A Safe Switching Algorithm based on Iterative Feedback Tuning (IFT) is developed for the control of nonlinear systems with unknown descriptions. The incorporation of IFT in Safe Switching combines the advantages of bo...
详细信息
A wireless DALI controlled electronic ballast for ultraviolet lamp (UVL) with high-sterilization quality and energy-saving control is proposed in this paper. Up to a maximum of 64 UVLs can be simultaneously controlled...
详细信息
A novel thyristor-controlled shunt VAR compensator is described. The scheme utilizes a six-pulse natural commutated dual-converter scheme for VAR control operation. The effect of dc offset voltage control on VAR drawn...
详细信息
A novel thyristor-controlled shunt VAR compensator is described. The scheme utilizes a six-pulse natural commutated dual-converter scheme for VAR control operation. The effect of dc offset voltage control on VAR drawn by the converter has been investigated. The following advantages are associated with this technique: there is low-current harmonic injection in the ac source;the converter does not draw active power from the ac source at any alpha;and there is full utilization of the converter VAR handling capability, as the performance is not affected by the commutating inductance. A theoretical and experimental investigation of fundamental and harmonic frequency characteristics of the source current is presented.
With the development of the telecommunications industry, the business products of major operators continue to innovate, and it is particularly important to analyze the credit value of telecom users and use them for bu...
详细信息
Internet of Things (IoT) has the potential to improve the way we interact with things. IoT envisions the idea of universal connectivity of everything which is defined as the global network of uniquely identifiable and...
详细信息
ISBN:
(纸本)9781509047673
Internet of Things (IoT) has the potential to improve the way we interact with things. IoT envisions the idea of universal connectivity of everything which is defined as the global network of uniquely identifiable and addressable smart things posing the capability to interact and communicate with other smart things. Every smart object consists of a microprocessor, transceiver module, sensors and power source. Most of the times these systems have to deal with low power and lossy networks (LLNs), where nodes have limited memory, processing capability, and power. However, stringent Quality of Service (QoS) is mandatory which is challenging to provide as the sensors are interconnected using lossy links. A routing protocol is needed as these devices can be scattered in an unplanned manner. Considering unanticipated characteristics of LLNs, Internet Engineering Task Force (IETF) developed, and standardized the Routing Protocol for LLNs (RPL). RPL is an IPv6 network and builds a tree-like topology which is based on few network metric optimization process using different Objective Functions (OF) to fulfill desired routing process. In this paper, we proposed a routing and a transmission power control algorithm to design a reliable energy efficient and low-cost RPL based system for IoT applications.
In high-reliability forward converters, the reset circuit design is crucial. LC snubber reset circuit is widely used for its low-cost, simple-controlled, and anti-radiation. However, in most studies, parasitic paramet...
详细信息
Multi-core processors (MCPs) present many challenges to developers of certifiable [1], safety-critical software applications. Many of these challenges fall on the system developer/integrator. However, some rely on cap...
详细信息
ISBN:
(纸本)9781479950027
Multi-core processors (MCPs) present many challenges to developers of certifiable [1], safety-critical software applications. Many of these challenges fall on the system developer/integrator. However, some rely on capabilities the underlying Real-Time Operating System (RTOS) that is used to support these applications. Most importantly, the RTOS must allow application developers to bound and control interference patterns on shared resources (e.g., contention for shared cache). Additionally, it must help minimize the difference between an application's average and worst-case execution times (ACET and WCET, respectively). Without such RTOS capabilities, developers of certifiable, safety-critical applications will find it difficult to achieve the goals of ensuring that the systems they deliver will safely perform their intended functions and maximizing the available CPU bandwidth afforded by MCPs. In this paper, we discuss cache partitioning technology that allows developers to achieve these two goals along with benchmark results that demonstrate its efficacy.
The paper brings a short overview of accomplished steps that promote development and enforcement of a new approach to PID control. Its concern is to unify numerous approaches and initiatives which emerged during the l...
详细信息
In order to improve the response speed and stability of the BP neural network controlled permanent magnet synchronous motor speed control process, an improved genetic algorithm is proposed to optimize the BP neural ne...
详细信息
The growing popularity of mobile technologies and mobile systems, especially Android system, brings many possibilities. Using the mobile application, it is possible to make bank transfers, communicate with patients fo...
详细信息
ISBN:
(纸本)9781665416580
The growing popularity of mobile technologies and mobile systems, especially Android system, brings many possibilities. Using the mobile application, it is possible to make bank transfers, communicate with patients for applications used in medicine and many others. Popularity, unfortunately, also brings many risks. With the development of the Internet and information technology, the range of opportunities for cyber-criminals has developed. With the increasing popularity of systems and mobile devices, we can also observe an increase in attacks and the number of malicious software targeted for these technologies. The development of the mobile application fulfills more and more important role in the everyday lives of the visibly growing number of smartphone and tablet users, especially from the point of view of security aspects. The paper presents an outline of the proposed secure development model to overcome the existing threats faced by the mobile application developers and its implementation in the form of the mobile security framework.
暂无评论