{"title":"Analytical solution for anthropomorphic limbs model, (IK of human arm)","authors":"M. Z. Al-Faiz, Y. Al-Mashhadany","doi":"10.1109/ISIEA.2009.5356374","DOIUrl":"https://doi.org/10.1109/ISIEA.2009.5356374","url":null,"abstract":"This paper considers a proposed algorithm for computation of the inverse kinematic(IK) model of the human arm. This algorithm introduces a new IK method suitable for reaching tasks performed by autonomous and interactive virtual humans. The basic problem is to pose the character in such a way that arm hand reaches the target ( position and orientation ) in space. The algorithm is composed of two phases. The first phase is the limitation of real task which concerning the human arm movement and the second phase presents the analytical solution for inverse kinematic problem (IKP) by trigonometric relations and algebraic solution according to limitation of joints. This algorithm is simulated by using MATLAB Ver. R2008a, and satisfied results are obtained, that explains the ability of the proposed algorithm to solve the inverse kinematic problem for real human arm.","PeriodicalId":6447,"journal":{"name":"2009 IEEE Symposium on Industrial Electronics & Applications","volume":"12 1","pages":"684-689"},"PeriodicalIF":0.0,"publicationDate":"2009-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87753187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Voltage rise due to inter-connection of embedded generators to distribution network on weak feeder","authors":"Saad Mekhilef, T. R. Chard, V. Ramachandramurthy","doi":"10.1109/ISIEA.2009.5356314","DOIUrl":"https://doi.org/10.1109/ISIEA.2009.5356314","url":null,"abstract":"This paper presents voltage rise due to inter-connection of embedded generators to distribution network on weak feeder. Studies were performed on Malaysia's 11kV network using a simulation tool called PSS ADEPTTM. Various scenarios were investigated such as EG penetration level, location of EG plant, sizing of feeder (distance from MAIN substation), loading of network, Automatic Voltage Control relay set point at MAIN substation, power factor of network and various operating mode of EG. It is concluded that the introduction of EG at the distribution network will cause voltage rise and this leads to customer voltages being out of the allowable range. Through careful design of the connection arrangement, Distribution Network Operator (DNO) can ensure that the new EG connection does not cause problems and at the same time, enhance the performance of the network.","PeriodicalId":6447,"journal":{"name":"2009 IEEE Symposium on Industrial Electronics & Applications","volume":"28 1","pages":"1028-1033"},"PeriodicalIF":0.0,"publicationDate":"2009-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80043733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Microvolt T-wave alternans analysis using Lyapunov exponents","authors":"Roozbeh Rajabi, H. Ghassemian","doi":"10.1109/ISIEA.2009.5356488","DOIUrl":"https://doi.org/10.1109/ISIEA.2009.5356488","url":null,"abstract":"T-wave alternans (TWA) is a marker of cardiac instability and high risk of sudden cardiac death. In this paper we propose a new approach for the TWA detection. For this purpose Lyapunov spectrum was calculated from T-wave time series. To evaluate the detector performance, simulated T-waves based on the real ECG signals were used. Detected and simulated episodes were compared, in terms of sensitivity and positive predictivity. The results show that this method can reliably detect T-wave alternans episodes.","PeriodicalId":6447,"journal":{"name":"2009 IEEE Symposium on Industrial Electronics & Applications","volume":"11 1","pages":"156-159"},"PeriodicalIF":0.0,"publicationDate":"2009-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80120000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study of mixed mode scenarios with IEEE 802.11 networks and Bluetooth network","authors":"B. Issac","doi":"10.1109/ISIEA.2009.5356454","DOIUrl":"https://doi.org/10.1109/ISIEA.2009.5356454","url":null,"abstract":"Wireless networks are increasingly being implemented and its acceptance in the society is booming. In this paper, the performance analysis of 802.11 networks was done for different standards like IEEE 802.11a, 802.11b, and 802.11g in different scenarios. The throughput and traffic dropped for such networks in homogeneous and heterogeneous groupings were studied. Also Bluetooth nodes were tested with 802.11b nodes and the network performance was analyzed. Observations on performance were eventually done based on these network simulations that were implemented using existing network models.","PeriodicalId":6447,"journal":{"name":"2009 IEEE Symposium on Industrial Electronics & Applications","volume":"34 1","pages":"319-324"},"PeriodicalIF":0.0,"publicationDate":"2009-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87091452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new Shifted Scaled LS channel estimator for Rician flat fading MIMO channel","authors":"H. Nooralizadeh, S. Moghaddam","doi":"10.1109/ISIEA.2009.5356473","DOIUrl":"https://doi.org/10.1109/ISIEA.2009.5356473","url":null,"abstract":"In this paper, Training-Based Channel Estimation (TBCE) method is considered in the Rician flat fading Multiple-Input Multiple-Output (MIMO) channels. In this channel model, the performance of the conventional Least Squares (LS) channel estimator is probed first. A new shifted type of Scaled Least Squares (SLS) channel estimator, entitled as SSLS, is then proposed. It is a generalized form of the SLS technique. The optimal choice of training signals using Mean Square Error (MSE) criterion is also achieved. It is observed that the LS estimator cannot exploit the knowledge of channel statistics. However, the SSLS estimator exploits the trace of a specifically defined matrix of the channel covariance and the receiver noise power as well as the knowledge of first-order statistics about the channel. It is shown that in the Rician fading MIMO channel, the new channel estimator has better performance than the popular LS and SLS techniques. Theoretical analysis and simulation results demonstrate that increasing Rice factor is a reason for decreasing MSE of the proposed estimator.","PeriodicalId":6447,"journal":{"name":"2009 IEEE Symposium on Industrial Electronics & Applications","volume":"15 1","pages":"243-247"},"PeriodicalIF":0.0,"publicationDate":"2009-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73478099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reliability of recursive concentrator","authors":"Sa'ed Abed, S. Alouneh, O. Ait Mohamed","doi":"10.1109/ISIEA.2009.5356460","DOIUrl":"https://doi.org/10.1109/ISIEA.2009.5356460","url":null,"abstract":"The inverse omega network possesses various attractive properties and its constituent node has a fixed degree independent of the system size. In this paper, a proof for a technique applied recursively to construct an N -input concentrator switching network which is similar in topology to the inverse omega network will be introduced. Also an examination of a reliable inverse omega network in the presence of any single node failure will be presented. The new configuration of the system ensures providing the same high performance results obtained before the failure. In this paper, we show how to check the passibility by the inverse omega network of any given connection set and list some of the general patterns passable by this network. We also show that the concentrate operation passable by the inverse omega network is just a special case of the more general alternate sequence operation.","PeriodicalId":6447,"journal":{"name":"2009 IEEE Symposium on Industrial Electronics & Applications","volume":"27 1","pages":"174-177"},"PeriodicalIF":0.0,"publicationDate":"2009-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88801212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Immune-inspired framework for securing hybrid MANET","authors":"Y. Mohamed, A. Abdullah","doi":"10.1109/ISIEA.2009.5356451","DOIUrl":"https://doi.org/10.1109/ISIEA.2009.5356451","url":null,"abstract":"A malicious node in mobile ad hoc networks (MANETs) can falsify a route advertisement, overwhelming traffic without forwarding it, helps in forwarding corrupted data, and injecting of false or uncompleted information. Mapping immune system security mechanisms to networking security can powerfully contribute in securing MANETs, since both are sharing some similar features because of the distributability environment in each. In a step for providing secured and reliable broadband services, formal specification logic along with a novel Immune-inspired security framework (I2MANETs) have been introduced. The different immune components synchronized to the framework through an agent that has the ability to replicate, monitor, detect, classify, and block/isolate the corrupted packets and/or nodes in a federated domain. The framework functions as the Human Immune System in: first response, second response, adaptability, distributability, survivability and other immune features. The I2MANETs can basically installed in one node in the domain, then automatically spread to the rest of the domain.","PeriodicalId":6447,"journal":{"name":"2009 IEEE Symposium on Industrial Electronics & Applications","volume":"2011 1","pages":"301-306"},"PeriodicalIF":0.0,"publicationDate":"2009-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86517360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new topology for dynamic voltage restorers without dc link","authors":"E. Babaei, M. Farhadi Kangarlu","doi":"10.1109/ISIEA.2009.5356312","DOIUrl":"https://doi.org/10.1109/ISIEA.2009.5356312","url":null,"abstract":"In this paper, a new topology based on matrix converter (MC) is proposed for dynamic voltage restorer (DVR). Matrix converters convert ac to ac with no dc link. So, applying this type of converters is an acceptable way to eliminate dc link in conventional DVRs. Three independent three-phase to single-phase MCs with 6 or 8 bi-directional power switches are applied in the proposed topology. As a result, the proposed DVR structure can be used to restore load voltage in both balanced and unbalanced voltage sag and swell conditions. The range of the DVR's correct operation varies selecting 6 or 8 numbered bi-directional power switches in matrix converters. The proposed topology increases the speed and efficiency of DVR and in return decreases the size of DVR, due to the dc link elimination. The proposed DVR can be presented as a package able to compensate voltage sag and swell regardless of the balance or unbalance conditions. Also, one of the most important capabilities of the proposed DVR is the voltage restoring in extremely disturbed networks. The experimental results as well as simulation results in PSCAD/EMTDC environment show that the proposed topology operates correctly and the voltage of sensitive load is completely controlled.","PeriodicalId":6447,"journal":{"name":"2009 IEEE Symposium on Industrial Electronics & Applications","volume":"27 1","pages":"1016-1021"},"PeriodicalIF":0.0,"publicationDate":"2009-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90809079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Sahak, W. Mansor, L. Khuan, A. Yassin, A. Zabidi, Farah Yasmin Abd Rahman
{"title":"Choice for a support vector machine kernel function for recognizing asphyxia from infant cries","authors":"R. Sahak, W. Mansor, L. Khuan, A. Yassin, A. Zabidi, Farah Yasmin Abd Rahman","doi":"10.1109/ISIEA.2009.5356372","DOIUrl":"https://doi.org/10.1109/ISIEA.2009.5356372","url":null,"abstract":"This paper investigates the performance of several kernel functions of support vector machine in detecting asphyxia from infant cries. In this study, Mel frequency cepstrum coefficients derived from the recorded infant cries were used as the input vectors. These input vectors were trained and classified using support vector machine. Four types of kernels - linear, quadratic, polynomial and radial basic function, were experimented and compared. Accuracy, sensitivity and specificity were adopted as criteria to obtain the best kernel. Experimental results showed that radial basic function kernel (σ = 35) is the best kernel with an accuracy of 85.15%, sensitivity of 91% and specificity of 71%.","PeriodicalId":6447,"journal":{"name":"2009 IEEE Symposium on Industrial Electronics & Applications","volume":"11 1","pages":"675-678"},"PeriodicalIF":0.0,"publicationDate":"2009-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82382840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An overview of microcode-based and FSM-based programmable memory built-in self test (MBIST) controller for coupling fault detection","authors":"Nur Qamarina Mohd Noor, A. Saparon, Yusrina Yusof","doi":"10.1109/ISIEA.2009.5356418","DOIUrl":"https://doi.org/10.1109/ISIEA.2009.5356418","url":null,"abstract":"Microcode-based and FSM-based controllers are two widely known architectures used for programmable memory built-in self test. These techniques are popular because of their flexibility of programming new test algorithms. In this paper, the architectures for both controllers are designed to implement a new test algorithm MARCH SAM that gives a better fault coverage in detecting single-cell fault and all intra-word coupling fault (CF).The components of each controllers are studied and designed. Both of the controllers are written using Verilog HDL and implemented in Altera Cyclone II FPGA. The simulation and synthesis results of both architectures are presented. Further analysis of the logic area usage and flexibility of these controllers are done on the synthesis results. The performance of each controller is compared in term of speed and area overhead.","PeriodicalId":6447,"journal":{"name":"2009 IEEE Symposium on Industrial Electronics & Applications","volume":"93 1","pages":"469-472"},"PeriodicalIF":0.0,"publicationDate":"2009-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83878253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}