|
Classification of power quality combined disturbances based on phase space reconstruction and support vector machines
Zhi-yong LI, Wei-lin WU
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(2): 173-181.
https://doi.org/10.1631/jzus.A071261
Power Quality (PQ) combined disturbances become common along with ubiquity of voltage flickers and harmonics. This paper presents a novel approach to classify the different patterns of PQ combined disturbances. The classification system consists of two parts, namely the feature extraction and the automatic recognition. In the feature extraction stage, Phase Space Reconstruction (PSR), a time series analysis tool, is utilized to construct disturbance signal trajectories. For these trajectories, several indices are proposed to form the feature vectors. Support Vector Machines (SVMs) are then implemented to recognize the different patterns and to evaluate the efficiencies. The types of disturbances discussed include a combination of short-term disturbances (voltage sags, swells) and long-term disturbances (flickers, harmonics), as well as their homologous single ones. The feasibilities of the proposed approach are verified by simulation with thousands of PQ events. Comparison studies based on Wavelet Transform (WT) and Artificial Neural Network (ANN) are also reported to show its advantages.
|
|
Evaluating transmission towers potentials during ground faults
Maria VINTAN
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(2): 182-189.
https://doi.org/10.1631/jzus.A072206
During ground faults on transmission lines, a number of towers near the fault are likely to acquire high potentials to ground. These tower voltages, if excessive, may present a hazard to humans and animals. This paper presents analytical methods in order to determine the transmission towers potentials during ground faults, for long and short lines. The author developed a global systematic approach to calculate these voltages, which are dependent of a number of factors. Some of the most important factors are: magnitudes of fault currents, fault location with respect to the line terminals, conductor arrangement on the tower and the location of the faulted phase, the ground resistance of the faulted tower, soil resistivity, number, material and size of ground wires. The effects of these factors on the faulted tower voltages have been also examined for different types of power lines.
|
|
Generalized bounds on the partial periodic correlation of complex roots of unity sequence set
Li-fang FENG, Ping-zhi FAN
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(2): 207-210.
https://doi.org/10.1631/jzus.A071380
In this paper, the generalized bounds are derived on the partial periodic correlation of complex roots of unity sequence set with zero or low correlation zone (ZCZ/LCZ) as the important criteria of the sequence design and application. The derived bounds are with respect to family size, subsequence length, maximum partial autocorrelation sidelobe, maximum partial crosscorrelation value and the ZCZ/LCZ. The results show that the derived bounds include the previous periodic bounds, such as Sarwate bound, Welch bound, Peng-Fan bound and Paterson-Lothian bound, as special cases.
|
|
Comments on “How to repair the Hill cipher”
Y. RANGEL-ROMERO, R. VEGA-GARCÍA, A. MENCHACA-MÉNDEZ, D. ACOLTZI-CERVANTES, L. MARTÍNEZ-RAMOS, M. MECATE-ZAMBRANO, F. MONTALVO-LEZAMA, J. BARRÓN-VIDALES, N. CORTEZ-DUARTE, F. RODRÍGUEZ-HENRÍQUEZ
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(2): 211-214.
https://doi.org/10.1631/jzus.A072143
A modification of the Hill cipher algorithm was recently proposed by Ismail et al.(2006), who claimed that their new scheme could offer more security than the original one due to an extra non-linearity layer introduced via an elaborated key generation mechanism. That mechanism produces one different encryption key for each one of the plaintext blocks. Nevertheless, we show in this paper that their method still has severe security flaws whose weaknesses are essentially the same as that already found in the original Hill cipher scheme.
|
|
Power duality for multi-antenna OFDM system in broadcast channel with user scheduling
Feng SHE, Han-wen LUO, Lei CHEN, Hua XIA
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(2): 215-224.
https://doi.org/10.1631/jzus.A071366
This paper deals with design and analysis of user scheduling and power allocation for multi-antenna OFDM systems with DPC, ZF-DPC, ZF-BF and TDMA transmit strategies. We consider the general multi-user downlink scheduling problem and power minimization with multi-user rate constraints. According to the channel state, it is shown that there is a power optimal policy which selects a subset of users in each scheduling interval. We present user selection algorithms for DPC, ZF-DPC, ZF-BF and TDMA for multi-antenna OFDM system in broadcast channels, and we also present the practical water-filling solution in this paper. By the selected users with the consideration of fairness, we derive the power optimization algorithm with multi-user rate constraints. We also analyze the power duality of uplink-downlink for the transmit strategies of DPC, ZF-DPC and ZF-BF. Simulation results show that the present user-scheduling algorithm and power minimization algorithm can achieve good power performance, and that the scheduling algorithm can guarantee fairness.
|
|
Boosting multi-features with prior knowledge for mini unmanned helicopter landmark detection
Qin-yuan REN, Ping LI, Bo HAN
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(2): 256-261.
https://doi.org/10.1631/jzus.A071131
Without sufficient real training data, the data driven classification algorithms based on boosting method cannot solely be utilized to applications such as the mini unmanned helicopter landmark image detection. In this paper, we propose an approach which uses a boosting algorithm with the prior knowledge for the mini unmanned helicopter landmark image detection. The stage forward stagewise additive model of boosting is analyzed, and the approach how to combine it with the prior knowledge model is presented. The approach is then applied to landmark image detection, where the multi-features are boosted to solve a series of problems, such as rotation, noises affected, etc. Results of real flight experiments demonstrate that for small training examples the boosted learning system using prior knowledge is dramatically better than the one driven by data only.
|
|
Exponential synchronization of general chaotic delayed neural networks via hybrid feedback
Mei-qin LIU, Jian-hai ZHANG
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(2): 262-270.
https://doi.org/10.1631/jzus.A071336
This paper investigates the exponential synchronization problem of some chaotic delayed neural networks based on the proposed general neural network model, which is the interconnection of a linear delayed dynamic system and a bounded static nonlinear operator, and covers several well-known neural networks, such as Hopfield neural networks, cellular neural networks (CNNs), bidirectional associative memory (BAM) networks, recurrent multilayer perceptrons (RMLPs). By virtue of Lyapunov-Krasovskii stability theory and linear matrix inequality (LMI) technique, some exponential synchronization criteria are derived. Using the drive-response concept, hybrid feedback controllers are designed to synchronize two identical chaotic neural networks based on those synchronization criteria. Finally, detailed comparisons with existing results are made and numerical simulations are carried out to demonstrate the effectiveness of the established synchronization laws.
|
|
Strategic games on a hierarchical network model
Yi-xiao LI, Xiao-gang JIN, Fan-sheng KONG, Hui-lan LUO
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(2): 271-278.
https://doi.org/10.1631/jzus.A071331
Among complex network models, the hierarchical network model is the one most close to such real networks as world trade web, metabolic network, WWW, actor network, and so on. It has not only the property of power-law degree distribution, but also the scaling clustering coefficient property which Barabási-Albert (BA) model does not have. BA model is a model of network growth based on growth and preferential attachment, showing the scale-free degree distribution property. In this paper, we study the evolution of cooperation on a hierarchical network model, adopting the prisoner’s dilemma (PD) game and snowdrift game (SG) as metaphors of the interplay between connected nodes. BA model provides a unifying framework for the emergence of cooperation. But interestingly, we found that on hierarchical model, there is no sign of cooperation for PD game, while the frequency of cooperation decreases as the common benefit decreases for SG. By comparing the scaling clustering coefficient properties of the hierarchical network model with that of BA model, we found that the former amplifies the effect of hubs. Considering different performances of PD game and SG on complex network, we also found that common benefit leads to cooperation in the evolution. Thus our study may shed light on the emergence of cooperation in both natural and social environments.
|
|
An iterative computation method for interpreting and extending an analytical battery model
Neng-gan ZHENG, Zhao-hui WU, Man LIN, Qi-jia WANG
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(2): 279-288.
https://doi.org/10.1631/jzus.A071223
Battery models are of great importance to develop portable computing systems, for whether the design of low power hardware architecture or the design of battery-aware scheduling policies. In this paper, we present a physically justified iterative computing method to illustrate the discharge, recovery and charge process of Li/Li-ion batteries. The discharge and recovery processes correspond well to an existing accurate analytical battery model: R-V-W’s analytical model, and thus interpret this model algorithmically. Our method can also extend R-V-W’s model easily to accommodate the charge process. The work will help the system designers to grasp the characteristics of R-V-W’s battery model and also, enable to predict the battery behavior in the charge process in a uniform way as the discharge process and the recovery process. Experiments are performed to show the accuracy of the extended model by comparing the predicted charge times with those derived from the DUALFOIL simulations. Various profiles with different combinations of battery modes were tested. The experimental results show that the extended battery model preserves high accuracy in predicting the charge behavior.
|
19 articles
|