275 research outputs found

    Unbalanced load flow with hybrid wavelet transform and support vector machine based Error-Correcting Output Codes for power quality disturbances classification including wind energy

    Get PDF
    Purpose. The most common methods to designa multiclass classification consist to determine a set of binary classifiers and to combine them. In this paper support vector machine with Error-Correcting Output Codes (ECOC-SVM) classifier is proposed to classify and characterize the power qualitydisturbances such as harmonic distortion,voltage sag, and voltage swell include wind farms generator in power transmission systems. Firstly three phases unbalanced load flow analysis is executed to calculate difference electric network characteristics, levels of voltage, active and reactive power. After, discrete wavelet transform is combined with the probabilistic ECOC-SVM model to construct the classifier. Finally, the ECOC-SVM classifies and identifies the disturbance type according tothe energy deviation of the discrete wavelet transform. The proposedmethod gives satisfactory accuracy with 99.2% compared with well known methods and shows that each power quality disturbances has specific deviations from the pure sinusoidal waveform,this is good at recognizing and specifies the type of disturbance generated from the wind power generator.Наиболее распространенные методы построения мультиклассовой классификации заключаются в определении набора двоичных классификаторов и их объединении. В данной статье предложена машина опорных векторов с классификатором выходных кодов исправления ошибок(ECOC-SVM) с целью классифицировать и характеризовать такие нарушения качества электроэнергии, как гармонические искажения, падение напряжения и скачок напряжения, включая генератор ветровых электростанций в системах передачи электроэнергии. Сначала выполняется анализ потока несимметричной нагрузки трех фаз для расчета разностных характеристик электрической сети, уровней напряжения, активной и реактивной мощности. После этого дискретное вейвлет-преобразование объединяется с вероятностной моделью ECOC-SVM для построения классификатора. Наконец, ECOC-SVM классифицирует и идентифицирует тип возмущения в соответствии с отклонением энергии дискретного вейвлет-преобразования. Предложенный метод дает удовлетворительную точность 99,2% по сравнению с хорошо известными методами и показывает, что каждое нарушение качества электроэнергии имеет определенные отклонения от чисто синусоидальной формы волны, что способствует распознаванию и определению типа возмущения, генерируемого ветровым генератором

    Adaptive Network Coding Schemes for Satellite Communications

    Full text link
    In this paper, we propose two novel physical layer aware adaptive network coding and coded modulation schemes for time variant channels. The proposed schemes have been applied to different satellite communications scenarios with different Round Trip Times (RTT). Compared to adaptive network coding, and classical non-adaptive network coding schemes for time variant channels, as benchmarks, the proposed schemes demonstrate that adaptation of packet transmission based on the channel variation and corresponding erasures allows for significant gains in terms of throughput, delay and energy efficiency. We shed light on the trade-off between energy efficiency and delay-throughput gains, demonstrating that conservative adaptive approaches that favors less transmission under high erasures, might cause higher delay and less throughput gains in comparison to non-conservative approaches that favor more transmission to account for high erasures.Comment: IEEE Advanced Satellite Multimedia Systems Conference and the 14th Signal Processing for Space Communications Workshop (ASMS/SPSC), 201

    Energy Efficient Adaptive Network Coding Schemes for Satellite Communications

    Full text link
    In this paper, we propose novel energy efficient adaptive network coding and modulation schemes for time variant channels. We evaluate such schemes under a realistic channel model for open area environments and Geostationary Earth Orbit (GEO) satellites. Compared to non-adaptive network coding and adaptive rate efficient network-coded schemes for time variant channels, we show that our proposed schemes, through physical layer awareness can be designed to transmit only if a target quality of service (QoS) is achieved. As a result, such schemes can provide remarkable energy savings.Comment: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 24 March 201

    Network Coding Channel Virtualization Schemes for Satellite Multicast Communications

    Full text link
    In this paper, we propose two novel schemes to solve the problem of finding a quasi-optimal number of coded packets to multicast to a set of independent wireless receivers suffering different channel conditions. In particular, we propose two network channel virtualization schemes that allow for representing the set of intended receivers in a multicast group to be virtualized as one receiver. Such approach allows for a transmission scheme not only adapted to per-receiver channel variation over time, but to the network-virtualized channel representing all receivers in the multicast group. The first scheme capitalizes on a maximum erasure criterion introduced via the creation of a virtual worst per receiver per slot reference channel of the network. The second scheme capitalizes on a maximum completion time criterion by the use of the worst performing receiver channel as a virtual reference to the network. We apply such schemes to a GEO satellite scenario. We demonstrate the benefits of the proposed schemes comparing them to a per-receiver point-to-point adaptive strategy

    Explicit Reciprocity Laws for Formal Drinfeld Modules

    Get PDF
    In this paper, we prove explicit reciprocity laws for a class of formal Drinfeld modules having stable reduction of height one, in the spirit of those existing in characteristic zero (cf. the work of Wiles). We begin by defining the Kummer pairing in the language of formal Drinfeld modules defined over local fields of positive characteristic. We then prove explicit formulas for this pairing in terms of the logarithm of the formal Drinfeld module, a certain Coleman power series, torsion points and the trace. Our results extend the explicit formulas already proved by Angl\`es for Carlitz modules, and by Bars and Longhi for sign-normalized rank one Drinfeld modules. The approach followed is similar to the ones followed in the previously mentioned papers, taking into account the subtleties derived from the fact that the formal Drinfeld modules considered are formal power series, and are no longer polynomials

    PROTECT_U: Un système communautaire pour la protection des usagers de Facebook

    Full text link
    Article publié dans le journal « Journal of Information Security Research ». March 2012.Chaque année, le nombre d’utilisateurs des réseaux sociaux augmente à une très grande vitesse. Des milliers de comptes usagés incluant des données privées sont créés quotidiennement. Un nombre incalculable de données privées et d'informations sensibles sont ainsi lues et partagées par les différents comptes. Ceci met en péril la vie privée et la sécurité de beaucoup d’utilisateurs de ces réseaux sociaux. Il est donc crucial de sensibiliser ces utilisateurs aux dangers potentiels qui les guettent. Nous présentons Protect_U (Hélou, Gandouz et al. 2012), un système de protection de la vie privée des utilisateurs de Facebook. Protect_U analyse le contenu des profils des utilisateurs et les classes selon quatre niveaux de risque : Low risk, medium risk, risky and critical. Il propose ensuite des recommandations personnalisées pour leur permettre de rendre leurs comptes plus sécuritaires. Pour ce faire, il fait appel à deux modèles de protection : local et communautaire. Le premier utilise les données personnelles de l’utilisateur afin de lui proposer des recommandations et le second recherche ses amis de confiance pour les inciter à participer à l’amélioration de la sécurité de son propre compte.Social networking sites have experienced a steady and dramatic increase in the number of users over the past several years. Thousands of user accounts, each including a significant amount of private data, are created daily. As such, an almost countless amount of sensitive and private information is read and shared across the various accounts. This jeopardizes the privacy and safety of many social network users and mandates the need to increase the users’ awareness about the potential hazards they are exposed to on these sites. We introduce Protect_U (Hélou, Gandouz et al. 2012), a privacy protection system for Facebook users. Protect_U analyzes the content of user profiles and ranks them according to four risk levels: Low Risk, Medium Risk, Risky and Critical. The system then suggests personalized recommendations designed to allow users to increase the safety of their accounts. In order to achieve this, Protect_U draws upon both the local and community-based protection models. The first model uses a Facebook user’s personal data in order to suggest recommendations, and the second seeks out the user’s most trustworthy friends to encourage them to help improve the safety of his/her account

    Enhanced Iterated local search for the technician routing and scheduling problem

    Full text link
    Most public facilities in the European countries, including France, Germany, and the UK, were built during the reconstruction projects between 1950 and 1980. Owing to the deteriorating state of such vital infrastructure has become relatively expensive in the recent decades. A significant part of the maintenance operation costs is spent on the technical staff. Therefore, the optimal use of the available workforce is essential to optimize the operation costs. This includes planning technical interventions, workload balancing, productivity improvement, etc. In this paper, we focus on the routing of technicians and scheduling of their tasks. We address for this purpose a variant of the workforce scheduling problem called the technician routing and scheduling problem (TRSP). This problem has applications in different fields, such as transportation infrastructure (rail and road networks), telecommunications, and sewage facilities. To solve the TRSP, we propose an enhanced iterated local search (eILS) approach. The enhancement of the ILS firstly includes an intensification procedure that incorporates a set of local search operators and removal-repair heuristics crafted for the TRSP. Next, four different mechanisms are used in the perturbation phase. Finally, an elite set of solutions is used to extensively explore the neighborhood of local optima as well as to enhance diversification during search space exploration. To measure the performance of the proposed method, experiments were conducted based on benchmark instances from the literature, and the results obtained were compared with those of an existing method. Our method achieved very good results, since it reached the best overall gap, which is three times lower than that of the literature. Furthermore, eILS improved the best-known solution for 3434 instances among a total of 5656 while maintaining reasonable computational times.Comment: Submitted manuscript to Computers and Operations Research journal. 34 pages, 7 figures, 6 table

    Network Coding Strategies for Satellite Communications

    Get PDF
    Network coding (NC) is an important technology that allows the network services to be optimal. The main advantage of NC is to reduce the necessity for re-transmissions of packets. Satellite Communications (SatComs) are one of the potential applications that can leverage on the benefits of NC due to their challenging fading environments and high round trip times. The motivation is to take the physical layer-awareness into consideration for adapting and hence extend the NC gains. Different rate and energy efficient adaptive NC schemes for time variant channels are proposed. We compare our proposed physical layer adaptive schemes to physical layer non-adaptive NC schemes for time variant channels. The adaptation of packet transmissions is on the basis of the corresponding time-dependent erasures, and allows proposed schemes to achieve significant gains in terms of throughput, delay and energy efficiency. The proposed schemes are robust for large and small size of packets. Although, the energy per bit is affected, a similar rate and energy gains can be arise. However, the performance gains are not motivated by the packet size, but through duty cycle silence of transfer packets. In this thesis, virtual schemes are also proposed to solve an open literature problem in the NC. The objective is to find a quasi-optimal number of coded packets to multicast to a group of independent wireless receivers suffer from a different channel conditions. In particular, we propose two virtual network that allows for the representation of a group of receivers as a multicast group to be visible as one receiver and single channel. Most of the schemes are applied to LEO/MEO/GEO satellite scenarios. They demonstrate remarkable gains compared to that strategy in which the adaptation depends only on one receiver point-to-point

    Bør Norge regulere pornografi restriktivt?

    Get PDF
    corecore