The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Direct power control (DPC) is an attractive control method for three-phase pulse-width modulation (PWM) rectifiers, due to the merits of simple structure, quick dynamic response and little tuning work. However, conventional switching table based DPC presents relatively high power ripples and current harmonics, which is especially serious when the grid voltages are unbalanced. Introducing space vector...
The control of PWM rectifiers under unbalanced network has become an important issue in recent years, especially in the applications with weak grid. Conventional methods is based on voltage oriented control (VOC), which requires several PI controllers in dual reference frame and the sequence extraction of grid/rectifier voltages and currents. To reduce the control complexity, recently direct power...
Deadbeat control (DBC) has been known for decades due to its conceptual simplicity and good performance. Recently finite control set model predictive control (FCS-MPC) is emerging as a powerful strategy for control of power converters. Different from DBC, which uses a modulator such as space vector modulation (SVM), FCS-MPC directly obtained the optimal switching states of power converters by minimizing...
Leukemia is a worldwide disease. In this paper we demonstrate that it is possible to build an automated, efficient and rapid leukemia diagnosis system. We demonstrate that it is possible to improve the precision of current techniques from the literature using the description power of well-known Convolutional Neural Networks (CNNs). We extract features from a blood smear image using pre-trained CNNs...
Today, it is not possible to use human power alone to cope with the increasing amount of data. For this reason, some automated methods are needed to group similar documents together or to place documents in predefined categories according to certain rules. The use of automated classification techniques is becoming increasingly important for this reason. In this study, a database consisting of 22 thousand...
An intrusion detection system (IDS) monitors the network traffic looking for suspicious or malicious activities or policy violations, which could represent an attack or unauthorized access. Traditional systems were designed to detect known attacks but cannot identify unknown threats. They most commonly detect known threats based on predefined rules or behavioral analysis through baselining the network...
ESN load forecasting model has high stability, and is able to learn fast and not easy to fall into local optimum, compared with standard recurrent neural network. In the process of constructing the typical ESN model, the choice of parameters is always empirical or random. The forecasting performance of ESN was analyzed on the basis of its key parameters. While the dynamic reserve pool has black box...
Degradation prediction is important for safety related products to avoid failures. When the degradations of multiple parameters of a product is taken into account, traditional univariate degradation prediction method is not applicable, especially when the parameters are correlated. To cope with this problem, Mahalanobis distance is proposed, to combine multiple parameters into one unified index. Then...
With the development of next-generation sequencing technologies, large number of transcripts has been accumulated in public databases. Long non-coding RNAs (lncRNAs), typically above 200 nucleotides in sequence length, have recently attracted increasing interests because of their important roles in various cellular processes. While it is straightforward to distinguishing lncRNAs from most small non-coding...
Web spam is a big problem for search engine users in World Wide Web. They use deceptive techniques to achieve high rankings. Although many researchers have presented the different approach for classification and web spam detection still it is an open issue in computer science. Analyzing and evaluating these websites can be an effective step for discovering and categorizing the features of these websites...
For processing purposes of silver colloidal suspensions in view of specific applications, this study evaluates the suitability of using alginate/lignosulfonate mixtures as an efficient dispersion matrix for the silver nanoparticles. The rheological behavior of the in situ obtained silver nanoparticle suspensions was investigated by rotational measurements performed using cone-plate geometry, considering...
Computer-assisted analysis of endoscopic imagescan be helpful to the automatic diagnosis and classificationof neoplastic lesions. Barrett's esophagus (BE) is a commontype of reflux that is not straightforward to be detected byendoscopic surveillance, thus being way susceptible to erroneousdiagnosis, which can cause cancer when not treated properly. In this work, we introduce the Optimum-Path Forest...
Video surveillance systems have enabled the monitoring of complex events in several places, such as airports, banks, streets, schools, industries, among others. Due to the massive amount of multimedia data acquired by video cameras, traditional visual inspection by human operators is a very tedious and time consuming task, whose performance is affected by fatigue and stress. A challenge is to develop...
In the field of high-speed electrical drives, the use of SiC MOSFET inverters represents a viable solution since this kind of devices allows an improvement of the converter efficiency. Notwithstanding issues related to the high frequency operation of the SiC MOSFET's, like the failure of the motor winding insulation due to the increased electrical stress and hence a reduced system reliability, are...
The common-mode current casued by the parasitic parameters in the transformerless multilevel converters degrades the performance of converters and brings security issues. This paper presents a new zero common-mode voltage space vector modulation for common-mode voltage suppression in the five-level modular composited converter. Firstly, the common-mode equivalent circuit model of five-level modular...
This paper introduces the differential-mode circulating current (DMCC) and zero-sequence circulating current (ZSCC) reduction method for paralleled inverters with zero common-mode (CM) PWM algorithm. By analyzing the reason of current jump in phase-leg, the method based on the freedom of PWM signal exchange and active voltage vector sequence exchange can be adopted which can keep volt-seconds balance...
Natural Language Processing (NLP) is a prominent subject which includes various subcategories such as text classification, error correction, machine translation, etc. Unlike other languages, there are limited number of Turkish NLP studies in literature. In this study, we apply text classification on Turkish documents by using n-gram features. Our algorithm applies different preprocessing techniques,...
Nowadays, merchandising is one of the significant method which allows to increase the sales. Therefore, activities such as monitoring the number of products on the shelves, completing the missing products and matching the planogram continuously have become important. An autonomous system is needed to automate operations such as product or brand recognition, stock tracking and planogram matching. In...
DDoS attacks bring huge threaten to network, how to effectively detect DDoS is a hot topic of information security. Currently, there are some methods designed to detect DDoS attacks, but the detection rate of them is low. Moreover, DDoS detection is easily misled by flash crowd traffic. In this paper, a new method to detect DDoS attacks based on RDF-SVM algorithm is proposed. By considering the importance...
Recent development in micro-electronics technologies as well as the computer vision techniques increased demand to use Unmanned Aerial Vehicles (UAVs) in several industrial and civil applications. This paper proposed a vision based system, that is used in UAVs for search, rescue and transportation purposes. The proposed system is divided into two main parts: Vision-based object detection and classification,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.