Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more ➡
Download
Standard view
Full view
of .
Add note
Save to My Library
Sync to mobile
Look up keyword
Like this
1Activity
×
0 of .
Results for:
No results containing your search query
P. 1
Implementation Of Wavelet And RBF For Power Quality Disturbance Classification

Implementation Of Wavelet And RBF For Power Quality Disturbance Classification

Ratings: (0)|Views: 106|Likes:
Published by ijcsis
This paper presents application of wavelet and Radial Basis Function (RBF) for power quality disturbance classification. Features are extracted from the electrical signals by using db wavelets. The features obtained from the wavelet are unique to each type of electrical fault. These features are normalized and given to the RBF. The data required are generated by simulating various faults in the test system. The performance of the proposed method is compared with the existing feature extraction techniques. Simulation results show the effectiveness of the proposed method for power quality disturbance classification.
This paper presents application of wavelet and Radial Basis Function (RBF) for power quality disturbance classification. Features are extracted from the electrical signals by using db wavelets. The features obtained from the wavelet are unique to each type of electrical fault. These features are normalized and given to the RBF. The data required are generated by simulating various faults in the test system. The performance of the proposed method is compared with the existing feature extraction techniques. Simulation results show the effectiveness of the proposed method for power quality disturbance classification.

More info:

Published by: ijcsis on Dec 04, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See More
See less

01/07/2014

pdf

text

original

 







 
 
 



                   
(IJCSIS) International Journal of Computer Science and Information Security,Vol. 8, No. 8, November 201077 http://sites.google.com/site/ijcsis/ISSN 1947-5500
 
        
 
 

 




 

 


 

 

 


(IJCSIS) International Journal of Computer Science and Information Security,Vol. 8, No. 8, November 201078 http://sites.google.com/site/ijcsis/ISSN 1947-5500
 




         
 

 

 

(IJCSIS) International Journal of Computer Science and Information Security,Vol. 8, No. 8, November 201079 http://sites.google.com/site/ijcsis/ISSN 1947-5500

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->