685 research outputs found

    Time domain analysis of switching transient fields in high voltage substations

    Get PDF
    Switching operations of circuit breakers and disconnect switches generate transient currents propagating along the substation busbars. At the moment of switching, the busbars temporarily acts as antennae radiating transient electromagnetic fields within the substations. The radiated fields may interfere and disrupt normal operations of electronic equipment used within the substation for measurement, control and communication purposes. Hence there is the need to fully characterise the substation electromagnetic environment as early as the design stage of substation planning and operation to ensure safe operations of the electronic equipment. This paper deals with the computation of transient electromagnetic fields due to switching within a high voltage air-insulated substation (AIS) using the finite difference time domain (FDTD) metho

    Determining Bus Stop Locations using Deep Learning and Time Filtering

    Get PDF
    This paper presents an intelligent bus stop determination from bus Global Positioning System (GPS) trajectories. A mixture of deep neural networks and a time filtering algorithm is used in the proposed algorithm. A deep neural network uses the speed histogram and azimuth angle at each location as input features. A deep neural networks consists of the convolutional neural networks (CNN), fully connected networks, and bidirectional Long-Short Term Memory (LSTM) networks. It predicts the soft decisions of bus stops at all locations along the route. The time filtering technique was adopted to refine the results obtained from the LSTM network. The time histograms of all locations was built where the high potential timestamps are extracted. Then, a linear regression is used to produce an approximate reliable timestamp. Each time distribution can be derived using data updated at that time slot and compared to a reference distribution. Locations are predicted as bus stop locations when timestamp distributions close to the reference distributions. Our technique was tested on real bus service GPS data from National Science and Technology Development Agency (NATDA, Thailand). The proposed method can outperform other existing bus stop detection systems

    Applied Mathematics to Mechanisms and Machines

    Get PDF
    This book brings together all 16 articles published in the Special Issue "Applied Mathematics to Mechanisms and Machines" of the MDPI Mathematics journal, in the section “Engineering Mathematics”. The subject matter covered by these works is varied, but they all have mechanisms as the object of study and mathematics as the basis of the methodology used. In fact, the synthesis, design and optimization of mechanisms, robotics, automotives, maintenance 4.0, machine vibrations, control, biomechanics and medical devices are among the topics covered in this book. This volume may be of interest to all who work in the field of mechanism and machine science and we hope that it will contribute to the development of both mechanical engineering and applied mathematics

    Intelligent Circuits and Systems

    Get PDF
    ICICS-2020 is the third conference initiated by the School of Electronics and Electrical Engineering at Lovely Professional University that explored recent innovations of researchers working for the development of smart and green technologies in the fields of Energy, Electronics, Communications, Computers, and Control. ICICS provides innovators to identify new opportunities for the social and economic benefits of society.  This conference bridges the gap between academics and R&D institutions, social visionaries, and experts from all strata of society to present their ongoing research activities and foster research relations between them. It provides opportunities for the exchange of new ideas, applications, and experiences in the field of smart technologies and finding global partners for future collaboration. The ICICS-2020 was conducted in two broad categories, Intelligent Circuits & Intelligent Systems and Emerging Technologies in Electrical Engineering

    Nigeria Paper Currency Serial Number Pattern Recognition System for Crimes Control

    Get PDF
    Only secured and conducive environment void of robbery, kidnapping, fake currency and all forms of insurgencies will foster production and distribution of goods, investment and saving that enhance national economic growth and development. This is a mirage in a country generally believed and tagged the giant of African; Nigeria. Crime, in whatever name or nomenclature, has a significant negative impact on the welfare and economy prosperities of our society. The urge to get rich promotes Crime like armed robbery, kidnapping for ransom and production of counterfeit banknotes to mention but a few. Innocent people have suffered psychological distress, fear, anger, depression, physical harm, financial loss and in most cases untimely death during the operations by these hoodlums. Banks, Cash-In-Transit Vehicle, and ATM points are often robbed by gangs in search for paper currency. Kidnappers as well demand for paper currency as ransom while some other gangs are involved in the production of counterfeit banknotes so as to enrich themselves no minding the negative effect on the nation’s economy.  The banknotes collected during the operations by the hoodlums are taken to banks. Yet, the banks will not detect or recognize any of these notes which attest to the fact that our system lacks check and balance. The system is very porous without a recourse to this era of technology when machine is trained to do virtually everything for our convenience. Currency as an entity has a unique identification number. The identification number is an alphanumeric currency issuance of about 10 digits comprises two (2) capital letters and eight (8) numbers usually positioned at a strategic location on either front or back of the 5, 10, 20, 50, 100, 200, 500 and 1000 naira notes. It is a reliable and intelligent system developed to track banknotes unique identifiers numbers- serial numbers, in order to control financial related crimes. Keywords: Nigeria Paper Currency Serial Number, Pattern Recognition DOI: 10.7176/IKM/11-3-04 Publication date: April 30th 202

    Text Similarity Between Concepts Extracted from Source Code and Documentation

    Get PDF
    Context: Constant evolution in software systems often results in its documentation losing sync with the content of the source code. The traceability research field has often helped in the past with the aim to recover links between code and documentation, when the two fell out of sync. Objective: The aim of this paper is to compare the concepts contained within the source code of a system with those extracted from its documentation, in order to detect how similar these two sets are. If vastly different, the difference between the two sets might indicate a considerable ageing of the documentation, and a need to update it. Methods: In this paper we reduce the source code of 50 software systems to a set of key terms, each containing the concepts of one of the systems sampled. At the same time, we reduce the documentation of each system to another set of key terms. We then use four different approaches for set comparison to detect how the sets are similar. Results: Using the well known Jaccard index as the benchmark for the comparisons, we have discovered that the cosine distance has excellent comparative powers, and depending on the pre-training of the machine learning model. In particular, the SpaCy and the FastText embeddings offer up to 80% and 90% similarity scores. Conclusion: For most of the sampled systems, the source code and the documentation tend to contain very similar concepts. Given the accuracy for one pre-trained model (e.g., FastText), it becomes also evident that a few systems show a measurable drift between the concepts contained in the documentation and in the source code.</p

    Deep Learning-Based Machinery Fault Diagnostics

    Get PDF
    This book offers a compilation for experts, scholars, and researchers to present the most recent advancements, from theoretical methods to the applications of sophisticated fault diagnosis techniques. The deep learning methods for analyzing and testing complex mechanical systems are of particular interest. Special attention is given to the representation and analysis of system information, operating condition monitoring, the establishment of technical standards, and scientific support of machinery fault diagnosis

    A Novel Business Process Prediction Model Using a DeepLearning Method

    Get PDF
    The ability to proactively monitor business pro-cesses is a main competitive differentiator for firms. Processexecution logs generated by process aware informationsystems help to make process specific predictions forenabling a proactive situational awareness. The goal of theproposed approach is to predict the next process event fromthe completed activities of the running process instance,based on the execution log data from previously completedprocess instances. By predicting process events, companiescan initiate timely interventions to address undesired devi-ations from the desired workflow. The paper proposes amulti-stage deep learning approach that formulates the nextevent prediction problem as a classification problem. Fol-lowing a feature pre-processing stage with n-grams andfeature hashing, a deep learning model consisting of anunsupervised pre-training component with stacked autoen-coders and a supervised fine-tuning component is applied.Experiments on a variety of business process log datasetsshow that the multi-stage deep learning approach providespromising results. The study also compared the results toexisting deep recurrent neural networks and conventionalclassification approaches. Furthermore, the paper addressesthe identification of suitable hyperparameters for the pro-posed approach, and the handling of the imbalanced nature ofbusiness process event datasets

    Time-domain speech enhancement using generative adversarial networks

    Get PDF
    Speech enhancement improves recorded voice utterances to eliminate noise that might be impeding their intelligibility or compromising their quality. Typical speech enhancement systems are based on regression approaches that subtract noise or predict clean signals. Most of them do not operate directly on waveforms. In this work, we propose a generative approach to regenerate corrupted signals into a clean version by using generative adversarial networks on the raw signal. We also explore several variations of the proposed system, obtaining insights into proper architectural choices for an adversarially trained, convolutional autoencoder applied to speech. We conduct both objective and subjective evaluations to assess the performance of the proposed method. The former helps us choose among variations and better tune hyperparameters, while the latter is used in a listening experiment with 42 subjects, confirming the effectiveness of the approach in the real world. We also demonstrate the applicability of the approach for more generalized speech enhancement, where we have to regenerate voices from whispered signals.Peer ReviewedPostprint (author's final draft
    • …
    corecore