Parameter identification of subsynchronous oscillation based on FastICA and MP algorithms
نویسندگان
چکیده
منابع مشابه
Geometric Optimisation and FastICA Algorithms
Independent component analysis is a challenging problem in the area of unsupervised adaptive filtering. Recently, there has been an increasing interest in using geometric optimisation for adaptive filtering. The performance of ICA algorithms significantly depends on the choice of the contrast function and the optimisation algorithm used in obtaining the demixing matrix. In this paper we focus o...
متن کاملDesign of Additional Damping Controllers with Subsynchronous Oscillation Damping Effectiveness
When we research the suppression problem of subsynchronous oscillation based on time domain simulation method, we find the appropriate parameters for phase compensation and amplitude gaining links are important to the damping effect of the additional damping controllers, supplementary excitation damping controller(SEDC) and subsynchronous supplementary damping controller(SSDC). Some scholars at...
متن کاملGenetic Algorithms Based Parameter Identification of Yeast Fed-Batch Cultivation
Different kinds of genetic algorithms have been investigated for a parameter identification of a fermentation process. Altogether eight realizations of genetic algorithms have been presented four of simple genetic algorithms and four of multi-population ones. Each of them is characterized with a different sequence of implementation of main genetic operators, namely selection, crossover and muta...
متن کاملa head parameter survey on mazandarani dialect and its effect(s) on learning english from ca perspective (on the basis of x-bar syntax)1
there has been a gradual shift of focus from the study of rule systems, which have increasingly been regarded as impoverished, … to the study of systems of principles, which appear to occupy a much more central position in determining the character and variety of possible human languages. there is a set of absolute universals, notions and principles existing in ug which do not vary from one ...
15 صفحه اولstudy of hash functions based on chaotic maps
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
ذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Journal of Engineering
سال: 2019
ISSN: 2051-3305,2051-3305
DOI: 10.1049/joe.2018.8685