By Topic

Computer Modelling and Simulation (UKSim), 2013 UKSim 15th International Conference on

Date 10-12 April 2013

Filter Results

Displaying Results 1 - 25 of 157
  • [Front cover]

    Publication Year: 2013, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (773 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2013, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (94 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2013, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (168 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2013, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (126 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013, Page(s):v - xvii
    Request permission for commercial reuse | PDF file iconPDF (169 KB)
    Freely Available from IEEE
  • Chairs' welcome message

    Publication Year: 2013, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (73 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organization

    Publication Year: 2013, Page(s): xix
    Request permission for commercial reuse | PDF file iconPDF (131 KB)
    Freely Available from IEEE
  • International Program Committee

    Publication Year: 2013, Page(s): xx
    Request permission for commercial reuse | PDF file iconPDF (117 KB)
    Freely Available from IEEE
  • International reviewers

    Publication Year: 2013, Page(s):xxi - xxii
    Request permission for commercial reuse | PDF file iconPDF (134 KB)
    Freely Available from IEEE
  • Sponsors, patrons, promoters, and supporters

    Publication Year: 2013, Page(s): xxiii
    Request permission for commercial reuse | PDF file iconPDF (70 KB)
    Freely Available from IEEE
  • Keynote abstracts [6 abstracts]

    Publication Year: 2013, Page(s):xxiv - xxxvii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (618 KB)

    Provides an abstract for each of the six keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Traffic Forecasting for King Fahd Causeway Using Artificial Neural Networks

    Publication Year: 2013, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1155 KB) | HTML iconHTML

    Traffic prediction involves forecasting traffic in terms of Annual Average Daily Traffic (AADT), Design Hour Volumes (DHV) and Directional Design Hour Volumes (DDHV). These forecasts are used for a wide variety of purposes from the planning to the design and operational stages of the highway network. The forecasting needs the sufficient historical traffic data to establish the trend of traffic dem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Validation of Artificial Neural Network Model for Share Price UK Banking Sector Short-Term Trading

    Publication Year: 2013, Page(s):6 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (619 KB) | HTML iconHTML

    The study's objective is to justify the use of the ANN for the short-term prediction of share prices, particularly in the banking sector. The assumption is that financial share time-series contain significant non-linearity and that the ANN can be utilized effectively. The ANN model is compared with a linear regression model. Non-linearity is shown by deduction via a comparison of experimental resu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hybrid Support System for Decision Making Based on MLP-ANN, IED and SCADA for Disturbances Analysis of Electrical Power Distribution Transformers

    Publication Year: 2013, Page(s):12 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1061 KB) | HTML iconHTML

    The operation and maintenance of the power system require attention, precise diagnostics on failure and agility on system recovery. In addition, each operation needs to be carefully planned and executed, once errors can be fatal. To improve the operation and maintenance tasks, in this article is presented the proposal of a support system for decision making units based on artificial neural network... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy-PID Control of Transverse Vibrating Pipe Due to Vortex Induced Vibration

    Publication Year: 2013, Page(s):21 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (644 KB) | HTML iconHTML

    This paper presents the fuzzy-PID control of flexibly mounted rigid pipe which undergoes vortex induced vibration phenomena. The cylinder is allowed to move in one direction which is perpendicular to the flow direction. The input and output data are obtained from experimental works where the input is the current flow speed and the output is the acceleration of the pipe. Auto-Regressive External In... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fuzzy Approach for Power Quality Standards

    Publication Year: 2013, Page(s):27 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (289 KB) | HTML iconHTML

    The paper presents a fuzzy approach for harmonic voltage level based on the linguistic prescription of power quality standard. Harmonic currents are mainly generated by industrial and residential loads with non-linear characteristics. Industrial loads which are a source of significant levels of harmonic distortion include power converters, variable speed drives, induction furnaces, arc furnaces. S... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Direct Adaptive Fuzzy Power System Stabilizer for a Multi-machine System

    Publication Year: 2013, Page(s):33 - 38
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (190 KB) | HTML iconHTML

    This paper presents a Direct adaptive Fuzzy technique as a Power System Stabilizer (DFPSS). The technique utilizes fuzzy systems directly as a controller that incorporates fuzzy control rules in the design of the control law. In direct adaptive control, the parameters of the controller are directly adjusted to reduce the norm of the output error that represents mismatch between the plant and the r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Behavior Control Model of Non Player Character

    Publication Year: 2013, Page(s):39 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (263 KB) | HTML iconHTML

    This paper presents the adaptive behavior control model of non player character. The model is based on the theory of control systems and the theory of discrete interval type-2 fuzzy sets and systems. Dynamic changes of the structure of fuzzy rule base with taking into account cognitive parameters of player are executed in the model in on-line mode. It allows to individualize gameplay and to provid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Closed Forms for the Fully-Connected Continuous Flock of Starlings Optimization Algorithm

    Publication Year: 2013, Page(s):45 - 50
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (221 KB) | HTML iconHTML

    A new typology of swarm-based algorithms which employ analytical closed-forms written in the continuum is presented. The continuous algorithms are firstly introduced by making a simple translation of the numerical swarm-based algorithms into differential equations in the time domain (state equations). The integration of these state equations by using a time windowing approach makes available funct... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolutionary Simulations to Determine the Human Circadian Period Using an Extended Sleep-Wake Model

    Publication Year: 2013, Page(s):51 - 54
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (170 KB) | HTML iconHTML

    The development of the human sleep-wake cycle and the adaptation to the changing day and night condition on our planet took place over a time frame of 100000 years. As the result, a representative cross section of today's population sleeps between 4 and 11 hours, with a midsleep point between 1.00 and 9.00 am and a period length of the human circadian pacemaker between 23.5 and 25 hours. Roenneber... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Numerical Solutions of One-Dimensional Shallow Water Equations

    Publication Year: 2013, Page(s):55 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1261 KB) | HTML iconHTML

    This paper investigates the application of finite difference methods to solve the Shallow Water Equations (SWE's), in the context of mesh refinement through the introduction of an error tolerance. The problem is tackled by linearisation of the nonlinear differential equations through the discretization process. Once the set of equations have been linearised discretely, they are then solved. The so... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cross-Entropy Approach for Computing a Pareto Fronts

    Publication Year: 2013, Page(s):61 - 66
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    We propose in this paper an approach based on the cross-entropy method for computing Pareto Fronts. The approach is based on the cross-entropy approach for single-objective optimization. It is adapted to multi-objective optimization by defining a sorting criterion for selecting the best samples based on non-dominated sorting. The effectiveness of the approach is tested on several academic problems... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • True Performance Evaluation Methodology in E-marketing

    Publication Year: 2013, Page(s):67 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (198 KB) | HTML iconHTML

    The business terms used in performance evaluation concepts revolve around the measurability of companies progress towards achieving the goals already set. But with time, various user satisfaction objectives will be formulated and applied on business strategy with the common aim of attaining the most efficient and effective utilization of companies resources. We present a satisfaction performance e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cooperative Path Management for Mobile Systems Based on Adaptive Dynamic Programming

    Publication Year: 2013, Page(s):73 - 77
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (331 KB) | HTML iconHTML

    Path-planning for multiple vehicles is a topic relevant to many areas of research including navigation and robotics. In this paper, we present a novel approach for cooperative movement management to examine how two objects can orchestrate their movements so as to avoid collisions and retain a good chance of returning to their intended paths. When the objects recognize that they are at risk of a co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Electronic Medical Report Security Using Visual Secret Sharing Scheme

    Publication Year: 2013, Page(s):78 - 83
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (414 KB) | HTML iconHTML

    Privacy and security is an important concern in the medical field. Authentication and security of medical data, storing and sharing medical images secretly is a challenging task. In order to face this challenge of security and privacy, we propose a method based on Visual Secret Sharing (VSS) for black and white medical images. In our proposed method we have a new approach in VSS with improved cont... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.