarding corrupted data, and injecting of false or uncompleted information. Mapping immune system security mechanisms to networking security can powerfully contribute in securing MANETs, since both are sharing some similar features because of the distributability environment in each. In a step for providing secured and reliable broadband services, formal specification logic along with a novel Immune-inspired security framework (I2MANETs) have been introduced. The different immune components synchronized to the framework through an agent that has the ability to replicate, monitor, detect, classify, and block/isolate the corrupted packets and/or nodes in a federated domain. The framework functions as the Human Immune System in: first response, second response, adaptability, distributability, survivability and other immune features. The I2MANETs can basically installed in one node in the domain, then automatically spread to the rest of the domain.
移动自组织网络(manet)中的恶意节点可以伪造路由发布,使流量无法转发,帮助转发损坏的数据,并注入虚假或不完整的信息。将免疫系统安全机制映射到网络安全可以有力地保护manet,因为两者都共享一些相似的特性,因为它们各自的可分发环境。在提供安全可靠的宽带服务的步骤中,引入了正式的规范逻辑以及一种新的免疫启发的安全框架(I2MANETs)。不同的免疫组件通过代理同步到框架,代理具有复制、监视、检测、分类和阻止/隔离联邦域中损坏的数据包和/或节点的能力。该框架具有人体免疫系统的第一反应、第二反应、适应性、可分布性、生存性等免疫特性。i2manet基本上可以安装在域中的一个节点上,然后自动扩展到域中的其他节点。
{"title":"Immune-inspired framework for securing hybrid MANET","authors":"Y. Mohamed, A. Abdullah","doi":"10.1109/ISIEA.2009.5356451","DOIUrl":"https://doi.org/10.1109/ISIEA.2009.5356451","url":null,"abstract":"A malicious node in mobile ad hoc networks (MANETs) can falsify a route advertisement, overwhelming traffic without forwarding it, helps in forwarding corrupted data, and injecting of false or uncompleted information. Mapping immune system security mechanisms to networking security can powerfully contribute in securing MANETs, since both are sharing some similar features because of the distributability environment in each. In a step for providing secured and reliable broadband services, formal specification logic along with a novel Immune-inspired security framework (I2MANETs) have been introduced. The different immune components synchronized to the framework through an agent that has the ability to replicate, monitor, detect, classify, and block/isolate the corrupted packets and/or nodes in a federated domain. The framework functions as the Human Immune System in: first response, second response, adaptability, distributability, survivability and other immune features. The I2MANETs can basically installed in one node in the domain, then automatically spread to the rest of the domain.","PeriodicalId":6447,"journal":{"name":"2009 IEEE Symposium on Industrial Electronics & Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86517360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A new topology for dynamic voltage restorers without dc link 无直流链路动态电压恢复器的新拓扑
Pub Date : 2009-12-18 DOI: 10.1109/ISIEA.2009.5356312
E. Babaei, M. Farhadi Kangarlu
In this paper, a new topology based on matrix converter (MC) is proposed for dynamic voltage restorer (DVR). Matrix converters convert ac to ac with no dc link. So, applying this type of converters is an acceptable way to eliminate dc link in conventional DVRs. Three independent three-phase to single-phase MCs with 6 or 8 bi-directional power switches are applied in the proposed topology. As a result, the proposed DVR structure can be used to restore load voltage in both balanced and unbalanced voltage sag and swell conditions. The range of the DVR's correct operation varies selecting 6 or 8 numbered bi-directional power switches in matrix converters. The proposed topology increases the speed and efficiency of DVR and in return decreases the size of DVR, due to the dc link elimination. The proposed DVR can be presented as a package able to compensate voltage sag and swell regardless of the balance or unbalance conditions. Also, one of the most important capabilities of the proposed DVR is the voltage restoring in extremely disturbed networks. The experimental results as well as simulation results in PSCAD/EMTDC environment show that the proposed topology operates correctly and the voltage of sensitive load is completely controlled.
本文提出了一种基于矩阵变换器(MC)的动态电压恢复器拓扑结构。矩阵变换器将交流电转换为交流电,没有直流链路。因此,应用这种类型的转换器是消除传统dvr中的直流链路的一种可接受的方法。在所提出的拓扑结构中,采用了三个独立的三相到单相的mc,带有6个或8个双向电源开关。因此,所提出的DVR结构可用于平衡和不平衡电压跌落和膨胀条件下的负载电压恢复。在矩阵变换器中选择6或8个编号的双向功率开关,DVR的正确操作范围会有所不同。由于消除了直流链路,所提出的拓扑结构提高了DVR的速度和效率,同时减小了DVR的尺寸。所提出的DVR可以作为一个能够补偿电压凹陷和膨胀的封装,而不管平衡或不平衡的情况。此外,所提出的DVR最重要的功能之一是在极度干扰的网络中恢复电压。实验结果以及在PSCAD/EMTDC环境下的仿真结果表明,所提出的拓扑结构工作正确,敏感负载电压得到完全控制。
{"title":"A new topology for dynamic voltage restorers without dc link","authors":"E. Babaei, M. Farhadi Kangarlu","doi":"10.1109/ISIEA.2009.5356312","DOIUrl":"https://doi.org/10.1109/ISIEA.2009.5356312","url":null,"abstract":"In this paper, a new topology based on matrix converter (MC) is proposed for dynamic voltage restorer (DVR). Matrix converters convert ac to ac with no dc link. So, applying this type of converters is an acceptable way to eliminate dc link in conventional DVRs. Three independent three-phase to single-phase MCs with 6 or 8 bi-directional power switches are applied in the proposed topology. As a result, the proposed DVR structure can be used to restore load voltage in both balanced and unbalanced voltage sag and swell conditions. The range of the DVR's correct operation varies selecting 6 or 8 numbered bi-directional power switches in matrix converters. The proposed topology increases the speed and efficiency of DVR and in return decreases the size of DVR, due to the dc link elimination. The proposed DVR can be presented as a package able to compensate voltage sag and swell regardless of the balance or unbalance conditions. Also, one of the most important capabilities of the proposed DVR is the voltage restoring in extremely disturbed networks. The experimental results as well as simulation results in PSCAD/EMTDC environment show that the proposed topology operates correctly and the voltage of sensitive load is completely controlled.","PeriodicalId":6447,"journal":{"name":"2009 IEEE Symposium on Industrial Electronics & Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90809079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 60
Choice for a support vector machine kernel function for recognizing asphyxia from infant cries 从婴儿哭声中识别窒息的支持向量机核函数的选择
Pub Date : 2009-12-18 DOI: 10.1109/ISIEA.2009.5356372
R. Sahak, W. Mansor, L. Khuan, A. Yassin, A. Zabidi, Farah Yasmin Abd Rahman
This paper investigates the performance of several kernel functions of support vector machine in detecting asphyxia from infant cries. In this study, Mel frequency cepstrum coefficients derived from the recorded infant cries were used as the input vectors. These input vectors were trained and classified using support vector machine. Four types of kernels - linear, quadratic, polynomial and radial basic function, were experimented and compared. Accuracy, sensitivity and specificity were adopted as criteria to obtain the best kernel. Experimental results showed that radial basic function kernel (σ = 35) is the best kernel with an accuracy of 85.15%, sensitivity of 91% and specificity of 71%.
本文研究了支持向量机核函数在婴儿哭声中检测窒息的性能。在这项研究中,Mel频率倒谱系数从记录的婴儿哭声被用作输入向量。使用支持向量机对这些输入向量进行训练和分类。对线性核、二次核、多项式核和径向基函数核进行了实验和比较。以准确性、灵敏度和特异性为标准,获得最佳核函数。实验结果表明,径向基函数核(σ = 35)为最佳核,准确率为85.15%,灵敏度为91%,特异度为71%。
{"title":"Choice for a support vector machine kernel function for recognizing asphyxia from infant cries","authors":"R. Sahak, W. Mansor, L. Khuan, A. Yassin, A. Zabidi, Farah Yasmin Abd Rahman","doi":"10.1109/ISIEA.2009.5356372","DOIUrl":"https://doi.org/10.1109/ISIEA.2009.5356372","url":null,"abstract":"This paper investigates the performance of several kernel functions of support vector machine in detecting asphyxia from infant cries. In this study, Mel frequency cepstrum coefficients derived from the recorded infant cries were used as the input vectors. These input vectors were trained and classified using support vector machine. Four types of kernels - linear, quadratic, polynomial and radial basic function, were experimented and compared. Accuracy, sensitivity and specificity were adopted as criteria to obtain the best kernel. Experimental results showed that radial basic function kernel (σ = 35) is the best kernel with an accuracy of 85.15%, sensitivity of 91% and specificity of 71%.","PeriodicalId":6447,"journal":{"name":"2009 IEEE Symposium on Industrial Electronics & Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82382840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An overview of microcode-based and FSM-based programmable memory built-in self test (MBIST) controller for coupling fault detection 基于微码和基于fsm的可编程存储器内置自检(MBIST)耦合故障检测控制器概述
Pub Date : 2009-12-18 DOI: 10.1109/ISIEA.2009.5356418
Nur Qamarina Mohd Noor, A. Saparon, Yusrina Yusof
Microcode-based and FSM-based controllers are two widely known architectures used for programmable memory built-in self test. These techniques are popular because of their flexibility of programming new test algorithms. In this paper, the architectures for both controllers are designed to implement a new test algorithm MARCH SAM that gives a better fault coverage in detecting single-cell fault and all intra-word coupling fault (CF).The components of each controllers are studied and designed. Both of the controllers are written using Verilog HDL and implemented in Altera Cyclone II FPGA. The simulation and synthesis results of both architectures are presented. Further analysis of the logic area usage and flexibility of these controllers are done on the synthesis results. The performance of each controller is compared in term of speed and area overhead.
基于微码和基于fsm的控制器是两种广泛使用的架构,用于可编程内存内置自检。这些技术之所以受欢迎,是因为它们可以灵活地编写新的测试算法。本文设计了这两种控制器的体系结构,以实现一种新的测试算法MARCH SAM,该算法在检测单细胞故障和所有字内耦合故障(CF)时具有更好的故障覆盖率。对各控制器的组成部分进行了研究和设计。这两个控制器都使用Verilog HDL编写,并在Altera Cyclone II FPGA中实现。给出了两种结构的仿真和综合结果。在综合结果的基础上,进一步分析了这些控制器的逻辑域使用和灵活性。在速度和面积开销方面比较了每个控制器的性能。
{"title":"An overview of microcode-based and FSM-based programmable memory built-in self test (MBIST) controller for coupling fault detection","authors":"Nur Qamarina Mohd Noor, A. Saparon, Yusrina Yusof","doi":"10.1109/ISIEA.2009.5356418","DOIUrl":"https://doi.org/10.1109/ISIEA.2009.5356418","url":null,"abstract":"Microcode-based and FSM-based controllers are two widely known architectures used for programmable memory built-in self test. These techniques are popular because of their flexibility of programming new test algorithms. In this paper, the architectures for both controllers are designed to implement a new test algorithm MARCH SAM that gives a better fault coverage in detecting single-cell fault and all intra-word coupling fault (CF).The components of each controllers are studied and designed. Both of the controllers are written using Verilog HDL and implemented in Altera Cyclone II FPGA. The simulation and synthesis results of both architectures are presented. Further analysis of the logic area usage and flexibility of these controllers are done on the synthesis results. The performance of each controller is compared in term of speed and area overhead.","PeriodicalId":6447,"journal":{"name":"2009 IEEE Symposium on Industrial Electronics & Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83878253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
2009 IEEE Symposium on Industrial Electronics & Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1