The two commonly used sources in the multi-transient electromagnetic (MTEM) method, square-wave and m-sequence, have different anti-noise performance which had been theoretically discussed in previous studies. But the...
详细信息
The two commonly used sources in the multi-transient electromagnetic (MTEM) method, square-wave and m-sequence, have different anti-noise performance which had been theoretically discussed in previous studies. But the onshore contrast experiment had rarely been conducted. An onshore experiment was performed over the Laizhou gold deposite, China, and the results obtained with two different source signatures were compared and analyzed. The signals had the same amplitude similar to 40 A and about the same length, so they had approximately equal energy. Two data sets with extremely different signal-to-noise ratio (SNR) were acquired with different source-receiver offsets. The skin-depth of two sources was analyzed;the recovered earth impulse responses indicated that m-sequence can compensate the high-frequency attenuation handsomely and the powerline noise suppression of m-sequence is 22 dB greater than the suppression of the square-wave, which demonstrated the superiority of m-sequence in MTEM dataprocessing.
The data acquisition of engine operating status is of momentously significance throughout the entire lifecycle of products. In this paper, an engine data acquisition system has been developed based on STM32. Based on ...
详细信息
data on the Internet is always vulnerable to different types of attacks due to the public nature of the Internet, which is the only source of communication all over the world. To protect sensitive information, many en...
详细信息
ISBN:
(纸本)9781450376259
data on the Internet is always vulnerable to different types of attacks due to the public nature of the Internet, which is the only source of communication all over the world. To protect sensitive information, many encryption techniques like Gingerbreadman chaotic map and S8 permutation-based image encryption scheme are proposed. However, due to security issues in these techniques, 3D Logistic map based confusion and diffusion processes are employed which solve those security problems.3D Logistic map was used to eliminate the strong correlation between the plain text image pixels. A random matrix is created in the diffusion stage via a 3D Logistic map and XORed with the scrambled image. The final ciphertext image is extracted using existing Gingerbread-man chaotic map based S-Box. The proposed scheme is analyzed experimentally and statistically using key space analysis, information entropy analysis, and differential analysis. Results are also validated via the Number of Pixel Rate Change (NPRC) to ensure the security and robustness of the proposed scheme.
Information Science and Electronic Engineering is a collection of contributions drawn from the internationalconference of Electronic Engineering and Information Science (ICEEIS 2016) held January 4-5, 2016 in Harbin,...
详细信息
ISBN:
(数字)9781351966689
ISBN:
(纸本)9781138029873
Information Science and Electronic Engineering is a collection of contributions drawn from the internationalconference of Electronic Engineering and Information Science (ICEEIS 2016) held January 4-5, 2016 in Harbin, China.
The papers in this proceedings volume cover various topics, including:- Electronic Engineering- Information Science and Information Technologies- Computational Mathematics and data Mining- Image processing and Computer Vision- Communication and signalprocessing- Control and Automation of Mechatronics- Methods, Devices and Systems for Measurement and Monitoring- Engineering of Weapon Systems- Mechanical Engineering and Material Science- Technologies of processing.
The content of this proceedings volume will be of interest to professionals and academics in the fields of Electronic Engineering, Computer Science and Mechanical Engineering.
In order to effectively diagnose the rub-impact fault of rotor-bearing system, this study develops an experimental model of a two-span rotor-bearing system with rubbing faults. The rubbing experiment was carried out t...
详细信息
ISBN:
(纸本)9781728188232
In order to effectively diagnose the rub-impact fault of rotor-bearing system, this study develops an experimental model of a two-span rotor-bearing system with rubbing faults. The rubbing experiment was carried out through the experimental platform and its analysis system, and the vibration of the rotor bearing system running under normal conditions, local slight rubbing and severe rubbing throughout the cycle are observed. The Variational Mode Decomposition (VMD) is then applied to the fault data analysis experiments of different rubbing degrees of the rotor. The experimental results further verified the effectiveness of the method, which can reveal the frequency structure of rubbing faults and accurately reflect the fault information. The findings are helpful in further understanding the dynamic characteristics of the rub-impact fault of the two-span rotor-bearing system and provide reference for fault diagnosis.
In the rapidly developing information age, the explosive growth of data increases the difficulty of big data application. Through analyzing the challenges faced by big data applications such as data collection, data t...
详细信息
The method of range profile for step frequency MMW radar targets based on wavelet transform power spectrum estimator is *** method can successfully measure the power spectrum in samples for which traditional methods o...
详细信息
ISBN:
(纸本)078037486X
The method of range profile for step frequency MMW radar targets based on wavelet transform power spectrum estimator is *** method can successfully measure the power spectrum in samples for which traditional methods often fail because the sample are finite sized,have a complex geometry,or are varyingly *** apply this method to the practical step frequency MMW radar target echo signals,and on the condition of the same sampling frequency and sampling data length,it can achieve one dimensional range profile with profile's resolution superior to *** with FFT algorithm,using wavelet spectrum estimator of short data series,we can achieves high resolution,high accuracy,and low SNR *** Experiment results make clear that the DWT estimator is a sensitive tool in range profile of step frequency MMW radar.
The allocation of electricity and computing resources is an important factor affecting economic development and social stability. Through research on the coordinated operation of computing power and electricity, resou...
详细信息
Considering the shortcomings of malfunction and too long action time of arc protection for traditional 10kV switch cabinet, arc protection system policy is designed in this article based on DSP. This system uses arc v...
详细信息
ISBN:
(纸本)9781538606612
Considering the shortcomings of malfunction and too long action time of arc protection for traditional 10kV switch cabinet, arc protection system policy is designed in this article based on DSP. This system uses arc voice recognition, arc detection and current detection to identify switchgear arc fault, and has the advantage of strong dataprocessing capability and fast operation. Meanwhile, wavelet analysis theory is applied to fault signalprocessing and recognition. This can provide reliable, secure fast arc fault protection for switch cabinet. Finally, partial discharge test platform is built to experiment, and the effectiveness and correctness of this strategy is verified by the experiment.
In this paper, a wideband digital signal transceiver module is designed by digital simulation system. The research content is mainly oriented to the needs of big data information collection and forwarding and receptio...
详细信息
暂无评论