/

Default Site
  • Change Site
  • Default Site
  • Advanced Search
  • Expert Search
  • Sign In
    • Help
    • Search History
    • Clear Session
  • Browse
    • Entire Repository  
    • Recent Additions
    • Communities & Collections
    • By Title
    • By Creator
    • By Subject
    • By Type
    • Most Accessed Papers
    • Most Accessed Items
    • Most Accessed Authors
  • Quick Collection  
Sign In
  • Help
  • Search History
  • Clear Session

Showing items 1 - 20 of 191

Your selections:

  • 0906 Electrical and Electronic Engineering
  • 0906 Electrical and Electronic Engineering
Full Text
115No 76Yes
Creator
34Islam, Syed 16Kamruzzaman, Joarder 15Gondal, Iqbal 12Abu-Siada, Ahmed 11Lu, Guojun 11Murshed, Manzur 9Kruger, Alexander 8Bagirov, Adil 7Karmakar, Gour 7Nguyen, Linh 7Xia, Feng 6Hashemnia, Naser 6Khandelwal, Manoj 6Masoum, Mohammad 6Teng, Shyh 6Yaqub, Muhammad 5Balasubramanian, Venki 5Hu, Jiefeng 5Jayaweera, Dilan 5López, Marco
Show More
Show Less
Subject
400102 Applied Mathematics 390801 Artificial Intelligence and Image Processing 270913 Mechanical Engineering 250103 Numerical and Computational Mathematics 141702 Cognitive Science 130805 Distributed Computing 121005 Communications Technologies 110806 Information Systems 80803 Computer Software 60205 Optical Physics 60899 Other Information and Computing Sciences 60915 Interdisciplinary Engineering 50101 Pure Mathematics 5Machine learning 5Metric regularity 5Nonsmooth optimization 5Subdifferential 40910 Manufacturing Engineering 4Anomaly detection
Show More
Show Less
Format Type
76Adobe Acrobat PDF
Resource Type
187Journal article 3Conference proceedings 2Review 1Conference paper 1acceptedVersion
Facets
Full Text
115No 76Yes
Creator
34Islam, Syed 16Kamruzzaman, Joarder 15Gondal, Iqbal 12Abu-Siada, Ahmed 11Lu, Guojun 11Murshed, Manzur 9Kruger, Alexander 8Bagirov, Adil 7Karmakar, Gour 7Nguyen, Linh 7Xia, Feng 6Hashemnia, Naser 6Khandelwal, Manoj 6Masoum, Mohammad 6Teng, Shyh 6Yaqub, Muhammad 5Balasubramanian, Venki 5Hu, Jiefeng 5Jayaweera, Dilan 5López, Marco
Show More
Show Less
Subject
400102 Applied Mathematics 390801 Artificial Intelligence and Image Processing 270913 Mechanical Engineering 250103 Numerical and Computational Mathematics 141702 Cognitive Science 130805 Distributed Computing 121005 Communications Technologies 110806 Information Systems 80803 Computer Software 60205 Optical Physics 60899 Other Information and Computing Sciences 60915 Interdisciplinary Engineering 50101 Pure Mathematics 5Machine learning 5Metric regularity 5Nonsmooth optimization 5Subdifferential 40910 Manufacturing Engineering 4Anomaly detection
Show More
Show Less
Format Type
76Adobe Acrobat PDF
Resource Type
187Journal article 3Conference proceedings 2Review 1Conference paper 1acceptedVersion
  • Title
  • Creator
  • Date

Quick View

A robust forgery detection method for copy-move and splicing attacks in images

- Islam, Mohammad, Karmakar, Gour, Kamruzzaman, Joarder, Murshed, Manzur


  • Authors: Islam, Mohammad , Karmakar, Gour , Kamruzzaman, Joarder , Murshed, Manzur
  • Date: 2020
  • Type: Text , Journal article
  • Relation: Electronics Vol. 9, no. 9 (2020), p. 1-22
  • Full Text:
  • Reviewed:
  • Description: Internet of Things (IoT) image sensors, social media, and smartphones generate huge volumes of digital images every day. Easy availability and usability of photo editing tools have made forgery attacks, primarily splicing and copy-move attacks, effortless, causing cybercrimes to be on the rise. While several models have been proposed in the literature for detecting these attacks, the robustness of those models has not been investigated when (i) a low number of tampered images are available for model building or (ii) images from IoT sensors are distorted due to image rotation or scaling caused by unwanted or unexpected changes in sensors' physical set-up. Moreover, further improvement in detection accuracy is needed for real-word security management systems. To address these limitations, in this paper, an innovative image forgery detection method has been proposed based on Discrete Cosine Transformation (DCT) and Local Binary Pattern (LBP) and a new feature extraction method using the mean operator. First, images are divided into non-overlapping fixed size blocks and 2D block DCT is applied to capture changes due to image forgery. Then LBP is applied to the magnitude of the DCT array to enhance forgery artifacts. Finally, the mean value of a particular cell across all LBP blocks is computed, which yields a fixed number of features and presents a more computationally efficient method. Using Support Vector Machine (SVM), the proposed method has been extensively tested on four well known publicly available gray scale and color image forgery datasets, and additionally on an IoT based image forgery dataset that we built. Experimental results reveal the superiority of our proposed method over recent state-of-the-art methods in terms of widely used performance metrics and computational time and demonstrate robustness against low availability of forged training samples.
  • Description: This research was funded by Research Priority Area (RPA) scholarship of Federation University Australia.

A robust forgery detection method for copy-move and splicing attacks in images

  • Authors: Islam, Mohammad , Karmakar, Gour , Kamruzzaman, Joarder , Murshed, Manzur
  • Date: 2020
  • Type: Text , Journal article
  • Relation: Electronics Vol. 9, no. 9 (2020), p. 1-22
  • Full Text:
  • Reviewed:
  • Description: Internet of Things (IoT) image sensors, social media, and smartphones generate huge volumes of digital images every day. Easy availability and usability of photo editing tools have made forgery attacks, primarily splicing and copy-move attacks, effortless, causing cybercrimes to be on the rise. While several models have been proposed in the literature for detecting these attacks, the robustness of those models has not been investigated when (i) a low number of tampered images are available for model building or (ii) images from IoT sensors are distorted due to image rotation or scaling caused by unwanted or unexpected changes in sensors' physical set-up. Moreover, further improvement in detection accuracy is needed for real-word security management systems. To address these limitations, in this paper, an innovative image forgery detection method has been proposed based on Discrete Cosine Transformation (DCT) and Local Binary Pattern (LBP) and a new feature extraction method using the mean operator. First, images are divided into non-overlapping fixed size blocks and 2D block DCT is applied to capture changes due to image forgery. Then LBP is applied to the magnitude of the DCT array to enhance forgery artifacts. Finally, the mean value of a particular cell across all LBP blocks is computed, which yields a fixed number of features and presents a more computationally efficient method. Using Support Vector Machine (SVM), the proposed method has been extensively tested on four well known publicly available gray scale and color image forgery datasets, and additionally on an IoT based image forgery dataset that we built. Experimental results reveal the superiority of our proposed method over recent state-of-the-art methods in terms of widely used performance metrics and computational time and demonstrate robustness against low availability of forged training samples.
  • Description: This research was funded by Research Priority Area (RPA) scholarship of Federation University Australia.
Quick View

Development of cluster-based energy management scheme for residential usages in the smart grid community

- Ur Rashid, Md Mamun, Granelli, Fabrizio, Hossain, Md Alamgir, Alam, Md Shafiul, Al-Ismail, Fahad, Shah, Rakibuzzaman


  • Authors: Ur Rashid, Md Mamun , Granelli, Fabrizio , Hossain, Md Alamgir , Alam, Md Shafiul , Al-Ismail, Fahad , Shah, Rakibuzzaman
  • Date: 2020
  • Type: Text , Journal article
  • Relation: Electronics (Switzerland) Vol. 9, no. 9 (2020), p. 1-25
  • Full Text:
  • Reviewed:
  • Description: Several efforts have been taken to promote clean energy towards a sustainable and green economy. Existing sources of electricity present some complications concerning consumers, utility owners, and the environment. Utility operators encourage household applicants to employ residential energy management (REM) systems. Renewable energy sources (RESs), energy storage systems (ESS), and optimal energy allocation strategies are used to resolve these difficulties. In this paper, the development of a cluster-based energy management scheme for residential consumers of a smart grid community is proposed to reduce energy use and monetary cost. Normally, residential consumers deal with household appliances with various operating time slots depending on consumer preferences. A simulator is designed and developed using C++ software to resolve the residential consumer’s REM problem. The benefits of the RESs, ESS, and optimal energy allocation techniques are analyzed by taking in account three different scenarios. Extensive case studies are carried out to validate the effectiveness of the proposed cluster-based energy management scheme. It is demonstrated that the proposed method can save energy and costs up to 45% and 56% compared to the existing methods. © 2020 by the authors. Licensee MDPI, Basel, Switzerland.

Development of cluster-based energy management scheme for residential usages in the smart grid community

  • Authors: Ur Rashid, Md Mamun , Granelli, Fabrizio , Hossain, Md Alamgir , Alam, Md Shafiul , Al-Ismail, Fahad , Shah, Rakibuzzaman
  • Date: 2020
  • Type: Text , Journal article
  • Relation: Electronics (Switzerland) Vol. 9, no. 9 (2020), p. 1-25
  • Full Text:
  • Reviewed:
  • Description: Several efforts have been taken to promote clean energy towards a sustainable and green economy. Existing sources of electricity present some complications concerning consumers, utility owners, and the environment. Utility operators encourage household applicants to employ residential energy management (REM) systems. Renewable energy sources (RESs), energy storage systems (ESS), and optimal energy allocation strategies are used to resolve these difficulties. In this paper, the development of a cluster-based energy management scheme for residential consumers of a smart grid community is proposed to reduce energy use and monetary cost. Normally, residential consumers deal with household appliances with various operating time slots depending on consumer preferences. A simulator is designed and developed using C++ software to resolve the residential consumer’s REM problem. The benefits of the RESs, ESS, and optimal energy allocation techniques are analyzed by taking in account three different scenarios. Extensive case studies are carried out to validate the effectiveness of the proposed cluster-based energy management scheme. It is demonstrated that the proposed method can save energy and costs up to 45% and 56% compared to the existing methods. © 2020 by the authors. Licensee MDPI, Basel, Switzerland.

A comprehensive analyses of aging characteristics of oil-paper insulation system in HVDC converter transformers

- Cui, Huize, Yang, Liuqing, Zhu, Yuanwei, Li, Shengtao, Abu-Siada, A., Islam, Syed

  • Authors: Cui, Huize , Yang, Liuqing , Zhu, Yuanwei , Li, Shengtao , Abu-Siada, A. , Islam, Syed
  • Date: 2020
  • Type: Text , Journal article
  • Relation: IEEE Transactions on Dielectrics and Electrical Insulation Vol. 27, no. 5 (2020), p. 1707-1714
  • Full Text: false
  • Reviewed:
  • Description: This paper investigates the dissolved gases evolution in transformer oil under combined DC/AC electrical-Thermal stress. Dissolved gases detected in transformer aged insulation oil reveal that oil under AC electric field combined with thermal stress can produce more dissolved gases than oil under DC electric field with thermal stress but less than the gases produced in oil under distorted AC or combined AC/DC voltage stress. This is attributed to the divergent migration properties of the charged components under different types of electric fields. To further understand this behavior, carrier recombination coefficient is proposed to explain the oil DGA results under various aging stresses. Results show that diagnostic parameters such as breakdown voltage, oil interfacial tension, and moisture content in pressboard should be used along with DGA results in order to accurately diagnose the insulation condition within converter transformers that impose a combined AC/DC voltage stress on the insulation system. © 1994-2012 IEEE.
  • Description: This work has been supported by the National Key Research and Development Program of China (2017YFB0902705), State Key Laboratory of Electrical Insulation and Power Equipment (EIPE20210), the National Natural Science Foundation of China (51907148), the Youth Fund of State Key Laboratory of Electrical Insulation and Power Equipment (EIPE19308), the Foundation Project of State Grid in Shaanxi province section, China (SGSNKY00SPJS1900302). The authors thank the Natural Science Basic Research Plan in Shaanxi Province of China (2019JQ-070).

Lower bound on minimum lee distance of algebraic-geometric codes over finite fields

- Wu, Xinwen, Kuijper, Margreta, Udaya, Parampalli

  • Authors: Wu, Xinwen , Kuijper, Margreta , Udaya, Parampalli
  • Date: 2007
  • Type: Text , Journal article
  • Relation: Electronics Letters Vol. 43, no. 15 (2007), p. 820-822
  • Full Text:
  • Reviewed:
  • Description: Algebraic-geometric (AG) codes over finite fields with respect to the Lee metric have been studied. A lower bound on the minimum Lee distance is derived, which is a Lee-metric version of the well-known Goppa bound on the minimum Hamming distance of AG codes. The bound generalises a lower bound on the minimum Lee distance of Lee-metric BCH and Reed-Solomon codes, which have been successfully used for protecting against bitshift and synchronisation errors in constrained channels and for error control in partial-response channels.
  • Description: C1
  • Description: 2003005654

A Root-finding algorithm for list decoding of Reed-Muller codes

- Wu, Xinwen, Kuijper, Margreta, Udaya, Parampalli

  • Authors: Wu, Xinwen , Kuijper, Margreta , Udaya, Parampalli
  • Date: 2006
  • Type: Text , Journal article
  • Relation: IEEE transactions on information theory Vol. 51, no. 3 (2006), p. 1190-1196
  • Full Text: false
  • Reviewed:
  • Description: Let Fq[X1,...,Xm] denote the set of polynomials over Fq in m variables, and Fq[X1,...,Xm]≤u denote the subset that consists of the polynomials of total degree at most u. Let H(T) be a nontrivial polynomial in T with coefficients in Fq[X1,...,Xm]. A crucial step in interpolation-based list decoding of q-ary Reed-Muller (RM) codes is finding the roots of H(T) in Fq[X1,...,Xm]≤u. In this correspondence, we present an efficient root-finding algorithm, which finds all the roots of H(T) in Fq[X1,...,Xm]≤u. The algorithm can be used to speed up the list decoding of RM codes.
  • Description: C1
  • Description: 2003005726

Multi-agent based autonomous control of microgrid

- Shawon, Mohammad Hasanuzzaman, Ghosh, Arimdam, Muyeen, S., Baptista, Murilo, Islam, Syed

  • Authors: Shawon, Mohammad Hasanuzzaman , Ghosh, Arimdam , Muyeen, S. , Baptista, Murilo , Islam, Syed
  • Date: 2020
  • Type: Text , Conference proceedings
  • Relation: 2nd International Conference on Smart Power and Internet Energy Systems, SPIES 2020, 15-18 Sept. 2020, Bangkok, Thailand p. 333-338
  • Full Text: false
  • Reviewed:
  • Description: Microgrid (MG), a revolutionary concept in the energy infrastructure, plays an important role for the establishment of a resilient grid infrastructure. Since its emergence, it has evolved around a number of cutting edge technologies for its smooth operation and control. Among them multi-agent system (MAS) provides an intelligent and decentralized platform for the control of microgrid. This paper highlights the application of a MAS in an AC microgrid, including a detailed structure of microgrid, the communication interface between microgrid and multi-agent platform. A detailed small scale microgrid model has been simulated in MATLAB/SIMULINK environment, whereas the agent platform has been implemented in JADE (Java Agent Development Framework) platform. The MAS autonomously detects main grid outage and facilitates seamless transition from grid-connected mode to islanding mode; thus ensures overall smooth operation of the power network. Simulation results are presented to verify the effectiveness of the MAS based control system. © 2020 IEEE.

Incremental DC optimization algorithm for large-scale clusterwise linear regression

- Bagirov, Adil, Taheri, Sona, Cimen, Emre

  • Authors: Bagirov, Adil , Taheri, Sona , Cimen, Emre
  • Date: 2021
  • Type: Text , Journal article
  • Relation: Journal of Computational and Applied Mathematics Vol. 389, no. (2021), p. 1-17
  • Relation: https://purl.org/au-research/grants/arc/DP190100580
  • Full Text: false
  • Reviewed:
  • Description: The objective function in the nonsmooth optimization model of the clusterwise linear regression (CLR) problem with the squared regression error is represented as a difference of two convex functions. Then using the difference of convex algorithm (DCA) approach the CLR problem is replaced by the sequence of smooth unconstrained optimization subproblems. A new algorithm based on the DCA and the incremental approach is designed to solve the CLR problem. We apply the Quasi-Newton method to solve the subproblems. The proposed algorithm is evaluated using several synthetic and real-world data sets for regression and compared with other algorithms for CLR. Results demonstrate that the DCA based algorithm is efficient for solving CLR problems with the large number of data points and in particular, outperforms other algorithms when the number of input variables is small. © 2020 Elsevier B.V.
Quick View

An L-2-Boosting Algorithm for Estimation of a Regression Function

- Bagirov, Adil, Clausen, Conny, Kohler, Michael


  • Authors: Bagirov, Adil , Clausen, Conny , Kohler, Michael
  • Date: 2010
  • Type: Text , Journal article
  • Relation: IEEE Transactions on Information Theory Vol. 56, no. 3 (2010), p. 1417-1429
  • Full Text:
  • Reviewed:
  • Description: An L-2-boosting algorithm for estimation of a regression function from random design is presented, which consists of fitting repeatedly a function from a fixed nonlinear function space to the residuals of the data by least squares and by defining the estimate as a linear combination of the resulting least squares estimates. Splitting of the sample is used to decide after how many iterations of smoothing of the residuals the algorithm terminates. The rate of convergence of the algorithm is analyzed in case of an unbounded response variable. The method is used to fit a sum of maxima of minima of linear functions to a given data set, and is compared with other nonparametric regression estimates using simulated data.

An L-2-Boosting Algorithm for Estimation of a Regression Function

  • Authors: Bagirov, Adil , Clausen, Conny , Kohler, Michael
  • Date: 2010
  • Type: Text , Journal article
  • Relation: IEEE Transactions on Information Theory Vol. 56, no. 3 (2010), p. 1417-1429
  • Full Text:
  • Reviewed:
  • Description: An L-2-boosting algorithm for estimation of a regression function from random design is presented, which consists of fitting repeatedly a function from a fixed nonlinear function space to the residuals of the data by least squares and by defining the estimate as a linear combination of the resulting least squares estimates. Splitting of the sample is used to decide after how many iterations of smoothing of the residuals the algorithm terminates. The rate of convergence of the algorithm is analyzed in case of an unbounded response variable. The method is used to fit a sum of maxima of minima of linear functions to a given data set, and is compared with other nonparametric regression estimates using simulated data.

Texture as pixel feature for video object segmentation

- Ahmed, Rakib, Karmakar, Gour, Dooley, Laurence

  • Authors: Ahmed, Rakib , Karmakar, Gour , Dooley, Laurence
  • Date: 2008
  • Type: Text , Journal article
  • Relation: Electronics Letters Vol. 44, no. 19 (2008), p. 1126-1127
  • Full Text: false
  • Reviewed:

Severity invariant feature selection for machine health monitoring

- Yaqub, Muhammad, Gondal, Iqbal, Kamruzzaman, Joarder

  • Authors: Yaqub, Muhammad , Gondal, Iqbal , Kamruzzaman, Joarder
  • Date: 2011
  • Type: Text , Journal article
  • Relation: International Review of Electrical Engineering Vol. 6, no. 1 (2011), p. 238-248
  • Full Text: false
  • Reviewed:
  • Description: Vibration signals used for abnormality detection in machine health monitoring (MHM) suffer from significant variation in the patterns with fault severity. This variation results in overlap among the features extracted against different fault types and causes severe degradation in fault detection accuracy. This paper identifies a newfangled problem originated by severity variant features and mitigates this impact by using appropriate feature selection based on Fisher linear discriminant (FLD) and Bhattacharyya distance (BCD) to enhance fault classification accuracy. In order to validate the performance of the proposed scheme, training and testing data are obtained from different severity levels. To capture the non-stationary behavior of vibration signal, robust tools such as wavelet transform (WT) for time-frequency analysis is employed. Simulation studies show that the proposed scheme ensures good fault diagnostic accuracy even if training and testing data belong to different severity levels. [ABSTRACT FROM AUTHOR]

Effective and efficient contour-based corner detectors

- Teng, Shyh, Najmus Sadat, Rafi, Lu, Guojun

  • Authors: Teng, Shyh , Najmus Sadat, Rafi , Lu, Guojun
  • Date: 2015
  • Type: Text , Journal article
  • Relation: Pattern Recognition Vol. 48, no. 7 (2015), p. 2185-2197
  • Full Text: false
  • Reviewed:
  • Description: Corner detection is an essential operation in many computer vision applications. Among the contour-based corner detectors in the literature, the Chord-to-Point Distance Accumulation (CPDA) detector is reported to have one of the highest repeatability in detecting robust corners and the lowest localization error. However, based on our analysis, we found that the CPDA detector often fails to accurately detect the true corners when a curve has multiple corners but the sharpness of one or a few of them is much more prominent than the rest. This detector also might not perform well when the corners are closely located. Furthermore, the CPDA detector is also computationally very expensive. To overcome these weaknesses, we propose two effective and efficient corner detectors using simple triangular theory and distance calculation. Our experimental results show that our proposed detectors outperform CPDA and nine other existing corner detectors in terms of repeatability. Our proposed detectors also have a relatively low or comparable localization error and are computationally more efficient. © 2015 Elsevier Ltd.
Quick View

Stationarity and regularity of infinite collections of sets

- Kruger, Alexander, López, Marco


  • Authors: Kruger, Alexander , López, Marco
  • Date: 2012
  • Type: Text , Journal article
  • Relation: Journal of Optimization Theory and Applications Vol. 154, no. 2 (2012), p. 339-369
  • Relation: http://purl.org/au-research/grants/arc/DP110102011
  • Full Text:
  • Reviewed:
  • Description: This article investigates extremality, stationarity, and regularity properties of infinite collections of sets in Banach spaces. Our approach strongly relies on the machinery developed for finite collections. When dealing with an infinite collection of sets, we examine the behavior of its finite subcollections. This allows us to establish certain primal-dual relationships between the stationarity/regularity properties some of which can be interpreted as extensions of the Extremal principle. Stationarity criteria developed in the article are applied to proving intersection rules for Fréchet normals to infinite intersections of sets in Asplund spaces. © 2012 Springer Science+Business Media, LLC.

Stationarity and regularity of infinite collections of sets

  • Authors: Kruger, Alexander , López, Marco
  • Date: 2012
  • Type: Text , Journal article
  • Relation: Journal of Optimization Theory and Applications Vol. 154, no. 2 (2012), p. 339-369
  • Relation: http://purl.org/au-research/grants/arc/DP110102011
  • Full Text:
  • Reviewed:
  • Description: This article investigates extremality, stationarity, and regularity properties of infinite collections of sets in Banach spaces. Our approach strongly relies on the machinery developed for finite collections. When dealing with an infinite collection of sets, we examine the behavior of its finite subcollections. This allows us to establish certain primal-dual relationships between the stationarity/regularity properties some of which can be interpreted as extensions of the Extremal principle. Stationarity criteria developed in the article are applied to proving intersection rules for Fréchet normals to infinite intersections of sets in Asplund spaces. © 2012 Springer Science+Business Media, LLC.
Quick View

A numerical control algorithm for navigation of an operator-driven snake-like robot with 4WD-4WS segments

- Percy, Andrew, Spark, Ian


  • Authors: Percy, Andrew , Spark, Ian
  • Date: 2010
  • Type: Text , Journal article
  • Relation: Robotica Vol. 29, no. 3 (2010), p. 471-482
  • Full Text:
  • Reviewed:
  • Description: This paper presents a new algorithm for the control of a snake-like robot with passive joints and active wheels. Each segment has four autonomously driven and steered wheels. The algorithm approximates the ideal solution in which all wheels on a segment have the same centre of curvature with wheel speeds, providing cooperative redundancy. Each hitch point joining segments traverses the same path, which is determined by an operator, prescribing the path curvature and front hitch speed. The numerical algorithm developed in this paper is simulation tested against a previously derived analytical solution for a predetermined path. Further simulations are carried out to show the effects of changing curvature and front hitch speed on hitch path, wheel angles and wheel speeds for a one, two and three segment robot.

A numerical control algorithm for navigation of an operator-driven snake-like robot with 4WD-4WS segments

  • Authors: Percy, Andrew , Spark, Ian
  • Date: 2010
  • Type: Text , Journal article
  • Relation: Robotica Vol. 29, no. 3 (2010), p. 471-482
  • Full Text:
  • Reviewed:
  • Description: This paper presents a new algorithm for the control of a snake-like robot with passive joints and active wheels. Each segment has four autonomously driven and steered wheels. The algorithm approximates the ideal solution in which all wheels on a segment have the same centre of curvature with wheel speeds, providing cooperative redundancy. Each hitch point joining segments traverses the same path, which is determined by an operator, prescribing the path curvature and front hitch speed. The numerical algorithm developed in this paper is simulation tested against a previously derived analytical solution for a predetermined path. Further simulations are carried out to show the effects of changing curvature and front hitch speed on hitch path, wheel angles and wheel speeds for a one, two and three segment robot.

Multi-step support vector regression and optimally parameterized wavelet packet transform for machine residual life prediction

- Yaqub, Muhammad, Gondal, Iqbal, Kamruzzaman, Joarder

  • Authors: Yaqub, Muhammad , Gondal, Iqbal , Kamruzzaman, Joarder
  • Date: 2013
  • Type: Text , Journal article
  • Relation: JVC/Journal of Vibration and Control Vol. 19, no. 7 (2013), p. 963-974
  • Full Text: false
  • Reviewed:
  • Description: Condition based maintenance (CBM) in the process industry helps in determining the residual life of equipment, avoiding sudden breakdown and facilitating the maintenance staff to schedule repairs by optimizing demand–supply relationships. One of the prevalent issues in CBM is to predict the residual life of the equipment. This paper proposes a novel framework to predict the remnant life of the equipment, called residual life prediction, based on optimally parameterized wavelet transform and multi-step support vector regression (RWMS). In optimally parameterized wavelet transform, a generalized criterion is proposed to select the wavelet decomposition level which works for all the applications; decomposition nodes are selected by characterizing their dominancy level based upon relative fault signature–signal energy contents. The prediction model is based on multi-step support vector regression to determine the nonlinear crack propagation in the rotary machine according to Paris’s fatigue model. The results both for the simulated as well as the actual vibration datasets validate the enhanced performance of RWMS in comparison with the existing techniques to predict the residual life of the equipment.

Shape optimization in contact problems with Coulomb friction and a solution-dependent friction coefficient

- Beremlijski, Petr, Haslinger, Jaroslav, Outrata, Jiri, Pathó, Róbert

  • Authors: Beremlijski, Petr , Haslinger, Jaroslav , Outrata, Jiri , Pathó, Róbert
  • Date: 2014
  • Type: Text , Journal article
  • Relation: SIAM Journal on Control and Optimization Vol. 52, no. 5 (2014), p. 3371-3400
  • Full Text: false
  • Reviewed:
  • Description: The present paper deals with shape optimization in discretized two-dimensional (2D) contact problems with Coulomb friction, where the coefficient of friction is assumed to depend on the unknown solution. Discretization of the continuous state problem leads to a system of finite-dimensional implicit variational inequalities, parametrized by the so-called design variable, that determines the shape of the underlying domain. It is shown that if the coefficient of friction is Lipschitz and sufficiently small in the C0,1 -norm, then the discrete state problems are uniquely solvable for all admissible values of the design variable (the admissible set is assumed to be compact), and the state variables are Lipschitzian functions of the design variable. This facilitates the numerical solution of the discretized shape optimization problem by the so-called implicit programming approach. Our main results concern sensitivity analysis, which is based on the well-developed generalized differential calculus of B. Mordukhovich and generalizes some of the results obtained in this context so far. The derived subgradient information is then combined with the bundle trust method to compute several model examples, demonstrating the applicability and efficiency of the presented approach. © 2014 Society for Industrial and Applied Mathematics

Spline regression models for complex multi-modal regulatory networks

- Ozmen, Ayse, Kropat, Erik, Weber, Gerhard-Wilhelm

  • Authors: Ozmen, Ayse , Kropat, Erik , Weber, Gerhard-Wilhelm
  • Date: 2014
  • Type: Text , Journal article
  • Relation: Optimization Methods and Software Vol. 29, no. 3 (2014), p. 515-534
  • Full Text: false
  • Reviewed:
  • Description: Complex regulatory networks often have to be further expanded and improved with regard to the unknown effects of additional parameters and factors that can emit a disturbing influence on the key variables under consideration. The concept of target-environment (TE) networks provides a holistic framework for the analysis of such parameter-dependent multi-modal systems. In this study, we consider time-discrete TE regulatory systems with spline entries. We introduce a new regression model for these particular two-modal systems that allows us to determine the unknown system parameters by applying the multivariate adaptive regression spline (MARS) technique and the newly developed conic multivariate adaptive regression spline (CMARS) method. We obtain a relaxation by means of continuous optimization, especially, conic quadratic programming (CQP) that could be conducted by interior point methods. Finally, a numerical example demonstrates the efficiency of the spline-based approach.

Radiative and nonradiative decay rates in chromium-related centers in nanodiamonds

- Castelletto, Stefania, Boretti, Alberto

  • Authors: Castelletto, Stefania , Boretti, Alberto
  • Date: 2011
  • Type: Text , Journal article
  • Relation: Optics Letters Vol. 36, no. 21 (2011), p. 4224-4226
  • Full Text: false
  • Reviewed:
  • Description: We address for the first time the measurement of nonradiative decay rates in Cr-related centers in nanodiamonds. Compared to our previous quantum efficiency measurement of Cr centers created in bulk diamond, separate measurements of radiative and nonradiative decay rates in grown nanodiamonds prove more challenging due to size dependence effects. We demonstrate in this Letter that, using defocused dipole imaging and collection efficiency calculation via finite-difference time-domain (FDTD), a quantum efficiency up to 0.9 can be inferred to Cr-related centers showing a 2-level system photon statistics.

Prefix coding of integers with real-valued predictions using cosets

- Ali, Mortuza, Murshed, Manzur

  • Authors: Ali, Mortuza , Murshed, Manzur
  • Date: 2007
  • Type: Text , Journal article
  • Relation: IEEE Communications Letters, vol. 11, no. 10, IEEE Communications Society, p. 814-816
  • Full Text: false
  • Description: In predictive coding of integers real-valued residuals are mapped to integers before encoding, leaving room for improvement by reducing the loss due to rounding. In this paper, we propose a new prefix coding scheme where actual integer values, instead of the residuals, are encoded using cosets with real domain predictions as the side information. This novel coding scheme outperforms Golomb-based coding by reducing the rounding loss with similar computational and memory complexity.
Quick View

Some remarks on stability of generalized equations

- Henrion, René, Kruger, Alexander, Outrata, Jiri


  • Authors: Henrion, René , Kruger, Alexander , Outrata, Jiri
  • Date: 2012
  • Type: Text , Journal article
  • Relation: Journal of Optimization Theory and Applications Vol. 159, no. 3 (2012), p. 681-697
  • Relation: http://purl.org/au-research/grants/arc/DP110102011
  • Full Text:
  • Reviewed:
  • Description: The paper concerns the computation of the graphical derivative and the regular (Fréchet) coderivative of the solution map to a class of generalized equations, where the multivalued term amounts to the regular normal cone to a (possibly nonconvex) set given by C 2 inequalities. Instead of the linear independence qualification condition, standardly used in this context, one assumes a combination of the Mangasarian-Fromovitz and the constant rank qualification conditions. Based on the obtained generalized derivatives, new optimality conditions for a class of mathematical programs with equilibrium constraints are derived, and a workable characterization of the isolated calmness of the considered solution map is provided. © 2012 Springer Science+Business Media, LLC.

Some remarks on stability of generalized equations

  • Authors: Henrion, René , Kruger, Alexander , Outrata, Jiri
  • Date: 2012
  • Type: Text , Journal article
  • Relation: Journal of Optimization Theory and Applications Vol. 159, no. 3 (2012), p. 681-697
  • Relation: http://purl.org/au-research/grants/arc/DP110102011
  • Full Text:
  • Reviewed:
  • Description: The paper concerns the computation of the graphical derivative and the regular (Fréchet) coderivative of the solution map to a class of generalized equations, where the multivalued term amounts to the regular normal cone to a (possibly nonconvex) set given by C 2 inequalities. Instead of the linear independence qualification condition, standardly used in this context, one assumes a combination of the Mangasarian-Fromovitz and the constant rank qualification conditions. Based on the obtained generalized derivatives, new optimality conditions for a class of mathematical programs with equilibrium constraints are derived, and a workable characterization of the isolated calmness of the considered solution map is provided. © 2012 Springer Science+Business Media, LLC.

Abrasion modeling of multiple-point defect dynamics for machine condition monitoring

- Yaqub, Muhammad, Gondal, Iqbal, Kamruzzaman, Joarder, Loparo, Kenneth

  • Authors: Yaqub, Muhammad , Gondal, Iqbal , Kamruzzaman, Joarder , Loparo, Kenneth
  • Date: 2013
  • Type: Text , Journal article
  • Relation: IEEE Transactions on Reliability Vol. 62, no. 1 (2013), p. 171-182
  • Full Text: false
  • Reviewed:
  • Description: Multiple-point defects and abraded surfaces in rotary machinery induce complex vibration signatures, and have a tendency to mislead defect diagnosis models. A challenging problem in machine defect diagnosis is to model and study defect signature dynamics in the case of multiple-point defects and surface abrasion. In this study, a multiple-point defect model (MPDM) that characterizes the dynamics of n-point bearing defects is proposed. MPDM is further extended to model degradation in a rotating machine as a special case of multiple-point defects. Analytical and experimental results for multiple-point defects and abrasions show that the location of the fundamental defect frequency shifts depending upon the relative location of the defects and width of the abrasive region. This variation in the defect frequency results in a degradation of the defect detection accuracy of the defect diagnostic model. Based on envelope detection analysis, a modification in existing defect diagnostic models is recommended to nullify the impact of multiple-point defects, and general abrasion in machine components.

  • «
  • ‹
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • ›
  • »
  • English (United States)
  • English (United States)
  • Privacy
  • Copyright
  • Contact
  • Federation Library
  • Federation ResearchOnline policy
  • ABN 51 818 692 256 | CRICOS provider number 00103D | RTO code 4909 | TEQSA PRV12151 Australian University
  • About Vital

‹ › ×

    Clear Session

    Are you sure you would like to clear your session, including search history and login status?