Fundamental Research in Electrical Engineering -

Fundamental Research in Electrical Engineering (eBook)

The Selected Papers of The First International Conference on Fundamental Research in Electrical Engineering
eBook Download: PDF
2018 | 1st ed. 2019
XIV, 1052 Seiten
Springer Singapore (Verlag)
978-981-10-8672-4 (ISBN)
Systemvoraussetzungen
223,63 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This volume presents the selected papers of the First International Conference on Fundamental Research in Electrical Engineering, held at Khwarazmi University, Tehran, Iran in July, 2017. The selected papers cover the whole spectrum of the main four fields of Electrical Engineering (Electronic, Telecommunications, Control, and Power Engineering).


This volume presents the selected papers of the First International Conference on Fundamental Research in Electrical Engineering, held at Khwarazmi University, Tehran, Iran in July, 2017. The selected papers cover the whole spectrum of the main four fields of Electrical Engineering (Electronic, Telecommunications, Control, and Power Engineering).

Preface 6
Contents 7
Biomedical Engineering 15
1 Bioelectrical Signals: A Novel Approach Towards Human Authentication 16
Abstract 16
1 Introduction 16
2 What Are Bioelectrical Signals? 17
3 The Advantage of Bioelectrical Signals Over Conventional Biometrics 18
4 The Electroencephalogram Signal as a Biometric 18
5 The Electrocardiogram as a Biometric 21
6 The Electrooculogram as a Biometric 23
7 Conclusion and Discussion 25
References 26
2 Recognition of Speech Isolated Words Based on Pyramid Phonetic Bag of Words Model Display and Kernel-Based Support Vector Machine Classifier Model 27
Abstract 27
1 Introduction 28
2 Prior Research 29
3 Pre-processing and Feature Extraction 29
3.1 First Stage: Removing Silence from the Beginning and End of Words 30
3.2 Second Stage: MFCC Feature Extraction Method 31
4 Display of Bag of Words 32
5 Dimensionality Reduction of Principal Component Analysis 32
6 Suggested Method 32
7 Display of Bag of Acoustics 32
8 Learning of Phonetic (Acoustic) Dictionary 33
9 Display of Pyramid Bow to Model Temporal Relationships in Speech 34
10 Diagram Block of the Proposed Method 36
11 Experiments 38
12 Training Data Set 38
13 Noisy Dataset 38
14 Feature Extraction 39
15 Classification Tests Results 39
16 Classification Analysis 39
16.1 Number of Optimal Clusters 39
17 Comparing the SVM-Based Method with Bow SVM 40
18 Comparison of Bow Method with Pyramid Bow Approach 40
19 Methods Resistance Against Noise 40
20 Conclusion 41
References 41
3 A Novel Improved Method of RMSHE-Based Technique for Mammography Images Enhancement 43
Abstract 43
1 Introduction 43
2 Direct Contrast Optimal Methods 45
3 Indirect Contrast Optimal Methods 45
3.1 Histogram Equalization (HE) 46
3.2 Contrast-Limited Adaptive Histogram Equalization (CLAHE) 47
3.3 Recursive Mean-Separate Histogram Equalization (RMSHE) 47
4 Proposed Algorithm 48
5 Conclusions 50
References 53
4 Contrast Improvement of Ultrasound Images of Focal Liver Lesions Using a New Histogram Equalization 55
Abstract 55
1 Introduction 55
2 Optimal Methods of Direct Contrast 56
3 Optimal Methods of Indirect Contrast 57
3.1 Histogram Equalization (HE) 57
3.2 Contrast-Limited Adaptive Histogram Equalization (CLAHE) 58
3.3 Recursive Mean-Separate Histogram Equalization (RMSHE) 59
4 Proposed Algorithm 60
5 Conclusions 64
References 64
5 An Unequal Clustering-Based Topology Control Algorithm in Wireless Sensor Networks Using Learning Automata 66
Abstract 66
1 Introduction 66
2 Methodology 68
3 Conclusion 77
References 77
6 Using an Active Learning Semi-supervision Algorithm for Classifying of ECG Signals and Diagnosing Heart Diseases 80
Abstract 80
1 Introduction 81
2 History 82
2.1 Classification of the ECG Signal Using a Wavelet, Morphological Properties, and Neural Networks 82
2.2 Classification of Cardiac Arrhythmias Using SVM 82
2.3 Electrocardiogram Signal Processing 82
3 Pattern Recognition 83
3.1 Pattern Recognition Methods 83
4 Proposed Method 83
4.1 A General View of the Active Learning Approach Using Directed Learning 84
4.2 Our Approach Differs from the Standard Approach from the Following Aspects 85
5 Simulation 85
5.1 Signal Shift to the Baseline Deviation 86
5.2 Removal of the Noise Resulting from Mains Electricity 86
5.3 Signal Windowing 87
5.4 Selection of the Training and Test Data 88
5.5 Feature Extraction 88
6 Principal Component Analysis (PCA) 89
6.1 Feature Selection with mRMR 90
6.2 Classification Using the Proposed Method 90
7 Conclusion 92
8 Features Works 93
References 93
7 Automatic Clustering Using Metaheuristic Algorithms for Content Based Image Retrieval 94
Abstract 94
1 Introduction 94
2 Clustering 97
2.1 K-Means Problem 97
2.2 Objective Function 97
2.3 Lloyd’s Heuristic Algorithm 98
2.4 Automatic Clustering 98
2.4.1 Validation Indexes 99
2.4.2 DB Index 99
2.4.3 CS Index 100
3 Main Image Retrieval Algorithms 101
3.1 Color Feature Extraction 101
3.2 Shape Feature Extraction 101
3.3 Texture Feature Extraction 102
4 Empirical Results 102
4.1 Database 102
4.2 Evaluation Criterion 102
4.3 Results 103
4.4 Performance Evaluation for Each of the Above Methods 104
4.5 Applying Automatic Clustering for the Purpose of Image Retrieval 107
5 Conclusion 109
References 109
8 A Robust Blind Audio Watermarking Scheme Based on DCT-DWT-SVD 111
Abstract 111
1 Introduction 112
2 Background 113
2.1 Discrete Cosine Transform (DCT) 113
2.2 Discrete Wavelet Transform (DWT) 114
2.3 Singular Value Decomposition (SVD) 114
3 The Proposed Algorithm 115
3.1 Watermarking Process 115
3.2 Watermark Extraction Process 117
4 Results of Implementation of the Proposed Method 117
5 Conclusion 121
References 122
9 A New Method to Copy-Move Forgery Detection in Digital Images Using Gabor Filter 124
Abstract 124
1 Introduction 124
2 Copy-Move Forgery (Or Area Copy Forgery) 127
3 Introducing the New Method 130
3.1 Feature Extraction by Gabor Filter 132
3.2 Splitting the Image into Overlapped Blocks and Creating a Feature Matrix 134
3.3 Alphabetical Sorting of Feature Matrix 134
3.4 Finding the Most Similar Blocks to Each Other Using Fourier Transform and Phase Correlation 135
4 Investigating the results 135
4.1 Forgery Detection Without Changing Size and Rotation and Different Rows of Gabor Filter 136
4.2 Resistance to Rotation 141
4.3 Resistance to Resizing 141
5 Conclusion 142
References 142
10 Temporal and Spatial Features for Visual Speech Recognition 144
Abstract 144
1 Introduction 144
2 Method 146
2.1 Hand-Crafted Features 147
2.2 Classifiers 149
3 Results 150
4 Conclusion 153
References 154
11 The Application of Wavelet Transform in Diagnosing and Grading of Varicocele in Thermal Images 155
Abstract 155
1 Introduction 156
2 Materials and Methods 157
3 Results 163
4 Discussion 165
5 Conclusion 167
Acknowledgements 168
References 168
12 A Review of Feature Selection Methods with the Applications in Pattern Recognition in the Last Decade 170
Abstract 170
1 Introduction 170
2 Some of the Feature Selection Methods Proposed for Pattern Recognition Over the Last Few Years 172
3 The Applications of Feature Selection in Pattern Recognition in the Last Decade 173
4 Conclusion 176
References 177
13 A Review of Research Studies on the Recognition of Farsi Alphabetic and Numeric Characters in the Last Decade 179
Abstract 179
1 Introduction 179
2 A Review of the Research on Farsi Numeric Character Recognition Methods 181
3 A Review of the Research on Farsi Alphabetic Character Recognition Methods 183
4 Conclusion 186
References 189
14 A New Model for Iris Recognition by Using Artificial Neural Networks 191
Abstract 191
1 Introduction 192
2 Copyright Form 192
3 Research Methodology 193
4 Discussion and Results 197
5 Conclusion 201
References 201
15 Designing a Fuzzy Expert Decision Support System Based on Decreased Rules to Specify Depression 203
Abstract 203
1 Introduction 203
2 BDI-II 207
3 Fuzzy Logic 208
4 ANFIS 210
5 Proposed Method 213
6 Implementation and Experimental Results 213
7 Reliability and Validity 215
8 Discussion 217
9 Conclusion and Suggestions 217
Acknowledgements 217
References 218
Control Engineering 220
16 Self-tuning PD2-PID Controller Design by Using Fuzzy Logic for Ball and Beam System 221
Abstract 221
1 Introduction 221
2 Mathematical Modeling of the Ball and Beam 222
3 PID Controller 223
4 Fuzzy Logic Controller 224
5 Fuzzy Logic Self-tuning PD2-PID 224
6 Simulation Results 225
7 Conclusion 228
References 228
17 Design of Automatic Gain Control (AGC) Circuit for Using in a Laboratory Military Submarine Sonar Systems Based on Native Knowledge 230
Abstract 230
1 Introduction 230
2 SONAR Systems 231
3 Basic Principles in a Typical Active Sonar System 232
4 The Basic Theory of the AGC Circuits 233
5 The Proposed Idea 234
6 The Proposed Circuit Structure 235
7 Simulation and Results 237
8 Conclusion 239
References 240
18 Control of Robot Manipulators with a Model for Backlash Nonlinearity in Gears 241
Abstract 241
1 Introduction 241
2 Problem Statement 243
2.1 Backlash Model and Its Properties 243
2.2 Robot Manipulator Dynamic Model 245
3 Proposed Control Law 246
4 Simulation Results 249
5 Experimental Validations 253
6 Conclusions 255
References 256
19 Designing an Automatic and Self-adjusting Leg Prosthesis 258
Abstract 258
1 Introduction 258
2 Stages of the Experiment 260
3 Properties and Conditions of the Experiment 260
4 Conclusion 265
References 265
Electronic Engineering 266
20 Implement Deep SARSA in Grid World with Changing Obstacles and Testing Against New Environment 267
Abstract 267
1 Introduction 268
2 Grid World with Changing Obstacles (GWCO) 269
3 Deep Reinforcement Learning 271
3.1 Deep Learning 271
3.2 Reinforcement Learning 272
3.3 Sarsa Deep Reinforcement Learning (SDRL) 272
4 Simulation Results 273
5 Adding Uncertainty and Changing the Environment After Learning 276
6 Conclusion 278
Acknowledgements 279
References 279
21 A New 1 GS/s Sampling Rate and 400 µV Resolution with Reliable Power Consumption Dynamic Latched Type Comparator 280
Abstract 280
1 Introduction 281
2 General Concept 282
3 The Proposed Comparator 283
4 Simulation Results 284
5 Conclusion 287
References 287
22 Improved Ring-Based Photonic Crystal Raman Amplifier Using Optofluidic Materials 290
Abstract 290
1 Introduction 290
2 Modeling Theory 291
3 Results and Discussion 294
4 Conclusion 302
References 303
23 Considering Factors Affecting the Prediction of Time Series by Improving Sine-Cosine Algorithm for Selecting the Best Samples in Neural Network Multiple Training Model 305
Abstract 305
1 Introduction 305
2 Sine-Cosine Optimization Algorithm 306
2.1 Sine-Cosine Algorithm 306
2.2 Proposed Algorithm 307
3 Results 308
4 Conclusion 317
References 318
24 Advantages of Using Cloud Computing in Software Architecture 319
Abstract 319
1 Introduction 320
1.1 Software Architectures and Their Advantages and Disadvantages 320
1.1.1 MainFrame Architecture 320
File Server Architecture 321
Client Server Architecture 321
Client Server Architecture: Two Tier 321
1.1.2 Multi Tier Architecture, Three Tier 322
1.1.3 Service Oriented Architecture 322
Model driven Architecture 323
1.2 Software Life Cycle 324
1.3 What Is Cloud Computing? 324
1.4 Use Cloud Computing in Software Architecture 326
1.5 Future Research and Conclusions 328
References 328
25 Designing and Implementation a Simple Algorithm Considering the Maximum Audio Frequency of Persian Vocabulary in Order to Robot Speech Control Based on Arduino 329
Abstract 329
1 Introduction 330
1.1 Speech Recognition Techniques 330
2 System Designing and Implementation Suggested Algorithm 332
2.1 The Components of Signal Processing Part 332
2.1.1 Sound Input 333
2.1.2 Computer(PC) 333
2.1.3 Wireless Connection Module 333
2.1.4 Controller Number One 334
2.2 Robot Components 334
2.2.1 Controller Number Two 334
2.2.2 DC Motor 334
2.2.3 Motor Driver 335
2.2.4 Wheel 335
2.2.5 Battery 336
2.2.6 Wireless Connection Module: 336
3 The Robot Direction Detection Algorithm 336
3.1 Sound Processing Algorithm 336
4 Algorithm Operation Study 338
4.1 Audio Signal Sampling and Receiving Sound from Microphone 338
5 Conclusion 341
References 343
26 Simulation of Bayard Alpert Ionization Vacuum Gauge with COMSOL 345
Abstract 345
1 Introduction 345
2 Physical Characteristics 347
3 Simulation of the Ionization Bayard Alpert Gauge 349
4 Conclusion 354
References 354
27 Room Temperature Acetone Sensing Based on ZnO Nanowire/Graphene Nanocomposite 356
Abstract 356
1 Introduction 356
2 Experimental 357
2.1 Materials 357
2.2 Electrode Preparation 357
2.3 Graphene Film Coating Procedure 358
2.4 Synthesis of ZnO Seed Layer 358
2.5 Synthesis of ZnO NWs on Graphene Sheets 358
2.6 Gas Sensing Measurements 358
2.7 Characterization 359
3 Result and Discussion 359
3.1 SEM Analysis 359
3.2 X-Ray Diffraction Analysis 360
3.3 Gas Sensing Analysis 361
3.4 Gas Sensing Mechanism 362
4 Conclusions 363
References 364
28 Application of Learning Methods for QoS Provisioning of Multimedia Traffic in IEEE802.11e 365
Abstract 365
1 Introduction 365
2 Original 802.11 MAC 366
3 IEEE 802.11e Standard 368
4 Enhanced Distribution Coordinate Access (EDCA) 368
5 HCF Controlled Channel Access (HCCA) 369
6 Traffic Specifications (TSPECs) 369
7 802.11e MAC Enhancements 370
8 Contention Free Bursts 370
9 Introduction of Reinforcement Learning 371
9.1 Reinforcement Learning Agents 371
10 Proposed Scheme 372
10.1 Analysis of Scheduling Algorithm in EQQ 372
10.2 Evaluation of Reinforcement Learning Used in EQQ 374
11 Results 375
12 Conclusions 377
References 378
29 LUT Design with Automated Built-in Self-test Functionality 380
Abstract 380
1 Introduction 380
2 Proposed BIST Architecture 383
2.1 Designed SRAM Cell 383
2.2 General Structure of Our LUT 383
2.3 Components of the Designed LUT 384
2.3.1 Main Structure of LUT 384
2.3.2 Structure of the Proposed Core Test 385
Sequential Counter 385
1*16 DEMUX 385
Backup Cell 385
Rectifier Buffers 385
Comparator XOR Gate 385
Automating Elements of Control Pulses 385
3 Performance of the Proposed Architecture 386
4 Simulation Results 387
5 Conclusion 389
References 389
30 A Framework for Effective Exception Handling in Software Requirements Phase 391
Abstract 391
1 Introduction 392
2 Proposed Framework 394
2.1 System Goals 394
2.2 Exception Classification 395
2.2.1 Improving Sub-functions Events 397
2.3 Exception Discovery 398
2.3.1 Scenarios Dependency Graph (SDG) 398
2.3.2 Fault Tree Analysis 398
2.3.3 Exception Propagation Path 399
2.4 EH Strategies 399
2.5 Measuring Exceptions Criticality 400
2.5.1 Exception Criticality Metric (ECM) 400
2.5.2 Scenario Criticality Metric (SCM) 401
2.6 Discovering Software Critical Paths 402
2.7 Guidelines for Software Testers 402
3 Conclusion and Future Work 404
References 404
31 HMFA: A Hybrid Mutation-Base Firefly Algorithm for Travelling Salesman Problem 406
Abstract 406
1 Introduction 406
2 Theoretical Principles 407
2.1 Mathematical Model of Travelling Salesman Problem 408
2.2 Distance of Two Cities 408
3 Firefly Algorithm 409
3.1 Some Mutation Operators 410
3.1.1 Swapping Mutation 411
3.1.2 Inversion Mutation 411
3.1.3 Insertion Mutation 411
3.1.4 2-Opt Mutation 412
4 Proposed Method 413
5 Simulation 416
6 Discussion and Conclusion 419
Acknowledgements 419
References 420
32 IGBT Devices, Thermal Modeling Using FEM 421
Abstract 421
1 Introduction 421
2 Theoretical 422
2.1 Research Hypotheses 422
2.2 Outstanding Research Objectives 422
2.3 Types of Work Methods 423
3 Relevant Records 423
4 IGBT Structure 424
5 Physics of IGBT 425
6 Introduction 425
7 Describe the Proposed Method 426
8 Define IGBT Transistor Structure 426
8.1 Switching Characteristics 426
8.1.1 Turn-On 426
9 Applying the FEM Algorithm for IGBT Thermal Modeling 429
10 Simulation and Evaluation of Results 429
11 MATLAB Simulation Environment 429
12 Simulation and Experimental Results 430
12.1 Results of the Simulation of the Proposed Method 430
12.2 Overview of Research Findings 436
13 Conclusion 436
13.1 Future Suggestions 437
Annex 438
References 442
Power Engineering 443
33 An Overview on the Probabilistic Safety Assessment (PSA), the Loss of External Power Source Connected to the Nuclear Power Plant 444
Abstract 444
1 Introduction 444
2 Probabilistic Safety Assessment (PSA) 445
3 Loss of Offsite Power Source in the Nuclear Reactor 446
4 Emergency Diesel Generators 452
5 Conclusion 453
References 453
34 Optimization of the Fuel Consumption for the Vehicle by Increasing the Efficiency of the Electrical Transmission System 455
Abstract 455
1 Introduction 455
2 Methodology 456
3 Conclusion 460
References 461
35 Improve the Reliability and Increased Lifetime of Comb Drive Structure in RF MEMS Switch 462
Abstract 462
1 Introduction 462
2 Problem Statement—Stiction Mechanism 463
3 Design and Mechanism of a Comb Drive Switch 464
4 Results 467
4.1 Polysilicon 467
4.2 Single-Crystal Silicon 467
4.3 Polyimide 468
5 Conclusion 470
References 471
36 Comparing the Efficiency of Proposed Protocol with Leach Protocol, in Terms of Network Lifetime 472
Abstract 472
1 Introduction 472
2 The Method Based on LEACH Clustering 473
3 The Energy Model 478
4 Introducing the Simulation Scenario 479
5 Comparison of the Efficiency of the Suggested Protocol with LEACH Protocol Concerning the Network Life Span 479
6 Consequences 480
References 483
37 Voltage Stability Enhancement Along with Line Congestion Reduction Using UPFC and Wind Farm Allocation and Sizing by Two Different Evolutionary Algorithms 485
Abstract 485
1 Introduction 486
2 Unified Power Flow Controller (UPFC) 487
3 UPFC Injection Model 488
4 Genetic Algorithm 490
5 Particle Swarm Optimization 490
6 Congestion Management 491
7 Voltage Stability Margin 492
8 Simulation and Numerical Results 493
9 Conclusion 495
References 495
38 Analysis of a Multilevel Inverter Topology 497
Abstract 497
1 Introduction 497
2 Diode-Clamped Inverter (DCC) 498
3 Flying Capacitor Inverter (FCC) 499
4 Cascaded H-Bridge Converter (CHBC) 500
5 Comparison of Multilevel Topologies 502
6 Power Converter Control 502
7 Conclusion 504
References 504
39 Control Scheme of Micro Grid for Intentional Islanding Operation 506
Abstract 506
1 Introduction 506
1.1 Control Techniques for Inverter 508
2 DQ-PLL Structure 508
3 Current Control 509
4 Voltage Control 510
5 Intentional Islanding Detection Algorithm 510
6 Resynchronization Controller Algorithm 511
7 Design of PI Controller 512
7.1 Grey Wolf Optimization Algorithm 512
8 Current Control Transfer Function 514
9 Voltage Control Transfer Function 514
10 Current Control and Voltage Control Stability 514
11 Dynamic Modeling and Simulation Results 515
11.1 Simulation Results 515
11.2 Without and with Synchronization Controller 516
11.3 Conclusion 517
References 517
40 Quasi-3D Analytical Prediction for Open Circuit Magnetic Field of Axial Flux Permanent-Magnet Machine 519
Abstract 519
1 Introduction 519
2 Formulation and Proposed Method 521
2.1 Assumptions 521
2.2 Calculation of Field Caused by Magnet 522
2.2.1 Calculation of No-Load Voltage 524
3 Simulation and Results 525
3.1 Parameters and Machine Structure 525
3.2 Magnetic Field in Case of No-Load Operation 525
3.3 Induced Voltage in Armature Coil in Case of No Load Operation 528
4 Conclusion 533
References 533
41 The Improvement of Voltage Reference Below 1 V with Low Temperature Dependence and Resistant to Variations of Power Supply in CMOS Technology 535
Abstract 535
1 Introduction 535
2 Conclusion 548
References 549
42 Micro—Electromechanical Switches Application in Smart Grids for Improving Their Performance 550
Abstract 550
1 Introduction 551
2 The Combo-Switch 552
3 Analysis and Simulation of Circuit Function 553
4 Sum-up and Conclusion 556
References 556
43 Phase Balancing in Distribution Network Using Harmony Search Algorithm and Re-phasing Technique 559
Abstract 559
1 Introduction 559
2 Re-phasing Process 561
3 Unbalance Network Load Flow 563
4 Harmony Search (HS) Algorithm 564
5 Calculations Results 565
5.1 Considering Network Losses as the Objective Function 571
6 Conclusion 572
References 572
44 Study on Performance of MPPT Methods in WRSG-Based Wind Turbines Utilized in Islanded Micro Grid 574
Abstract 574
1 Introduction 574
2 Basic Wind Turbine Concepts 575
2.1 Wind Energy Extraction 575
2.2 Wind Turbine Power Characteristics 577
3 Common MPPT Methods 577
3.1 MPPT with Power Curve Method 578
3.2 MPPT with TSR Control 578
3.3 MPPT with Optimal Torque Control (OTC) 579
4 Proposed Islanded Micro Grid and Its Response to Overload 580
4.1 Description of Micro Grid 580
4.2 System Behavior Under Overload 581
4.3 Discussion on Results 584
5 Conclusion 584
Appendix 584
References 585
45 Evaluation of Harmonic Effect on Capacity and Location of Optimal Capacitors in Distribution Network Using HBB-BC Algorithm 587
Abstract 587
1 Introduction 587
2 The Studied Network 589
3 Power Loss Index (LPI) 591
4 Constraints and Objective Function 591
5 Load Distribution of Backward and Forward Sweep Technique 593
6 HBB-BC Algorithm 594
7 Simulation Results 595
8 Conclusion 599
References 600
46 Performance Evaluation of Indicators Effective in Improving Air Cooler Output by Linear Programming 602
Abstract 602
1 Introduction 602
2 Research Method 603
3 Findings 603
4 Statement of the Problem 605
5 Results 608
6 Conclusion 610
References 611
47 Determining the Parameters of Insulation Model by Using Dielectric Response Function 612
Abstract 612
1 Introduction 612
2 Theory 613
3 Test Object 614
4 Parameters Identification Methods 614
4.1 Exponential Curve Fitting Method 615
4.2 Genetic Algorithm and PSO Algorithm 616
5 Using the Model Parameters to Calculation the Dissipation Factor of Insulation 617
6 Conclusion 618
References 618
48 Modeling Electrical Arc Furnace (EAF) and Simulating STATCOM Devices for Adjusting Network Power Quality 620
Abstract 620
1 Introduction 620
2 EAF Model 622
2.1 EAF Mathematical Model 622
2.2 Stochastic Behavior of EAF 625
2.3 The EAF Model Parameters Estimation Process 626
3 Introducing the Model Used for Simulating STATCOM 626
4 Aftermaths of Simulation 631
5 Conclusions 633
References 634
49 Distributed Generation Optimization Strategy Based on Random Determination of Electric Vehicle Power 636
Abstract 636
1 Introduction 636
2 Introducting Electric Vehicles 637
2.1 Electric Vehicles (EV) 638
2.2 Hybrid Electric Vehicles (HEV) 638
2.3 Plug-in Hybrid Electric Vehicles (PHEV) 639
2.4 Fuel Cell Vehicles 639
2.4.1 Simple Fuel Cell Vehicle 639
2.4.2 Hybrid Fuel Cell Vehicles 640
3 Application Requirements of the Joint Vehicles 640
4 Simulation 643
5 Conclusion 643
References 645
50 An Improved Harmony Search Algorithm to Solve Dynamic Economic Load Dispatch Problem in Presence of FACTS Devices 647
Abstract 647
1 Introduction 647
2 Dynamic Economic Load Dispatch 649
3 Harmony Search Algorithm 652
3.1 Parameters Initialization 652
3.2 Calculating Initial Objective Function Value of Each Harmony 652
3.3 Improvising a New Harmony 653
3.4 Updating Harmony Memory 653
3.5 Checking Stop Condition 653
3.6 Proposed Improved HSA 654
3.6.1 Roulette Wheel 654
3.6.2 Parallel Search in Dynamic Subgroups 654
3.7 Handling Constraints in DELD in the Proposed Method 655
4 Simulation Results 657
4.1 First Scenario 657
4.2 Second Scenario 658
4.3 Third Scenario 658
5 Conclusion 660
References 661
51 Coordinated Operation of Wind Farm, Pumped-Storage Power Stations, and Combined Heat and Power Considering Uncertainties 663
Abstract 663
1 Introduction 663
2 The Electricity Market 665
3 Wind Power Uncertainty and Analysis Modeling 665
4 Pumped-Storage Power Stations Analysis Modeling 666
5 Combined Heat and Power Station Modeling 668
6 Defining the Variables 669
7 Particle Swarm Optimization Algorithm 670
8 Simulation Results 671
9 Conclusion 673
References 675
52 Optimization of Exponential Double-Diode Model for Photovoltaic Solar Cells Using GA-PSO Algorithm 677
Abstract 677
1 Introduction 678
2 The Electrical Circuit Model and Related Equations 678
2.1 Exponential Double-Diode Circuit 678
2.2 Mathematical Equations 679
3 Proposed GA-PSO Algorithm 680
4 Results and Discussion 680
5 Conclusion 681
References 682
Telecommunication Engineering 684
53 Hierarchical Routing in Large Wireless Sensor Networks Using a Combination of LPA * and Fuzzy Algorithms 685
Abstract 685
1 Introduction 685
1.1 Selection of Cluster Members 690
1.2 Proposed routing method 690
1.2.1 Applying the A-Star Algorithm 690
1.2.2 Applying the Fuzzy Approach 691
1.3 Assured Aggregation by Cluster Head 691
1.4 Send Data 694
2 Simulation 694
2.1 Comparative Methods 694
2.2 Simulation Parameters 695
2.3 Network Lifetime 695
2.4 Number of Live Nodes 695
2.5 Number of Received Data 696
2.6 Numbers 697
2.7 The Amount of Remaining Energy 698
3 Conclusion 699
4 Future Work 699
References 699
54 Improving Security Using Blow Fish Algorithm on Deduplication Cloud Storage 701
Abstract 701
1 Introduction 701
2 Cryptography 702
3 Asymmetric Algorithms 703
3.1 DES 703
3.2 Triple-DES 704
3.3 AES 704
3.4 Blowfish 705
3.5 Flexibility of All Algorithms 705
4 Choose Appropriate Algorithm 706
5 Implementing 707
6 Conclusion 709
References 709
55 Increased Rate of Packets in Cognitive Radio Wireless ad hoc Network with Considering Link Capacity 710
Abstract 710
1 Introduction 710
2 The Issue of Considering Link Capacity 712
2.1 System Structure 713
2.2 Proposed Method 713
3 Link Capacity 717
3.1 End-to-End Interference Model 718
3.2 Interference Aware Channel Assignment (IACA) Algorithm 719
4 Simulation and Results 721
4.1 Simulation Scenarios 721
4.2 Handoff Blocking Probability 722
4.3 Throughput 722
5 Conclusion 724
6 Suggestions 724
References 725
56 Deadlock Detection in Routing of Interconnection Networks Using Blocked Channel Fuzzy Method and Traffic Average in Input and Output Channels 726
Abstract 726
1 Introduction 726
2 A Fuzzy Method to Deadlock Detection 728
3 Network Pattern 729
4 Simulation Results 730
5 Conclusion 730
References 732
57 Optimizing of Deadlock Detection Methods in Routing of Multicomputer Networks by Fuzzy Here Techniques 734
Abstract 734
1 Introduction 734
2 A Fuzzy Method to Deadlock Detection 736
3 Network Pattern 737
4 Simulation Results 738
5 Conclusion 739
References 739
58 Occupancy Overload Control by Q-learning 741
Abstract 741
1 Introduction 741
2 Background 742
2.1 SIP Protocol 742
2.2 Q-learning 743
3 Related Works 744
4 OCC with Learning Capability 745
4.1 States Scope 746
4.2 Actions Scope 746
4.3 Q-table 747
4.4 States Change Function 747
4.5 Reward Function 747
5 Simulations 748
5.1 Goodput and Call Setup Delay 749
5.2 Stability and Reactiveness 750
6 Conclusion 751
References 752
59 Mobile Smart Systems to Detect Balance Motion in Rehabilitation 753
Abstract 753
1 Introduction 753
2 Sensors 756
3 Research Method 757
4 Data Analysis 758
5 Conclusion 760
References 760
60 A Novel Algorithm Developed with Integrated Metrics for Dynamic and Smart Credit Rating of Bank Customers 762
Abstract 762
1 Introduction 763
2 Modeling for Dynamic Discredit Calculation 763
2.1 Discredit 763
2.2 Discredit in a Fiscal Year 764
3 Hypotheses 764
3.1 Hypothesis One 764
3.2 Hypothesis Two 764
3.3 Model Description 765
3.4 Main Input Variables of the Model 766
4 Dynamic, Weighted Discredit Calculation Model for Cheque-Account Customers 767
4.1 Model Validation Through Developing Discredited Software 767
4.2 Discussion 768
5 Conclusions 772
6 Future Studies 773
6.1 Important Recommendation for All Banking Systems 773
6.2 Limitations and Delimitations 773
6.3 Model Improvement by Inserting Other Effective Variables 773
References 774
61 Data Mining Based on Standard Analysis 775
Abstract 775
1 Introduction 775
2 Statement of Problem 776
3 Description of Problem 777
3.1 Purpose and Nature of Data Mining 778
3.2 Importance of Content in Information Generation 778
3.3 Organizational Intelligence for Data Analysis 779
3.4 Database Optimization 780
4 Discussion and Conclusion 781
References 781
62 Development of Software with Appropriate Applications in Smart Tools 783
Abstract 783
1 Introduction 783
2 Statement of Problem 784
3 Statement of Plan 785
3.1 Internet of Things in Smart Tools 786
3.2 Software Progress 786
3.3 The Role of Markets in Software Development, Identifying Experts and Attracting Diverse People with Various Tendencies 787
3.4 Promoting Software Power a Step for Technology Localization
4 Discussion and Conclusion 788
References 788
63 Investigating IPv6 Addressing Model with Security Approach and Compare It with IPv4 Model 790
Abstract 790
1 Introduction 790
2 Research Background 792
3 Research Method 794
4 Conclusion 795
References 795
64 Design of Dual-Band Band-Pass Filters with Compact Resonators and Modern Feeding Structure for Wireless Communication Applications 796
Abstract 796
1 Introduction 797
2 Design of the First Set of DBBPFs 798
2.1 The Coupling Scheme and the Primary Structure 798
2.2 The Configuration of the DBBPF After Meandering the Resonators 800
2.3 Numerical Parameters and Information 805
3 Design of the Second Set of DBBPFs 806
3.1 The Basic Theory of 0° and Non-0° Feed Structure 806
3.2 Basic Structure of Proposed DBBPF 806
3.3 The Proposed DBBPF 0.9/1.8 GHz 807
3.4 The Proposed DBBPF at 0.9/1.8 GHz 809
4 Comparison of the First and Second DBBPFs 811
5 Conclusion 812
References 812
65 New Fuzzy Logic-Based Methods for the Data Reduction 814
Abstract 814
1 Introduction 814
2 The Fuzzy Singular Value Decomposition Method (FSVD) 815
2.1 The Takagi-Sugeno Fuzzy Model 816
2.2 Singular Value Decomposition Method 816
2.3 The FSVD Method for Data Reduction 816
2.4 Properties of the FSVD Method 818
3 An Illustrative Example 818
3.1 The Anderson’s Iris Data Set 819
3.2 The Obtained Results 819
4 A Technique for Selection of an Appropriate Method for the Data Reduction 820
4.1 An Outline for the Technique 820
4.2 The Obtained Results 821
5 Concluding Remarks 824
References 824
66 A New Approach for Processing the Variable Density Log Signal Using Frequency-Time Analysis 825
Abstract 825
1 Introduction 825
2 VDL Data 826
3 Analysis of Time-Frequency Transformation Methods 828
3.1 Short Time Fourier Transformation (STFT) 829
3.2 Continuous Wavelet Transform (CWT) 829
3.3 Synchrosqueezing Transformation (SST) 829
4 Results 830
5 Conclusion 830
References 835
67 Detection of Malicious Node in Centralized Cognitive Radio Networks Based on MLP Neural Network 837
Abstract 837
1 Introduction 837
2 Basic Theory 840
2.1 Missed Detection 840
2.2 False Alarm 840
3 System Model 841
4 Proposed Scheme 842
4.1 Database and Basic User Traffic 842
4.2 Normalization and de Normalization of Data 842
4.3 Training Phase 843
4.4 Test Phase 844
4.5 Detection of “Always Yes” and “Always No” Attacker 844
4.6 Detection of Smart Attacker 845
5 Simulation Results 845
6 Conclusion 848
Reference 849
68 FIR Filter Realization Using New Algorithms in Order to Eliminate Power Line Interference from ECG Signal 850
Abstract 850
1 Introduction 850
2 Power Line Interference (PLI) 852
3 FIR Notch Filter 853
4 Particle Swarm Optimization (PSO) 853
5 FIR Filter Realising 855
6 Proposed Algorithms 856
6.1 First Algorithm Hardware Simplification by Trial and Error (HSTAE) 856
6.2 Second Algorithm: Improved Modified PSO (MPSO) 858
7 Simulation Results 860
8 Conclusion 864
References 865
69 Providing a Proper Solution to Solve Problems Related to Banking Operations Through the ATM Machines to Help the Disabled, the Elderly and the Illiterate People 867
Abstract 867
1 Introduction 867
2 Speech Processing 867
2.1 Definitions and Applications [1, 2 and 3] 867
2.2 Types of Speaker Recognition Systems [4] and [5] 868
2.3 Implementation Techniques 870
3 The Importance of Signal Modeling 870
3.1 Understanding Signal Modeling 870
3.2 Pattern Detection 871
3.3 Signal Modeling Algorithms 872
3.4 Digital Methods for Saving Sounds 875
4 Voice Recognition Algorithm 876
4.1 Hidden Markov’s Model 876
4.2 Architecture of Hidden Markov’s Model 876
4.3 Discussion About Automatic Speech Detection 877
5 Presentation of the Proposed System 878
5.1 Presentation of Existing Problems 878
5.2 Proposed Solution 879
5.3 Advantages of the Proposed System 881
5.4 The Drawbacks of the Proposed System 881
6 Conclusions and Recommendations 882
Acknowledgements 882
References 882
70 Presenting a New Clustering Algorithm by Combining Intelligent Bat and Chaotic Map Algorithms to Improve Energy Consumption in Wireless Sensor Network 883
Abstract 883
1 Introduction 884
2 Related Works 884
3 The Proposed Algorithm 886
3.1 Bat Algorithm Introduction 886
3.1.1 Studying Bat’s Behavior 886
3.2 Studying the Evolutionary Bat Algorithm 886
3.3 Advantages of Bat Algorithm 888
3.4 Applications of the Bat Algorithm 888
3.5 Chaotic Bat Algorithm 889
3.5.1 Chaotic Theory 889
3.5.2 Introducing Chaotic Maps 889
4 Simulation and Results of the Proposed Algorithm 891
4.1 Simulation 892
4.2 Performance Analysis 893
4.3 The Number of Dead Nodes per Round 896
4.4 Total Energy of Nodes per Round 896
5 Conclusion 897
References 898
71 The Impact of Spatial Resolution on Reconstruction of Simple Pattern Through Multi Layer Perceptron Artificial Neural Network 900
Abstract 900
1 Introduction 900
2 Multi Layer Perceptron Network 902
3 Result and Discussion 904
4 Conclusion 907
References 907
72 Analysis of the Role of Cadastre in Empowerment of Informal Settlements (Case Study: Ahvaz City) 909
Abstract 909
1 Introduction 910
1.1 Problem Statement 910
1.2 Research Goal 911
1.3 Research Questions 911
1.4 Research Methodology 911
2 Theoretical Concepts and Fundamentals 911
2.1 Concepts Related to Cadastre 911
2.1.1 Parcel 911
2.1.2 Information Systems 912
2.1.3 Geographic Information System (GIS) 912
2.1.4 Earth Information System (LIS) 912
2.1.5 Cadastral Objectives 913
2.1.6 Cadastral Types 913
Tax Cadastre 913
Linear Cadastral 914
Digital Cadastral 915
Property Cadastre 915
Political Cadastre 915
Geographic Cadastre 915
Watery Cadastre 916
Online Cadastre 916
Multipurpose Cadastre 916
2.2 Informal Settlement 916
2.2.1 Definitions and Common Terminology for Informal Settlements 916
Marginalization 916
2.3 The Relationship Between Cadastre and the Security of Land Occupation in Informal Settlements 917
3 Case Study 917
4 Discussions and Findings 919
4.1 Reviewing the Implementation of the Cadastral Plan on the Security of Capturing Residents of Informal Settlements and in Deciding and Deciding to Motivate Investment 919
4.2 The Opinion of the Relevant Experts 920
4.2.1 Identification of Effective Factors in the Formation of Informal Settlements from the Perspective of Experts 920
4.2.2 Investigating the Positive and Negative Impacts of Land Ownership on Informal Settlements 921
4.2.3 The Impact of Informal Outreach on the Faces and Economic, Social, Spatial and Environmental Structure of Ahvaz City 922
5 Conclusion 922
References 923
73 Threats of Social Engineering Attacks Against Security of Internet of Things (IoT) 924
Abstract 924
1 Introduction 925
2 Social Engineering 926
3 Simulation of a Social Engineering Attack 926
4 SE Attack Is Unpredictable Technically 927
5 Introducing Some Social Engineering Attacks 928
6 Challenges and Weakness of Users’ Conducts 929
7 Conclusion 934
References 935
74 Assessment and Modeling of Decision-Making Process for e-Commerce Trust Based on Machine Learning Algorithms 936
Abstract 936
1 Introduction 936
2 Research Structure 938
3 Proposed Method 938
3.1 Main Issue of Classification 938
3.2 Support Vector Machine (SVM) 939
3.3 C4.5 Decision Tree 940
3.4 Bayesian Classifier 940
3.5 K-nearest Neighbor 941
3.6 Distance Metric Learning 942
4 Modeling of Decision-Making About Business Trust Using Machine Learning Algorithms 943
5 Model Implementation and Presentation 946
6 Conclusions 952
References 953
75 Three-Band, Flexible, Wearable Antenna with Circular Polarization 954
Abstract 954
1 Introduction 954
2 Introduction to the Structure of the Designed Antenna 955
3 Results of Antenna Simulation 956
3.1 Return Loss 957
3.2 Axial Ratio 958
3.3 Current Distribution on the Antenna Surface 959
3.4 Right-Handed and Left-Handed Radiation Patterns 960
3.5 3-D Radiation Pattern 961
4 Conclusion 962
References 962
76 A Multi-objective Distribution Network Reconfiguration and Optimal Use of Distributed Generation Unites by Harmony Search Algorithm 964
Abstract 964
1 Introduction 964
2 Distributed Generation Resources (DG) 966
3 Formulation of the Problem 966
3.1 Voltage Stability 966
3.2 Voltage Profile 967
3.3 Power Losses Using Network Restructuring 968
4 Harmony Search Algorithm (HSA) [14–16] 969
5 The Proposed Method 969
6 Simulation Steps 970
6.1 Sample Network 970
7 Software Simulation 970
8 Simulation Results 973
9 Conclusion 974
References 975
77 Multi-band Rectangular Monopole Microstrip Antenna with Modified Feed Junction for Microwave Wireless Applications 976
Abstract 976
1 Introduction 976
2 Antenna Design 977
3 Simulation, Measurement and Discussion 978
4 Conclusion 980
References 981
78 Electrostatic MEMS Switch with Vertical Beams and Body Biasing 983
Abstract 983
1 Introduction 983
2 Simulation and Results 986
3 Conclusion 988
References 988
79 Optimal Clustering of Nodes in Wireless Sensor Networks, Using a Gravitational Search Algorithm 989
Abstract 989
1 Introduction 989
2 A Review of Past Research 990
3 Evolutionary Algorithms 992
3.1 Gravitational Search Algorithm 992
3.2 Particle Swarm Optimization Algorithm 994
3.3 Synthetic Bumblebee Algorithm 995
4 The Proposed Method 996
4.1 Using Evolutionary Algorithms for Problem Solving 997
5 Conclusion 1002
References 1002
80 A Bee Colony (Beehive) Based Approach for Data Replication in Cloud Environments 1004
Abstract 1004
1 Introduction 1004
2 Suggested Method 1006
2.1 Artificial Bee Colony (ABC) Algorithm 1006
2.2 Suggested Algorithm 1006
2.2.1 Implementing Suggested Algorithm 1009
3 Results Evaluating 1009
3.1 Simulation Results 1011
References 1016

Erscheint lt. Verlag 25.7.2018
Reihe/Serie Lecture Notes in Electrical Engineering
Zusatzinfo XIV, 1052 p. 562 illus., 377 illus. in color.
Verlagsort Singapore
Sprache englisch
Themenwelt Technik Elektrotechnik / Energietechnik
Technik Maschinenbau
Technik Nachrichtentechnik
Schlagworte Control • HV Engineering • ICCEC, Tehran • Khwarazmi University • Motor Drives • Power Systems • Sensors & Micro-machines • telecommunications
ISBN-10 981-10-8672-9 / 9811086729
ISBN-13 978-981-10-8672-4 / 9789811086724
Haben Sie eine Frage zum Produkt?
Wie bewerten Sie den Artikel?
Bitte geben Sie Ihre Bewertung ein:
Bitte geben Sie Daten ein:
PDFPDF (Wasserzeichen)
Größe: 35,8 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Lehrbuch zu Grundlagen, Technologie und Praxis

von Konrad Mertens

eBook Download (2022)
Carl Hanser Verlag GmbH & Co. KG
34,99
Ressourcen und Bereitstellung

von Martin Kaltschmitt; Karl Stampfer

eBook Download (2023)
Springer Fachmedien Wiesbaden (Verlag)
66,99
200 Aufgaben zum sicheren Umgang mit Quellen ionisierender Strahlung

von Jan-Willem Vahlbruch; Hans-Gerrit Vogt

eBook Download (2023)
Carl Hanser Verlag GmbH & Co. KG
34,99