ORIGINAL_ARTICLE
Optimal Design of Single-Phase Induction Motor Using MPSO and FEM
In this paper, a new approach is proposed for the optimum design of single-phase induction motor. By using the classical design equations and the evolutionary algorithms such as Genetic Algorithms (GA), Particle Swarm Optimization (PSO) and Modified Particle Swarm Optimization (MPSO), a Single Phase Induction Motor (SPIM) was designed with the maximum efficiency. The Finite Element Method (FEM) was used to achieve an accurate model of the motor. This model was used to validate the optimum design instead of implementing it practically that would be expensive. Results show that the efficiency of the motor designed by MPSO is higher compared to the ones designed by other methods. So this algorithm can be proposed as an appropriate tool in design of single-phase induction motors.
http://eej.aut.ac.ir/article_435_c686edf03e2a6cdb8395629bf565dccd.pdf
2014-04-01T11:23:20
2018-06-20T11:23:20
1
9
10.22060/eej.2014.435
Optimal Design
Single Phase Induction Motor
GA
PSO
MPSO
FEM
B.
Farhadi
true
1
MSc. Student, Department of Electrical Engineering, Faculty of Engineering, University of Guilan, Rasht, Iran
MSc. Student, Department of Electrical Engineering, Faculty of Engineering, University of Guilan, Rasht, Iran
MSc. Student, Department of Electrical Engineering, Faculty of Engineering, University of Guilan, Rasht, Iran
AUTHOR
S.H.
Shahalami
true
2
Assistant Professor, Department of Electrical Engineering, Faculty of Engineering, University of Guilan, Rasht, Iran
Assistant Professor, Department of Electrical Engineering, Faculty of Engineering, University of Guilan, Rasht, Iran
Assistant Professor, Department of Electrical Engineering, Faculty of Engineering, University of Guilan, Rasht, Iran
LEAD_AUTHOR
E.
Fallah Choolabi
true
3
Assistant Professor, Department of Electrical Engineering, Faculty of Engineering, University of Guilan, Rasht, Iran
Assistant Professor, Department of Electrical Engineering, Faculty of Engineering, University of Guilan, Rasht, Iran
Assistant Professor, Department of Electrical Engineering, Faculty of Engineering, University of Guilan, Rasht, Iran
AUTHOR
Mademlis, C., Ioskeridis, I., “Optimization of single phase induction motors part I: maximum energy efficiency control”, IEEE Transactions on Energy Conversion, vol. 20, no. 1, pp 187 - 195, March, 2005.
1
Huang, H., Fuchs, E.F., Zak, Z., “Optimization Of Single Phase induction motor design part I: formulation of the optimization technique”, IEEE Transactions on Energy Conversion, vol. 3, no. 2, pp 349 - 356, Jun, 1988.
2
Ramarathnam, R., Desai, B.G., Rao, V.S., “A comparative study of minimization techniques for optimization of induction motor design”, IEEE Transactions on Power Apparatus and Systems, vol. PAS-92 , no. 5, pp 1448 - 1454, 1973.
3
Bhuvaneswari, R., Subramanian, S., “Optimization of Single-phase Induction Motor Design using Radial Basis Function Network”, Conference Proceeding of INDICON2005, pp 35 - 40, Dec, 2005.
4
Eberhart, R.C., Kennedy, J., “A new optimizer using particle swarm optimization”, Proceedings of the Sixth International Symposium on Micro Machine and Human Science, pp 39-43, 1995.
5
Kennedy, J., Eberhart, R., “Particle Swarm Optimization”, Proceedings of the IEEE International Conference on Neural Networks, vol. 4, pp 1942 - 1948, 1995.
6
Shi, Y., Eberhart, R.C., “Empirical study of particle swarm Optimization”, Proceedings of the 1999 Congress on Evolutionary Computation, vol. 3, pp 1945-1950, Jul, 1999.
7
Eberhart, R.C. Shi, Y., “Comparing inertia weights and constriction factors in particle swarm optimization”, Proceedings of the 2000 Congress on Evolutionary Computation, vol. 1, pp 84-88, Jul, 2000.
8
Chaturvedi, K.T., Pandit, M., Srivastava, L. “Particle Swarm optimization with time varying acceleration coefficients for non-convex economic power dispatch”, International Journal of Electrical Power & Energy Systems, vol. 31, no. 6, pp 249-257, 2009.
9
Sakthivel, V.P., Bhuvaneswari, R., Subramanian, S., “An improved particle swarm optimization for induction motor parameter determination”, International Journal of Computer Applications, vol. 1, no. 2, pp 62 - 67, 2010.
10
Sakthivel, V.P., Subramanian, S., “Using MPSO algorithm to optimize three-phase squirrel cage”, Proceedings of the International Conference on Emerging Trends in Electrical and Computer Technology, pp 261-267, March, 2011.
11
Mittle, V.N., Mittal, A. ., “Design of Electrical Machines”, 4th edition, 1996.
12
Fuat Uler G., Mohammed O.A., Koh C.S., “Design optimization of electrical machines using genetic algorithms”, IEEE Trans. Magnetics , vol. 31 , no. 3 , pp 2008 - 2011 , 1995.
13
Wieczorek J.P, O. Gol, Z. Michalewiez, “An evolutionary algorithm for the optimal design of induction motors”, IEEE Trans. Magnetics , vol. 34 , no. 6 , pp 3882 - 3887, 1998.
14
Bellarmine G.T., Bhuvaneswari R., Subramanian S., “Radial basis function network based design optimization of induction motor” , Proceedings of IEEE SOUTHEASTCON2006, pp 75-80, 2006.
15
Bhuvaneswari R., Subramanian S., “Fuzzy logic approach to three phase induction motor design”, Proceedings of the International Conference on Computer Applications in Electrical Engineering Recent Advances - CERA-05 , pp 505-509, 2005.
16
Bhuvaneswari R. Subramanian S.,
17
“Optimization of Single-phase Induction Motor Design using Rsdial Basis Function Network”, IEEE Indicon 2005 Conference, 2005.
18
K.Y. Jang , K.S. Kim , K.B. Kim, J. Lee , “Design of Premium Efficiency Level Single Induction Motor by Parameter Analysis”, International Conference on Electrical Machines and Systems ICEMS, pp 1-4, 2009.
19
Srikomkham P., Ruangsinchaiwanich S., “Optimal Rotor Design of a PSC Motor Using Taguchi Method and FEM”, International Conference on Electrical Machines and Systems ICEMS, pp 1341-1346, 2010.
20
ORIGINAL_ARTICLE
Cogging Torque Reduction in PMSM Motor by Using Proposed New Auxiliary Winding
Performing fast and accurate methods for modeling the electrical machines has been the subject of several studies and many authors proposed different procedures to attain this aim. Beside the accuracy, the speed of the method is of great concern. On the other hand, the capability of the method to be changed according to the need is another important issue. Finite Element method provides relatively accurate results but it is time consuming and changing the parameters, once the model designed is difficult to be done. Magnetic Equivalent Circuit method is rather a new concept to model the electrical machines. The most important feature of the method is its flexible accuracy which can be determined due to the user's desire. Another important characteristic is the capability of the method in changing parameters. In this paper, a permanent magnet synchronous motor is modeled using Magnetic Equivalent Circuit; the values of the magnetic flux density and magnetic field intensity are calculated. Afterward, the generated output torque is calculated using Maxwell Stress Tensor. The comparison between the results of the MEC model and the Finite Element Analysis reveals the sufficient accuracy of the proposed method. Finally, a new method is proposed for cogging torque minimization which is based on the torque pulsation originated from an auxiliary winding. The result shows a significant reduction in the amplitude of the cogging torque.
http://eej.aut.ac.ir/article_436_9733a2589e1e67d1d13a02ea9a5c221d.pdf
2014-04-01T11:23:20
2018-06-20T11:23:20
11
17
10.22060/eej.2014.436
PMSM Motor
Cogging Torque
Auxiliary Winding
K.
Abbaszadeh
true
1
Associate Professor, Department of Electrical Engineering, K.N. Toosi University of Technology, Tehran, Iran
Associate Professor, Department of Electrical Engineering, K.N. Toosi University of Technology, Tehran, Iran
Associate Professor, Department of Electrical Engineering, K.N. Toosi University of Technology, Tehran, Iran
LEAD_AUTHOR
S.
Maroufian
true
2
MSc. Student, Department of Electrical Engineering, K.N. Toosi University of Technology, Tehran, Iran
MSc. Student, Department of Electrical Engineering, K.N. Toosi University of Technology, Tehran, Iran
MSc. Student, Department of Electrical Engineering, K.N. Toosi University of Technology, Tehran, Iran
AUTHOR
[1].Luke Dosiek, and Pragasen Pillay, “Cogging Torque Reduction in Permanent Magnet Machines", IEEE trans. Ind. Appl., Vol. 43, No. 6, pp. 1565-1571, Nov. / Dec. 2007.
1
[2].K. Abbaszadeh, F. Rezaee Alam, M. Teshnehlab, “Slot opening optimization of surface mounted permanent magnet motor for cogging torque reduction”, Energy Conversion and Management 55 (2012) 108–115.
2
[3].Claudio Bianchini, Fabio Immovilli, Emilio Lorenzani, Alberto Bellini, Matteo Davoli, “Review of Design Solutions for Internal Permanent Magnet Machines Cogging Torque Reduction”. Magnetics,
3
Auxiliary Winding IEEE Transactions on Vol.48 , Issue 10,pp 2685 – 2693, 2012.
4
[4].Karim Abbaszadeh, Seyede Sara maroufian, “PM Demagnetization Detection in Axial Flux Permanent Magnet Motor using ARX Model”, Electrical Engineering (ICEE), 2013 21st Iranian Conference
5
[5].Seyed Amin Saied, Karim Abbaszadeh, and Mehdi Fadaie, “Reduced Order Model of Developed Magnetic Equivalent Circuit in Electrical Machine Modeling”, IEEE Trans. Magn., Vol. 46, No. 7, pp. 2649-2655, july 2010.
6
[6].Ali Davoudi, Patrick L. Chapman, Juri Jatskevich, and Alireza Khaligh, “Reduced-Order Modeling of High-Fidelity Magnetic Equivalent Circuits”, IEEE Trans. power electronics, Vol. 24, No. 12, pp. 2847-2855, Dec. 2009.
7
[7].S. Saied, K. Abbaszadeh A. Tenconi, “Improvement to Winding Function Theory for PM Machine Analysis”, Proceedings of the 2011 International Conference on Power Engineering, Energy and Electrical Drives,pp,1-6 11-13 May 2011
8
[8].Hamza W. Derbas, Joshua M. Williams, Andreas C. Koenig, and Steven D. Pekarek, “A Comparison of Nodal- and Mesh-Based Magnetic Equivalent Circuit Models”, IEEE Trans. Energy Convers., Vol. 24, No. 2, pp. 388-396, June 2009.
9
[9].T. Raminosoa, J.A. Farooq, A. Djerdir, A. Miraoui, “Reluctance network modelling of surface permanent magnet motor considering iron nonlinearities”, Energy Convers. and Manage. 50 pp 1356–1361,2009.
10
[10].B. Sheikh-Ghalavand, S. Vaez-Zadeh, and A. Hassanpour Isfahani, “An Improved Magnetic Equivalent Circuit Model for Iron-Core Linear Permanent-Magnet Synchronous Motors”, IEEE Trans. Magn., Vol. 46, No. 1, pp. 112-120, Jan. 2010.
11
[11].Marco Amrhein, and Philip T. Krein, “Force Calculation in 3-D Magnetic Equivalent Circuit Networks With a Maxwell Stress Tensor”, IEEE Trans. Energy Convers. Vol. 24, No. 3, pp. 587-593, Sep. 2009.
12
[12].S. Saied, K. Abbaszadeh, A. Tenconi and S. Vaschetto, “New Approach to Cogging Torque Simulation Using Numerical Functions”, Industry Applications, IEEE Transactions on,Vol.50, Issue: 4,pp 2420 – 2426, 15 July 2014.
13
[13].V. Ostovic, “Dynamics of Saturated Electric Machines”. New York: Springer-Verlag, 1989.
14
[14].Karim Abbaszadeh, Seyede Sara Maroufian, “Axial flux permanent magnet motor modeling using magnetic equivalent circuit“, Electrical Engineering (ICEE), 2013 21st Iranian Conf.
15
[15].Jacek F. Gieras, Mitcell Wing, “Permanent Magnet Motor Technology, Design and Applications, Second Edition, Revised and Expanded”, CRC Press, 2005.
16
[16].Y. G. Guo, J. G. Zhu, and V. S. Ramsden, “calculation of cogging torque in claw pole permanent magnet motors” Fourth International Conference on Industrial and Information Systems, ICIIS 2009, 28 - 31 Dec. 2009.
17
[17].Daohan Wang, Xiuhe Wang, Dongwei Qiao, Ying Pei, and Sang-Yong Jung, “Reducing Cogging Torque in Surface-Mounted Permanent-Magnet Motors by Nonuniformly Distributed Teeth Method “, IEEE Trans. Magn. Vol. 47, No. 9, pp. 2231-2239, Sep. 2011
18
[18].Ramdane Lateb, Noureddine Takorabet, and Farid Meibody-Tabar, “Effect of Magnet Segmentation on the Cogging Torque in Surface-Mounted Permanent-Magnet Motors “, IEEE Trans. Magn., Vol. 42, No. 3, pp.442-445, March 2006.
19
[19].M. rahimi, N. talebi, k. abbaszadeh, S.M.T. bathaee, “Simple Harmonic Compensation Method for Torque Ripple Minimization in PMSM Drives”, Fourth International Conference on Industrial and Information Systems, ICIIS 2009, 28 - 31 Dec. 2.
20
ORIGINAL_ARTICLE
A New Guideline for the Allocation of Multipoles in the Multiple Multipole Method for Two Dimensional Scattering from Dielectrics
A new guideline for proper allocation of multipoles in the multiple multipole method (MMP) is proposed. In an ‘a posteriori’ approach, subspace fitting (SSF) is used to find the best location of multipole expansions for the two dimensional dielectric scattering problem. It is shown that the best location of multipole expansions (regarding their global approximating power) coincides with the medial axis of the object. The subspace analysis is performed for various scenarios including objects with different shapes and sizes relative to the wavelength, different permittivities and both TEz and TMz polarizations. Numerical examples for both TEz and TMz cases are also presented. The results are in a very good agreement with the finite element method (FEM) results. Two challenging test cases are presented. First, a large object compared to the wavelength and second, a small object with field singularities close to the boundary. Accuracy of the final MMP results shows the effectiveness of the new allocation rule.
http://eej.aut.ac.ir/article_437_4aef76f04bb7d22fc0dc180d0d5c9f79.pdf
2014-04-01T11:23:20
2018-06-20T11:23:20
19
26
10.22060/eej.2014.437
Multiple Multipole Method
Subspace Analysis
Electromagnetic Scattering
M.
Rabbani
true
1
PhD. Student, Electrical Engineering Department, Amirkabir University of Technology, Tehran, Iran
PhD. Student, Electrical Engineering Department, Amirkabir University of Technology, Tehran, Iran
PhD. Student, Electrical Engineering Department, Amirkabir University of Technology, Tehran, Iran
AUTHOR
A.
Tavakoli
true
2
Professor, Radio Communications Center of Excellence, Electrical Engineering Department, Amirkabir University of Technology, Tehran, Iran
Professor, Radio Communications Center of Excellence, Electrical Engineering Department, Amirkabir University of Technology, Tehran, Iran
Professor, Radio Communications Center of Excellence, Electrical Engineering Department, Amirkabir University of Technology, Tehran, Iran
LEAD_AUTHOR
K. Yasumoto, Electromagnetic theory and applications for photonic crystals, CRC press, 2005.
1
T. J. Cui and W. C. Chew, “Fast algorithm for electromagnetic scattering by buried 3-D dielectric objects of large size”, IEEE Trans. Geosci. Remote Sens., Vol. 37, No.5, pp. 2597- 2608, 1999.
2
M. Pastorino, Microwave imaging, Vol. 208, John Wiley & Sons, 2010.
3
C. Hafner, “Boundary methods for optical nano structures”, Phys. Status Solidi (b), Vol. 244, No.10, pp. 3435- 3447, 2007.
4
Y. Eremin and T. Wriedt, “New scheme of the Discrete Sources Method for light scattering analysis of a particle breaking interface”, Comput. Phys. Commu., Vol. 185, No.12, pp. 3141- 3150, 2014.
5
A. Alparslan and C. Hafner, “Analysis of photonic structures by the multiple multipole program with complex origin layered geometry Green's functions”, J. Comput. Theor. Nanos., Vol. 9, No.3, pp. 479- 485, 2012.
6
E. Moreno, D. Erni, C. Hafner and R. Vahldieck, “Multiple multipole method with automatic multipole setting applied to the simulation of surface plasmons in metallic nanostructures”, J. Opt. Soc. Am. A, Vol. 19, No.1, pp. 101- 111, 2002.
7
E. Eremina, Y. Eremin and T. Wriedt, “Computational nano-optic technology based on discrete sources method”, J. Mod. Opt., Vol. 58, No.5-6, pp. 384- 399, 2011.
8
T. Jalali and D. Erni, “Highly confined photonic nanojet from elliptical particles”, J. Mod. Opt., Vol. 61, No.13, pp. 1069- 1076, 2014.
9
T. Wriedt, Generalized Multipole Techniques for Electromagnetic and Light Scattering, Elsevier Science B.V., 1999.
10
C. Hafner, The Generalized Multipole Technique for Computational Electromagnetics, Artech House, Boston, 1990.
11
K. I. Beshir and J. E. Richie, “On the location and number of expansion centers for the generalized multipole technique”, IEEE Trans. Electromagn. Compat., Vol. 38, No.2, pp. 177- 180, 1996.
12
T. Sannomiya, J. Vörös and C. Hafner, “Symmetry decomposed multiple multipole program calculation of plasmonic particles on substrate for biosensing applications”, J. Comput. Theor. Nanos., Vol. 6, No.3, pp. 749- 756, 2009.
13
C. V. Hafner, “Beiträge zur Berechnung der Ausbreitung elektromagnetischer Wellen in zylindrischen Strukturen mit Hilfe des Point-Matching-Verfahrens”, 1980.
14
A. Bandyopadhyay, C. Tomassoni, M. Mongiardo and A. Omar, “Generalized multipole technique without redundant multipoles”, Int. J. Numer. Model.: El., Vol. 18, No.6, pp. 413- 427, 2005.
15
Y. Leviatan, “Analytic continuation considerations when using generalized formulations for scattering problems”, IEEE Trans. Antennas Prpag., Vol. 38,
16
No.8, pp. 1259- 1263, 1990.
17
J. E. Richie, “Application of spatial bandwidth concepts to MAS pole location for dielectric cylinders”, IEEE Trans. Antennas Prpag., Vol. 59, No.12, pp. 4861- 4864, 2011.
18
P. Leuchtmann, “The Multiple Multipole Program (MMP): Theory, Practical Use and Latest Features”, ACES. Short course notes, Vol. 121, 1995.
19
P. Regli, “Automatic Expansion Setting for the 3D-MMP Code”, in Conf. Proc. 8th Annu. Rev. Progress in Applied Computational Electromagnetics; at the Naval Postgraduate School, Monterey, CA, March 16-20, 1992, 1992.
20
P. Leuchtmann, “Automatic computation of optimum origins of the poles in the multiple multipole method (MMP-method)”, IEEE Trans. Magn., Vol. 19, No.6, pp. 2371- 2374, 1983.
21
C. Hafner, Post-modern electromagnetics, John Wiley & Sons, 1999.
22
J. Richie, “MAS Pole Location and Effective Spatial Bandwidth of the Scattered Field”, IEEE Trans. Antennas Prpag., Vol. 58, No.11, pp. 3610- 3615, 2010.
23
M. G. Imhof, “Computing the elastic scattering from inclusions using the multiple multipoles method in three dimensions”, Geophys. J. Int., Vol. 156, No.2, pp. 287- 296, 2004.
24
M. G. Imhof, “Multiple multipole expansions for elastic scattering”, J. Acoust. Soc. Am., Vol. 100, No.5, pp. 2969- 2979, 1996.
25
R. Millar, “The Rayleigh hypothesis and a related least-squares solution to scattering problems for periodic surfaces and other scatterers”, Radio Sci., Vol. 8, No.8, 9, pp. 785- 796, 1973.
26
H. Krim and M. Viberg, “Two decades of array signal processing research: the parametric approach”, IEEE Signal Process. Mag., Vol. 13, No.4, pp. 67- 94, 1996.
27
E. A. Marengo, F. K. Gruber and F. Simonetti, “Time-reversal MUSIC imaging of extended targets”, IEEE Trans. Image Process., Vol. 16, No.8, pp. 1967- 1984, 2007.
28
J. C. Mosher and R. M. Leahy, “Recursive MUSIC: a framework for EEG and MEG source localization”, IEEE Trans. Biomed. Eng., Vol. 45, No.11, pp. 1342- 1354, 1998.
29
A. Wirgin, “The inverse crime”, Arxiv preprint math-ph/0401050, 2004.
30
O. M. Bucci and G. Franceschetti, “On the spatial bandwidth of scattered fields”, IEEE Trans. Antennas Propag., Vol. 35, No.12, pp. 1445- 1455, 1987.
31
K. Siddiqi and S. Pizer, Medial representations: mathematics, algorithms and applications, Vol. 37, Springer Science & Business Media, 2008.
32
T. Jalali, “Calculation of a nonlinear eigenvalue problem based on the MMP method for analyzing photonic crystals”, J. Opt., Vol. 16, No.12, p. 125006, 2014. [33] U. Jakobus, H.-O. Ruoß and F. Landstorfer, “Analysis of electromagnetic scattering problems by an iterative combination of MoM with GMT using MPI for the communication”, Microw. Opt. Technol. Lett., Vol. 19, No.1, pp. 1- 4, 1998.
33
ORIGINAL_ARTICLE
Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and the privacy of a new RFID authentication protocol proposed by Shi et al. in 2014. We prove that although Shi et al. have tried to present a secure and untraceable authentication protocol, their protocol still suffers from several security and privacy weaknesses which make it vulnerable to various security and privacy attacks. We present our privacy analysis based on a well-known formal privacy model which is presented by Ouafi and Phan in 2008. Moreover, to stop such attacks on the protocol and increase the performance of Shi et al.’s scheme, we present some modifications and propound an improved version of the protocol. Finally, the security and the privacy of the proposed protocol were analyzed against various attacks.
http://eej.aut.ac.ir/article_438_692104c490b02f7f411555f1bb4735e6.pdf
2014-04-01T11:23:20
2018-06-20T11:23:20
27
36
10.22060/eej.2014.438
Internet of Things
RFID authentication protocols
Security and Privacy
Ouafi-Phan Privacy Model
EPC C1 G2 Standard
K.
Baghery
true
1
MSc Student, Department of Electrical Engineering, Shahed University, Tehran, Iran
MSc Student, Department of Electrical Engineering, Shahed University, Tehran, Iran
MSc Student, Department of Electrical Engineering, Shahed University, Tehran, Iran
AUTHOR
B.
Abdolmaleki
true
2
MSc Student, Department of Electrical Engineering, Shahed University, Tehran, Iran
MSc Student, Department of Electrical Engineering, Shahed University, Tehran, Iran
MSc Student, Department of Electrical Engineering, Shahed University, Tehran, Iran
AUTHOR
M. J.
Emadi
true
3
Assistant Professor, Department of Electrical Engineering, Amirkabir University of Technology, Tehran, Iran
Assistant Professor, Department of Electrical Engineering, Amirkabir University of Technology, Tehran, Iran
Assistant Professor, Department of Electrical Engineering, Amirkabir University of Technology, Tehran, Iran
LEAD_AUTHOR
J. Banks, M. Pachano. L. Thompson, and D. Hanny, RFID applied, John Wiley & Sons, Inc., 2007.
1
D. He, and Sh. Zeadally, “An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography,” IEEE Internet of Things Journal, vol. 2, no. 1, pp. 72 - 83 , 2015.
2
M.H. Ok, and G. Uiwang, “A location tracking by RFID to assist the transportation vulnerable in
3
subway stations,” in 11th WSEAS International Conference on Mathematical methods and computational techniques in electrical engineering, 2009.
4
L. Ruiz-Garcia, and L. Lunadei, “The role of RFID in agriculture: Applications, limitations and challenges,” Computers and Electronics in Agriculture, vol. 79, no. 1, pp. 42-50, 2011.
5
M. L. Ng, K. S. Leong, D. M. Hall, and P. H. Cole, “A small passive UHF RFID tag for livestock identification,” in IEEE International Symposium on Microwave, Antenna, Propagation and EMC Technologies for Wireless Communications, 2005.
6
P. Picazo-Sanchez, N. Bagheri, P. Peris-Lopez, and J. E. Tapiador, “Two RFID Standard-based Security protocols for healthcare environments,” Journal of Medical Systems, vol. 37, no. 5, pp. 1-12, 2013.
7
S. Maharjan, “RFID and IOT: An overview,” Simula Research Laboratory University of Oslo, 2010.
8
H. Gross, E. Wenger, H. Martín, and M. Hutter, “PIONEER: a Prototype for the Internet of Things Based on an Extendable EPC Gen2 RFID Tag,” in Radio Frequency Identification: Security and Privacy Issues, pp. 54-73, 2014.
9
L. Yang, P. Yu, W. Bailing, Q. Yun, B. Xuefeng, and Y. Xinling, “Hash-based RFID mutual authentication protocol,” International Journal of Security & Its Applications, vol. 7, no. 3, 2013.
10
D. Henrici, “RFID Security and privacy: concepts, protocols and architectures,” Lecture Notes Electrical Engineering, Springer-Verlag Berlin Heidelberg, vol. 17, 2008.
11
EPCglobal Inc., Available: http://www.epcglobalinc.org.
12
H. Gross, E. Wenger, H. Martín, and M. Hutter, "PIONEER: a Prototype for the Internet of Things Based on an Extendable EPC Gen2 RFID Tag," in Radio Frequency Identification: Security and Privacy Issues, pp. 54-73, 2014.
13
H. Hada, and J. Mitsugi, “EPC based internet of things architecture,” in IEEE International Conference on RFID-Technologies and Applications (RFID-TA), 2011.
14
B. Hameed, I. Khan, F. Durr, and K. Rothermel, “An RFID based consistency management framework for production monitoring in a smart real-time factory,” in 2rd International Conference on the Internet of Things (IOT), Tokyo, 2010.
15
T. C. Yeh, Y. J. Wanga, T. Ch. Kuo, and S. S. Wanga, “Securing RFID systems conforming to EPC Class 1 Generation 2 standard,” Expert Systems with Applications, vol. 37, p. 7678–7683, 2010.
16
M.H. Habibi, M. R. Alaghband, and M. R. Aref, “Attacks on a lightweight mutual authentication protocol under EPC C-1 G-2 standard,” in Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, Springer, 2011, pp. 254-263.
17
E.-J. Yoon, “Improvement of the securing rfid systems conforming to EPC Class 1 Generation 2 standard,” Expert Syst. Appl., vol. 39, no. 11, p. 1589–1594, 2012.
18
S. M. Alavi, K. Baghery, B. Abdolmaleki, and M. R. Aref, “Traceability analysis of recent RFID authentication protocols,” Wireless Personal Communications Journal, DOI 10.1007/s11277-015-2469-0, March 2015.
19
A. Mohammadali, Z. Ahmadian, and M. R. Aref, “Analysis and Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standard,” IACR Cryptology ePrint Archive, vol. 66, pp. 1-9, 2013.
20
F. Xiao, Y. Zhou, J. Zhou, H. Zhu, and X. Niu, “Security protocol for RFID system conforming to EPC-C1G2 standard,” Journal of Computers, vol. 8, no. 3, pp. 605-612, 2013.
21
Z. Shi, Y. Xia, Y. Zhang, Y. Wang, and J. Dai, “A CRC-based lightweight authentication protocol for EPCglobal Class-1 Gen-2 tags,” in 14th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP), 2014.
22
I. Coisel, and T. Martin , “Untangling RFID privacy models,” Journal of Computer Networks and Communications, pp. 1-26, 2013, DOI:10.1155/2013/710275.
23
S. M. Alavi, B. Abdolmaleki, and K. Baghery, “Vulnerabilities and improvements on HRAP+, a hash-based RFID authentication protocol,” Advances in Computer Science: an International Journal, vol. 3, no. 6, pp. 51-56, 2014.
24
Z. Sohrabi-Bonab, M. R. Alagheband, and M. R. Aref, “Formal cryptanalysis of a CRC-based RFID authentication protocol,” in The 22nd Iranian Conference on Electrical Engineering (ICEE 2014), Tehran, 2014.
25
G. Avoine, “Adversarial model for radio frequency identification,” Cryptology ePrint Archive, report 2005/049. http://eprint.iacr.org/2005/049, 2005.
26
C. H. Lim, and T. Kwon, “Strong and robust RFID authentication enabling perfect ownership transfer,”
27
In Proceedings of ICICS ’06, LNCS 4307 , pp. 1-20, 2006.
28
A. Juels, and S.A Weis, “Defining strong privacy for RFID,” in Proceedings of PerCom ′07, pp. 342–347. , 2006.
29
K. Ouafi and R. C.-W. Phan, “Privacy of recent RFID authentication protocols,” in 4th International Conference on Information Security Practice and Experience, Springer, 2008.
30
R. H. Deng, Y. Li, M. Yung, and Y. Zhao, “A new framework work for RFID privacy,” in 15th European Symposium on Research in Computer Security (ESORICS), Athens, 2010.
31
D. Moriyama, S. Matsuo, and M. Ohkubo, “Relation among the security models for RFID authentication,” in In 17th European symposium on research in computer security, pp. 661–678, 2012.
32
S. Vaudenay, “On privacy models for RFID,” in ASIACRYPT 2007, LNCS 4833, pp. 68–87., 2007.
33
H. Y. Chien, and C. H. Chen, “Mutual authentication protocol for RFID confirming to EPC Class 1 Generation 2 standards,” Computer Standards & Interfaces, vol. 29, no. 2, pp.254-259, 2007.
34
L. Pang, H. Li, L. He, A. Alramadhan, and Y. Wang, “Secure and efficient lightweight RFID authentication protocol based on fast tag indexing,” International Journal of Communication Systems, vol. 27, no. 11, pp. 3244-3254, 2014.
35
M. Safkhani and N. Bagheri, “For an EPC-C1G2 RFID compliant Protocol, CRC with Concatenation: No; PRNG with Concatenation: Yes,” Cryptology ePrint Archive, Report 2013/490, 2013
36
Yeh T C, Wanga Y J, Kuo T C, Wanga S S, “Securing RFID systems conforming to EPC Class 1 Generation 2 standard,” Expert Systems with Applications, 37 :7678–7683, 2010.
37
Wang S, Liu S, Chen D, “Security analysis and improvement on two RFID authentication protocols,” Wireless Personal Communications DOI 10.1007/s11277-014-2189-x, 2014.
38
ORIGINAL_ARTICLE
IIR System Identification Using Improved Harmony Search Algorithm with Chaos
Due to the fact that the error surface of adaptive infinite impulse response (IIR) systems is generally nonlinear and multimodal, the conventional derivative based techniques fail when used in adaptive identification of such systems. In this case, global optimization techniques are required in order to avoid the local minima. Harmony search (HS), a musical inspired metaheuristic, is a recently introduced population based algorithm that has been successfully applied to global optimization problems. In the present paper, the system identification problem of IIR models is formulated as a nonlinear optimization problem and then an improved version of harmony search incorporating chaotic search (CIHS), is introduced to solve the identification problem of four benchmark IIR systems. Furthermore, the performance of the proposed methodology is compared with HS and two well-known meta-heuristic algorithms, genetic algorithm (GA) and particle swarm optimization (PSO) and a modified version of PSO called PSOW. The results demonstrate that the proposed method has the superior performance over the other above mentioned algorithms in terms of convergence speed and accuracy.
http://eej.aut.ac.ir/article_439_b095d5d54a93417adc2cba777b6b55ff.pdf
2014-04-01T11:23:20
2018-06-20T11:23:20
37
47
10.22060/eej.2014.439
System identification
IIR structure
Adaptive Filtering
Chaos
Harmony search.
M.
Shafaati
true
1
MSc. Student, Electrical Engineering Department, Faculty of Engineering, University of Guilan, Rasht, Iran
MSc. Student, Electrical Engineering Department, Faculty of Engineering, University of Guilan, Rasht, Iran
MSc. Student, Electrical Engineering Department, Faculty of Engineering, University of Guilan, Rasht, Iran
AUTHOR
H.
Mojallali
true
2
Assistant Professor, Electrical Engineering Department, Faculty of Engineering, University of Guilan, Rasht, Iran
Assistant Professor, Electrical Engineering Department, Faculty of Engineering, University of Guilan, Rasht, Iran
Assistant Professor, Electrical Engineering Department, Faculty of Engineering, University of Guilan, Rasht, Iran
LEAD_AUTHOR
J. Banks, M. Pachano. L. Thompson, and D. Hanny, RFID applied, John Wiley & Sons, Inc., 2007.
1
D. He, and Sh. Zeadally, “An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography,” IEEE Internet of Things Journal, vol. 2, no. 1, pp. 72 - 83 , 2015.
2
M.H. Ok, and G. Uiwang, “A location tracking by RFID to assist the transportation vulnerable in
3
subway stations,” in 11th WSEAS International Conference on Mathematical methods and computational techniques in electrical engineering, 2009.
4
L. Ruiz-Garcia, and L. Lunadei, “The role of RFID in agriculture: Applications, limitations and challenges,” Computers and Electronics in Agriculture, vol. 79, no. 1, pp. 42-50, 2011.
5
M. L. Ng, K. S. Leong, D. M. Hall, and P. H. Cole, “A small passive UHF RFID tag for livestock identification,” in IEEE International Symposium on Microwave, Antenna, Propagation and EMC Technologies for Wireless Communications, 2005.
6
P. Picazo-Sanchez, N. Bagheri, P. Peris-Lopez, and J. E. Tapiador, “Two RFID Standard-based Security protocols for healthcare environments,” Journal of Medical Systems, vol. 37, no. 5, pp. 1-12, 2013.
7
S. Maharjan, “RFID and IOT: An overview,” Simula Research Laboratory University of Oslo, 2010.
8
H. Gross, E. Wenger, H. Martín, and M. Hutter, “PIONEER: a Prototype for the Internet of Things Based on an Extendable EPC Gen2 RFID Tag,” in Radio Frequency Identification: Security and Privacy Issues, pp. 54-73, 2014.
9
L. Yang, P. Yu, W. Bailing, Q. Yun, B. Xuefeng, and Y. Xinling, “Hash-based RFID mutual authentication protocol,” International Journal of Security & Its Applications, vol. 7, no. 3, 2013.
10
D. Henrici, “RFID Security and privacy: concepts, protocols and architectures,” Lecture Notes Electrical Engineering, Springer-Verlag Berlin Heidelberg, vol. 17, 2008.
11
EPCglobal Inc., Available: http://www.epcglobalinc.org.
12
H. Gross, E. Wenger, H. Martín, and M. Hutter, "PIONEER: a Prototype for the Internet of Things Based on an Extendable EPC Gen2 RFID Tag," in Radio Frequency Identification: Security and Privacy Issues, pp. 54-73, 2014.
13
H. Hada, and J. Mitsugi, “EPC based internet of things architecture,” in IEEE International Conference on RFID-Technologies and Applications (RFID-TA), 2011.
14
B. Hameed, I. Khan, F. Durr, and K. Rothermel, “An RFID based consistency management framework for production monitoring in a smart real-time factory,” in 2rd International Conference on the Internet of Things (IOT), Tokyo, 2010.
15
T. C. Yeh, Y. J. Wanga, T. Ch. Kuo, and S. S. Wanga, “Securing RFID systems conforming to EPC Class 1 Generation 2 standard,” Expert Systems with Applications, vol. 37, p. 7678–7683, 2010.
16
M.H. Habibi, M. R. Alaghband, and M. R. Aref, “Attacks on a lightweight mutual authentication protocol under EPC C-1 G-2 standard,” in Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, Springer, 2011, pp. 254-263.
17
E.-J. Yoon, “Improvement of the securing rfid systems conforming to EPC Class 1 Generation 2 standard,” Expert Syst. Appl., vol. 39, no. 11, p. 1589–1594, 2012.
18
S. M. Alavi, K. Baghery, B. Abdolmaleki, and M. R. Aref, “Traceability analysis of recent RFID authentication protocols,” Wireless Personal Communications Journal, DOI 10.1007/s11277-015-2469-0, March 2015.
19
A. Mohammadali, Z. Ahmadian, and M. R. Aref, “Analysis and Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standard,” IACR Cryptology ePrint Archive, vol. 66, pp. 1-9, 2013.
20
F. Xiao, Y. Zhou, J. Zhou, H. Zhu, and X. Niu, “Security protocol for RFID system conforming to EPC-C1G2 standard,” Journal of Computers, vol. 8, no. 3, pp. 605-612, 2013.
21
Z. Shi, Y. Xia, Y. Zhang, Y. Wang, and J. Dai, “A CRC-based lightweight authentication protocol for EPCglobal Class-1 Gen-2 tags,” in 14th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP), 2014.
22
I. Coisel, and T. Martin , “Untangling RFID privacy models,” Journal of Computer Networks and Communications, pp. 1-26, 2013, DOI:10.1155/2013/710275.
23
S. M. Alavi, B. Abdolmaleki, and K. Baghery, “Vulnerabilities and improvements on HRAP+, a hash-based RFID authentication protocol,” Advances in Computer Science: an International Journal, vol. 3, no. 6, pp. 51-56, 2014.
24
Z. Sohrabi-Bonab, M. R. Alagheband, and M. R. Aref, “Formal cryptanalysis of a CRC-based RFID authentication protocol,” in The 22nd Iranian Conference on Electrical Engineering (ICEE 2014), Tehran, 2014.
25
G. Avoine, “Adversarial model for radio frequency identification,” Cryptology ePrint Archive, report 2005/049. http://eprint.iacr.org/2005/049, 2005.
26
C. H. Lim, and T. Kwon, “Strong and robust RFID authentication enabling perfect ownership transfer,”
27
In Proceedings of ICICS ’06, LNCS 4307 , pp. 1-20, 2006.
28
A. Juels, and S.A Weis, “Defining strong privacy for RFID,” in Proceedings of PerCom ′07, pp. 342–347. , 2006.
29
K. Ouafi and R. C.-W. Phan, “Privacy of recent RFID authentication protocols,” in 4th International Conference on Information Security Practice and Experience, Springer, 2008.
30
R. H. Deng, Y. Li, M. Yung, and Y. Zhao, “A new framework work for RFID privacy,” in 15th European Symposium on Research in Computer Security (ESORICS), Athens, 2010.
31
D. Moriyama, S. Matsuo, and M. Ohkubo, “Relation among the security models for RFID authentication,” in In 17th European symposium on research in computer security, pp. 661–678, 2012.
32
S. Vaudenay, “On privacy models for RFID,” in ASIACRYPT 2007, LNCS 4833, pp. 68–87., 2007.
33
H. Y. Chien, and C. H. Chen, “Mutual authentication protocol for RFID confirming to EPC Class 1 Generation 2 standards,” Computer Standards & Interfaces, vol. 29, no. 2, pp.254-259, 2007.
34
L. Pang, H. Li, L. He, A. Alramadhan, and Y. Wang, “Secure and efficient lightweight RFID authentication protocol based on fast tag indexing,” International Journal of Communication Systems, vol. 27, no. 11, pp. 3244-3254, 2014.
35
M. Safkhani and N. Bagheri, “For an EPC-C1G2 RFID compliant Protocol, CRC with Concatenation: No; PRNG with Concatenation: Yes,” Cryptology ePrint Archive, Report 2013/490, 2013
36
Yeh T C, Wanga Y J, Kuo T C, Wanga S S, “Securing RFID systems conforming to EPC Class 1 Generation 2 standard,” Expert Systems with Applications, 37 :7678–7683, 2010.
37
Wang S, Liu S, Chen D, “Security analysis and improvement on two RFID authentication protocols,” Wireless Personal Communications DOI 10.1007/s11277-014-2189-x, 2014.
38
ORIGINAL_ARTICLE
Design and Efficient Analysis of Large Reflectarray Antenna
In recent years reflectarray antennas have received considerable attention due to their unique capabilities. However, due to their large size, analyzing the performance of these antennas using traditional full wave finite-difference and finite-element techniques requires considerable computational resources. In this paper, we present an efficient method to accurately analyze these class of antennas which considerably reduces the computational burden. First, the radiation properties of the unit cells of the antennas are obtained by applying periodic boundary conditions, which corresponds to an infinite array. Then, a phase-only algorithm is used to obtain required phase shift on the antenna surface. Next, different unit cells are used to achieve the required phase on the antenna surface. Lastly, to confirm the validity of our approach, each designed antenna is simulated by full wave method using method of moment and the full wave simulation results of co and cross polarization levels are compared with those obtained using the proposed formula. There is excellent agreement between the co- and cross polarization levels obtained by proposed approach and those obtained using full wave simulation.
http://eej.aut.ac.ir/article_440_6c4dbcfbf0de5cb6dc7c2d42f5cbbb61.pdf
2014-04-01T11:23:20
2018-06-20T11:23:20
49
58
10.22060/eej.2014.440
Full Wave Simulation
High Gain Antenna
Reflectarray Antenna
Unit Cell Diversity
I.
Aryanian
true
1
PhD. Student, Department of Electrical Engineering, Amirkabir University of Technology, Tehran, Iran
PhD. Student, Department of Electrical Engineering, Amirkabir University of Technology, Tehran, Iran
PhD. Student, Department of Electrical Engineering, Amirkabir University of Technology, Tehran, Iran
AUTHOR
A.
Abdipour
true
2
Professor, Department of Electrical Engineering, Amirkabir University of Technology, Tehran, Iran
Professor, Department of Electrical Engineering, Amirkabir University of Technology, Tehran, Iran
Professor, Department of Electrical Engineering, Amirkabir University of Technology, Tehran, Iran
LEAD_AUTHOR
Gh.
Moradi
true
3
Assistant Professor, Department of Electrical Engineering, Amirkabir University of Technology, Tehran, Iran
Assistant Professor, Department of Electrical Engineering, Amirkabir University of Technology, Tehran, Iran
Assistant Professor, Department of Electrical Engineering, Amirkabir University of Technology, Tehran, Iran
AUTHOR
Pozar, D. M., and Metzler, T. A., “Analysis of a reflectarray antenna using microstrip patches of variable size”, Electron Lett 29, pp 657–658, 1993.
1
Hamzavi-Zarghani, ; Z. Atlasbaf, “A new broadband single-layer dual-band reflectarray antenna in X- and Ku-Bands", Antennas and Wireless Propagation Letters, IEEE Trans. Antennas Propagation, pp 602 – 605, 2015.
2
Munson, R. E., Haddad, H. A., and Hanlen, J. W., “Microstrip reflectarray for satellite communications and RCS enhancement or reduction”, U.S. patent 4 684 952, 1987.
3
Bialkowski, M. E., and Song, H. J., “Dual linearly polarized reflectarray using aperture coupled microstrip patches”, IEEE Int. Symp. Antennas Propagat, pp 486–489, 2001.
4
B. D. Nguyen, K. T. Pham, V.-S. Tran, L. Mai, N. Yonemoto, A. Kohmura, et al., "Electronically tunable reflectarray element based on C-patch coupled to delay line," Electronics Letters, , pp 1114-1116, 2014.
5
Hasan Abadi, S.M.A.M. ; Ghaemi, K. ; Behdad, N. , “Ultra-wideband, true time delay reflectarray antennas using ground-plane-backed, miniaturized-element frequency selective surfaces”, IEEE Trans. Antennas Propagation pp 534 – 542 , 2015.
6
T. Makdissy, R. Gillard, E. Fourn, E. Girard, and H. Legay, "Phase-Shifting Cell for Dual Linearly Polarized Reflectarrays with Reconfigurable Potentialities," 2013.
7
F. Venneri, S. Costanzo, and G. Di Massa, "Design and validation of a reconfigurable single varactor-tuned reflectarray," Antennas and Propagation, IEEE Transactions on, pp 635-645, 2013.
8
O. Bayraktar, O. A. Civi, and T. Akin, "Beam switching reflectarray monolithically integrated with RF MEMS switches," Antennas and Propagation, IEEE Transactions on, pp 854-862, 2012.
9
M. Riel and J. Laurin, "Design of an electronically beam scanning reflectarray using aperture-coupled elements," Antennas and Propagation, IEEE Transactions on, pp 1260-1266, 2007.
10
F. Venneri, S. Costanzo, and G. Di Massa, "Reconfigurable aperture-coupled reflectarray element tuned by single varactor diode," Electronics Letters, 68-69, 2012.
11
B. D. Nguyen, K. T. Pham, V.-S. Tran, L. Mai, N. Yonemoto, A. Kohmura, et al., "Electronically tunable reflectarray element based on C-patch coupled to delay line," Electronics Letters, pp 1114-1116, 2014.
12
S. Montori, F. Cacciamani, R. Vincenti Gatti, R. Sorrentino, G. Arista, C. Tienda Herrero, et al., "A Transportable Reflectarray Antenna for Satellite Ku-band Emergency Communications."
13
E. Carrasco, M. Barba, and J. A. Encinar, "X-band reflectarray antenna with switching-beam using pin diodes and gathered elements," Antennas and Propagation, IEEE Transactions on, pp 5700-5708, 2012.
14
A. E. Martynyuk, J. Martinez Lopez, and N. A. Martynyuk, "Spiraphase-type reflectarrays based on loaded ring slot resonators," Antennas and Propagation, IEEE Transactions on, pp 142-153, 2004.
15
H. Kamoda, T. Iwasaki, J. Tsumochi, T. Kuki, and O. Hashimoto, "60-GHz electronically reconfigurable large reflectarray using single-bit phase shifters," Antennas and Propagation, IEEE Transactions on, pp 2524-2531, 2011.
16
E. Carrasco, J. A. Encinar, and M. Barba, "Dual linear polarized reflectarray element with true-time delay," in Antennas and Propagation, 2009. EuCAP 2009. 3rd European Conference on, 2009, pp. 3733-3737.
17
R. Pereira, R. Gillard, R. Sauleau, P. Potier, T. Dousset, and X. Delestre, "Four-state dual polarisation unit-cells for reflectarray applications," Electronics letters, pp 742-743, 2010.
18
G. Perez-Palomino, R. Florencio, J. A. Encinar, M. Barba, R. Dickie, R. Cahill, et al., "Accurate and Efficient Modeling to Calculate the Voltage Dependence of Liquid Crystal Based Reflectarray Cells", IEEE Trans. Antennas Propagation, pp 2659 – 2668, 2014.
19
Bialkowski, M. E., and Sayidmarie, K. H.,” Investigations into phase characteristics of a single-layer reflectarray employing patch or ring elements of variable size”, IEEE Trans. Antennas Propagation 56, 2008.
20
Chaharmir, M. R., and, J. Shaker, “Broadband reflectarray with combination of cross and rectangle loop elements”, Electron Let 44, 658–659, 2008.
21
Huang, J., and Encinar, J. A., Reflectarray Antennas, IEEE Press. New York, John Wiley & Sons, 2008.
22
Chaharmir, M. R., Shaker J., and Legay, H., “Broadband design of a single layer large reflectarray using multi cross loop elements”, IEEE Trans. Antennas Propagation 57, pp 3363-3366. 2009.
23
Encinar, J. A., and Zornoza, J. A., “Broadband design of three-layer printed reflectarrays”, IEEE Trans. Antennas Propagation 51, pp 1662–1664, 2003.
24
Hasani, H., Kamyab, M., Mirkamali, A., “Low cross polarization reflectarray antenna”, IEEE Trans. Antennas Propagation 59, pp 1752 – 1756. 2011.
25
Malfajani, R. S., Atlasbaf, Z., “Design and implementation of a broadband single layer reflectarray antenna with large range linear phase elements”, IEEE Antennas and Wireless Propagation Letters 11, pp 1442–1445, 2012.
26
Rahmat-Samii, Y., “Useful coordinate transformations for antenna applications”, IEEE Trans. Antennas Propagation, pp 571 – 574. 1979.
27
Balanis, C. A., “Advanced engineering electromagnetic”, IEEE Press, John Wiley & Sons New York, 2012.
28
ORIGINAL_ARTICLE
Indoor Positioning and Pre-processing of RSS Measurements
Rapid expansions of new location-based services signify the need for finding accurate localization techniques for indoor environments. Among different techniques, RSS-based schemes and in particular oneof its variants which is based on Graph-based Semi-Supervised Learning (G-SSL) are widely-used approaches The superiority of this scheme is that it has low setup/training cost and at the same time it leads to low localization error. Analyzing the G-SSL method we can observe that its performance is highly dependent on its inputs (RSS measurements). The main objective of this work is to further improve the accuracy of G -SSL based schemes by performing multiple RSS measurements and then passing them through pre-processing blocks to improve the reliability of the corresponding RSS vector at each Sample Points (SPs). Experimental results are then followed to show the performance of the proposed method compared to what we get with the original G-SSL approach.
http://eej.aut.ac.ir/article_441_d04b08942bfa3c43c3df1ccf086deaf5.pdf
2014-04-01T11:23:20
2018-06-20T11:23:20
59
66
10.22060/eej.2014.441
Recovered Hidden Markov Model
Electric Arc Furnace
Voltage Flicker
Power Quality parameters
V.
Pourahmadi
true
1
Assistant Professor, Electrical Engineering Department, Amirkabir University of Technology, Tehran, Iran
Assistant Professor, Electrical Engineering Department, Amirkabir University of Technology, Tehran, Iran
Assistant Professor, Electrical Engineering Department, Amirkabir University of Technology, Tehran, Iran
LEAD_AUTHOR
S.
Valaee
true
2
Professor, ECE department, University of Toronto, Toronto, Canada
Professor, ECE department, University of Toronto, Toronto, Canada
Professor, ECE department, University of Toronto, Toronto, Canada
AUTHOR