In this paper a new method has been proposed to select optimal switching angles based on Firefly algorithm. the resultant equations for the computation of output voltage total harmonic distortion (thD) of a multilevel...
详细信息
In this paper a new method has been proposed to select optimal switching angles based on Firefly algorithm. the resultant equations for the computation of output voltage total harmonic distortion (thD) of a multilevel inverter are used as the objective function. this objective function is used to minimize the thD in the output voltage of a multilevel inverter. While minimizing the objective function, the selective harmonics such as the 5th, 7th, 11th and 13th can be controlled by using the Firefly algorithm. the simulations are performed for an 11 level cascaded multilevel inverter with equal and nonequal dc sources to show the validity of the proposed method. the results show that the proposed firefly algorithm can eliminate selective harmonics in the output voltage of a multilevel inverter.
A face determination algorithm based on multi-template is proposed, which is combined with convolution and dynamic programming. Firstly, three kinds of templates are synthesized using the experimental face dataset, in...
详细信息
ISBN:
(数字)9780738124223
ISBN:
(纸本)9781665419536
A face determination algorithm based on multi-template is proposed, which is combined with convolution and dynamic programming. Firstly, three kinds of templates are synthesized using the experimental face dataset, including face, eyes, and mouth-nose templates, and then obtaining their weights and the optimal threshold. Secondly, the area of face, eyes, mouth and nose is cut from image, then realizing the size and number normalization, and calculating the three convolution values for detected image and the templates, and then the sum convolution values for face detecting are got by a weighted summation of them. Finally, according to the principle of threshold decision to judge whether the image is human face or non-face. Experimental verifications are conducted to evaluate the algorithm's performance on the acquisition, human face and non-face datasets. the results show that the algorithm runs faster, the accuracy is 94%, 84%.
this paper presents the characteristics of programmed SONOS *** CHE and CHISEL programming mechanisms are analyzed and the effects of programming bias to the program speed and saturated V under different program metho...
详细信息
this paper presents the characteristics of programmed SONOS *** CHE and CHISEL programming mechanisms are analyzed and the effects of programming bias to the program speed and saturated V under different program methods are *** shows that compared with CHE operation,CHISEL program has a lower voltage bias for the same program speed,and better threshold self-convergent character. the distribution of trapped charges in the Silicon Nitride layer after CHE or CHISEL program is also investigated. the research shows that the different charge distributions have different impacts to the I-V and erase characteristics.
the presented study is dedicated to the case of the airline’s optimal resources recombination. the airline, owning UAVs, deploys the aircraft number optimally in accordance withthe maximal value of the individuals, ...
详细信息
ISBN:
(数字)9798331534141
ISBN:
(纸本)9798331534158
the presented study is dedicated to the case of the airline’s optimal resources recombination. the airline, owning UAVs, deploys the aircraft number optimally in accordance withthe maximal value of the individuals, preferences subjective entropy. the air transport technologies’ elements (aircraft) optimal deployment meets the linear programming solution which proves the correctness of the proposed approach application. the subjective analysis illustration shows the maximum of the objective function (profit) in a prospective case and in a nonlinear manner. this allows to judge how much the optimal solution better is and in a cognitively perceptible form. the necessary computer simulation is conducted and corresponding diagrams are plotted.
Active and deductive rules in databases and procedural attachment in knowledge bases are used as mechanisms of computation of derived attributes. these research domains have become very closely related. the support of...
详细信息
Active and deductive rules in databases and procedural attachment in knowledge bases are used as mechanisms of computation of derived attributes. these research domains have become very closely related. the support of derivations in current active databases suffers from many semantic and technical problems. Active rules in their ECA (Event Condition Action) form are event oriented whereas derivations are naturally data oriented. Deductive rules are well adapted to relational databases, but their integration within the object oriented model does not always have successful results. Procedural attachment may be considered as both a deductive and active process, but it uses an imperative language to derive attributes. We try to focus on the use of active rules to derive attributes in an object oriented model. We give our approach for the support of deductions in a declarative assertion language and their processing in an active way. We propose a declarative derivation approach integrated within an object oriented model.
In this paper, for multi-machine power system, computationally fast binary particle swarm optimization (BPSO) based power system stabilizer design is presented. It is necessary to make the best setting of PSS (Power S...
详细信息
ISBN:
(数字)9781728176123
ISBN:
(纸本)9781728176130
In this paper, for multi-machine power system, computationally fast binary particle swarm optimization (BPSO) based power system stabilizer design is presented. It is necessary to make the best setting of PSS (Power System Stabilizer) parameters for improving its contribution towards the damping oscillation with less computational time for solving the PSO programming. the result shows the performance of PSS in a multi-machine environment for a proposed objective function. Time-domain simulation results of the PSO based PSS under different operating conditions are demonstrated on the 16-machine, 68-bus system.
ASIPs are designed in order to execute instructions of a particular domain of applications. the designing of ASIPs addresses the major challenges faced by a system on chip such as size, cost, performance and energy co...
详细信息
ASIPs are designed in order to execute instructions of a particular domain of applications. the designing of ASIPs addresses the major challenges faced by a system on chip such as size, cost, performance and energy consumption. the higher the number of similar instructions within the domain to be mapped the lesser the energy consumption, the smaller the size and the higher the performance of the ASIP. thus, designing processors for domains with more similar programs would overcome these issues. this paper describes the investigation of whether the domains of programmer specific programs have any significance like application specific program domains and thus, whether the approach of designing processors known as Programmer Specific Instruction Set Processors is worthwhile. We performed the evaluation at the instruction level by using four different measures to obtain the similarity of programs: (1) by the existence of each instruction, (2) by the frequency of each instruction, (3) by two consecutive instruction patterns and (4) by three consecutive instruction patterns of application specific and programmer specific programs. We found that although programmer specific instructions show some impact on the similarity measures, they are much smaller and therefore insignificant compared to the impact from application specific programs.
this study proposes the Strength Pareto Evolutionary Algorithm (SPEA2) for Environmental/Economic Power Dispatch (EEPD) problem. In the past fuel cost consumption minimization was the single objective function of econ...
详细信息
this study proposes the Strength Pareto Evolutionary Algorithm (SPEA2) for Environmental/Economic Power Dispatch (EEPD) problem. In the past fuel cost consumption minimization was the single objective function of economic power dispatch problem. Since the clean air act amendments have been applied to reduce polluting gases emissions from power plants, the utilities change their strategies in order to reduce pollution and atmospheric emission as well, adding emission minimization as other objective function made economic power dispatch (EPD) a multi-objective problem having conflicting objectives. SPEA2 is the improved version of SPEA with a set of special operators that allow performing a very effective search of optimal solutions. the results show the ability of the proposed method to generate well distributed Pareto optimal solutions to the EEPD problem. the comparative tests performed on IEEE 30 bus test system have demonstrated the accuracy and the effectiveness of SPEA2.
Software security problems exist since the early days of computer systems. Operating system level approaches, network level approaches and machine level approaches are not sufficient for the security of software syste...
详细信息
Software security problems exist since the early days of computer systems. Operating system level approaches, network level approaches and machine level approaches are not sufficient for the security of software systems. Software security has gained attention in the recent years as an internal security issue of software systems as compared to external protective measures. threat modeling is a technique being used to model threats into software systems. By applying threat modeling at the early stages of software development life cycle, all possible threats to software systems can be identified and mitigated and hence in this way, a more secure software application can be developed. Various threat modeling approaches such as CLASP, SDL, STRIDE, DREAD, TAM and Touch Points are being used by many organizations for threat modeling into software systems. But all of the approaches being used for threat modeling are based on informal and semi formal techniques. Formal methods are based on mathematics and provide state of the art techniques for secure software development. Formal methods had been used successfully in many critical systems such as CICS, Paris Railway System and British Air Traffic Control System etc. In the proposed approach VDM++, will be used for specification of core components: STRIDE, DREAD and Security Mechanisms. VDM++Tools will be used for type checking and proof obligations.
In preemptive real-time systems, a tighter estimate of the Worst Case Response Time (WCRT) of the tasks can be obtained if the layout of the tasks in memory is included in the estimation procedure. this is because the...
详细信息
ISBN:
(纸本)0769514413
In preemptive real-time systems, a tighter estimate of the Worst Case Response Time (WCRT) of the tasks can be obtained if the layout of the tasks in memory is included in the estimation procedure. this is because the Cache Related Preemption Delay (CRPD) depends on the inter-task interference in the cache. We develop a response time analysis framework which takes the layout of the tasks into account. We present an ILP formulation which generates a layout of the tasks such that all timing constraints are satisfied. To overcome the issue of non-scalability associated with an ILP solution, we also present a linear programming relaxation of the ILP formulation, which offers an approximate solution. the performance of the proposed formulation is demonstrated.
暂无评论