this paper proposes a selective driving algorithm for a high-efficiency operation of an inductive power transfer (IPT) system in which the double-D quadrature pad (DDQP) is applied. Initially, the IPT pads are manufac...
this paper proposes a selective driving algorithm for a high-efficiency operation of an inductive power transfer (IPT) system in which the double-D quadrature pad (DDQP) is applied. Initially, the IPT pads are manufactured, and the coupling coefficients are measured according to the pad misalignment. Subsequently, the driving algorithm and compensation network of the IPT converter are designed according to the measurement results. After that, the loss analysis is conducted through the simulation to evaluate the designed IPT converter, and the efficiency before and after applying the proposed driving algorithm to the IPT converter is compared to demonstrate the feasibility of the algorithm. Finally, the experimental waveforms are suggested to validate the design of the DDQP - CP IPT system.
Forest fires are currently the most common issue that we are dealing with. the resources that have been lost are irreplaceable. Forest fires are uncontrollable fires that occur in nature as a result of human involveme...
Forest fires are currently the most common issue that we are dealing with. the resources that have been lost are irreplaceable. Forest fires are uncontrollable fires that occur in nature as a result of human involvement or any other natural event. Forest fires can be so large that putting them out takes a long time. Contrasting with previous years, there has been a striking surge in the frequency of forest fires. Changes in climatic conditions are the key factor affecting the scope of forest fires. Long dry spells in the spring and summer make the woodlands particularly vulnerable. the extent of forest fires is mostly determined by weather conditions such as precipitation and wind, as well as the terrain's architecture. Long dry spells in the spring and summer make the woodlands particularly vulnerable. the extent of forest fires is mostly determined by weather conditions such as precipitation and wind, as well as the terrain's architecture. the incorporation of a Video Fire Detection model significantly enhances the efficiency of fire detection systems, particularly in large spaces. Establishing a video fire detection system involves focusing on spatial, spectral, and temporal indicators, as well as flame picture segmentation, recognition, tracking, and prediction. Analytical techniques, specifically utilizing ResNet50 and VGG16 models, can be applied to identify pool fire images through these segmentation processes, contributing to more robust fire detection capabilities.
this paper proposes an intelligent and machine-learning based optimization method that targets to optimal windings layer setup for LLC converter transformer with small number of optimizing iterations. the research uti...
this paper proposes an intelligent and machine-learning based optimization method that targets to optimal windings layer setup for LLC converter transformer with small number of optimizing iterations. the research utilizes Bayesian optimization (BO) to guide designers toward winding layers setup that achieves the maximum efficiency at nominal operating point of LLC converters. Furthermore, a new multiphysics simulation platform is proposed for feeding efficiencies to optimizing iterations. this simulation platform is able to provide entire losses estimation, high simulation accuracy is verified by measurement. An LLC converter prototype with 33V input and 400V/250W output is implemented to demonstrate effectiveness of proposed optimization method.
A basic subject of computergraphics (CG) based on three-dimensional (3D) computer-aideddesign (CAD) was provided in a class of "Basic Media design" for undergraduate students in their first years. the 3D-C...
详细信息
We present a review of demographic information collected and reported about animal research participants in Animal-computer Interaction (ACI) research. Starting from the complete ACI proceedings of 161 publications fr...
详细信息
ISBN:
(纸本)9798400711756
We present a review of demographic information collected and reported about animal research participants in Animal-computer Interaction (ACI) research. Starting from the complete ACI proceedings of 161 publications from the conference beginnings in 2016 until 2023, we established a corpus of 79 publications involving live animal participants. Our aim was to paint a picture of who these animals are, what demographic data was collected about them, and how this data varied across different research contexts. Our analysis revealed 841 live animals represented in ACI research, encompassing 23 different types of animals across 10 research contexts. We observed differences in the demographic information correlating withthe animals' types and contexts. We argue that these differences might reflect biases about animals and could impact the interdisciplinary exchange of research findings. In particular, descriptors such as breed, species, and context-specific details were frequently reported, while aspects like personalities, life experiences, and social relationships were less consistently documented, and only in some specific contexts. We discuss the implications of these findings for research validity, reproducibility, and ethical considerations within ACI, proposing recommendations for more consistent and comprehensive reporting practices. this work aims to enhance our understanding of animal participants in ACI research and advance efforts towards equitable and ethical interspecies relationships through technology.
Among the most significant responsibilities for those involved in software project management is software effort estimation. the fact that software development is constantly evolving makes it very hard to forecast eff...
Among the most significant responsibilities for those involved in software project management is software effort estimation. the fact that software development is constantly evolving makes it very hard to forecast effort. In the past, academics have estimated effort and duration for one type of methodology for software development. Various size matrices are used for software project estimation. To estimate the lines of code, use cases, objects, and story point for various development methodologies, algorithmic models are used. this work develops a hybrid software-estimating model for projects that are both object-oriented and traditional. there is the primary input is the size of the software, expressed as the lines of code and use case points. the combined Software Effort Prediction Model is created using linear regression analysis. this model is developed using the size of the project and the selected parameters identified withthe correlation coefficient. the proposed work has been analyzed using the average magnitude of relative error. this study is further evaluated using existing methods for estimating software costs, and it is discovered that these methods—case-based reasoning, linear regression, radial basis function neural networks, ensemble modeling, and fuzzy analytic hierarchy process — the combined models have the least amount of inaccuracy. Linear regression is used to forecast the effort for procedural and object-oriented projects, and the findings are compared to those from other models to ensure the work is valid. the work obtains the highest accuracy for accurately estimating software projects.
Drones performing an autonomous mission need to adapt to frequent changes in their environment. In other words, they have to be context-aware. Most current context-aware systems are designed to distinguish between sit...
详细信息
this paper presents a robust Ku-band low-noise amplifier (LNA) developed using GaN high-electron-mobility transistor (HEMT). the LNA employs a small signal equiva lent circuit model that exhibits significant small-sig...
详细信息
ISBN:
(数字)9798350378726
ISBN:
(纸本)9798350378733
this paper presents a robust Ku-band low-noise amplifier (LNA) developed using GaN high-electron-mobility transistor (HEMT). the LNA employs a small signal equiva lent circuit model that exhibits significant small-signal and noise characteristics, as well as impressive linearity. the LNA is designed using $0.15~\mu\mathrm{m}$ AlGaN/GaN process on the SiC sub starte. the design incorporates a careful selection of HEMT configurations and the use of simultaneous matching tech niques that maximizes the gains and minimizing noise figure (NF), input, output, and isolation losses simultaneously. the proposed LNA based on GaN HEMT design offers gain of 35 dB and 36 dB, respectively, at 12 GHz and 18 GHz, with ex tremely low noise figures of 1.1 dB and 1.26 dB. the return losses for both input and output over the complete band of operation are better than 15 dB. the proposed LNA can find potential applications in a space receiver.
Due to the possibilities provided by such technologies to provide people with live immersive virtual worlds, Extended Reality (XR) technologies such as virtual (VR), augmented (AR), and mixed reality (MR) have grown. ...
详细信息
Phishing is a cybercrime in which an attacker sends a false email designed to mislead the receiver into exposing personal information, such as passwords, credit card numbers, or other sensitive data. Phishing websites...
Phishing is a cybercrime in which an attacker sends a false email designed to mislead the receiver into exposing personal information, such as passwords, credit card numbers, or other sensitive data. Phishing websites are one of the most frequent ways attackers carry out phishing attacks. these websites are made to look like actual websites, such as banking websites or online businesses, to fool the victim into entering their personal information. Machine learning is a form of artificial intelligence that can detect phishing websites. Machine learning algorithms can be educated on enormous datasets of phishing websites and legal websites to identify the properties that discriminate between the two. Once taught, these algorithms can be used to classify new websites as phishing or authentic in real time. this paper addresses the state-of-the-art in machine learning-based phishing website identification. the paper explains the many machine-learning approaches that have been deployed for this work, as well as the features that have been utilized to train these algorithms. the article also explores the limitations of real-time phishing website identification and the prospects of this research.
暂无评论