Computer simulation of electric motor operation isparticularly useful for gaining an insight into their dynamicbehaviour and electro-mechanical interaction. A suitable modelenables motor faults to be simulated and the...
详细信息
Computer simulation of electric motor operation isparticularly useful for gaining an insight into their dynamicbehaviour and electro-mechanical interaction. A suitable modelenables motor faults to be simulated and the change incorresponding parameters to be predicted without physicalexperimentation. This paper presents both a theoretical andexperimental analysis of asymmetric stator and rotor faults ininduction machines. A three-phase induction motor was simulatedand operated under normal health operation, with one brokenrotor bar and with voltage imbalances on one phase of supply. Theresults illustrate good agreement between both simulated andexperimental results.
The research on open complex giant system hasbeen done in this paper, in which brittleness as one of thebasic characteristics is presented on the basis of the traitsof its collapse. Analysis on the small sample events...
详细信息
The research on open complex giant system hasbeen done in this paper, in which brittleness as one of thebasic characteristics is presented on the basis of the traitsof its collapse. Analysis on the small sample events havebeen carried out about the system under the disturbancefrom the inside and outside based on information diffusiontheory considering that the system has the ***, brittle potential function has been inducedapplying the distribution function of random depending oncatastrophe theory after the collectivity probability densityhas been got. Finally, brittleness link function is defined,which can serve the further quantitative research onoptimizing open complex giant system.
This thesis describes the principles and keytechniques of how to socksify third-party applications. Byembedding thin socksifying layer over transport layer,functions calls of Winsock API are intercepted onsocksifying ...
详细信息
This thesis describes the principles and keytechniques of how to socksify third-party applications. Byembedding thin socksifying layer over transport layer,functions calls of Winsock API are intercepted onsocksifying layer, where the functions are ***,SOCKS protocol can besupported in the third-party application. And this networkapplication is in security and control based on theconfiguration of SOCKS server. Because interception andmodifying is implemented dynamically in memory,thismethod can be easily modified and generatized, especially,it can be applied widely to upgrading and modifyingsoftware.
An effective Hopfield neural network(HNN)approach to multiprocessor job scheduling problem (known tobe a NP-hard problem) is proposed in this paper, which is aptto resource and timing (execution time and deadline)cons...
详细信息
An effective Hopfield neural network(HNN)approach to multiprocessor job scheduling problem (known tobe a NP-hard problem) is proposed in this paper, which is aptto resource and timing (execution time and deadline)constraints. This approach directly formulates the energyfunction of HNN according to constraints term by term andmore derives HNN model, then embeds simulated annealinginto HNN to prevent local minimum. Simulation resultsdemonstrate that the derived energy function works effectivelyfor this class of problems.
In this paper, a kind of variable-voltage direct torquecontrol (DTC) method for permanent magnet synchronousmotor (PMSM) drive system is proposed. 24 or more voltagrvectors with variable voltage on cirole traces are o...
详细信息
In this paper, a kind of variable-voltage direct torquecontrol (DTC) method for permanent magnet synchronousmotor (PMSM) drive system is proposed. 24 or more voltagrvectors with variable voltage on cirole traces are obtained. Anew switch table is used to select voltage vectors effectively Bytheory analysis and simulation rescarch, the proposed controlmethod is proved to enable diminishing the torque ripple,especially in low speed range. In the preliminary experiment,both smootb control of speed and high dynamic performance areachieved.
The effectiveness of a parallel or distributedsystem is often determined by its communication network. Inorder to operate more efficiently a network is required toprovide low latency and be able to handle large amount...
详细信息
The effectiveness of a parallel or distributedsystem is often determined by its communication network. Inorder to operate more efficiently a network is required toprovide low latency and be able to handle large amount oftraffic. Multistage Interconnection Network plays a vital roleon the performance of these multiprocessor system. Thispaper introduces a class of fault tolerant multistageInterconnection Network (MINs) named as Modified FaultTolerant (MFT) Network. A MFT network can provide a "fullaccess" capacity in presence of multiple faults. Permutationand performance studies show that MFT achieve a asignificant improvement over FT [17] network.
There is a lot of multimedia data types, related compressalgorithms and related code standards that have differentcharactenistics and adapt to different application *** the characteristics of multimedia dynamically is...
详细信息
There is a lot of multimedia data types, related compressalgorithms and related code standards that have differentcharactenistics and adapt to different application *** the characteristics of multimedia dynamically is helpful forclearly understanding and properly using the media data. Theobjective of this research is to develop a network multimediaevaluation platform based on the client/server mode, by means ofanalyzing and comparing the feathers of main media (the series ofMPEG. ITU-H, ITU-G, JPEG, etc) compression algorithm. Theplatform, MATEP, can test and display main parameters of relatedmultimedia data. These parameters can be used in QoS control.
A new signcryption scheme with (t, n) sharedunsigneryption based on discrete logarithm is proposed,which is the integration of Jung et al.'s signcryption schemeand Shamir secret sharing scheme. In this scheme, any...
详细信息
A new signcryption scheme with (t, n) sharedunsigneryption based on discrete logarithm is proposed,which is the integration of Jung et al.'s signcryption schemeand Shamir secret sharing scheme. In this scheme, any t ofn receivers can unsigncrypt the message and any t-1 orfewer receivers can not unsigncrypt the message. Ascompared to Hsu and Wu's authenticated encryptionscheme With (t, n) shared verification, the proposed schemehas the following advantages: it is more efficient forsigncryption;it can prevent malicious receivers fromcheating others.
A new method, State Transition(ST), for analyzings-t reliability of communication networks is developed in thispaper. ST is based on the finding that the message transmissionprocess can be described by the Markov chai...
详细信息
A new method, State Transition(ST), for analyzings-t reliability of communication networks is developed in thispaper. ST is based on the finding that the message transmissionprocess can be described by the Markov chain with twoabsorbing states. With ST all the non-absorbing states can begenerated with depth-first search or breadth-first search and thenetwork reliability can be computed with back reiterationtechnique after computing the one-step transition probabilitybetween states.
As CSCW application used widely in manyfields, there is an increasing need for designing a CSCWsystem middleware which provides the necessarycooperative functions and communication services inCSCW system to avoid deve...
详细信息
As CSCW application used widely in manyfields, there is an increasing need for designing a CSCWsystem middleware which provides the necessarycooperative functions and communication services inCSCW system to avoid developing the basic modulerepeatedly. Based on the integrated analysis of CSCWenvironments, this paper introduces a middleware designmodel and its basic running mechanism based on CORBAtechnique. In addition, object-oriented design method isused to program, and a set of class libraries and APIs areprovided on which developers can build new CSCWapplication system in component-based mode with higherefficiency and code-reused rate.
暂无评论