Tests were done to research the influence of fuel supply map during the starting process of electroniccontrolled diesel engine in using the electroniccontrolled diesel engine which was combined with CA498 Z diesel e...
详细信息
ISBN:
(纸本)9781509064151;9781509064144
Tests were done to research the influence of fuel supply map during the starting process of electroniccontrolled diesel engine in using the electroniccontrolled diesel engine which was combined with CA498 Z diesel engine, VP37 electroniccontrolled distributor injection pump management system and VS100 calibration system. Calibration process of starting fuel supply map was educed under the principle of low HC emission and rapid starting speed. The calibrating methods of starting fuel supply map were obtained through the tests.
This paper presents a design scheme of control system for a small fixed double propulsion unmanned surface vehicle(USV). The system is based on MOOS-IvP star topology, with distributed and modular features. The system...
详细信息
ISBN:
(纸本)9781509064151;9781509064144
This paper presents a design scheme of control system for a small fixed double propulsion unmanned surface vehicle(USV). The system is based on MOOS-IvP star topology, with distributed and modular features. The system integrates the sensor module, the propeller module, the data recording module and the control module. The Autonomous Navigation of USV is achieved successfully by using the heading control method based on PID. Simulink simulation and lake experiment verifies its effectiveness.
Establish the hybrid electric vehicle power switching threshold and fuzzy logic control simulation model. Simulate and analyze the change speed of power under different accelerator pedal opening degrees and the influe...
详细信息
ISBN:
(纸本)9781538662434
Establish the hybrid electric vehicle power switching threshold and fuzzy logic control simulation model. Simulate and analyze the change speed of power under different accelerator pedal opening degrees and the influence of battery SOC value on the change speed. The results show that the fuzzy control strategy can meet the requirements of dynamic performance and have better economy performance.
In order to improve ride comfort, a linear motor active suspension system is *** quarter model of active suspension is established,the structure design of actuator is carried out, the finite element model is establish...
详细信息
ISBN:
(纸本)9781509064151;9781509064144
In order to improve ride comfort, a linear motor active suspension system is *** quarter model of active suspension is established,the structure design of actuator is carried out, the finite element model is established, the electromagnetic finite element analysis of the model is carried out to verify the correctness of the model, the suspension system control strategy is designed, and the simulation analysis is carried out under Matlab/simulink. The result shows that the magnetic field distribution of actuator is uniform,the maximum force up to 996 N,,and the ride comfort of the suspension is improved under the current hysteresis control strategy.
The quadcopter is a four-input, six-output and underactuated system. The attitude estimation and control strategy of quadcopter are the hotspot and difficult research problems in this field due to the dynamic characte...
详细信息
ISBN:
(纸本)9781509064151;9781509064144
The quadcopter is a four-input, six-output and underactuated system. The attitude estimation and control strategy of quadcopter are the hotspot and difficult research problems in this field due to the dynamic characteristics of multivariate, nonlinear, coupled and underactuated. In this paper, control strategy is studied based on quadcopter. Considering the nonlinear controller is affected by parameter model of quadcopter in high dynamic flight. This paper design the cascade PID that is not affected by parameter model of quadcopter by simplifying the model of quadcopter. The results of simulation and experiment show that this controller is effective and stable.
In this paper, some methods of weighting weights are introduced through analyzing the relevant documents of the existing weighting methods. At the same time, the summaries and the suggestions and ideas are given for e...
详细信息
ISBN:
(纸本)9781509064151;9781509064144
In this paper, some methods of weighting weights are introduced through analyzing the relevant documents of the existing weighting methods. At the same time, the summaries and the suggestions and ideas are given for each document. Also the method of combining the subjective and objective weighting methods is recognized, and then the question of how to combine the subjective and objective is discussed. Finally the own index weighting scheme is proposed, also its shortcomings and the aspects that can improve are pointed out.
A method to solve the problem of dim target detection under complex background based on their multi-scale fractal feature is presented in this paper. It is realized by calculating the difference of fractal features be...
详细信息
ISBN:
(纸本)9781509064151;9781509064144
A method to solve the problem of dim target detection under complex background based on their multi-scale fractal feature is presented in this paper. It is realized by calculating the difference of fractal features between natural background and man-made target in variation with scale to extract the MFFK parameters, a multi-scale fractal feature distribution image can be obtained. After that, self-adaptive threshold segmentation method is used on the calculated feature distribution image to detect the dim target. Experimental results show that the proposed method not only suppresses the interference of the complex background effectively, but also presents excellent detection property and environmental adaptability.
The accurate model that is corresponding with the EMS-type High-speed Magnetic-levitation Train is very difficult to be acquired due to the fault. A kind of passive fault-tolerant controller is designed by using simul...
详细信息
ISBN:
(纸本)9781509064151;9781509064144
The accurate model that is corresponding with the EMS-type High-speed Magnetic-levitation Train is very difficult to be acquired due to the fault. A kind of passive fault-tolerant controller is designed by using simultaneous stabilization theory based on the lapped structure of suspension module. The simulated analysis shows that under the situation that a suspension module in tapped structure totally loses efficacy, and the train can suspend stably still, which ensures the fault-tolerant ability in a stable sense of the system for the fault, improving the working reliability of the high-speed magnetic-levitation train.
This paper proposed a modified FCM image segmentation method based on Gaussian kernel and spatial information. FCM is especially effective in image segmentation, however, it lacks enough robustness to noise and outlie...
详细信息
ISBN:
(纸本)9781509064151;9781509064144
This paper proposed a modified FCM image segmentation method based on Gaussian kernel and spatial information. FCM is especially effective in image segmentation, however, it lacks enough robustness to noise and outliers. At first, the Gaussian kernel and spatial information will be applied into the fuzzy clustering algorithm to enhance the robustness of FCM and reconstruct neighborhood information of the new objective function in this paper. Then the results of different methods are analyzed and compared. Experimental results show that this method can improve the image segmentation accuracy and robustness of anti-noise.
Memory corruption is one of the oldest problems in computer security. This problem has existed for many years and a number of solutions have been proposed, but memory corruption attacks continue to pose a serious thre...
详细信息
ISBN:
(纸本)9781538662434
Memory corruption is one of the oldest problems in computer security. This problem has existed for many years and a number of solutions have been proposed, but memory corruption attacks continue to pose a serious threat. From the attacker's point of view, this paper corresponds the memory corruption mitigation with the attacker's behavior. It mainly introduces the memory corruption mitigation on Windows and Linux, analyses the limitations of each protection mechanism, and briefly describes bypassing techniques. Besides, we identify some concepts in memory corruption prevention, and provide suggestions on improving the existing mechanisms.
暂无评论