{"title":"Derivative observations used in predictive control","authors":"J. Kocijan, Douglas J. Leitht","doi":"10.1109/MELCON.2004.1346883","DOIUrl":"https://doi.org/10.1109/MELCON.2004.1346883","url":null,"abstract":"Gaussian processes provide approach to probabilistic nonparametric modelling which allows a straightforward combination of measured data and local linear models in an empirical model. This is of particular importance in the identification of nonlinear dynamic systems from experimental data where usually more data are available far from equilibrium points. We illustrate the utility of such simple nonlinear predictive control example.","PeriodicalId":164818,"journal":{"name":"Proceedings of the 12th IEEE Mediterranean Electrotechnical Conference (IEEE Cat. No.04CH37521)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128078156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Object by value transfer mechanisms for obligation policy enforcement object loading","authors":"M. Randić, M. Kunstic, B. Blašković","doi":"10.1109/MELCON.2004.1347032","DOIUrl":"https://doi.org/10.1109/MELCON.2004.1347032","url":null,"abstract":"Adequate architecture and technology can significantly improve the adaptability and performance of the policy-based management systems. We present how the policy enforcement point operation can be improved by applying the \"object by value\" transfer mechanisms. Policy enforcement object transferred and loaded into the policy enforcement point as a stateful object can support the adaptable behaviour of the point. We experimented with the two standard object by using the value technologies such as CORBA valuetypes and Java serialization on RMl. Examples in this paper refer to the CORBA valuetypes only.","PeriodicalId":164818,"journal":{"name":"Proceedings of the 12th IEEE Mediterranean Electrotechnical Conference (IEEE Cat. No.04CH37521)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129661171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Estimation of difficult-to-measure process variables using neural networks - a comparison of simple MLP and RBF neural network properties","authors":"D. Sliskovic, E. Nyarko, N. Peric","doi":"10.1109/MELCON.2004.1346888","DOIUrl":"https://doi.org/10.1109/MELCON.2004.1346888","url":null,"abstract":"In this paper, two different artificial neural networks are tested and compared with regard to their application in the estimation of difficult-to-measure process variables. Two of the most commonly used neural networks, the MLP (multilayer perceptron) and RBF (radial basis function) neural networks, with simple structure and standard training methods are chosen as examples. Neural network training is based on available data from a database of process variables measured over a long time period. The database in this paper is obtained using a simulation model of a real process. Without going deeper into theoretical background, relative properties of these neural networks are given through the results obtained by testing the trained networks and analysis performed on these results.","PeriodicalId":164818,"journal":{"name":"Proceedings of the 12th IEEE Mediterranean Electrotechnical Conference (IEEE Cat. No.04CH37521)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129645273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A secure authenticated key agreement protocol","authors":"C. Popescu","doi":"10.1109/MELCON.2004.1347048","DOIUrl":"https://doi.org/10.1109/MELCON.2004.1347048","url":null,"abstract":"Authenticated key agreement protocols have an important role for building secure communications amongst two or more entities over the Internet. In this paper we propose an efficient and secure authenticated key agreement protocol based on Diffie-Hellman key agreement. Our protocol is more efficient than previous authenticated key agreement protocols because it requires only 1 integer multiplication. We show that our protocol meets the security attributes under the assumption that the elliptic curve discrete logarithm problem is secure.","PeriodicalId":164818,"journal":{"name":"Proceedings of the 12th IEEE Mediterranean Electrotechnical Conference (IEEE Cat. No.04CH37521)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130727270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using database framework in Web applications","authors":"D. Ridjanovic, V. Okanović","doi":"10.1109/MELCON.2004.1347025","DOIUrl":"https://doi.org/10.1109/MELCON.2004.1347025","url":null,"abstract":"In software engineering, every new period brings new terms. First there were objects, and then came components and patterns, and now frameworks are becoming the current buzzword. Frameworks are powerful, but hard to develop and use effectively for application developers. It is often better to use and customize the open source frameworks than to develop in-house frameworks. Even if you are not developing the framework, but instead using an open source framework, there is still much work to be done. Deploying a framework involves a major investment in training and mentoring to allow developers to make the best use of the complex interfaces, abstract classes and classes. In this paper we discuss the open source frameworks and give an example of a database framework use in the dynamic Web applications development.","PeriodicalId":164818,"journal":{"name":"Proceedings of the 12th IEEE Mediterranean Electrotechnical Conference (IEEE Cat. No.04CH37521)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130359829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The valuation of new generation assets in a competitive electricity market","authors":"E. Caruso, M. Dicorato, A. Minoia, M. Trovato","doi":"10.1109/MELCON.2004.1348237","DOIUrl":"https://doi.org/10.1109/MELCON.2004.1348237","url":null,"abstract":"The selection and the valuation of a power project reveal a very difficult task in a liberalized electricity market. In conjunction with the highly capital-intensive feature of electricity supply, different factors can influence the profitability of the investment, such as: market rules, plant location, load demand and fuel cost trend, etc. In this paper, a methodology based on the long-term simulation of an electricity market is proposed to investigate the financial feasibility of new generation assets. The simulation tool handles zonal- or nodal- based pricing schemes, with different kinds of equality and inequality constraints. The procedure has been applied to evaluate the penetration level of combined cycle gas turbine power plants in southern Italy.","PeriodicalId":164818,"journal":{"name":"Proceedings of the 12th IEEE Mediterranean Electrotechnical Conference (IEEE Cat. No.04CH37521)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129618550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Batina, N. Mentens, Berna Örs, Bart. Preneel, Bart. Preneel
{"title":"Serial multiplier architectures over GF(2/sup n/) for elliptic curve cryptosystems","authors":"L. Batina, N. Mentens, Berna Örs, Bart. Preneel, Bart. Preneel","doi":"10.1109/MELCON.2004.1347047","DOIUrl":"https://doi.org/10.1109/MELCON.2004.1347047","url":null,"abstract":"We present an FPGA implementation of a new multiplier for binary finite fields that combines two previously known methods. The multiplier is designed for polynomial bases which allow more flexibility in hardware and is dedicated to efficient implementations of elliptic curve cryptography. An extension to a digit-serial architecture is also sketched. For the introduced architecture we also discuss resistance to side-channel attacks.","PeriodicalId":164818,"journal":{"name":"Proceedings of the 12th IEEE Mediterranean Electrotechnical Conference (IEEE Cat. No.04CH37521)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129927626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Selective video transmission by means of virtual reality based object extraction","authors":"J. P. Bandera, C. Urdiales, F. Sandoval","doi":"10.1109/MELCON.2004.1346815","DOIUrl":"https://doi.org/10.1109/MELCON.2004.1346815","url":null,"abstract":"This paper presents a new technique to extract objects from a real complex background so that a video sequence can be decomposed into a set of objects as required for object-oriented video compression techniques. The proposed method is based on a background subtraction technique. However, instead of using a fixed background, the system relies on predicting one from a previously constructed virtual model of the environment. Thus, camera movements are allowed. These movements are estimated by means of a tracker device. We also present the virtual model construction technique for indoor environments. The method has been successfully tested for several different video sequences including capture errors, partially mapped virtual environments and camera positioning errors. Further work will focus on extending the virtual models not only to environment, but also to objects, and integrating the method in a MPEG4 standard compression system.","PeriodicalId":164818,"journal":{"name":"Proceedings of the 12th IEEE Mediterranean Electrotechnical Conference (IEEE Cat. No.04CH37521)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124691784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A.C. de Lima, S.C. Guimardes, J. Camacho, D. Bispo
{"title":"Electric energy demand analysis using fuzzy decision-making system","authors":"A.C. de Lima, S.C. Guimardes, J. Camacho, D. Bispo","doi":"10.1109/MELCON.2004.1348014","DOIUrl":"https://doi.org/10.1109/MELCON.2004.1348014","url":null,"abstract":"To obtain energy services, the integrated planning resources (IPR) work with an analysis that contemplates rationalization; independent production and environmental factors related to the energy supply systems. With this on mind for a consumer unity billed by means of a binomial tariff, the fuzzy decision making system for demand analysis (FDMSDA) can be considered as a tool to determine a new functioning condition, contemplating the energy average price supplied by own generation or local utility to the technology of load shaving due to the \"conventional\" and \"blue and green hour-seasonal\" Brazilian tariff structure.","PeriodicalId":164818,"journal":{"name":"Proceedings of the 12th IEEE Mediterranean Electrotechnical Conference (IEEE Cat. No.04CH37521)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124971377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Measurement and analysis of voltage events in a low-voltage distribution network","authors":"J. Barros, E. Perez","doi":"10.1109/MELCON.2004.1348245","DOIUrl":"https://doi.org/10.1109/MELCON.2004.1348245","url":null,"abstract":"The paper presents the results of several months monitoring of voltage events in a low-voltage distribution network. Voltage dips, short interruptions and overvoltages in voltage supply are considered in the study. The voltage event detection method employed uses three Kalman Filters, one per voltage phase, to detect and estimate in real-time the magnitude and phase angle of the three-phase voltage supply during the event. Statistical analysis of the voltage events recorded and the effect of these voltage events on equipment are also considered in the paper.","PeriodicalId":164818,"journal":{"name":"Proceedings of the 12th IEEE Mediterranean Electrotechnical Conference (IEEE Cat. No.04CH37521)","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125995684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}