Low-frequency noise, such as road noise from automobiles and interior noise from bullet train cars, is detrimental to passenger comfort. Active noise control provides us with a way of suppressing low-frequency noise. ...
详细信息
ISBN:
(纸本)9798350311259
Low-frequency noise, such as road noise from automobiles and interior noise from bullet train cars, is detrimental to passenger comfort. Active noise control provides us with a way of suppressing low-frequency noise. It generates a sound of the same amplitude and opposite phase as noise and uses it to cancel the noise. Conventional active noise control is complicated to apply. Thus, the objective of this study is to establish a sound field control system by using the equivalent-input-disturbance method. System identification was performed to obtain an ideal plant of a duct. The control system is constructed based on the equivalent-input-disturbance approach with a low-order controller. The experimental results showed a suppression effect of about 50% of the sound field.
The ultimate goal of Internet of Vehicles (IoV) is to enhance the safety, intelligence, and efficiency of traffic systems. However, dynamic network topology, high speed, and exposed communication links inevitably pose...
详细信息
ISBN:
(数字)9781665468800
ISBN:
(纸本)9781665468800
The ultimate goal of Internet of Vehicles (IoV) is to enhance the safety, intelligence, and efficiency of traffic systems. However, dynamic network topology, high speed, and exposed communication links inevitably pose looming threats to vehicle safety. Thus, establishing trust sharing mechanism between traffic entities is pivotal to safeguarding the safety of IoV. This paper proposes a distributed trust sharing provisioning utilizing Reservoir computing-based path predicting algorithm. In this paper, Echo State Network and Deep Q-Network are novelly combined to realize trust information sharing in Partially Observable Markov Decision Process (POMDP) scenarios. In addition, in DRL state space design, we consider the current trust assessment results of different clusters in front of the vehicle to maximize the protection of vehicle network security. Finally, extensive simulations are conducted to prove that the proposed scheme has excellent convergence speed, verifying the feasibility and effectiveness.
computing may be a profoundly examined subject within the technological and financial world, and numerous huge players in the software industry are working for the improvement of computing services. With the help of a...
详细信息
Recently, the challenges of security systems in protecting citizens from crime and disasters have become very difficult. While some organizations have developed fire detection security systems, incidents of intrusions...
详细信息
With the increase in the number of networking devices in the industrial field, the total amount of data increases, resulting in huge broadband pressure and power consumption, making the traditional centralized process...
详细信息
This design is based on MSP432 single chip microcomputer as the core, combined with visual recognition technology, through the speed closed loop to control the intelligent car, and realize the dual car to follow and o...
详细信息
ISBN:
(纸本)9781643683850
This design is based on MSP432 single chip microcomputer as the core, combined with visual recognition technology, through the speed closed loop to control the intelligent car, and realize the dual car to follow and overtake on the predetermined track. In this design, MSP432P401Y is selected as the main control, and the identification information is sent to the master control through the serial port, so as to enter the corresponding road and prevent the car from deviating from the predetermined track;The leading car and the following car communicate with each other through Bluetooth module to achieve the goa of two vehicle collaborative transportation;Through the feedback information of the motor encoder, the speed closed-loop control system of the trolley is designed through the feedback information of the motor encoder to realize the precise control of the transportation distance. After detection, this design has the advantages of fast identification speed, high accuracy, stable transportation and high efficiency.
GPT is a large language model (LLM) derived from natural language processing that can generate a human-like text using machine learning. However, these models raise questions about authenticity and reliability of mate...
详细信息
The renewable energy sources (RESs) dominated power grid is an envisaged infrastructure of the future power system, where the commonly used grid following (GFL) control for grid-tied converters suffers from lacking gr...
详细信息
A disturbance observer-based H∞ composite control method under disturbances and deception attacks is addressed in this paper. Firstly, the control model is constructed. Secondly, a disturbance observer-based H∞ comp...
详细信息
This paper investigates the problem of zero-day malicious software (Malware) detection through unsupervised deep learning. We built a sequence-to-sequence auto-encoder model for learning the behavior of normal softwar...
详细信息
暂无评论