The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Voltage sag has become one of the major power quality concerns in recent years. To accurately evaluate the voltage sag, it is necessary to obtain its sag type. In this paper, a more generalized voltage sag classification method with consideration of phase shift is proposed compared to the traditional classification method. This new method can be used in the accurate discrimination of sag types. Moreover,...
Millions of comments are available on forums, Facebook, Tweeter, YouTube etc. Proper analysis of these huge comments can lead to solve many social, economic, political, business related questions which otherwise are difficult to understand and analyse. Proposed system explores the statistical approach for sentiment analysis of product reviews using expectation maximization algorithm. Systematic mathematical...
In order to deal with an increase in the number of test cases in recent software testing, a test analysis method for black box testing using test categories based on Application Under Test (AUT) and fault knowledge have been proposed in previous studies. AUT is classified into elements of the reference model, and logical test cases are derived. For each element of the model, there are approaches to...
In this paper, we review and prove certain properties regarding t-way coverage when covering arrays are merged together to form larger arrays. Moreover, we build upon these theoretical observations to formulate a procedure on how, from the input space model of a composed SUT and t-way test suites for its components, to create a larger and unified t-way test suite. The proposed modelling methodologies...
Our previous work led to the proposal of a method for secret computation without changing the polynomial degree in Shamir’s (k, n) secret sharing scheme. This scheme realizes secret computation for n
A skeleton unit test code generation method has been proposed for OTS/CafeOBJ specifications. To obtain executable test codes, we need to instantiate those skeleton test codes. In this study, we propose a method to instantiate them with CafeOBJ rewrite specifications and the exhaustive search command. We compare rewrite specifications obtained by the existing specification translation methods from...
This paper presents an iterative pre-filtering based algorithm for Wiener system identification by using bilinear parameterized formulation. This method assumes the invert ability of the non-linearity involved in the modeling of wiener model. In addition, the output of the linear block is corrupted with noise signal resulting a model with correlated noise disturbance. The least square solution fails...
This paper deals with the process of construction and calibration of 6DOF Stewart platform using LabVIEW software that can be used for various mechatronic applications. An intelligent control is required in order to coordinate the six legged parallel manipulators of the platform. The various process has been involved in the construction assembling and controlling the setup and the calibration of the...
This paper reports the use of flower pollination algorithm (FPA) for maximum power point tracking (MPPT) in a partially shaded photovoltaic (PV) array. The proposed algorithm is very powerful in solving constrained and unconstrained optimization problems. The advantages of this algorithm are its fast convergence and robustness. The performance of the proposed algorithm is studied for different shading...
The control of a non-linear process is a difficult task in process industries. Real processes often exhibit nonlinear behavior. Many process industries use conical tanks because its shape contributes to better drainage. Its non-linearity due to the constantly changing cross section makes the control of a conical tank a challenging problem. In order to improve the control effectiveness of some nonlinear...
This paper discusses the design and analysis of a 380/12 V DC-DC high efficient LLC converter having a power output of 750W. The ripple in output voltage is brought down to 0.09V. It works with an efficiency of 96.1 percent at full load, 97.2 percent efficiency at 50 percent load and 91.2 percent efficiency at 10 percent load. Since zero voltage and zero current switching are used, losses are reduced...
In recent years, social media such as Twitter have encountered a significant growth because of the ceaseless increase in the volume of contents and the number of users. The level of influence among social media users is significantly different from one user to the other; and as such, it has become more vital to find the most influential users on social media. There are lots of mysteries about behaviours...
Stack Overflow is one of the most popular question-and-answer sites for programmers. However, there are a great number of duplicate questions that are expected to be detected automatically in a short time. In this paper, we introduce two approaches to improve the detection accuracy: splitting body into different types of data and using word-embedding to treat word ambiguities that are not contained...
Operational amplifier is consider to be the most imperative electronic device. The procedure inscribed in this paper is to design a two stage CMOS operational amplifier (Opamp) and analyze the effect of various parameters on the characteristics of Opamp design. This paper is mainly concentrating on design of optimized Opamp gain. Keeping this as a main aspect, Opamp specifications are taken into account,...
In this paper, we address the problem of energy-aware user satisfaction in self-organizing networks. Our main objective is to meet with the users requirements while reducing energy consumption. Accordingly, we aim at seeking satisfaction equilibria, mainly the efficient satisfaction equilibrium (ESE). We first define conditions of existence and uniqueness of ESE. Considering information-theoretic...
Opportunistic Mobile Social Networks (MSNs) are a type of delay-tolerant networks that are composed of mobile nodes with social characteristics. Most of current research on forwarding algorithms for MSNs leverages the properties of social networks, such as community and centrality. However, the fundamental property, interaction, has not received sufficient attention. The effects of interactions consist...
This work introduces a novel security framework for wireless sensor networks (WSN) based on dynamic duty cycle, which allows nodes to detect their compromised neighbors based on unanticipated fluctuations in network traffic send rate over time. Our framework was assessed by its ability to detect advanced WSN threats (e.g., active, passive, or both attacks). One of the benefits of this framework is...
Internet of Things (IoTs) is an enabler for the intelligence appended to many central features of the modern world, such as hospitals, cities, grids, organizations, and buildings. The security and privacy are some of the major issues that prevent the wide adoption of IoTs. Its storage and computing power of these devices is often limited and their designs currently focus on ensuring functionality...
Many algorithms and applications in ICN directly depend on content names. All the more surprising that there is no common foundation to evaluate them against each other. Without a common foundation, apples are compared to oranges. As this paper has the goal to enable real, realistic and comparable evaluations in ICN, also methods to compare sets of content names are needed. There are two ways to reach...
Participatory sensing is an emerging paradigm in which citizens voluntarily use their mobile phones to capture and share sensed data from their surrounding environment in order to monitor and analyze some phenomena. Participating users can disrupt the system by contributing corrupted, fabricated, or erroneous data. Different reputation systems have been proposed to monitor participants' behavior and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.