Abstract: The Wind Turbine Modeling in Wind Energy Conversion System (WECS) using Doubly-Fed Induction Generator (DFIG) PI Controller based design is presented. To study about the variable wind speed. The PI controller performs responding to the dynamic performance. The objective is to study the characteristic of wind turbine and finding the optimum wind speed suitable for wind turbine performance. This system will allow the specification setting (2.5MW). The output active power also corresponding same the input is given. And the reactive power produced by the wind turbine is regulated at 0 Mvar. Variable wind speed is optimum for drive train performance at 12.5 m/s (at maximum power coefficient point) from the simulation of DFIG by Simulink is described.
Abstract: Signature represents an individual characteristic of a
person which can be used for his / her validation. For such application
proper modeling is essential. Here we propose an offline signature
recognition and verification scheme which is based on extraction of
several features including one hybrid set from the input signature
and compare them with the already trained forms. Feature points
are classified using statistical parameters like mean and variance.
The scanned signature is normalized in slant using a very simple
algorithm with an intention to make the system robust which is
found to be very helpful. The slant correction is further aided by the
use of an Artificial Neural Network (ANN). The suggested scheme
discriminates between originals and forged signatures from simple
and random forgeries. The primary objective is to reduce the two
crucial parameters-False Acceptance Rate (FAR) and False Rejection
Rate (FRR) with lesser training time with an intension to make the
system dynamic using a cluster of ANNs forming a multiple classifier
system.
Abstract: In this paper, we study the multi-scenario knapsack problem, a variant of the well-known NP-Hard single knapsack problem. We investigate the use of an adaptive algorithm for solving heuristically the problem. The used method combines two complementary phases: a size reduction phase and a dynamic 2- opt procedure one. First, the reduction phase applies a polynomial reduction strategy; that is used for reducing the size problem. Second, the adaptive search procedure is applied in order to attain a feasible solution Finally, the performances of two versions of the proposed algorithm are evaluated on a set of randomly generated instances.
Abstract: In this paper, based on steady-state models of Flexible
AC Transmission System (FACTS) devices, the sizing of static
synchronous series compensator (SSSC) controllers in transmission
network is formed as an optimization problem. The objective of this
problem is to reduce the transmission losses in the network. The
optimization problem is solved using particle swarm optimization
(PSO) technique. The Newton-Raphson load flow algorithm is
modified to consider the insertion of the SSSC devices in the
network. A numerical example, illustrating the effectiveness of the
proposed algorithm, is introduced. In addition, a novel model of a 3-
phase voltage source converter (VSC) that is suitable for series
connected FACTS a controller is introduced. The model is verified
by simulation using Power System Blockset (PSB) and Simulink
software.
Abstract: Within dental-guided surgery, there has been a lack
of analytical methods for optimizing the treatment of the
rehabilitation concepts regarding geometrical variation. The purpose
of this study is to find the source of the greatest geometrical variation
contributor and sensitivity contributor with the help of virtual
variation simulation of a dental drill- and implant-guided surgery
process using a methodical approach. It is believed that lower
geometrical variation will lead to better patient security and higher
quality of dental drill- and implant-guided surgeries. It was found
that the origin of the greatest contributor to the most variation, and
hence where the foci should be set, in order to minimize geometrical
variation was in the assembly category (surgery). This was also the
category that was the most sensitive for geometrical variation.
Abstract: Quality evaluation of urban environment is an integral
part of efficient urban environment planning and management. The
development of fuzzy set theory (FST) and the introduction of FST
to the urban study field attempts to incorporate the gradual variation
and avoid loss of information. Urban environmental quality
assessment pertain to interpretation and forecast of the urban
environmental quality according to the national regulation about the
permitted content of contamination for the sake of protecting human
health and subsistence environment . A strategic motor vehicle
control strategy has to be proposed to mitigate the air pollution in the
city. There is no well defined guideline for the assessment of urban
air pollution and no systematic study has been reported so far for
Indian cities. The methodology adopted may be useful in similar
cities of India. Remote sensing & GIS can play significant role in
mapping air pollution.
Abstract: Near-infrared (NIR) spectroscopy is a widely used
method for material identification for laboratory and industrial applications.
While standard spectrometers only allow measurements at
one sampling point at a time, NIR Spectral Imaging techniques can
measure, in real-time, both the size and shape of an object as well as
identify the material the object is made of. The online classification
and sorting of recovered paper with NIR Spectral Imaging (SI)
is used with success in the paper recycling industry throughout
Europe. Recently, the globalisation of the recycling material streams
caused that water-based flexographic-printed newspapers mainly from
UK and Italy appear also in central Europe. These flexo-printed
newspapers are not sufficiently de-inkable with the standard de-inking
process originally developed for offset-printed paper. This de-inking
process removes the ink from recovered paper and is the fundamental
processing step to produce high-quality paper from recovered paper.
Thus, the flexo-printed newspapers are a growing problem for the
recycling industry as they reduce the quality of the produced paper
if their amount exceeds a certain limit within the recovered paper
material.
This paper presents the results of a research project for the
development of an automated entry inspection system for recovered
paper that was jointly conducted by CTR AG (Austria) and PTS
Papiertechnische Stiftung (Germany). Within the project an NIR
SI prototype for the identification of flexo-printed newspaper has
been developed. The prototype can identify and sort out flexoprinted
newspapers in real-time and achieves a detection accuracy
for flexo-printed newspaper of over 95%. NIR SI, the technology the
prototype is based on, allows the development of inspection systems
for incoming goods in a paper production facility as well as industrial
sorting systems for recovered paper in the recycling industry in the
near future.
Abstract: Self-organizing map (SOM) is a well known data reduction technique used in data mining. Data visualization can reveal structure in data sets that is otherwise hard to detect from raw data alone. However, interpretation through visual inspection is prone to errors and can be very tedious. There are several techniques for the automatic detection of clusters of code vectors found by SOMs, but they generally do not take into account the distribution of code vectors; this may lead to unsatisfactory clustering and poor definition of cluster boundaries, particularly where the density of data points is low. In this paper, we propose the use of a generic particle swarm optimization (PSO) algorithm for finding cluster boundaries directly from the code vectors obtained from SOMs. The application of our method to unlabeled call data for a mobile phone operator demonstrates its feasibility. PSO algorithm utilizes U-matrix of SOMs to determine cluster boundaries; the results of this novel automatic method correspond well to boundary detection through visual inspection of code vectors and k-means algorithm.
Abstract: Game theory could be used to analyze the conflicted
issues in the field of information hiding. In this paper, 2-phase game
can be used to build the embedder-attacker system to analyze the
limits of hiding capacity of embedding algorithms: the embedder
minimizes the expected damage and the attacker maximizes it. In the
system, the embedder first consumes its resource to build embedded
units (EU) and insert the secret information into EU. Then the attacker
distributes its resource evenly to the attacked EU. The expected
equilibrium damage, which is maximum damage in value from the
point of view of the attacker and minimum from the embedder against
the attacker, is evaluated by the case when the attacker attacks a
subset from all the EU. Furthermore, the optimal equilibrium capacity
of hiding information is calculated through the optimal number of EU
with the embedded secret information. Finally, illustrative examples
of the optimal equilibrium capacity are presented.
Abstract: This paper presents the results of corrosion fatigue
crack growth behaviour of a Ni-Cr-Mn steel commonly used in
marine applications. The effect of mechanical variables such as
frequency and load ratio on fatigue crack growth rate at various
stages has been studied using compact tension (C(T)) specimens
along the rolling direction of steel plate under 3.5% saturated NaCl
aqueous environment. The significance of crack closure on corrosion
fatigue, and the validity of Elber-s empirical linear crack closure
model with the ASTM compliance offset method have been
examined.
Fatigue crack growth rate is higher and threshold stress intensities
are lower in aqueous environment compared to the lab air conditions.
It is also observed that the crack growth rate increases at lower
frequencies. The higher stress ratio promotes the crack growth. The
effect of oxidization and corrosion pit formation is very less as the
stress ratio is increased. It is observed that as stress ratios are
increased, the Elber-s crack closure model agrees well with the crack
closure estimated by the ASTM compliance offset method for tests
conducted at 5Hz frequency compared to tests conducted at 1Hz in
corrosive environment.
Abstract: Matching algorithms have significant importance in
speaker recognition. Feature vectors of the unknown utterance are
compared to feature vectors of the modeled speakers as a last step in
speaker recognition. A similarity score is found for every model in
the speaker database. Depending on the type of speaker recognition,
these scores are used to determine the author of unknown speech
samples. For speaker verification, similarity score is tested against a
predefined threshold and either acceptance or rejection result is
obtained. In the case of speaker identification, the result depends on
whether the identification is open set or closed set. In closed set
identification, the model that yields the best similarity score is
accepted. In open set identification, the best score is tested against a
threshold, so there is one more possible output satisfying the
condition that the speaker is not one of the registered speakers in
existing database. This paper focuses on closed set speaker
identification using a modified version of a well known matching
algorithm. The results of new matching algorithm indicated better
performance on YOHO international speaker recognition database.
Abstract: Young patients suffering from Cerebral Palsy are
facing difficult choices concerning heavy surgeries. Diagnosis settled
by surgeons can be complex and on the other hand decision for
patient about getting or not such a surgery involves important
reflection effort. Proposed software combining prediction for
surgeries and post surgery kinematic values, and from 3D model
representing the patient is an innovative tool helpful for both patients
and medicine professionals. Beginning with analysis and
classification of kinematics values from Data Base extracted from
gait analysis in 3 separated clusters, it is possible to determine close
similarity between patients. Prediction surgery best adapted to
improve a patient gait is then determined by operating a suitable
preconditioned neural network. Finally, patient 3D modeling based
on kinematic values analysis, is animated thanks to post surgery
kinematic vectors characterizing the closest patient selected from
patients clustering.
Abstract: Authentication plays a vital role in many secure
systems. Most of these systems require user to log in with his or her
secret password or pass phrase before entering it. This is to ensure all
the valuables information is kept confidential guaranteeing also its
integrity and availability. However, to achieve this goal, users are
required to memorize high entropy passwords or pass phrases.
Unfortunately, this sometimes causes difficulty for user to remember
meaningless strings of data. This paper presents a new scheme which
assigns a weight to each personal question given to the user in
revealing the encrypted secrets or password. Concentration of this
scheme is to offer fault tolerance to users by allowing them to forget
the specific password to a subset of questions and still recover the
secret and achieve successful authentication. Comparison on level of
security for weight-based and weightless secret recovery scheme is
also discussed. The paper concludes with the few areas that requires
more investigation in this research.
Abstract: Laser engraving is a manufacturing method for those applications where previously Electrical Discharge Machining (EDM) was the only choice. Laser engraving technology removes material layer-by-layer and the thickness of layers is usually in the range of few microns. The aim of the present work is to investigate the influence of the process parameters on the surface quality when machined by laser engraving. The examined parameters were: the pulse frequency, the beam speed and the layer thickness. The surface quality was determined by the surface roughness for every set of parameters. Experimental results on Al7075 material showed that the surface roughness strictly depends on the process parameters used.
Abstract: Extensive research has been devoted to economic
production quantity (EPQ) problem. However, no attention has been
paid to problems where production period length is constrained. In
this paper, we address the problem of deciding the optimal
production quantity and the number of minor setups within each
cycle, in which, production period length is constrained but a minor
setup is possible for pass the constraint. A mathematical model is
developed and Iterated Local Search (ILS) is proposed to solve this
problem. Finally, solution procedure illustrated with a numerical
example and results are analyzed.
Abstract: In this paper a method for designing of nonlinear controller for a fuzzy model of Double Inverted Pendulum is proposed. This system can be considered as a fuzzy large-scale system that includes offset terms and disturbance in each subsystem. Offset terms are deterministic and disturbances are satisfied a matching condition that is mentioned in the paper. Based on Lyapunov theorem, a nonlinear controller is designed for this fuzzy system (as a model reference base) which is simple in computation and guarantees stability. This idea can be used for other fuzzy large- scale systems that include more subsystems Finally, the results are shown.
Abstract: A new mechanism responsible for structural life
consumption due to resonant fatigue in turbine blades, or vanes, is
presented and explained. A rotating blade or vane in a gas turbine can
change its contour due to erosion and/or material build up, in any of
these instances, the surface pressure distribution occurring on the
suction and pressure sides of blades-vanes can suffer substantial
modification of their pressure and temperatures envelopes and flow
characteristics. Meanwhile, the relative rotation between the blade
and duct vane while the pressurized gas flows and the consequent
wake crossings, will induce a fluctuating thrust force or lift that will
excite the blade.
An actual totally used up set of vane-blade components in a HP
turbine power stage in a gas turbine is analyzed. The blade suffered
some material erosion mostly at the trailing edge provoking a
peculiar surface pressure envelope which evolved as the relative
position between the vane and the blade passed in front of each other.
Interestingly preliminary modal analysis for this eroded blade
indicates several natural frequencies within the aeromechanic power
spectrum, moreover, the highest frequency component is 94% of one
natural frequency indicating near resonant condition.
Independently of other simultaneously occurring fatigue cycles
(such as thermal, centrifugal stresses).
Abstract: Linear Discrimination Analysis (LDA) is a linear
solution for classification of two classes. In this paper, we propose a
variant LDA method for multi-class problem which redefines the
between class and within class scatter matrices by incorporating a
weight function into each of them. The aim is to separate classes as
much as possible in a situation that one class is well separated from
other classes, incidentally, that class must have a little influence on
classification. It has been suggested to alleviate influence of classes
that are well separated by adding a weight into between class scatter
matrix and within class scatter matrix. To obtain a simple and
effective weight function, ordinary LDA between every two classes
has been used in order to find Fisher discrimination value and passed
it as an input into two weight functions and redefined between class
and within class scatter matrices. Experimental results showed that
our new LDA method improved classification rate, on glass, iris and
wine datasets, in comparison to different versions of LDA.
Abstract: This paper proposes a new model to support user
queries on postgraduate research information at Universiti Tenaga
Nasional. The ontology to be developed will contribute towards
shareable and reusable domain knowledge that makes knowledge
assets intelligently accessible to both people and software. This work
adapts a methodology for ontology development based on the
framework proposed by Uschold and King. The concepts and
relations in this domain are represented in a class diagram using the
Protégé software. The ontology will be used to support a menudriven
query system for assisting students in searching for
information related to postgraduate research at the university.
Abstract: Using maximal consistent blocks of tolerance relation
on the universe in incomplete decision table, the concepts of join block
and meet block are introduced and studied. Including tolerance class,
other blocks such as tolerant kernel and compatible kernel of an object
are also discussed at the same time. Upper and lower approximations
based on those blocks are also defined. Default definite decision rules
acquired from incomplete decision table are proposed in the paper. An
incremental algorithm to update default definite decision rules is
suggested for effective mining tasks from incomplete decision table
into which data is appended. Through an example, we demonstrate
how default definite decision rules based on maximal consistent
blocks, join blocks and meet blocks are acquired and how optimization
is done in support of discernibility matrix and discernibility function
in the incomplete decision table.