This paper presents the design and implementation of an innovative control valve system that integrates a ball valve run by a servo motor, IoT capabilities, and PID control for precise operation. The system uses a 1/4...
详细信息
This paper presents the design and performance analysis of a T-type inverter optimized for wireless charging applications in electric vehicle (EV) batteries, aiming to enhance efficiency and reduce power losses. Tradi...
详细信息
This article presents the implementation of 2:4 and 3:8 decoder circuits using a previously simulated, low-voltage, compact-modeled, fully transparent, and flexible a-IGZO (amorphous-Indium Gallium Zinc Oxide)-based T...
详细信息
The paper presents a comprehensive framework for recognizing lower limb movements using surface electromyography (sEMG) signals, addressing the growing need for effective human activity recognition (HAR) systems in he...
详细信息
In this research paper we focus on the design and implementation of reliable real time wireless sensor network (WSN) protocols that make use of relay node and proper localization techniques to enhance the performance ...
详细信息
This research conducts a numerical investigation of a multi-analyte H-patterned photonic crystal fiber (PCF) sensor utilizing surface plasmon resonance (SPR) technology developed to recognize industrial fluids in vari...
详细信息
Short circuit capability in power switching devices is highly desired for motor drive application, and it is a challenging issue for GaN power high-electron-mobility transistor (HEMT) devices because of concentrated h...
详细信息
Garbage target detection plays a crucial role in environmental protection and urban management. With the continuous development of computer vision technology, deep learning methods have become one of the main tools fo...
详细信息
The electrically excited synchronous motor (EESM), also called the wound field synchronous motor, does not use permanent magnets and provides advantages such as a wide constant power range, high efficiency, and easy c...
详细信息
When Android was first introduced, it permitted unrestricted access to all installed applications, posing significant security risks. In one of our previous works, we proposed, implemented, and demonstrated a comprehe...
详细信息
暂无评论