Search results for "algebra"
showing 10 items of 4129 documents
Pipeline Monitoring Architecture Based on Observability and Controllability Analysis
2019
Recently many techniques with different applicability have been developed for damage detection in the pipeline. The pipeline system is designed as a distributed parameter system, where the state space of the distributed parameter system has infinite dimension. This paper is dedicated to the problem of observability as well as controllability analysis in the pipeline systems. Some theorems are presented in order to test the observability and controllability of the system. Computing the rank of the controllability and observability matrix is carried out using Matlab.
Adjusted bat algorithm for tuning of support vector machine parameters
2016
Support vector machines are powerful and often used technique of supervised learning applied to classification. Quality of the constructed classifier can be improved by appropriate selection of the learning parameters. These parameters are often tuned using grid search with relatively large step. This optimization process can be done computationally more efficiently and more precisely using stochastic search metaheuristics. In this paper we propose adjusted bat algorithm for support vector machines parameter optimization and show that compared to the grid search it leads to a better classifier. We tested our approach on standard set of benchmark data sets from UCI machine learning repositor…
A predictive learning approach to optimal load sharing in energy management systems
2019
Given the total power demand, $P_{d}$ , current practice of equal load sharing in the process industry is to distribute the load among power supply units and machines (e.g., diesel/aas/wind turbines) in proportion to the maximum power, i.e., $P_{i}=\frac{p_{\max}^{i}}{\sum_{j}P_{\max}^{j}}P_{d}$ , where $P_{\max}^{i}$ denotes the maximum power of the ithunit. However, the efficiency of power supply units, vary in time and are highly individual, even in the case of units from same brand and model. Thus, by considering and utilizing these individual differences, it is possible to share the load in a more fuel/cost/energy optimal manner. To capture this potential, the work presented in this pa…
Algebraic parameter estimation of a multi-sinusoidal waveform signal from noisy data
2013
International audience; In this paper, we apply an algebraic method to estimate the amplitudes, phases and frequencies of a biased and noisy sum of complex exponential sinusoidal signals. Let us stress that the obtained estimates are integrals of the noisy measured signal: these integrals act as time-varying filters. Compared to usual approaches, our algebraic method provides a more robust estimation of these parameters within a fraction of the signal's period. We provide some computer simulations to demonstrate the efficiency of our method.
Algebraic parameter estimation of a biased sinusoidal waveform signal from noisy data
2012
International audience; The amplitude, frequency and phase of a biased and noisy sum of two complex exponential sinusoidal signals are estimated via new algebraic techniques providing a robust estimation within a fraction of the signal period. The methods that are popular today do not seem able to achieve such performances. The efficiency of our approach is illustrated by several computer simulations.
Comparison of fully non-stationary artificial accelerogram generation methods in reproducing seismicity at a given site
2020
Abstract Seismic input modelling is a crucial step when Non-Linear Time-History Analyses (NLTHAs) are performed, the seismic response of structures being highly responsive to the input employed. When natural accelerograms able to represent local seismicity are not available, the use of generated accelerograms is an efficient solution for input modelling. The aim of the present paper is to compare four methods for generating fully non-stationary artificial accelerograms on the basis of a target spectrum, identified using seven recorded accelerograms registered in the neighbourhood of the construction site during a single event, assumed as target accelerograms. For each method, seven accelero…
A Novel Border Identification Algorithm Based on an “Anti-Bayesian” Paradigm
2013
Published version of a chapter in the book: Computer Analysis of Images and Patterns. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-642-40261-6_23 Border Identification (BI) algorithms, a subset of Prototype Reduction Schemes (PRS) aim to reduce the number of training vectors so that the reduced set (the border set) contains only those patterns which lie near the border of the classes, and have sufficient information to perform a meaningful classification. However, one can see that the true border patterns (“near” border) are not able to perform the task independently as they are not able to always distinguish the testing samples. Thus, researchers have worked on thi…
A Novel Intelligent Technique for Product Acceptance Process Optimization on the Basis of Misclassification Probability in the Case of Log-Location-S…
2019
In this paper, to determine the optimal parameters of the product acceptance process under parametric uncertainty of underlying models, a new intelligent technique for optimization of product acceptance process on the basis of misclassification probability is proposed. It allows one to take into account all possible situations that may occur when it is necessary to optimize the product acceptance process. The technique is based on the pivotal quantity averaging approach (PQAA) which allows one to eliminate the unknown parameters from the problem and to use available statistical information as completely as possible. It is conceptually simple and easy to use. One of the most important featur…
Secure and Privacy Preserving Pattern Matching in Distributed Cloud-based Data Storage
2019
Given two strings: pattern $p$ of length $m$ and text $t$ of length $n$ . The string matching problem is to find all (or some) occurrences of the pattern $p$ in the text $t$ . We introduce a new simple data structure, called index arrays, and design fast privacy-preserving matching algorithm for string matching. The motivation behind introducing index arrays is determined by the need for pattern matching on distributed cloud-based datasets with semi-trusted cloud providers. It is intended to use encrypted index arrays both to improve performance and protect confidentiality and privacy of user data.