Articles in This Issue
Abstract
Power transformer protective relay should block the tripping during magnetizing inrush and rapidly operate the tripping during internal faults. Recently, the frequency environment of power system has been made more complicated and the quantity of 2nd frequency component in inrush state has been decreased because of the improvement of core steel. And then, traditional approaches will likely be maloperated in the case of magnetizing inrush with low second harmonic component and internal faults with high second harmonic component. This paper proposes a new relaying algorithm to enhance the fault detection sensitivities of conventional techniques by using a fuzzy logic approach. The proposed fuzzy-based relaying algorithm consists of flux-differential current derivative curve, harmonic restraint, and percentage differential characteristic curve. The proposed relaying was tested with MATLAB simulation software and showed a fast and accurate trip operation.
Abstract
The aim of this paper is to design and evaluate hop calculations and system performance for line of sight (LOS) radio relay links utilizing a simplified proposed procedure. Such a procedure is simulated for the determination of both hop calculations and system performance. The practical procedure of this paper has been ordered in a manner to solve up to 95% of the hop design problems encountered in practice. Two examples with different specifications and different required outage time are examined to fulfill the Committee Consultative International Radio (CCIR) recommendations.
Abstract
Data hiding, a form of steganography, embeds data into digital media for the purpose of identification, annotation, security, and copyright. The goal of steganography is to avoid drawing suspicion to the transmission of a hidden message. Digital audio provides a suitable cover for high-throughput steganography. In this paper a high robustness system against the attackers in hiding of color images is presented. We used the multi-resolution discrete wavelet transform in hiding process. The JPEG format type for color images and WAV format for speech cover signal that used in test of system. Programs and graphics are executed by using MATLAB version 6.5 programs.
Abstract
In this paper the dynamic behavior of linear induction motor is described by a mathematical model taking into account the end effects and the core losses. The need for such a model rises due to the complexity of linear induction motors electromagnetic field theory. The end affects are modeled by introducing a speed dependent scale factor to the magnetizing inductance and series resistance in the d-axis equivalent circuit. Simulation results are presented to show the validity of the model during both no-load and sudden load change intervals. This model can also be used directly in simulation researches for linear induction motor vector control drive systems.
Abstract
This work implying the design of hiding system that hides a gray scale image into another gray scale image using two-dimensional wavelet packet transform. The proposed hiding scheme uses Wavelet Packet Transform (WPT) to embed data elements of the secret image in different frequency bands of the cover image. The data elements of the secrete image are placed within DWT subspaces after simple treatment in order to reduce its significance on the resulting image and to increase security. The resulting image (the cover image within which the secret image is hidden) is called stego_image. Stego_image is closely related to the cover image and does not show any details of the secret image. The proposed system achieves perfect reconstruction of the secret image. All programs in this work is written by MATLAB 7.
Abstract
The robot is a repeated task plant. The control of such a plant under parameter variations and load disturbances is one of the important problems. The aim of this work is to design Genetic-Fuzzy controller suitable for online applications to control single link rigid robot arm plant. The genetic-fuzzy online controller (forward controller) contains two parts, an identifier part and model reference controller part. The identification is based on forward identification technique. The proposed controller it tested in normal and load disturbance conditions.
Abstract
The use of image communication has increased in recent years. In this paper, new partial encryption schemes are used to encrypt only part of the compressed data. Only 6.25-25% of the original data is encrypted for four different images, resulting in a significant reduction in encryption and decryption time. In the compression step, an advanced clustering analysis technique (Fuzzy C-means (FCM)) is used. In the encryption step, the permutation cipher is used. The effect of number of different clusters is studied. The proposed partial encryption schemes are fast and secure, and do not reduce the compression performance of the underlying selected compression methods as shown in experimental results and conclusion.