Search results

1 – 10 of over 7000
To view the access options for this content please click here
Article

Fiaz Ahmad, Akhtar Rasool, Esref Emre Ozsoy, Asif Sabanoviç and Meltem Elitas

The purpose of this paper is to propose successive-over-relaxation (SOR) based recursive Bayesian approach (RBA) for the configuration identification of a Power System

Abstract

Purpose

The purpose of this paper is to propose successive-over-relaxation (SOR) based recursive Bayesian approach (RBA) for the configuration identification of a Power System. Moreover, to present a comparison between the proposed method and existing RBA approaches regarding convergence speed and robustness.

Design/methodology/approach

Swift power network configuration identification is important for adopting the smart grid features like power system automation. In this work, a new SOR-based numerical approach is adopted to increase the convergence speed of the existing RBA algorithm and at the same time maintaining robustness against noise. Existing RBA and SOR-RBA are tested on IEEE 6 bus, IEEE 14 bus networks and 48 bus Danish Medium Voltage distribution network in the MATLAB R2014b environment and a comparative analysis is presented.

Findings

The comparison of existing RBA and proposed SOR-RBA is performed, which reveals that the latter has good convergence speed compared to the former RBA algorithms. Moreover, it is robust against bad data and noise.

Originality value

Existing RBA techniques have slow convergence and are also prone to measurement noise. Their convergence speed is effected by noisy measurements. In this paper, an attempt has been made to enhance convergence speed of the new identification algorithm while keeping its numerical stability and robustness during noisy measurement conditions. This work is novel and has drastic improvement in the convergence speed and robustness of the former RBA algorithms.

Details

COMPEL - The international journal for computation and mathematics in electrical and electronic engineering, vol. 36 no. 4
Type: Research Article
ISSN: 0332-1649

Keywords

To view the access options for this content please click here
Book part

Irina Farquhar and Alan Sorkin

This study proposes targeted modernization of the Department of Defense (DoD's) Joint Forces Ammunition Logistics information system by implementing the optimized…

Abstract

This study proposes targeted modernization of the Department of Defense (DoD's) Joint Forces Ammunition Logistics information system by implementing the optimized innovative information technology open architecture design and integrating Radio Frequency Identification Device data technologies and real-time optimization and control mechanisms as the critical technology components of the solution. The innovative information technology, which pursues the focused logistics, will be deployed in 36 months at the estimated cost of $568 million in constant dollars. We estimate that the Systems, Applications, Products (SAP)-based enterprise integration solution that the Army currently pursues will cost another $1.5 billion through the year 2014; however, it is unlikely to deliver the intended technical capabilities.

Details

The Value of Innovation: Impact on Health, Life Quality, Safety, and Regulatory Research
Type: Book
ISBN: 978-1-84950-551-2

To view the access options for this content please click here
Article

Bartlomiej Guzowski, Roman Gozdur, Mateusz Lakomski and Lukasz Bernacki

The purpose of this paper is to develop identification system for fiber optic connectors in passive distribution cabinets. The system should have alternative power supply…

Abstract

Purpose

The purpose of this paper is to develop identification system for fiber optic connectors in passive distribution cabinets. The system should have alternative power supply and wireless communication unlike the identification systems commercially available, which will make the system fully autonomous.

Design/methodology/approach

Detailed project and realization of real demonstrator of fully autonomous identification system. After the realization of the demonstrator, its optimization was performed.

Findings

It is possible to build fully autonomous identification system which requires 15.6 mJ energy to perform one cycle of identification process. Moreover, it is possible to use the alternative power method to supply this system.

Originality/value

Fully autonomous identification system of fiber optic connectors with alternative power supply and wireless communication.

Details

Circuit World, vol. 43 no. 1
Type: Research Article
ISSN: 0305-6120

Keywords

To view the access options for this content please click here
Article

A. Canova, F. Freschi, M. Repetto and M. Tartaglia

The definition of a simple model of low frequency magnetic field created by power industrial installations can be approached by using an equivalent source system (ESS)…

Abstract

Purpose

The definition of a simple model of low frequency magnetic field created by power industrial installations can be approached by using an equivalent source system (ESS). Given a set of measured magnetic field points, the ESS, made by a limited set of current carrying wires or turns, must be placed and supplied in order to fit the measured magnetic field values. An optimisation procedure can be used to define the current values and the location of the ESS which minimize the error between the measured and computed magnetic field values.

Design/methodology/approach

A two‐step optimal procedure is defined: in the outer step a stochastic optimisation routine is used to drive the geometric control parameters of the ESS while, in the inner step, the current values flowing through the sources are computed to find the minimization of the error with respect to a set of measured magnetic field values. The optimisation procedure is based on an artificial immune system algorithm which focuses on a deep exploration of the search space and gave interesting results both in terms of accuracy and computational efficiency.

Findings

The results show that the proposed approach is able to reconstruct the magnetic field created by complex source system and give some accuracy measure on the reconstruction error. The optimisation process carried out also on conductor positions has allowed to find out the location of the real sources in an accurate way, also in presence of measurement errors.

Originality/value

The approach proposed uses optimisation procedures to solve the inverse problem of source reconstruction starting by a set of measured magnetic field values. The definition of a simple equivalent source structure, together with an optimisation procedure to set its control parameters, allows to simulate complex magnetic field sources, like power substations or cable systems, in a very efficient and compact way.

Details

COMPEL - The international journal for computation and mathematics in electrical and electronic engineering, vol. 24 no. 3
Type: Research Article
ISSN: 0332-1649

Keywords

To view the access options for this content please click here
Book part

Filipe J. Sousa

No scholar or researcher is able to provide robust evidence that counters the scant reflection on metatheory – mostly ontology and epistemology – underlying management…

Abstract

No scholar or researcher is able to provide robust evidence that counters the scant reflection on metatheory – mostly ontology and epistemology – underlying management studies in general, and industrial marketing and purchasing research in particular. This paper is a contribution to the indispensable discussion of metatheoretical alternatives in research, and most importantly, the strengths and shortcomings thereof, and respective implications on research questions, objectives, and findings.

Details

Organizational Culture, Business-to-Business Relationships, and Interfirm Networks
Type: Book
ISBN: 978-0-85724-306-5

To view the access options for this content please click here
Article

Vladimir Kindl, Michal Frivaldsky, Pavol Spanik, Marek Piri and Viliam Jaros

This paper aims to develop mathematical models of variously compensated wireless energy transfer (WET) systems. Attention is primarily paid to the derivation of the most…

Abstract

Purpose

This paper aims to develop mathematical models of variously compensated wireless energy transfer (WET) systems. Attention is primarily paid to the derivation of the most important energy transfer characteristics such as efficiency and amount of transferred power. This paper discusses the main advantages and disadvantages of various compensation techniques to show their possible application areas. On the basis of these results, a designer will be able to quickly identify which compensation type suites as the best solution to fulfill a given system’s requirements.

Design/methodology/approach

First, the current state in the field of mathematical modeling of WET systems is introduced. Next, the non-resonant magnetic-coupled circuit together with four most common resonant magnetic-coupled circuits is analyzed. The equivalent circuit models using loop currents methodology is applied to the analyses. The proposed methodology is experimentally verified by the laboratory measurement of selected circuit topology. The main contribution of the proposed methodology lies in its quick applicability on more complicated or extended systems while keeping a relatively good match with the real system’s behavior.

Findings

The authors have presented the usage of a simple and accurate methodology for investigating variously compensated WET systems. Electrical engineers who require effective and powerful tools for the identification of basic WET systems properties will find this methodology to be of extensive help.

Research limitations/implications

The analyses consider only the sinusoidal type of supply voltage; so, it is valid mainly for the close range of the resonant state. Nonlinearities cannot be taken into account.

Practical implications

This research may be applied in the field of WET systems.

Originality/value

Research in the area of power electronic systems, which provides a clear and straightforward procedure for WET system identification, will be helpful to most practical technicians who are not well versed in areas of physical-based phenomena.

Details

COMPEL - The international journal for computation and mathematics in electrical and electronic engineering, vol. 36 no. 4
Type: Research Article
ISSN: 0332-1649

Keywords

To view the access options for this content please click here
Article

Elham Ali Shammar and Ammar Thabit Zahary

Internet has changed radically in the way people interact in the virtual world, in their careers or social relationships. IoT technology has added a new vision to this…

Abstract

Purpose

Internet has changed radically in the way people interact in the virtual world, in their careers or social relationships. IoT technology has added a new vision to this process by enabling connections between smart objects and humans, and also between smart objects themselves, which leads to anything, anytime, anywhere, and any media communications. IoT allows objects to physically see, hear, think, and perform tasks by making them talk to each other, share information and coordinate decisions. To enable the vision of IoT, it utilizes technologies such as ubiquitous computing, context awareness, RFID, WSN, embedded devices, CPS, communication technologies, and internet protocols. IoT is considered to be the future internet, which is significantly different from the Internet we use today. The purpose of this paper is to provide up-to-date literature on trends of IoT research which is driven by the need for convergence of several interdisciplinary technologies and new applications.

Design/methodology/approach

A comprehensive IoT literature review has been performed in this paper as a survey. The survey starts by providing an overview of IoT concepts, visions and evolutions. IoT architectures are also explored. Then, the most important components of IoT are discussed including a thorough discussion of IoT operating systems such as Tiny OS, Contiki OS, FreeRTOS, and RIOT. A review of IoT applications is also presented in this paper and finally, IoT challenges that can be recently encountered by researchers are introduced.

Findings

Studies of IoT literature and projects show the disproportionate importance of technology in IoT projects, which are often driven by technological interventions rather than innovation in the business model. There are a number of serious concerns about the dangers of IoT growth, particularly in the areas of privacy and security; hence, industry and government began addressing these concerns. At the end, what makes IoT exciting is that we do not yet know the exact use cases which would have the ability to significantly influence our lives.

Originality/value

This survey provides a comprehensive literature review on IoT techniques, operating systems and trends.

Details

Library Hi Tech, vol. 38 no. 1
Type: Research Article
ISSN: 0737-8831

Keywords

To view the access options for this content please click here
Book part

Alexandra E. MacDougall, John E. Baur, Milorad M. Novicevic and M. Ronald Buckley

On many occasions, organizational science research has been referred to as fragmented and disjointed, resulting in a literature that is, in the opinion of many, difficult…

Abstract

On many occasions, organizational science research has been referred to as fragmented and disjointed, resulting in a literature that is, in the opinion of many, difficult to navigate and comprehend. One potential explanation is that scholars have failed to comprehend that organizations are complex and intricate systems. In order to move us past this morass, we recommend that researchers extend beyond traditional rational, mechanistic, and variable-centered approaches to research and integrate a more advantageous pattern-oriented approach within their research program. Pattern-oriented methods approximate real-life phenomena by adopting a holistic, integrative approach to research wherein individual- and organizational-systems are viewed as non-decomposable organized wholes. We argue that the pattern-oriented approach has the potential to overcome a number of breakdowns faced by alternate approaches, while offering a novel and more representative lens from which to view organizational- and HRM-related issues. The proposed incorporation of the pattern-oriented approach is framed within a review and evaluation of current approaches to organizational research and is supplemented with a discussion of methodological and theoretical implications as well as potential applications of the pattern-oriented approach.

Details

Research in Personnel and Human Resources Management
Type: Book
ISBN: 978-1-78350-824-2

Keywords

To view the access options for this content please click here
Article

Krzysztof Kasianiuk

This paper aims to provide introductory conceptual tools for studying political power in a complex multi-level environment. In particular, it is intended to answer the…

Abstract

Purpose

This paper aims to provide introductory conceptual tools for studying political power in a complex multi-level environment. In particular, it is intended to answer the question of how concepts provided by cybernetics and general systems theory (GST) could serve to foster the study of political power.

Design/methodology/approach

The objective is realized through a reconsideration of a set of the basic concepts of cybernetics, GST and political science. Two system identification models – black box and white box – along with Marian Mazur’s concept of steering are used to deconstruct the classic definition of power formulated by Max Weber. Next, a two-phase procedure for empirical power analysis is proposed. Rudimentary in its scope, the article shows a path of more comprehensive and transformative analyses of key notions.

Findings

It seems that system identification models help uncover structural and functional aspects of political power, which aids the process of analysis of different mechanisms of political power.

Originality/value

The article supports the argument for a conceptual isomorphism between cybernetics and political science. The value of the proposed approach is derived from the combination of two features. First, two aspects of system operation – functional and structural – help to focus research attention on different problems of political power analysis. Second, the interrelation and interdependence of both aspects of systems operation serve as a practical means in the analysis of communication and behavior of actors in the political power processes.

Details

Kybernetes, vol. 47 no. 6
Type: Research Article
ISSN: 0368-492X

Keywords

To view the access options for this content please click here
Article

Stevan Stankovski, Gordana Ostojic, Nikola Djukic, Srdjan Tegeltija and Aleksandar Milojkovic

– The purpose of this paper is to describe an approach of using mobile phones with Bluetooth technology to enter/exit restricted area.

Abstract

Purpose

The purpose of this paper is to describe an approach of using mobile phones with Bluetooth technology to enter/exit restricted area.

Design/methodology/approach

Applied Bluetooth technology implemented in mobile phones enables the user to perform the identification and the state of presence while entering/exiting the parking space without stopping the vehicle. For the successful implementation of this method for presence detection and proper identification, it is necessary to determine the values of the Bluetooth signal.

Findings

This paper discuses a case study that has been done at entry/exit of parking lots. The obtained experimental results show that mobile phones with the Bluetooth technology can be successfully applied as presence detection sensors, as well as in processes for the identification of the user/object in the move.

Practical implications

The paper gives a primer how mobile phones with Bluetooth technology, in addition to their basic purpose, can be used as identification devices to enter/exit restricted area.

Originality/value

The users have possibilities to access restricted area using a common device – a mobile phone with Bluetooth technology. Successful implementation of developed access control system is based on determining the proper value of the Bluetooth signal strength field that extends around the control cabinet in which the Bluetooth devices are situated.

Details

Sensor Review, vol. 34 no. 3
Type: Research Article
ISSN: 0260-2288

Keywords

1 – 10 of over 7000