Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

University of Wollongong

Faculty of Informatics - Papers (Archive)

Series

2008

System

Articles 1 - 5 of 5

Full-Text Articles in Physical Sciences and Mathematics

Vulnerability Assessment Of Power System Using Radial Basis Function Neural Network And A New Feature Extraction Method, Ahmed M. Haidar, Azah Mohamed, Aini Hussain Jan 2008

Vulnerability Assessment Of Power System Using Radial Basis Function Neural Network And A New Feature Extraction Method, Ahmed M. Haidar, Azah Mohamed, Aini Hussain

Faculty of Informatics - Papers (Archive)

Vulnerability assessment in power systems is important so as to determine how vulnerable a power system in case of any unforeseen catastrophic events. This paper presents the application of Radial Basis Function Neural Network (RBFNN) for vulnerability assessment of power system incorporating a new proposed feature extraction method named as the Neural Network Weight Extraction (NNWE) for dimensionality reduction of input data. The performance of the RBFNN is compared with the Multi Layer Perceptron Neural Network (MLPNN) so as to evaluate the effectiveness of the RBFNN in assessing the vulnerability of a power system based on the indices, power system …


A Diagrammatic Reasoning System For The Description Logic Alc, Peter W. Eklund, Frithjof Dau Jan 2008

A Diagrammatic Reasoning System For The Description Logic Alc, Peter W. Eklund, Frithjof Dau

Faculty of Informatics - Papers (Archive)

Diagrammatic reasoning is a tradition of visual logic that allows sentences that are equivalent to first order logic to be written in a visual or structural form: usually for improved usability. A calculus for the diagram can then be defined that allows well-formed formulas to be derived. This calculus is intended in the analog of logical inference. Description logics (DLs) have become a popular knowledge representation and processing language. DLs correspond to decidable fragments of first order logic; their notation is in the style of symbolic, variable-free formulas. Moreover, DLs are equipped with table au theorem provers that are proven …


A Real-Time Facial Expression Recognition System For Online Games, Ce Zhan, Wanqing Li, Philip Ogunbona, Farzad Safaei Jan 2008

A Real-Time Facial Expression Recognition System For Online Games, Ce Zhan, Wanqing Li, Philip Ogunbona, Farzad Safaei

Faculty of Informatics - Papers (Archive)

Multiplayer online games (MOGs) have become increasingly popular because of the opportunity they provide for collaboration, communication, and interaction. However, compared with ordinary human communication, MOG still has several limitations, especially in communication using facial expressions. Although detailed facial animation has already been achieved in a number of MOGs, players have to use text commands to control the expressions of avatars. In this paper, we propose an automatic expression recognition system that can be integrated into an MOG to control the facial expressions of avatars. To meet the specific requirements of such a system, a number of algorithms are studied, …


Ontology-Based Knowledge Representation For A P2p Multi-Agent Distributed Intrusion Detection System, Dayong Ye, Quan Bai, Minjie Zhang Jan 2008

Ontology-Based Knowledge Representation For A P2p Multi-Agent Distributed Intrusion Detection System, Dayong Ye, Quan Bai, Minjie Zhang

Faculty of Informatics - Papers (Archive)

Many research efforts on application of ontology in network security have been done in the past decade. However, they mostly stop at initial proposal or focus on framework design without detailed representation of intrusion or attack and relevant detection knowledge with ontology. In this paper, the design and implementation of ontology-based knowledge representation for a peer-to-peer multi-agent distributed intrusion detection system (ontology-based MADIDS) are introduced. An example which demonstrates the representation of an attack with ontology and the relevant detection process is also presented. In ontology-Based MADIDS, ontology technique enables peers in the system and agents in one peer to …


Voltage Unbalance Emission Limits For Installations: General Guidelines And System Specific Considerations, Robert Koch, Alexander Baitch, Sarath Perera, Prabodha Paranavithana Jan 2008

Voltage Unbalance Emission Limits For Installations: General Guidelines And System Specific Considerations, Robert Koch, Alexander Baitch, Sarath Perera, Prabodha Paranavithana

Faculty of Informatics - Papers (Archive)

Guidelines for developing voltage unbalance emission limits for installations connected to EHV, HV, and MV power systems have recently been published as a technical report by the International Electrotechnical Commission (IEC). These guidelines, based on the work of Joint Working Group CIGRE/CIRED C4.103, are intended to provide a common basis for the development of similar guidelines or standards in specific countries. This paper reviews these international guidelines and the background to the development of specific recommendations made in the technical report. It also considers elements of these guidelines that may relate to specific network considerations, and therefore may be of …