The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Traditional Associative Classification (AC) algorithms typically search for all possible association rules to find a representative subset of those rules. Since the search space of such rules may grow exponentially as the support threshold decreases, the rules discovery process can be computationally expensive. One effective way to tackle this problem is to directly find a set of high-stakes association...
In this paper, a novel face recognition technique based on discrete wavelet transform and Adaptive Local Binary Pattern (ALBP) with directional statistical features is proposed. The proposed technique consists of three stages: preprocessing, feature extraction and recognition. In preprocessing and feature extraction stages, wavelet decomposition is used to enhance the common features of the same subject...
It has been observed that the security of virtual worlds is becoming an important issue for law enforcement agencies. Accurate and automatic tracking of people in the virtual world is an interesting problem for terrorism and security experts. One way to track and recognize the identity of a person in the virtual world is to recognize the face of the avatar that represents this person. To deal with...
With high penetration of distributed generations (DGs), power distribution system is regarded as a multisource system in which fault location scheme must be direction sensitive. This paper presents an automated fault location method using radial basis function neural network (RBFNN) for a distribution system with DG units. In the proposed method, the fault type is first determined by normalizing the...
Telecommunication fraud prediction in this paper is an interpolation problem that uses the daily telecommunication network services information to analyze and predict the alarm information generated from a detection engine by minimizing false cases. This paper proposed the use of backpropagation neural network (BPNN) to perform telecommunication interpolation based on local telecommunication network...
Automated fruit grading in local fruit industries are gradually receiving attention as the use of technology in upgrading the quality of food products are now acknowledged. In this paper, outer surface colors of palm oil fresh fruit bunches (FFB) are analyzed to automatically grade the fruits into over ripe, ripe and unripe. We compared two methods of color grading: (1) using RGB digital numbers and...
This paper presents the application of support vector machines (SVM) for determining voltage unstable areas in an actual power system. The voltage unstable area is first determined based on the power transfer stability index (PTSI) calculated using information obtained from dynamic simulation output. Simulations were carried out on a practical 87 bus test system by considering load increase as the...
This paper presents dynamic voltage collapse prediction on an actual power system using support vector machines. Dynamic voltage collapse prediction is first determined based on the PTSI calculated from information in dynamic simulation output. Simulations were carried out on a practical 87 bus test system by considering load increase as the contingency. The data collected from the time domain simulation...
The development of Rasch measurement model has rapidly expanded from social science educational fields to other engineering and technology field as well. This study is an attempt to apply Rasch measurement in the field of technology to assess information managers' (IM) competency. Learning outcomes is used in constructing the Rasch model measurement in assessing their competencies. Rasch model tabulates...
Vulnerability Assessment and control are some of the essential requirements for maintaining security of modern power systems, particularly in competitive energy markets. This paper presents intelligent computational techniques for vulnerability assessment of power systems and recommends preventive control measures. Accurate techniques for vulnerability assessment and control of power systems are developed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.