Secondary ESD from a non-grounded decorative metal structure on an electronic device often leads to very large discharge currents and a fast rise time of less than 400 picoseconds. Due to the proximity of this seconda...
详细信息
ISBN:
(纸本)9781538666210
Secondary ESD from a non-grounded decorative metal structure on an electronic device often leads to very large discharge currents and a fast rise time of less than 400 picoseconds. Due to the proximity of this secondary ESD event to the electronics, it is likely to cause soft failures or latch-up. Secondary ESD can be detected in IEC 61000-4-2 setups by monitoring the currents, charge transfer, and sudden current increases due to the secondary ESD. An algorithm has been implemented in a test setup which automatically detects secondary ESD. However, due to pre-pulses, reignition of sparking within the relay, and other effects, the algorithm may lead to false positives and missed secondary ESD. This paper describes the implementation of the algorithm and presents the results of DUT testing.
The detection algorithm of compensation current command signal is one of the key technologies of power quality regulator. The real time nature of the detection algorithm affects the effect of compensation. Conventiona...
详细信息
ISBN:
(纸本)9781538653739
The detection algorithm of compensation current command signal is one of the key technologies of power quality regulator. The real time nature of the detection algorithm affects the effect of compensation. Conventional i(p)-i(q) detection algorithm is commonly filtered by Butterworth filters. However, its inherent delay characteristics make the detection real-time poor. In order to improve the real-time of the detection algorithm, this paper proposes an i(p)-i(q) detection algorithm based on Kalman filter. First, Establish equations of state and measurement for the Kalman filter based on i(p)-i(q). Then, the Kalman filter algorithm is used to filter i(p)-i(q) to obtain DC component, inverting the DC component to obtain the three-phase fundamental current. Finally, the proposed algorithm is simulated by matlab and compared with the algorithm which using Butterworth filter. The results show that the proposed algorithm is better than the latter in real-time.
The stool color card has been the primary tool for identifying acholic stools in infants with biliary atresia (BA), in several countries. However, BA stools are not always acholic, as obliteration of the bile duct occ...
详细信息
The stool color card has been the primary tool for identifying acholic stools in infants with biliary atresia (BA), in several countries. However, BA stools are not always acholic, as obliteration of the bile duct occurs gradually. This study aims to introduce Baby Poop (Baby unchi in Japanese), a free iPhone application, employing a detection algorithm to capture subtle differences in colors, even with non-acholic BA stools. The application is designed for use by caregivers of infants aged approximately 2 weeks-1 month. Baseline analysis to determine optimal color parameters predicting BA stools was performed using logistic regression (n = 50). Pattern recognition and machine learning processes were performed using 30 BA and 34 non-BA images. Additional 5 BA and 35 non-BA pictures were used to test accuracy. Hue, saturation, and value (HSV) were the preferred parameter for BA stool identification. A sensitivity and specificity were 100% (95% confidence interval 0.48-1.00 and 0.90-1.00, respectively) even among a collection of visually non-acholic, i.e., pigmented BA stools and relatively pale-colored non-BA stools. Results suggest that an iPhone mobile application integrated with a detection algorithm is an effective and convenient modality for early detection of BA, and potentially for other related diseases.
Taxi plays an important role in the urban passenger transport system. Good taxi service quality will help increase the happiness of urban residents. However, the issue of no-load taxis has always been one of the most ...
详细信息
Taxi plays an important role in the urban passenger transport system. Good taxi service quality will help increase the happiness of urban residents. However, the issue of no-load taxis has always been one of the most concerned issues for urban managers. This paper uses the improved DBSCAN method to carry on the cluster analysis to the taxi trajectory, prompts the taxi driver to avoid the no-load area, and achieves the purpose that to raise the taxi utilization factor. The improved DBSCAN method introduces two distance metrics, segment feature distance and dynamic space-time distortion distance. The feature distances of the segment include the vertical distance, horizontal distance, and angular distance, which can effectively measure the distance between trajectory segments. The dynamic space-time distortion distance introduces spatial factors on the basis of the dynamic distortion distance, and successfully overcomes the similarity error problem caused by different trajectory lengths. At the same time, using the GPS data set of Nanjing taxi to carry out experiments, the results show that the algorithm has higher accuracy and stability than the algorithms in the literature.
The high penetration rate of cars in Korea causes a great deal of congested traffic, and a variety of car management systems which use license plate detection technology are being employed to overcome this problem. Ho...
详细信息
ISBN:
(纸本)9781538606001
The high penetration rate of cars in Korea causes a great deal of congested traffic, and a variety of car management systems which use license plate detection technology are being employed to overcome this problem. However, detection errors occur in existing edge-based license plate detection technology due to a low license plate area recognition rate. Therefore, in this paper we have designed a car license plate area detection algorithm which improves the recognition rate through an operation which combines canny and Laplacian edges in order to improve the license plate recognition rate.
In wireless sensor networks (WSNs), coverage holes may appear because of sensors' random deployment, sensor destruction or consumption of sensor power. Discovery of boundaries of coverage holes is important for re...
详细信息
ISBN:
(纸本)9781509063529
In wireless sensor networks (WSNs), coverage holes may appear because of sensors' random deployment, sensor destruction or consumption of sensor power. Discovery of boundaries of coverage holes is important for repairing these holes and optimizing the whole network. In this paper, we use Rips complex as system model based on homology knowledge. We adopt a detection algorithm to find non-triangular holes only dependent on the connectivity information between sensors. Rely on the definition promoted, we can find all boundary edges and then initiate the process of finding coverage holes. We prove that our algorithm can reduce computation complexity of coverage holes detection by comparing with another homology-based method. And simulation results show that our algorithm can discover almost all non-triangular holes with the accuracy reaching up to 99.99%
One of the simplest ways of digital image forgery is a copy-move attack. The copy-move process consists of three stages: copy selected image fragment from one place, transform it using some image processing algorithm ...
详细信息
One of the simplest ways of digital image forgery is a copy-move attack. The copy-move process consists of three stages: copy selected image fragment from one place, transform it using some image processing algorithm and paste it to another place of the same image. Two main approaches to copy-move detection exist nowadays: feature-based and hash-based. Most of the algorithms are developed according to the feature-based approach, whereas the hash-based approach is used only for plain copymove detection (when the copied image fragment is not transformed). However, the main advantage of hash-based algorithms is low computational complexity. In this paper, we propose a new hash-based copy-move detection algorithm that can be applied to transformed duplicates detection due to a special preprocessing procedure. This procedure implements initial image transformation to incorporate the changes (affine transforms are not considered in this paper), produced by a transform algorithm on the second stage. Several preprocessing procedures are compared during experiments: image intensity range reduction, gradient calculation, expansion in orthonormal basis, adaptive linear contrast enhancement and local binary pattern. (C) 2017 The Authors. Published by Elsevier Ltd.
One of the simplest ways of digital image forgery is a copy-move attack. The copy-move process consists of three stages: copy selected image fragment from one place, transform it using some image processing algorithm ...
详细信息
One of the simplest ways of digital image forgery is a copy-move attack. The copy-move process consists of three stages: copy selected image fragment from one place, transform it using some image processing algorithm and paste it to another place of the same image. Two main approaches to copy-move detection exist nowadays: feature-based and hash-based. Most of the algorithms are developed according to the feature-based approach, whereas the hash-based approach is used only for plain copy-move detection (when the copied image fragment is not transformed). However, the main advantage of hash-based algorithms is low computational complexity. In this paper, we propose a new hash-based copy-move detection algorithm that can be applied to transformed duplicates detection due to a special preprocessing procedure. This procedure implements initial image transformation to incorporate the changes (affine transforms are not considered in this paper), produced by a transform algorithm on the second stage. Several preprocessing procedures are compared during experiments: image intensity range reduction, gradient calculation, expansion in orthonormal basis, adaptive linear contrast enhancement and local binary pattern.
Maximum power point tracking (MPPT) under partial shading condition (PSC) is a challenging research topic in the PV array system. As the shaded PV module makes different peak patterns on the power versus voltage curve...
详细信息
Maximum power point tracking (MPPT) under partial shading condition (PSC) is a challenging research topic in the PV array system. As the shaded PV module makes different peak patterns on the power versus voltage curve and misguides the MPPT algorithm, various kinds of global MPP (GMPP) detecting algorithms have been studied. Generally, too frequent execution of the GMPP tracking algorithm reduces the achievable power of PV module due to time spent on the scanning process. Thus, the partial shading detection algorithm is essential for efficient utilization of solar energy source. Based on the theoretical investigation of the characteristic curve patterns under various partial shading conditions, this paper presents a new detection algorithm utilizing power level monitoring. While conventional methods only focus on fast shading patterns, the proposed algorithm always shows superb performance regardless of the partial shading patterns.
As a hot-spot of 5G, the research on detection algorithms for massive multiple input multiple output (MIMO) system is significant but difficult. The traditional MIMO detection algorithms or their improvements are not ...
详细信息
As a hot-spot of 5G, the research on detection algorithms for massive multiple input multiple output (MIMO) system is significant but difficult. The traditional MIMO detection algorithms or their improvements are not appropriate for large scaled antennas. In this paper, we propose artificial bee colony (ABC) detection algorithm for massive MIMO system. As one advanced technology of swarm intelligence, ABC algorithm is most efficient for large scaled constrained numerical combinatorial optimization problem. Therefore, we employ it to search the optimum solution vector in the modulation alphabet with linear detection result as initial. Simulation and data analysis prove the correctness and efficiency. Versus the scale of massive MIMO systems from 64 x 64 to 1024 x 1024 with uncoded four-quadrature-amplitude-modulation signals, the proposed ABC detection algorithm obtains bit error rate of 10(-5) at low average received signal-to-noise-ratio of 12 dB with rapid convergence rate, which approximates the optimum bit error rate performance of the maximum likelihood and achieves the theoretical optimum spectral efficiency with low required average received signal-to-noise-ratio of 10 dB in similar increasing regularity, over finite time of low polynomial computational complexity of O(N-T(2)) per symbol, where N-T denotes the transmitting antennas' number. The proposed ABC detection algorithm is efficient for massive MIMO system. Copyright (C) 2016 John Wiley & Sons, Ltd.
暂无评论