This paper proposes a new method based on the comprehensive transition criteria of speed, flux position, and voltage vector to solve the transition problem in hybrid direct torque control. In addition, the control ang...
详细信息
This paper proposes a new method based on the comprehensive transition criteria of speed, flux position, and voltage vector to solve the transition problem in hybrid direct torque control. In addition, the control angle is introduced that is adjusted by the smoothness and rapidity. Peak current, flux distortion, and torque ripple can be significantly reduced by the proposed method.
The Coronavirus Disease 2019 (COVID-19) has become an international public health emergency, posing a serious threat to human health and safety around the world. The 2019-nCoV coronavirus spike protein was confirmed t...
详细信息
The Coronavirus Disease 2019 (COVID-19) has become an international public health emergency, posing a serious threat to human health and safety around the world. The 2019-nCoV coronavirus spike protein was confirmed to be highly susceptible to various mutations, which can trigger apparent changes of virus transmission capacity and the pathogenic mechanism. In this article, the binding interface was obtained by analyzing the interaction modes between 2019-nCoV coronavirus and the human ACE2. Based on the "SIFT server" and the "bubble" identification mechanism, 9 amino acid sites were selected as potential mutation-sites from the 2019-nCoV-S1-ACE2 binding interface. Subsequently, a total number of 171 mutant systems for 9 mutation-sites were optimized for binding-pattern comparsion analysis, and 14 mutations that may improve the binding capacity of 2019-nCoV-S1 to ACE2 were selected. The Molecular Dynamic Simulations were conducted to calculate the binding free energies of all the 14 mutant systems. Finally, we found that most of the 14 mutations on the 2019-nCoV-S1 protein could enhance the binding ability between 2019-nCoV coronavirus and human ACE2. Among which, the binding capacities for G446R, Y449R and F486Y mutations could be increased by 20 percent, and that for S494R mutant increased even by 38.98 percent. We hope this research could provide significant help for the future epidemic detection, drug and vaccine development.
One of the old techniques for performance improvements is branch prediction. As the branch misprediction rate has reached less than 0.01 for certain techniques, it is safe to say that current branch prediction techniq...
详细信息
ISBN:
(纸本)9781509043071
One of the old techniques for performance improvements is branch prediction. As the branch misprediction rate has reached less than 0.01 for certain techniques, it is safe to say that current branch prediction techniques are very efficient. But for certain critical applications a small misprediction also poses a problem. In this paper, a new prediction technique is discussed which always predicts the branch correctly. This technique works well for else if loop at the cost of increased hardware resources.
This book investigates the susceptibility of intrinsic physically unclonable function (PUF) implementations on reconfigurable hardware to optical semi-invasive attacks from the chip backside. It explores different cla...
详细信息
ISBN:
(数字)9783319758206
ISBN:
(纸本)9783319758190
This book investigates the susceptibility of intrinsic physically unclonable function (PUF) implementations on reconfigurable hardware to optical semi-invasive attacks from the chip backside. It explores different classes of optical attacks, particularly photonic emission analysis, laser fault injection, and optical contactless probing. By applying these techniques, the book demonstrates that the secrets generated by a PUF can be predicted, manipulated or directly probed without affecting the behavior of the PUF. It subsequently discusses the cost and feasibility of launching such attacks against the very latest hardware technologies in a real scenario. The author discusses why PUFs are not tamper-evident in their current configuration, and therefore, PUFs alone cannot raise the security level of key storage. The author then reviews the potential and already implemented countermeasures, which can remedy PUFs’ security-related shortcomings and make them resistant to optical side-channel and optical fault attacks. Lastly, by making selected modifications to the functionality of an existing PUF architecture, the book presents a prototype tamper-evident sensor for detecting optical contactless probing attempts.
Sophisticated networking and communications capabilities that were previously the sole domain of mainframes, PCs, and workstations are now becoming mandatory in the realm of smaller embedded microcontrollers. However,...
详细信息
ISBN:
(数字)9780080470115
ISBN:
(纸本)9780750676984
Sophisticated networking and communications capabilities that were previously the sole domain of mainframes, PCs, and workstations are now becoming mandatory in the realm of smaller embedded microcontrollers. However, documentation, standards, and design information is scattered among many sources and is difficult to find. In this practical book, popular columnist and embedded designer Fred Eady is your guide and advisor. He pulls together all the necessary design background and details and shows you how to use today affordable microcontrollers for powerful communications and networking applications such as local area networks and embedded internet. Using working code examples and schematics, Eady steers you through the basics using two popular microcontroller families, PIC and Atmel. Included are a wealth of detailed design examples for: RS-232 firmware and hardware Microcontroller USARTs The I2C bus Ethernet implementation Embedded internet implementation Wireless linksSample source code is provided and thoroughly explained for all the application examples. The accompanying CD-ROM contains the example code as well as a searchable ebook version of the text, to help you get up to speed quickly. You could spend days or even weeks pulling together all the information that Eady has assembled in this one indispensable reference.* The only source that pulls together difficult-to-find design information, and teaches step-by-step how to use it to create powerful networking applications* Includes fully functional examples of microcontroller hardware and firmware* Companion cd-rom includes all schematics and code utilized in the book
Many systems administrators on the Mac need a way to manage machine configuration after initial setup and deployment. Apples Managed Preferences system (also known as MCX) is under-documented, often misunderstood, and...
详细信息
ISBN:
(数字)9781430229384
ISBN:
(纸本)9781430229377
Many systems administrators on the Mac need a way to manage machine configuration after initial setup and deployment. Apples Managed Preferences system (also known as MCX) is under-documented, often misunderstood, and sometimes outright unknown by sys admins. MCX is usually deployed in conjunction with an OS X server, but it can also be used in Windows environments or where no dedicated server exists at all. Enterprise Mac Managed Preferences is the definitive guide to Apples Managed Client technology. With this book, youll get the following: An example-driven guide to Mac OS X Managed Preferences/Client technology Recipes for common use case studies and patterns A targeted approach appropriate for any sys admin that manages Macs in an OS X or Windows environment This is the only book that focuses on this facet of OS X exclusively. If youre a sys admin, this book will take away much of the pain of working with OS X client systems. Even better, both of the authors are very involved in the Mac communityGreg Neagle is part of the MacEnterprise steering committee, and Ed is the Executive Editor and an author for MacTech magazine and a member of the Apple Consultants Network. What youll learn The Managed Preferences system and how to manage it All about Directory Services Local Directory Services How to work with property list files How to deliver files with Open Directory, ActiveDirectory, local scripts, third-party utilities, Puppet, LANRev, Casper, and more How to work with compositing preferences, including the hierarchy of preferences How to write a Plist for management, using Workgroup Manager and Dock Example How and when to enforce Managed Preferences How to understand manifests What recipes to use and when When, how, and where to use mcxquery, System Profiler, and MCX Cache flushing Who this book is for This book is for systems administrators using Mac clients.
Advances in GPU Research and Practice focuses on research and practices in GPU based systems. The topics treated cover a range of issues, ranging from hardware and architectural issues, to high level issues, such as a...
详细信息
ISBN:
(数字)9780128037881
ISBN:
(纸本)9780128037386
Advances in GPU Research and Practice focuses on research and practices in GPU based systems. The topics treated cover a range of issues, ranging from hardware and architectural issues, to high level issues, such as application systems, parallel programming, middleware, and power and energy issues. Divided into six parts, this edited volume provides the latest research on GPU computing. Part I: Architectural Solutions focuses on the architectural topics that improve on performance of GPUs, Part II: System Software discusses OS, compilers, libraries, programming environment, languages, and paradigms that are proposed and analyzed to help and support GPU programmers. Part III: Power and Reliability Issues covers different aspects of energy, power, and reliability concerns in GPUs. Part IV: Performance Analysis illustrates mathematical and analytical techniques to predict different performance metrics in GPUs. Part V: Algorithms presents how to design efficient algorithms and analyze their complexity for GPUs. Part VI: Applications and Related Topics provides use cases and examples of how GPUs are used across many sectors. Discusses how to maximize power and obtain peak reliability when designing, building, and using GPUsCovers system software (OS, compilers), programming environments, languages, and paradigms proposed to help and support GPU programmersExplains how to use mathematical and analytical techniques to predict different performance metrics in GPUsIllustrates the design of efficient GPU algorithms in areas such as bioinformatics, complex systems, social networks, and cryptographyProvides applications and use case scenarios in several different verticals, including medicine, social sciences, image processing, and telecommunications
Topics covered range from parallel algorithms, programming tools, OpenMP, MPI and OpenCL, followed by experimental measurements of parallel programs’ run-times, and by engineering analysis of obtained results fo...
详细信息
ISBN:
(数字)9783319988337
ISBN:
(纸本)9783319988320
Topics covered range from parallel algorithms, programming tools, OpenMP, MPI and OpenCL, followed by experimental measurements of parallel programs’ run-times, and by engineering analysis of obtained results for improved parallel execution performances.
暂无评论