Search results

Filters

  • Journals
  • Authors
  • Keywords
  • Date
  • Type

Search results

Number of results: 9
items per page: 25 50 75
Sort by:

Abstract

The paper relates to the problem of adaptation of V-block methods to waviness measurements of cylindrical surfaces. It presents the fundamentals of V-block methods and the principle of their application. The V-block methods can be successfully used to measure the roundness and waviness deviations of large cylinders used in paper industry, shipping industry, or in metallurgy. The concept of adaptation of the V-block method to waviness measurements of cylindrical surfaces was verified using computer simulations and experimental work. The computer simulation was carried out in order to check whether the proposed mathematical model and V-block method parameters are correct. Based on the simulation results, a model of measuring device ROL-2 for V-block waviness measurements was developed. Next, experimental research was carried out consisting in evaluation of waviness deviation, initially using a standard non-reference measuring device, and then using the tested device based on the V-block method. Finally, accuracy of the V-block experimental method was calculated.
Go to article

Abstract

An intelligent boundary switch is a three-phase outdoor power distribution device equipped with a controller. It is installed at the boundary point on the medium voltage overhead distribution lines. It can automatically remove the single-phase-to-ground fault and isolation phase-to-phase short-circuit fault. Firstly, the structure of an intelligent boundary switch is studied, and then the fault detection principle is also investigated. The single-phase-to-ground fault and phase-to-phase short-circuit fault are studied respectively. A method using overcurrent to judge the short-circuit fault is presented. The characteristics of the single-phase-to-ground fault on an ungrounded distribution system and compositional grounded distribution system are analyzed. Based on these characteristics, a method using zero sequence current to detect the single-phase-to-ground fault is proposed. The research results of this paper give a reference for the specification and use of intelligent boundary switches.
Go to article

Abstract

To avoid of manipulating search engines results by web spam, anti spam system use machine learning techniques to detect spam. However, if the learning set for the system is out of date the quality of classification falls rapidly. We present the web spam recognition system that periodically refreshes the learning set to create an adequate classifier. A new classifier is trained exclusively on data collected during the last period. We have proved that such strategy is better than an incrementation of the learning set. The system solves the starting–up issues of lacks in learning set by minimisation of learning examples and utilization of external data sets. The system was tested on real data from the spam traps and common known web services: Quora, Reddit, and Stack Overflow. The test performed among ten months shows stability of the system and improvement of the results up to 60 percent at the end of the examined period.
Go to article

Abstract

An application specific integrated design using Quadrature Linear Discriminant Analysis is proposed for automatic detection of normal and epilepsy seizure signals from EEG recordings in epilepsy patients. Five statistical parameters are extracted to form the feature vector for training of the classifier. The statistical parameters are Standardised Moment, Co-efficient of Variance, Range, Root Mean Square Value and Energy. The Intellectual Property Core performs the process of filtering, segmentation, extraction of statistical features and classification of epilepsy seizure and normal signals. The design is implemented in Zynq 7000 Zc706 SoC with average accuracy of 99%, Specificity of 100%, F1 score of 0.99, Sensitivity of 98% and Precision of 100 % with error rate of 0.0013/hr., which is approximately zero false detection.
Go to article

Abstract

The paper presents the results of investigating the effect of increase of observation correlations on detectability and identifiability of a single gross error, the outlier test sensitivity and also the response-based measures of internal reliability of networks. To reduce in a research a practically incomputable number of possible test options when considering all the non-diagonal elements of the correlation matrix as variables, its simplest representation was used being a matrix with all non-diagonal elements of equal values, termed uniform correlation. By raising the common correlation value incrementally, a sequence of matrix configurations could be obtained corresponding to the increasing level of observation correlations. For each of the measures characterizing the above mentioned features of network reliability the effect is presented in a diagram form as a function of the increasing level of observation correlations. The influence of observation correlations on sensitivity of the w -test for correlated observations (Förstner 1983,Teunissen 2006) is investigated in comparison with the original Baarda’s w -test designated for uncorrelated observations, to determine the character of expected sensitivity degradation of the latter when used for correlated observations. The correlation effects obtained for different reliability measures exhibit mutual consistency in a satisfactory extent. As a by-product of the analyses, a simple formula valid for any arbitrary correlation matrix is proposed for transforming the Baarda’s w -test statistics into the w -test statistics for correlated observations.
Go to article

Abstract

We present the development of a technique for studying laser-induced magnetization dynamics, based on inductive measurement. The technique could provide a simple tool for studying laser-induced demagnetization in thin films and associated processes, such as Gilbert damping and magnetization precession. It was successfully tested using a nanosecond laser and NiZn ferrite samples and – after further development – it is expected to be useful for observation of ultra-fast demagnetization. The combination of optical excitation and inductive measurement enables to study laser-induced magnetization dynamics in both thin and several micrometre thick films and might be the key to a new principle of ultrafast broadband UV–IR pulse detection.
Go to article

Abstract

One of the most important issues that power companies face when trying to reduce time and cost maintenance is condition monitoring. In electricity market worldwide, a significant amount of electrical energy is produced by synchronous machines. One type of these machines is brushless synchronous generators in which the rectifier bridge is mounted on rotating shafts. Since bridge terminals are not accessible in this type of generators, it is difficult to detect the possible faults on the rectifier bridge. Therefore, in this paper, a method is proposed to facilitate the rectifier fault detection. The proposed method is then evaluated by applying two conventional kinds of faults on rectifier bridges including one diode open-circuit and two diode open-circuit (one phase open-circuit of the armature winding in the auxiliary generator in experimental set). To extract suitable features for fault detection, the wavelet transform has been used on recorded audio signals. For classifying faulty and healthy states, K-Nearest Neighbours (KNN) supervised classification method was used. The results show a good accuracy of the proposed method.
Go to article

Abstract

In this paper, we present the methods to detect the channel delay profile and the Doppler spectrum of shallow underwater acoustic channels (SUAC). In our channel sounding methods, a short impulse in form of a sinusoid function is successively sent out from the transmitter to estimated the channel impulse response (CIR). A bandpass filter is applied to eliminate the interference from out-of-band (OOB). A threshould is utilized to obtain the maximum time delay of the CIR. Multipath components of the SUAC are specified by correlating the received signals with the transmitted sounding pulse with its shifted phases from 0 to 2#25;. We show the measured channel parameters, which have been carried out in some lakes in Hanoi. The measured results illustrate that the channel is frequency selective for a narrow band transmission. The Doppler spectrum can be obtained by taking the Fourier transform of the time correlation of the measured channel transfer function. We have shown that, the theoretical maximum Doppler frequency fits well to that one obtained from measurement results.
Go to article

Abstract

The article herein presents the method and algorithms for forming the feature space for the base of intellectualized system knowledge for the support system in the cyber threats and anomalies tasks. The system being elaborated might be used both autonomously by cyber threat services analysts and jointly with information protection complex systems. It is shown, that advised algorithms allow supplementing dynamically the knowledge base upon appearing the new threats, which permits to cut the time of their recognition and analysis, in particular, for cases of hard-to-explain features and reduce the false responses in threat recognizing systems, anomalies and attacks at informatization objects. It is stated herein, that collectively with the outcomes of previous authors investigations, the offered algorithms of forming the feature space for identifying cyber threats within decisions making support system are more effective. It is reached at the expense of the fact, that, comparing to existing decisions, the described decisions in the article, allow separate considering the task of threat recognition in the frame of the known classes, and if necessary supplementing feature space for the new threat types. It is demonstrated, that new threats features often initially are not identified within the frame of existing base of threat classes knowledge in the decision support system. As well the methods and advised algorithms allow fulfilling the time-efficient cyber threats classification for a definite informatization object.
Go to article

This page uses 'cookies'. Learn more