The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Distributed generation is a new way for energy using and microgrid is a good solution for distributed generation connecting. For a better plan of optimizing operation for the microgrid, this paper uses a method named game theory method. By converting the objects into players and the functions to utility functions and with the help of impact factor and cluster the variables are converted to strategies...
Combined heating and power (CHP) microgrid is conducive to the realization of energy cascade utilization and meeti the users' needs with divers types of energy. With remarkable economic and environmental benefits, CHP microgrid is one of the potential development directions of smart grid. In this paper, a CHP microgrid consists of wind turbines, photovoltaic cells, microturbines, gas-fired boilers,...
Double-cycling problem is motivated in quay crane scheduling practice at container ports, where a quay crane is enabled to simultaneously unload and load one container in a cycle. As container vessels are generally equipped with hatch covers, which induce precedence constraints. Regarding the impact of hatch covers, this paper proposes models and algorithm for the general double-cycling problem with...
Volume anomaly such as distributed denial-of-service (DDoS) has been around for ages but with advancement in technologies, they have become stronger, shorter and weapon of choice for attackers. Digital forensic analysis of intrusions using alerts generated by existing intrusion detection system (IDS) faces major challenges, especially for IDS deployed in large networks. In this paper, the concept...
Voice coil motor (VCM) is widely known as its top-quality of free friction, low noise, fast transient response and well repeatability. Yet the dynamic characteristic of a VCM is nonlinear and time-varying, thus the model-based conventional controller is difficult to achieve high-precision control performance for a VCM. To attack this problem, a self-organizing fuzzy sliding-mode control (SFSC) system...
A robust navigation strategy is proposed for Unmanned Aerial Vehicles (UAVs) with parameter perturbations and external disturbances. The dynamic model of a UAV is derived from Euler-Lagrange equations. With the help of path planning algorithm, we are able to find the shortest path for UAVs to traverse on a 3D surface. Meanwhile, to solve the tracking problem, we deploy a mixed H2/H∞ controller to...
A wireless sensor network (WSN) usually operates in an unreliable wireless environment with energy constraint. Many researchers are primarily interested in energy awareness and communication reliability of WSNs to maximize network lifetime. However, dealing with the conflicting problems of improving energy efficiency and fault-tolerance simultaneously is a challenging task. Most previous studies have...
Developing user friendly Human-Computer-Interfaces is important in many areas of computer applications. Traditional input devices such as the keyboard and mouse are designed for general purpose computers only, they are not likely to provide intuitive user experiences for multi-dimensional input entry. Therefore, we design and implement an embedded system for users to interactive with a computer in...
In this paper, we utilized the relationship between two blocks to generate the robust feature. Such a feature is very stable under various image processing operations. The XOR operation is applied to the feature and the watermark to create the secret key. Moreover, a mechanism is developed to resist the cropping attacks. The experimental results demonstrate our technique is highly robust against image...
Wireless Sensor Networks (WSNs) make possible many new applications in a wide range of application domains. Many of these applications are based on a many-to-many communication paradigm in which multiple sensor nodes send their sensed data to multiple sinks. To support these many-to-many applications, this paper proposes an energy-efficient transport protocol in which each source sensor evaluates...
A multi-bridge processing system (MBPS) has multiple bridge machines working at their serially arranged and partially overlapping workspaces. Its job scheduling can be abstracted as a colored travelling salesman problem (CTSP). CTSP is a new type of multiple traveling salesman problems in which each salesman must visit his exclusive cities and may visit some shared cities. This work presents a two-stage...
Low cost and low power scalar embedded processors can issue only a single instruction per cycle which results in longer execution time for applications and consequently lower energy efficiency. Superscalar processor that can issue multiple instructions per cycle are more energy efficient than scalar processors, however, they consume more power which is severely limited in embedded systems that operate...
Wireless sensor networks are traditionally constrained by finite energy supply. Recent wireless charging technology enables possibility for timely replenishing consumed energy of dispersed sensors. This paper investigates on-demand wireless charging problem with multiple mobile chargers, which can sustain a large-scale wireless sensor network operation perpetually without knowing energy consumption...
Analysis of EEG activity usually raises the problem of differentiating between genuine EEG activity and that which is introduced through a variety of external influence. These artifacts may affect the outcome of the EEG recording. In this paper, wavelet denoising and band pass filter for preprocessing and a robustprincipal component analysis algorithm for extraction are proposed to remove the artifacts...
An important objective of health monitoring systems (HMS) for tall building is to diagnose the state of the building and to detect its possible damage. To solve these problems, data mining approaches are becoming meaniningful along with the advance of Big Data techniques, among which support vector machine (SVM) is one of the most powerful classifiers because of its good accuracy. However, SVM is...
This work studies a transportation problem called as lane reservation problem, which is to complete some special transportation tasks within pre-given deadline by optimally selecting lanes to be reserved from the network and designing source-destination paths for the special tasks. Because of the exclusive use of the reserved lanes by the special tasks, negative impact such as increase of travel time...
“Data century has arrived! Having too many applications to discrete mathematics rather than use continuous mathematics, the method instead of using analog to digital methods. The vector and matrix has become the language which we must speak up.” says the author of the professor named Gibert, S. Linear algebra is a branch of mathematics that studies the object is a vector, a vector space (or linear...
This paper presents an intelligent ridesharing system for taxi to share cost and journey among the passengers. The objective of the system is to provide taxi-sharing service for passengers who want to save the payment cost. It is done by recommending taxis drivers for picking up passengers at a higher revenue. The passengers are able to find taxis easily and quickly as well. By exploiting the time-dependent...
In this paper we propose a novel relay selection method for cooperation communication networks using fuzzy logic. Many efforts have been made in the literature to select the superior relay based on relay's SNR/SER and / or relay's reputation (in cooperation stimulation methods). We jointly consider four criteria for the process of relay selection, relay's SNR/SER, relay's reputation, relaying strategy...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.