2016 IEEE Region 10 Conference (TENCON)最新文献

筛选
英文 中文
Fuzzy model for predicting electric generation from sea wave energy in Thailand 泰国海浪能发电的模糊预测模型
2016 IEEE Region 10 Conference (TENCON) Pub Date : 2016-11-01 DOI: 10.1109/TENCON.2016.7848518
S. Phaiboon, Khunchai Tanukitwattana
{"title":"Fuzzy model for predicting electric generation from sea wave energy in Thailand","authors":"S. Phaiboon, Khunchai Tanukitwattana","doi":"10.1109/TENCON.2016.7848518","DOIUrl":"https://doi.org/10.1109/TENCON.2016.7848518","url":null,"abstract":"This paper presents electrical energy predicting from sea waves in Thailand using fuzzy logic approximation. We installed a study of 300 W electric generator and performed measurement of the wave height and electric power generating. This information is used for modeling to analyze the relationship Then we applied our fuzzy model to predict the electric generation from sea wave in Gulf of Thailand and Andaman sea. The results show comfortable and fast predicting with high accuracy for uncertain sea wave energy.","PeriodicalId":246458,"journal":{"name":"2016 IEEE Region 10 Conference (TENCON)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114382228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Effects of varying fiber length towards packet delay in Passive Optical Network 无源光网络中不同光纤长度对分组时延的影响
2016 IEEE Region 10 Conference (TENCON) Pub Date : 2016-11-01 DOI: 10.1109/TENCON.2016.7848735
N. Radzi, M. A. Ridwan, F. Abdullah, N. M. Din, M. Al-Mansoori, H. Z. Abidin
{"title":"Effects of varying fiber length towards packet delay in Passive Optical Network","authors":"N. Radzi, M. A. Ridwan, F. Abdullah, N. M. Din, M. Al-Mansoori, H. Z. Abidin","doi":"10.1109/TENCON.2016.7848735","DOIUrl":"https://doi.org/10.1109/TENCON.2016.7848735","url":null,"abstract":"Passive Optical Network (PON) testbed has been the interests of many researchers nowadays to study the non-linear effects of fibers that could not be captured using simulations. The length of the fiber is significant because cost savings could be made with longer fiber by reducing the electronic equipment and real-estate required at the local exchange or wire center. In this paper, we vary the fiber length ranges from 5 km, 10 km, 15 km and 20 km to study the effects they produce towards the packet delay. The experiment is done in a Peripheral Interface Controller (PIC) based PON testbed, and validated by National Instrument - Universal Software Radio Peripheral (NI-USRP) based PON testbed. The results show that the percentage difference between each fiber length is very minor, where we can observe as high as 0.12% between 10 km to 5 km fiber length, 0.65% between 15 km to 10 km fiber length, 0.3% between 20 km to 10 km fiber length and only 1.1% between 20 km to 5 km fiber length.","PeriodicalId":246458,"journal":{"name":"2016 IEEE Region 10 Conference (TENCON)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114383836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
In-orbit results of VELOX-II nanosatellite VELOX-II纳米卫星在轨结果
2016 IEEE Region 10 Conference (TENCON) Pub Date : 2016-11-01 DOI: 10.1109/TENCON.2016.7848740
K. Low, M. Tissera, J. W. Chia
{"title":"In-orbit results of VELOX-II nanosatellite","authors":"K. Low, M. Tissera, J. W. Chia","doi":"10.1109/TENCON.2016.7848740","DOIUrl":"https://doi.org/10.1109/TENCON.2016.7848740","url":null,"abstract":"VELOX-II is among the first few 6U nano-satellites in the world that have been successfully launched and operated in space. The satellite was developed and built in the Satellite Research Centre (SaRC) at Nanyang Technological University (NTU). It is SaRC's sixth satellite in orbit. It carries a communication payload to demonstrate inter-satellite data relay system capability between a low earth orbit (LEO) and higher orbit satellites. Its primary aim is to demonstrate data transmission anytime and anywhere in the orbit. Besides the primary communication payload, the satellite missions include a GPS payload for precise orbit navigation and a fault tolerant electronic circuit. In this paper, the missions of VELOX-II are described and in-orbit flight results are presented.","PeriodicalId":246458,"journal":{"name":"2016 IEEE Region 10 Conference (TENCON)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114395745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Securing vehicular ad-hoc networks from data falsification attacks 保护车载自组织网络免受数据伪造攻击
2016 IEEE Region 10 Conference (TENCON) Pub Date : 2016-11-01 DOI: 10.1109/TENCON.2016.7847967
D. Rawat, B. B. Bista, Gongjun Yan
{"title":"Securing vehicular ad-hoc networks from data falsification attacks","authors":"D. Rawat, B. B. Bista, Gongjun Yan","doi":"10.1109/TENCON.2016.7847967","DOIUrl":"https://doi.org/10.1109/TENCON.2016.7847967","url":null,"abstract":"Data falsification attack is one of the main security issues in vehicular ad-hoc networks (VANETs) where vehicles rely on information received from other peers/vehicles. In this paper, we propose a method to detect data falsification attack using hash chains for enhancing the network performance by adapting contention window size to forward accurate information to the neighboring vehicles in a timely manner (to improve throughput while reducing end-to-end delay). Performance of the proposed approach is evaluated using numerical results obtained from simulations. We found that the proposed adaptive approach prevents VANET from data falsification attacks and provides higher throughput with lower delay.","PeriodicalId":246458,"journal":{"name":"2016 IEEE Region 10 Conference (TENCON)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114514514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Workspace trajectory tracking control of flexible joint robots based on backstepping method 基于反步法的柔性关节机器人工作空间轨迹跟踪控制
2016 IEEE Region 10 Conference (TENCON) Pub Date : 2016-11-01 DOI: 10.1109/TENCON.2016.7848700
Z. Jiang, Ken Shinohara
{"title":"Workspace trajectory tracking control of flexible joint robots based on backstepping method","authors":"Z. Jiang, Ken Shinohara","doi":"10.1109/TENCON.2016.7848700","DOIUrl":"https://doi.org/10.1109/TENCON.2016.7848700","url":null,"abstract":"This paper addresses the issue of end-effector trajectory tracking control of multi-link flexible joint robot manipulators. A submanifold is designed to describe the ideal trajectory tracking performance. Dynamics of the robot is rewritten in terms of the manifold. Control schemes are derived using backstepping control design approach. Stability of the system is analyzed based on Lyapunov stability theory. Simulations are carried out to on a 2-link flexible robot manipulator. The results demonstrate effectiveness and usefulness of the proposed control method.","PeriodicalId":246458,"journal":{"name":"2016 IEEE Region 10 Conference (TENCON)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117105123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Pyramid stack data stream mining for handling concept-drifting 处理概念漂移的金字塔堆栈数据流挖掘
2016 IEEE Region 10 Conference (TENCON) Pub Date : 2016-11-01 DOI: 10.1109/TENCON.2016.7847953
Zhuoran Xu, Cuiqin Hou, Yingju Xia, Jun Sun, Hiroya Inakoshi, N. Yugami
{"title":"Pyramid stack data stream mining for handling concept-drifting","authors":"Zhuoran Xu, Cuiqin Hou, Yingju Xia, Jun Sun, Hiroya Inakoshi, N. Yugami","doi":"10.1109/TENCON.2016.7847953","DOIUrl":"https://doi.org/10.1109/TENCON.2016.7847953","url":null,"abstract":"Data stream mining has gained growing attentions recently. Concept drift is a particular problem in data stream mining, which is defined as the distribution of data may change over time. Most of current methods try to estimate the current distribution or reconstruct the current distribution from a mixture of old distributions. They suffer problems of estimation and reconstruction error respectively. In this paper, we found that a classifier that fits the current distribution can be obtained more directly than the current methods by ensembling classifiers trained with increasing number of recent data. This strategy guarantees that no matter when and how concept drift happens, there is always a classifier that suits the current data distribution. So our method only needs to select the current distribution classifier out of all classifiers we hold. This is much easier than estimation and reconstruction. We test our method on four real world data sets. Comparing with other methods, our method is the best algorithm in terms of average accuracy.","PeriodicalId":246458,"journal":{"name":"2016 IEEE Region 10 Conference (TENCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129922086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint cyber and physical attacks against topology of electric grids 针对电网拓扑结构的联合网络和物理攻击
2016 IEEE Region 10 Conference (TENCON) Pub Date : 2016-11-01 DOI: 10.1109/TENCON.2016.7848103
Ying Sun, Wen-Tai Li, Wentu Song, C. Yuen
{"title":"Joint cyber and physical attacks against topology of electric grids","authors":"Ying Sun, Wen-Tai Li, Wentu Song, C. Yuen","doi":"10.1109/TENCON.2016.7848103","DOIUrl":"https://doi.org/10.1109/TENCON.2016.7848103","url":null,"abstract":"This paper stands an attacker's point of view to develop a novel attack strategy that causes as much destructive as possible to the topology of electric network. By attacking transmission lines, power flow of girds will be changed, which could cause overload on other lines and possibly trigger cascading failures, and then lead to large areas blackout. Meanwhile, considering the limited resource of attacker, we propose a method to find out the minimum value to corrupt the measurements of attacked area, in order to mislead the control centre into detecting wrong attacked locations. Finally, the proposed attack strategy is explained in detail by IEEE 9-bus systems, and extending this application to a more complex networks that verified by IEEE 14-bus systems. Simulation results show that the damage risks of electric grids, caused by the proposed strategy, are increased at least 50% compared with traditional attack strategy.","PeriodicalId":246458,"journal":{"name":"2016 IEEE Region 10 Conference (TENCON)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130483504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A regression model-based approach to fast contingency screening for transient stability 基于回归模型的暂态稳定快速应急筛选方法
2016 IEEE Region 10 Conference (TENCON) Pub Date : 2016-11-01 DOI: 10.1109/TENCON.2016.7848129
M. Chheng, A. Nerves
{"title":"A regression model-based approach to fast contingency screening for transient stability","authors":"M. Chheng, A. Nerves","doi":"10.1109/TENCON.2016.7848129","DOIUrl":"https://doi.org/10.1109/TENCON.2016.7848129","url":null,"abstract":"The study develops a fast and simple technique for on-line transient stability assessment for the case of fault disturbances in the power transmission system. A case study for stability preventive control by generation rescheduling illustrates an application of the proposed procedure. The study focuses on an implementation of an on-line contingency screening method. A regression model is built between the proposed stability index and the critical clearing time. This regression model is based on off-line calculations for application in real-time transient stability assessment. Three different stability indices are proposed: rotor Angle Increment index, Absolute Angle Increment index, and Kinetic Energy index. In the off-line computation, the regression model relationship between the chosen index and the critical clearing time is built. For on-line application, the critical clearing time is determined using the regression equation and the calculated stability index value. The IEEE 39-bus 10-machine test system is used to evaluate the performance of the proposed method.","PeriodicalId":246458,"journal":{"name":"2016 IEEE Region 10 Conference (TENCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130512535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Machine learning algorithm for retinal image analysis 视网膜图像分析的机器学习算法
2016 IEEE Region 10 Conference (TENCON) Pub Date : 2016-11-01 DOI: 10.1109/TENCON.2016.7848208
Santhakumar R, Megha Tandur, E. R. Rajkumar, G. S, Girish Haritz, K. Rajamani
{"title":"Machine learning algorithm for retinal image analysis","authors":"Santhakumar R, Megha Tandur, E. R. Rajkumar, G. S, Girish Haritz, K. Rajamani","doi":"10.1109/TENCON.2016.7848208","DOIUrl":"https://doi.org/10.1109/TENCON.2016.7848208","url":null,"abstract":"Diabetic retinopathy is the most general diabetes complication that affects eyes and results in blindness. It's due to impairment of the arteries a veins located in the fundus of eye (retina) that are composed of light sensitive tissues. The aim of this research work is to design an efficient and sensitive tool for Diabetic Retinopathy using the images acquired from portable fundus camera. The screening tool is based on advanced machine learning and computer vision algorithm which includes patch level prediction. In patch level prediction algorithm will localize the diseased region in the Diabetic Retinopathy image like Hard Exudates and Hemorrhage. The patch level classification uses Support Vector Machine (SVM) machine learning classifier model to predict the potential patch of Hard Exudates and Hemorrhage. In this algorithm, the image is broken into regular rectangular patch. The feature for each patch along with the different class label based on the ground truth is computed and passed to strong classifier SVM. The data sets are split into training dataset and testing dataset. The classifier model is built on training dataset and tested against the test dataset. The performance results of rectangular patch level prediction using SVM the average performance for Hard Exudates was Accuracy 96 %, Sensitivity 94%, Specificity 96%. The average performance for Hemorrhage was Accuracy 85 %, Sensitivity 77%, and Specificity 85%.","PeriodicalId":246458,"journal":{"name":"2016 IEEE Region 10 Conference (TENCON)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123849695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Prosodic features of Marathi news reading style 马拉地语新闻阅读风格的韵律特征
2016 IEEE Region 10 Conference (TENCON) Pub Date : 2016-11-01 DOI: 10.1109/TENCON.2016.7848421
Sanket Barhate, S. Kshirsagar, Niramay Sanghvi, Kamini Sabu, P. Rao, N. Bondale
{"title":"Prosodic features of Marathi news reading style","authors":"Sanket Barhate, S. Kshirsagar, Niramay Sanghvi, Kamini Sabu, P. Rao, N. Bondale","doi":"10.1109/TENCON.2016.7848421","DOIUrl":"https://doi.org/10.1109/TENCON.2016.7848421","url":null,"abstract":"Text-to-speech synthesizers present an attractive alternative to reading in hands-free communication scenarios. Speech intelligibility and naturalness are key to the user acceptability of synthesized speech. The accurate modeling of prosody plays an important role in both dimensions. While prosody is language dependent, it is also strongly dependent on the speaking style. In this work, we study the important prosodic features of news reading style in Marathi using publicly available radio broadcasts. Prominence and boundaries are among the important linguistic cues conveyed via a news reader's prosody. Using perception testing, we obtain boundaries and prominent words in broadcast recordings of two female news readers. We measure acoustic parameters known to serve as cues to prominence such as the fundamental frequency, duration and intensity. We also make observations on timing and pitch phenomena at inter- and intra-sentence breaks. Our results indicate that prominence depends strongly on achieved FO span in the word and to a smaller extent on duration increase. Breaks are signaled by pauses and pre-boundary lengthening of the final syllable. We observe that, unlike English, sentence ending in Marathi is not always accompanied by a pitch fall in the final syllable. The implications of these observations on prosody generation are discussed.","PeriodicalId":246458,"journal":{"name":"2016 IEEE Region 10 Conference (TENCON)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121213546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信