scispace - formally typeset
Search or ask a question

Showing papers by "Rajasthan Technical University published in 2009"


Proceedings ArticleDOI
23 Jan 2009
TL;DR: An algorithm in which the application of Genetic algorithm has been shown in the order reduction of linear time invariant dynamic systems and it is shown that the algorithm has several advantages, e.g. the reduced order models retain the steady-state value and stability of the original system.
Abstract: In this paper, the authors present an algorithm in which the application of Genetic algorithm has been shown in the order reduction of linear time invariant dynamic systems. The reduction algorithm is based on minimization of the integral square error by Genetic algorithm pertaining to a unit impulse input. The algorithm is simple, rugged and computer oriented. It is shown that the algorithm has several advantages, e.g. the reduced order models retain the steady-state value and stability of the original system. Two numerical examples are also given to illustrate the superiority of the proposed algorithm over some existing methods. The comparisons between the proposed and the other well-known existing order reduction techniques have been shown by comparing the ISE and IRE of various reduced order models.

25 citations


Journal Article
TL;DR: In this article, a new transformation formula (1− x) 3F2  a, a + 1 2, d + 1 ; x 2 (1 −x)2 c + 3 2, d  = 4F3 ᄚ 2a, c, 2d + 12A + 12, 2d− 12A+ 12, 2D− 12
Abstract: The aim of this research note is to prove the following new transformation formula (1− x) 3F2  a, a + 1 2 , d + 1 ; x 2 (1−x)2 c + 3 2 , d  = 4F3  2a, c, 2d + 12A + 12 , 2d− 12A + 12 ; 2x 2c + 2, 2d + 1 2 A− 1 2 , 2d− 1 2 A− 1 2  valid for |x| < 1 2 and if |x| = 1 2 , then Re(c − 2a) > 0, where A = √ 16d2 − 16cd− 8d + 1. For d = c + 1 2 , we get quadratic transformations due to Kummer. The result is derived with the help of the generalized Gauss’s summation theorem available in the literature. AMS subject classifications: 33C05, 33D15

6 citations


Book ChapterDOI
01 Jan 2009
TL;DR: A novel ICT (inverse cosine based transformation) method to preserve the data before subjecting it to clustering or any kind of analysis to address the privacy issue in data mining by a novel privacy preserving data mining technique.
Abstract: Today, privacy preservation is one of the greater concerns in data mining. While the research to develop different techniques for data preservation is on, a concrete solution is awaited. We address the privacy issue in data mining by a novel privacy preserving data mining technique. We develop and introduce a novel ICT (inverse cosine based transformation) method to preserve the data before subjecting it to clustering or any kind of analysis. A novel ‘privacy preserved k-clustering algorithm’ (PrivClust) is developed by embedding our ICT method into existing K-means clustering algorithm. This algorithm is explicitly designed with conversion to a privacy-preserving version in mind. The challenge was how to meet privacy requirements and guarantee valid clustering results as well. Simulation was carried out using Matlab. Our analysis and simulation show that this algorithm efficiently preserves the intended information on the one hand and yields valid cluster results on the other.

3 citations


Journal ArticleDOI
TL;DR: In this article, the design of a damping controller for a static synchronous compensator using a fast output sampling feedback technique is presented, and a very simple controller in the form of a simple gain matrix is obtained, which is effective over a range of operating conditions.
Abstract: In this article, the design of a damping controller for a static synchronous compensator using a fast output sampling feedback technique is presented. The proposed technique needs only the information of locally available signals, and moreover, by this technique, a very simple controller in the form of a simple gain matrix is obtained, which is effective over a range of operating conditions. Because of these two reasons, the control system designed by the proposed technique is very easy to implement. The effectiveness of the proposed technique has been validated through detailed non-linear simulation studies on the 10-machine 39-bus New England system.

2 citations


Proceedings ArticleDOI
01 Dec 2009
TL;DR: In this article, three types of PWM pulses (synchronized pulses, independent pulses, and interleaved pulses), applied to switches, are employed to extract maximum power from a photo voltaic (PV) generator.
Abstract: Maximization of power, which depends on solar irradiation and temperature conditions, from a photo voltaic (PV) generator is of special interest as the efficiency of the PV module is very low. A maximum power tracker is used for extracting the maximum power from the generator. To be effective with cellular converter architecture, however, a scheme must be able to accommodate a varying number of cells and maintain operation under any climate conditions. Three types of PWM pulses (synchronized pulses, independent pulses, and interleaved pulses), applied to switches, to extract maximum power from PV generator are employed. Quantitative performance comparisons are being presented among synchronized pulses, independent pulses, and interleaved pulses of the converter cells. Simulation is done in MATLAB simulink environment.

1 citations


Proceedings ArticleDOI
01 Dec 2009
TL;DR: Some innovative ECG delineation techniques along with a few known techniques were used to provide the optimum strategy for marking of events and were applied on 125 records of CSE DS-3 database and on the data acquired from no known-cardiac Cobra bitten patients under strict ethical protocol and medical supervision.
Abstract: ECG signal provides a dynamic assessment of the cardiac activities. To analyze the ECG signal, some innovative ECG delineation techniques alongwith a few known techniques were used to provide the optimum strategy for marking of events. The techniques were applied on 125 records of CSE DS-3 database for calibration and subsequently, on the data acquired from no known-cardiac Cobra bitten patients under strict ethical protocol and medical supervision.

1 citations