Abstract: Optimal supplementary damping controller design for Thyristor Controlled Series Compensator (TCSC) is presented in this paper. For the proposed controller design, a multi-objective fitness function consisting of both damping factors and real part of system electromachanical eigenvalue is used and Real- Coded Genetic Algorithm (RCGA) is employed for the optimal supplementary controller parameters. The performance of the designed supplementary TCSC-based damping controller is tested on a weakly connected power system with different disturbances and loading conditions with parameter variations. Simulation results are presented and compared with a conventional power system stabilizer and also with the TCSC-based supplementary controller when the controller parameters are not optimized to show the effectiveness and robustness of the proposed approach over a wide range of loading conditions and disturbances.
Abstract: We study different types of aggregation operators such
as the ordered weighted averaging (OWA) operator and the
generalized OWA (GOWA) operator. We analyze the use of OWA
operators in the Minkowski distance. We will call these new distance
aggregation operator the Minkowski ordered weighted averaging
distance (MOWAD) operator. We give a general overview of this
type of generalization and study some of their main properties. We
also analyze a wide range of particular cases found in this
generalization such as the ordered weighted averaging distance
(OWAD) operator, the Euclidean ordered weighted averaging
distance (EOWAD) operator, the normalized Minkowski distance,
etc. Finally, we give an illustrative example of the new approach
where we can see the different results obtained by using different
aggregation operators.
Abstract: We present a method for the selection of students
in interdisciplinary studies based on the hybrid averaging
operator. We assume that the available information given in
the problem is uncertain so it is necessary to use interval
numbers. Therefore, we suggest a new type of hybrid
aggregation called uncertain induced generalized hybrid
averaging (UIGHA) operator. It is an aggregation operator
that considers the weighted average (WA) and the ordered
weighted averaging (OWA) operator in the same formulation.
Therefore, we are able to consider the degree of optimism of
the decision maker and grades of importance in the same
approach. By using interval numbers, we are able to represent
the information considering the best and worst possible results
so the decision maker gets a more complete view of the
decision problem. We develop an illustrative example of the
proposed scheme in the selection of students in
interdisciplinary studies. We see that with the use of the
UIGHA operator we get a more complete representation of the
selection problem. Then, the decision maker is able to
consider a wide range of alternatives depending on his
interests. We also show other potential applications that could
be used by using the UIGHA operator in educational problems
about selection of different types of resources such as
students, professors, etc.
Abstract: Strong law of large numbers and complete convergence for sequences of *-mixing random variables are investigated. In particular, Teicher-s strong law of large numbers for independent random variables are generalized to the case of *-mixing random sequences and extended to independent and identically distributed Marcinkiewicz Law of large numbers for *-mixing.
Abstract: the present paper, using the technique of differential subordination, we obtain certain results for analytic functions defined by a multiplier transformation in the open unit disc E = { z : IzI < 1}. We claim that our results extend and generalize the existing results in this particular direction
Abstract: Technological newness and innovativeness are
important aspects of small firm development, growth and wealth
creation. The contribution of the study to entrepreneurship
personality research and to technology-related research in
entrepreneurship is that the model of the general personality driven
technological development was developed and empirically tested.
Hypotheses relating the big five personality factors (OCEAN:
openness, conscientiousness, extraversion, agreeableness, and
neuroticism) and technological developments were tested by using
multiple regression analysis on survey data from a sample of 160
entrepreneurs from Slovenia. The model reveals two personality
factors, which are predictive of technological developments:
openness (positive impact) and neuroticism (negative impact). In
addition, a positive impact of firm age on technological
developments was found. Other personality factors
(conscientiousness, extraversion and agreeableness) of entrepreneurs
may not be considered important for their firm technological
developments.
Abstract: A bond graph model of a two degrees of freedom
PUMA is described. System inversion gives the system input
required to generate a given system output. In order to get the system
inversion of the PUMA manipulator, a linearization of the nonlinear
bond graph is obtained. Hence, the bicausality of the linearized bond
graph of the PUMA manipulator is applied. Thus, the bicausal bond
graph provides a systematic way of generating the equations of the
system inversion. Simulation results to verify the calculated input for
a given output are shown.
Abstract: According to the majority and to stereotypes in a simple everyman religious processes in the world in general, and Kazakhstan in particular, have only negative trends. The main reason for the author's opinion is seen in the fact that the media in the pursuit of ratings and sensation, more inclined to highlight the negative aspects of events in the country and the world of processes forgetting or casually mentioning the positive initiatives and achievements. That is why the article is mainly revealed positive trends in mind that the problems of fanaticism, terrorism and the confrontation of society on various issues, a lot has been written and detailed. This article describes the stages in the development of relations between religion and state, as well as institutionalization, networking and assistance in the correct orientation of religious activities in the country.
Abstract: In the context of spectrum surveillance, a method to
recover the code of spread spectrum signal is presented, whereas the
receiver has no knowledge of the transmitter-s spreading sequence.
The approach is based on a genetic algorithm (GA), which is forced to
model the received signal. Genetic algorithms (GAs) are well known
for their robustness in solving complex optimization problems.
Experimental results show that the method provides a good
estimation, even when the signal power is below the noise power.
Abstract: In this work, we study the problem of determining
the minimum scheduling length that can satisfy end-to-end (ETE)
traffic demand in scheduling-based multihop WSNs with cooperative
multiple-input multiple-output (MIMO) transmission scheme. Specifically,
we present a cross-layer formulation for the joint routing,
scheduling and stream control problem by incorporating various
power and rate adaptation schemes, and taking into account an
antenna beam pattern model and the signal-to-interference-and-noise
(SINR) constraint at the receiver. In the context, we also propose
column generation (CG) solutions to get rid of the complexity
requiring the enumeration of all possible sets of scheduling links.
Abstract: .Hardware realization of a Neural Network (NN), to a large extent depends on the efficient implementation of a single neuron. FPGA-based reconfigurable computing architectures are suitable for hardware implementation of neural networks. FPGA realization of ANNs with a large number of neurons is still a challenging task. This paper discusses the issues involved in implementation of a multi-input neuron with linear/nonlinear excitation functions using FPGA. Implementation method with resource/speed tradeoff is proposed to handle signed decimal numbers. The VHDL coding developed is tested using Xilinx XC V50hq240 Chip. To improve the speed of operation a lookup table method is used. The problems involved in using a lookup table (LUT) for a nonlinear function is discussed. The percentage saving in resource and the improvement in speed with an LUT for a neuron is reported. An attempt is also made to derive a generalized formula for a multi-input neuron that facilitates to estimate approximately the total resource requirement and speed achievable for a given multilayer neural network. This facilitates the designer to choose the FPGA capacity for a given application. Using the proposed method of implementation a neural network based application, namely, a Space vector modulator for a vector-controlled drive is presented
Abstract: This paper presents the 20-GHz fractional PLL (Phase
Locked Loop) circuit for the next generation Wi-Fi by using 90 nm
TSMC process. The newly suggested millimeter wave 16/17
pre-scalar is designed and verified by measurement to make the
fractional PLL having a low quantization noise. The operational
bandwidth of the 60 GHz system is 15 % of the carrier frequency
which requires large value of Kv (VCO control gain) resulting in
degradation of phase noise. To solve this problem, this paper adopts
AFC (Automatic Frequency Controller) controlled 4-bit millimeter
wave VCO with small value of Kv. Also constant Kv is implemented
using 4-bit varactor bank. The measured operational bandwidth is 18.2
~ 23.2 GHz which is 25 % of the carrier frequency. The phase noise of
-58 and -96.2 dBc/Hz at 100 KHz and 1 MHz offset is measured
respectively. The total power consumption of the PLL is only 30 mW.
Abstract: Wireless mesh networks based on IEEE 802.11
technology are a scalable and efficient solution for next generation
wireless networking to provide wide-area wideband internet access to
a significant number of users. The deployment of these wireless mesh
networks may be within different authorities and without any
planning, they are potentially overlapped partially or completely in
the same service area. The aim of the proposed model is design a new
model to Enhancement Throughput of Unplanned Wireless Mesh
Networks Deployment Using Partitioning Hierarchical Cluster
(PHC), the unplanned deployment of WMNs are determinates there
performance. We use throughput optimization approach to model the
unplanned WMNs deployment problem based on partitioning
hierarchical cluster (PHC) based architecture, in this paper the
researcher used bridge node by allowing interworking traffic between
these WMNs as solution for performance degradation.
Abstract: With the exponential rise in the number of multimedia
applications available, the best-effort service provided by the Internet
today is insufficient. Researchers have been working on new
architectures like the Next Generation Network (NGN) which, by
definition, will ensure Quality of Service (QoS) in an all-IP based
network [1]. For this approach to become a reality, reservation of
bandwidth is required per application per user. WiMAX (Worldwide
Interoperability for Microwave Access) is a wireless communication
technology which has predefined levels of QoS which can be
provided to the user [4]. IPv6 has been created as the successor for
IPv4 and resolves issues like the availability of IP addresses and
QoS. This paper provides a design to use the power of WiMAX as an
NSP (Network Service Provider) for NGN using IPv6. The use of the
Traffic Class (TC) field and the Flow Label (FL) field of IPv6 has
been explained for making QoS requests and grants [6], [7]. Using
these fields, the processing time is reduced and routing is simplified.
Also, we define the functioning of the ASN gateway and the NGN
gateway (NGNG) which are edge node interfaces in the NGNWiMAX
design. These gateways ensure QoS management through
built in functions and by certain physical resources and networking
capabilities.
Abstract: The ε4 allele of the ε2, ε3 and ε4 protein isoform polymorphism in the gene encoding apolipoprotein E (Apo E) has previously been associated with increased cardiac artery disease (CAD); therefore to investigate the significance of this polymorphism in pathogenesis of CAD in Iranian patients with stenosis and control subjects. To investigate the association between
Apo E polymorphism and coronary artery disease we performed a comparative case control study of the frequency of Apo E
polymorphism in One hundred CAD patients with stenosis who underwent coronary angiography (>50% stenosis) and 100 control subjects (
Abstract: For a given specific problem an efficient algorithm has been the matter of study. However, an alternative approach orthogonal to this approach comes out, which is called a reduction. In general for a given specific problem this reduction approach studies how to convert an original problem into subproblems. This paper proposes a formal modeling language to support this reduction approach in order to make a solver quickly. We show three examples from the wide area of learning problems. The benefit is a fast prototyping of algorithms for a given new problem. It is noted that our formal modeling language is not intend for providing an efficient notation for data mining application, but for facilitating a designer who develops solvers in machine learning.
Abstract: Because of the great advance in multimedia
technology, digital multimedia is vulnerable to malicious
manipulations. In this paper, a public key self-recovery block-based
video authentication technique is proposed which can not only
precisely localize the alteration detection but also recover the missing
data with high reliability. In the proposed block-based technique,
multiple description coding MDC is used to generate two codes (two
descriptions) for each block. Although one block code (one
description) is enough to rebuild the altered block, the altered block
is rebuilt with better quality by the two block descriptions. So using
MDC increases the ratability of recovering data. A block signature is
computed using a cryptographic hash function and a doubly linked
chain is utilized to embed the block signature copies and the block
descriptions into the LSBs of distant blocks and the block itself. The
doubly linked chain scheme gives the proposed technique the
capability to thwart vector quantization attacks. In our proposed
technique , anyone can check the authenticity of a given video using
the public key. The experimental results show that the proposed
technique is reliable for detecting, localizing and recovering the
alterations.
Abstract: A procedure commonly used in Job Shop Scheduling Problem (JSSP) to evaluate the neighborhoods functions that use the non-deterministic algorithms is the calculation of the critical path in a digraph. This paper presents an experimental study of the cost of computation that exists when the calculation of the critical path in the solution for instances in which a JSSP of large size is involved. The results indicate that if the critical path is use in order to generate neighborhoods in the meta-heuristics that are used in JSSP, an elevated cost of computation exists in spite of the fact that the calculation of the critical path in any digraph is of polynomial complexity.
Abstract: Based on general proportional integral (GPI) observers and sliding mode control technique, a robust control method is proposed for the master-slave synchronization of chaotic systems in the presence of parameter uncertainty and with partially measurable output signal. By using GPI observer, the master dynamics are reconstructed by the observations from a measurable output under the differential algebraic framework. Driven by the signals provided by GPI observer, a sliding mode control technique is used for the tracking control and synchronization of the master-slave dynamics. The convincing numerical results reveal the proposed method is effective, and successfully accommodate the system uncertainties, disturbances, and noisy corruptions.
Abstract: Series of experimental tests were conducted on a
section of a 660 kW wind turbine blade to measure the pressure
distribution of this model oscillating in plunging motion. In order to
minimize the amount of data required to predict aerodynamic loads
of the airfoil, a General Regression Neural Network, GRNN, was
trained using the measured experimental data. The network once
proved to be accurate enough, was used to predict the flow behavior
of the airfoil for the desired conditions.
Results showed that with using a few of the acquired data, the
trained neural network was able to predict accurate results with
minimal errors when compared with the corresponding measured
values. Therefore with employing this trained network the
aerodynamic coefficients of the plunging airfoil, are predicted
accurately at different oscillation frequencies, amplitudes, and angles
of attack; hence reducing the cost of tests while achieving acceptable
accuracy.