• Title/Summary/Keyword: phases of network

Search Result 282, Processing Time 0.023 seconds

Step-Up Asymmetrical Nine Phase Delta-Connected Transformer for HVDC Transmission

  • Ammar, Arafet Ben;Ammar, Faouzi Ben
    • Journal of Power Electronics
    • /
    • v.18 no.6
    • /
    • pp.1920-1929
    • /
    • 2018
  • In order to provide a source for nine phases suitable for 18-pulse ac to dc power, this paper proposes a new structure for a step-up asymmetrical delta-connected transformer for converting three-phase ac power to nine-phase ac power. The design allows for symmetry between the nine output voltages to improve the power quality of the supply current and to minimize the THD. The results show that this new structure proves the equality between the output voltages with $40^{\circ}-{\alpha}$ and $40^{\circ}+{\alpha}$ phase shifting and produces symmetrical output currents. This result in the elimination of harmonics in the network current and provides a simulated THD that is equal to 5.12 %. An experimental prototype of the step-up asymmetrical delta-autotransformer is developed in the laboratory and the obtained results give a network current with a THD that is equal to 5.35%. Furthermore, a finite element analysis with a 3D magnetic field model is made based on the dimensions of the 4kVA, 400 V laboratory prototype three-phase with three-limb delta-autotransformer with a six-stacked-core in each limb. The magnetic distribution flux, field intensity and magnetic energy are carried out under open-circuit operation or load-loss.

An Intelligent Framework for Feature Detection and Health Recommendation System of Diseases

  • Mavaluru, Dinesh
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.177-184
    • /
    • 2021
  • All over the world, people are affected by many chronic diseases and medical practitioners are working hard to find out the symptoms and remedies for the diseases. Many researchers focus on the feature detection of the disease and trying to get a better health recommendation system. It is necessary to detect the features automatically to provide the most relevant solution for the disease. This research gives the framework of Health Recommendation System (HRS) for identification of relevant and non-redundant features in the dataset for prediction and recommendation of diseases. This system consists of three phases such as Pre-processing, Feature Selection and Performance evaluation. It supports for handling of missing and noisy data using the proposed Imputation of missing data and noise detection based Pre-processing algorithm (IMDNDP). The selection of features from the pre-processed dataset is performed by proposed ensemble-based feature selection using an expert's knowledge (EFS-EK). It is very difficult to detect and monitor the diseases manually and also needs the expertise in the field so that process becomes time consuming. Finally, the prediction and recommendation can be done using Support Vector Machine (SVM) and rule-based approaches.

Minimization of differential column shortening and sequential analysis of RC 3D-frames using ANN

  • Njomo, Wilfried W.;Ozay, Giray
    • Structural Engineering and Mechanics
    • /
    • v.51 no.6
    • /
    • pp.989-1003
    • /
    • 2014
  • In the preliminary design stage of an RC 3D-frame, repeated sequential analyses to determine optimal members' sizes and the investigation of the parameters required to minimize the differential column shortening are computational effort consuming, especially when considering various types of loads such as dead load, temperature action, time dependent effects, construction and live loads. Because the desired accuracy at this stage does not justify such luxury, two backpropagation feedforward artificial neural networks have been proposed in order to approximate this information. Instead of using a commercial software package, many references providing advanced principles have been considered to code a program and generate these neural networks. The first one predicts the typical amount of time between two phases, needed to achieve the minimum maximorum differential column shortening. The other network aims to prognosticate sequential analysis results from those of the simultaneous analysis. After the training stages, testing procedures have been carried out in order to ensure the generalization ability of these respective systems. Numerical cases are studied in order to find out how good these ANN match with the sequential finite element analysis. Comparison reveals an acceptable fit, enabling these systems to be safely used in the preliminary design stage.

Improving Data Accuracy Using Proactive Correlated Fuzzy System in Wireless Sensor Networks

  • Barakkath Nisha, U;Uma Maheswari, N;Venkatesh, R;Yasir Abdullah, R
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.9
    • /
    • pp.3515-3538
    • /
    • 2015
  • Data accuracy can be increased by detecting and removing the incorrect data generated in wireless sensor networks. By increasing the data accuracy, network lifetime can be increased parallel. Network lifetime or operational time is the time during which WSN is able to fulfill its tasks by using microcontroller with on-chip memory radio transceivers, albeit distributed sensor nodes send summary of their data to their cluster heads, which reduce energy consumption gradually. In this paper a powerful algorithm using proactive fuzzy system is proposed and it is a mixture of fuzzy logic with comparative correlation techniques that ensure high data accuracy by detecting incorrect data in distributed wireless sensor networks. This proposed system is implemented in two phases there, the first phase creates input space partitioning by using robust fuzzy c means clustering and the second phase detects incorrect data and removes it completely. Experimental result makes transparent of combined correlated fuzzy system (CCFS) which detects faulty readings with greater accuracy (99.21%) than the existing one (98.33%) along with low false alarm rate.

Beyond SDLC: Process Modeling and Documentation Using Thinging Machines

  • Al-Fedaghi, Sabah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.191-204
    • /
    • 2021
  • The software development life cycle (SDLC) is a procedure used to develop a software system that meets both the customer's needs and real-world requirements. The first phase of the SDLC involves creating a conceptual model that represents the involved domain in reality. In requirements engineering, building such a model is considered a bridge to the design and construction phases. However, this type of model can also serve as a basic model for identifying business processes and how these processes are interconnected to achieve the final result. This paper focuses on process modeling in organizations, per se, beyond its application in the SDLC when an organization needs further documentation to meet its growth needs and address regular changes over time. The resultant process documentation is created alongside the daily operations of the business process. The model provides visualization and documentation of processes to assist in defining work patterns, avoiding redundancy, or even designing new processes. In this paper, a proposed diagrammatic representation models each process using one diagram comprising five actions and two types of relations to build three levels of depiction. These levels consist of a static description, events, and the behavior of the modeled process. The viability of a thinging machine is demonstrated by re-modeling some examples from the literature.

Factors for Better Adoption of Information Security on Custom-Made Software at SMEs: A Systematic Review and Framework

  • Fatimah Alghamdi;Moutasm Tamimi;Nermin Hamza
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.65-78
    • /
    • 2023
  • Investigations on information security factors re- main elusive at small and medium enterprises (SMEs), es- specially for custom-made software solutions. This article aims to investigate, classify, adopt factors from recent literature addressing information security resources. SMEs al- ready have information security in place, but they are not easy to adopt through the negotiation processes between the in-house software development companies and custom-made software clients at SMEs. This article proposes a strategic framework for implementing the process of adoption of the information security factors at SMEs after conducting a systematic snapshot approach for investigating and classifying the resources. The systematic snapshot was conducted using a search strategy with inclusion and exclusion criteria to retain 128 final reviewed papers from a large number of papers within the period of 2001-2022. These papers were analyzed based on a classification schema including management, organizational, development, and environmental categories in software development lifecycle (SDLC) phases in order to define new security factors. The reviewed articles addressed research gaps, trends, and common covered evidence-based decisions based on the findings of the systematic mapping. Hence, this paper boosts the broader cooperation between in-house software development companies and their clients to elicit, customize, and adopt the factors based on clients' demands.

Short packet communication in underlay cognitive network assisted by an intelligent reflecting surface

  • Pham Ngoc Son;Tran Trung Duy;Pham Viet Tuan;Tan-Phuoc Huynh
    • ETRI Journal
    • /
    • v.45 no.1
    • /
    • pp.28-44
    • /
    • 2023
  • We propose short packet communication in an underlay cognitive radio network assisted by an intelligent reflecting surface (IRS) composed of multiple reconfigurable reflectors. This scheme, called the IRS protocol, operates in only one time slot (TS) using the IRS. The IRS adjusts its phases to give zero received cumulative phase at the secondary destination, thereby enhancing the end-to-end signal-to-noise ratio. The transmitting power of the secondary source is optimized to simultaneously satisfy the multi-interference constraints, hardware limitations, and performance improvement. Simulation and analysis results of the average block error rates (BLERs) show that the performance can be enhanced by installing more reconfigurable reflectors, increasing the blocklength, lowering the number of required primary receivers, or sending fewer information bits. Moreover, the proposed IRS protocol always outperforms underlay relaying protocols using two TSs for data transmission, and achieves the best average BLER at identical transmission distances between the secondary source and secondary destination. The theoretical analyses are confirmed by Monte Carlo simulations.

The Importance of Ethical Hacking Tools and Techniques in Software Development Life Cycle

  • Syed Zain ul Hassan;Saleem Zubair Ahmad
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.169-175
    • /
    • 2023
  • Ethical hackers are using different tools and techniques to encounter malicious cyber-attacks generated by bad hackers. During the software development process, development teams typically bypass or ignore the security parameters of the software. Whereas, with the advent of online web-based software, security is an essential part of the software development process for implementing secure software. Security features cannot be added as additional at the end of the software deployment process, but they need to be paid attention throughout the SDLC. In that view, this paper presents a new, Ethical Hacking - Software Development Life Cycle (EH-SDLC) introducing ethical hacking processes and phases to be followed during the SDLC. Adopting these techniques in SDLC ensures that consumers find the end-product safe, secure and stable. Having a team of penetration testers as part of the SDLC process will help you avoid incurring unnecessary costs that come up after the data breach. This research work aims to discuss different operating systems and tools in order to facilitate the secure execution of the penetration tests during SDLC. Thus, it helps to improve the confidentiality, integrity, and availability of the software products.

A Novel Hitting Frequency Point Collision Avoidance Method for Wireless Dual-Channel Networks

  • Quan, Hou-De;Du, Chuan-Bao;Cui, Pei-Zhang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.3
    • /
    • pp.941-955
    • /
    • 2015
  • In dual-channel networks (DCNs), all frequency hopping (FH) sequences used for data channels are chosen from the original FH sequence used for the control channel by shifting different initial phases. As the number of data channels increases, the hitting frequency point problem becomes considerably serious because DCNs is non-orthogonal synchronization network and FH sequences are non-orthogonal. The increasing severity of the hitting frequency point problem consequently reduces the resource utilization efficiency. To solve this problem, we propose a novel hitting frequency point collision avoidance method, which consists of a sequence-selection strategy called sliding correlation (SC) and a collision avoidance strategy called keeping silent on hitting frequency point (KSHF). SC is used to find the optimal phase-shifted FH sequence with the minimum number of hitting frequency points for a new data channel. The hitting frequency points and their locations in this optimal sequence are also derived for KSHF according to SC strategy. In KSHF, the transceivers transmit or receive symbol information not on the hitting frequency point, but on the next frequency point during the next FH period. Analytical and simulation results demonstrate that unlike the traditional method, the proposed method can effectively reduce the number of hitting frequency points and improve the efficiency of the code resource utilization.

Simultaneous Observations of SiO and $H_2O$ Masers toward Known Stellar SiO and $H_2O$ Maser Sources.II. Statistical Study

  • Kim, Jae-Heon;Cho, Se-Hyung;Kim, Sang-Joon
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.35 no.1
    • /
    • pp.51.2-51.2
    • /
    • 2010
  • We have carried out an extensive statistical analysis based on the results of simultaneous observations of SiO and $H_2O$ masers toward 166 known SiO and $H_2O$ maser sources using KVN_Yonsei radio telescope (Kim et al.2010, ApJS submitted). We investigate the distributions of the mean velocities and the intensity ratios between SiO and $H_2O$ maser emission including those between SiO v=1 and v=2,J=1-0 transitions according to type of evolved stars. We also investigate mutual relations between SiO and $H_2O$ maser properties(total flux densities and velocity structures etc.) according to stellar pulsation phases. Most of SiO masers appear around the stellar velocity (80 % within ${\pm}5km\;s^{-1}$), while $H_2O$ masers show a different characteristic compared with SiO masers (69% within ${\pm}5km\;s^{-1}$). In addition, we investigate a correlation between $SiO/H_2O$ maser emission and AKARIFIS flux density as well as the AKARI color characteristics of SiO and $H_2O$ observational results in the AKARIFIS two-color diagram.

  • PDF