For permanent magnet synchronous machines(PMSMs),accurate inductance is critical for control design and condition *** to magnetic saturation,existing methods require nonlinear saturation model and measurements from mu...
详细信息
For permanent magnet synchronous machines(PMSMs),accurate inductance is critical for control design and condition *** to magnetic saturation,existing methods require nonlinear saturation model and measurements from multiple load/current conditions,and the estimation is relying on the accuracy of saturation model and other machine parameters in the *** harmonic produced by harmonic currents is inductance-dependent,and thus this paper explores the use of magnitude and phase angle of the speed harmonic for accurate inductance *** estimation models are built based on either the magnitude or phase angle,and the inductances can be from d-axis voltage and the magnitude or phase angle,in which the filter influence in harmonic extraction is considered to ensure the estimation *** inductances can be estimated from the measurements under one load condition,which is free of saturation ***,the inductance estimation is robust to the change of other machine *** proposed approach can effectively improve estimation accuracy especially under the condition with low current *** and comparisons are conducted on a test PMSM to validate the proposed approach.
作者:
Boumaraf, MessaoudaMerazka, FatihaLISIC Laboratory
Telecommunications Department Electronic and Computer Engineering Faculty USTHB University Algiers Algeria LISIC Laboratory
Telecommunications Department Electrical Engineering Faculty USTHB University Algiers Algeria
This paper presents a speech encryption algorithm utilizing chaotic shift keying alongside error recovery techniques for the G.722.2 codec. The algorithm employs chaotic data interleaving on speech inter-frames to rep...
详细信息
Searching the occurrences of specific code patterns (code search) is a common task in software engineering, and programming by example (PBE) techniques have been applied to ease customizing code patterns. However, pre...
详细信息
Distributed denial of service(DDoS)attacks are common network attacks that primarily target Internet of Things(IoT)*** are critical for emerging wireless services,especially for applications with limited *** attacks p...
详细信息
Distributed denial of service(DDoS)attacks are common network attacks that primarily target Internet of Things(IoT)*** are critical for emerging wireless services,especially for applications with limited *** attacks pose significant risks to entrepreneurial businesses,preventing legitimate customers from accessing their *** attacks require intelligent analytics before processing service *** denial of service(DDoS)attacks exploit vulnerabilities in IoT devices by launchingmulti-point distributed *** attacks generate massive traffic that overwhelms the victim’s network,disrupting normal *** consequences of distributed denial of service(DDoS)attacks are typically more severe in software-defined networks(SDNs)than in traditional *** centralised architecture of these networks can exacerbate existing vulnerabilities,as these weaknesses may not be effectively addressed in this *** preliminary objective for detecting and mitigating distributed denial of service(DDoS)attacks in software-defined networks(SDN)is to monitor traffic patterns and identify anomalies that indicate distributed denial of service(DDoS)*** implements measures to counter the effects ofDDoS attacks,and ensure network reliability and availability by leveraging the flexibility and programmability of SDN to adaptively respond to *** authors present a mechanism that leverages the OpenFlow and sFlow protocols to counter the threats posed by DDoS *** results indicate that the proposed model effectively mitigates the negative effects of DDoS attacks in an SDN environment.
With the advance of 5G technologies and the development of space-air-ground-sea applications,the fast and efficient collection and processing of the explosive growth of sensing data have become significant and *** thi...
详细信息
With the advance of 5G technologies and the development of space-air-ground-sea applications,the fast and efficient collection and processing of the explosive growth of sensing data have become significant and *** this paper,considering the Age of Information(AoI),the limited coverage of Base Stations(BS),and the constrained computation capability of Unmanned Aerial Vehicle(UAV),we propose a hybrid communication framework that utilizes UAVs as relays to optimize the collection of sensing *** aim to minimize the average AoI of the data among all sensor nodes while considering the energy consumption constraints of sensor nodes,which is formulated as a Mixed Integer NonLinear Programming(MINLP).To address this problem,we decompose it into communication resource allocation and computation resource ***,the average AoI of the whole system is minimized and the average energy consumption constraint of sensor nodes is *** simulation results show that our proposed method can achieve significant performance *** specific,our proposed method can reduce the average AoI by 20%,11%,and 43%compared to the three counterparts,Data Transmission Directly Algorithm(DTDA),Max Weight Algorithm(MWA),and matching algorithm,respectively.
The component aging has become a significant concern worldwide,and the frequent failures pose a serious threat to the reliability of modern power *** light of this issue,this paper presents a power system reliability ...
详细信息
The component aging has become a significant concern worldwide,and the frequent failures pose a serious threat to the reliability of modern power *** light of this issue,this paper presents a power system reliability evaluation method based on sequential Monte Carlo simulation(SMCS)to quantify system reliability considering multiple failure modes of ***,a three-state component reliability model is established to explicitly describe the state transition process of the component subject to both aging failure and random failure *** this model,the impact of each failure mode is decoupled and characterized as the combination of two state duration variables,which are separately modeled using specific probability ***,SMCS is used to integrate the three-state component reliability model for state transition sequence generation and system reliability ***,various reliability metrics,including the probability of load curtailment(PLC),expected frequency of load curtailment(EFLC),and expected energy not supplied(EENS),can be *** ensure the applicability of the proposed method,Hash table grouping and the maximum feasible load level judgment techniques are jointly adopted to enhance its computational *** studies are conducted on different aging scenarios to illustrate and validate the effectiveness and practicality of the proposed method.
Vehicular consumer electronics, such as autonomous vehicles (AVs), need collecting large amounts of private user information, which face the risk of privacy leakage. To protect the privacy of consumers, researchers ha...
详细信息
Intrusion prevention is significant to avoid device damage and financial losses. Researchers have proposed various Intrusion Prevention systems (IPS) to prevent malware, including traditional and SDN-based IPS. Howeve...
详细信息
Microgrids(MGs)with high penetration of dis-tributed generators may cause congestion in the distribution net-work during *** address this issue,this paper proposes a two-time-scale congestion management scheme for mul...
详细信息
Microgrids(MGs)with high penetration of dis-tributed generators may cause congestion in the distribution net-work during *** address this issue,this paper proposes a two-time-scale congestion management scheme for multiple MGs integrated distribution ***-ahead hourly-scale dynamic congestion management(DCM)is formulated as a con-strained optimization problem,which can be solved by utilizing the proposed alternating iterative method,with the privacy of both the distribution network and MGs being *** sub-hourly-scale contract energy tracking aims at fully utilizing the controllable resources of the MGs to minimize the difference of the contract and actual exchanged energy between the MG and distribution *** coordination of the proposed two timescales of management schemes,the MGs integrated distribution networks can operate economically while avoiding the probable congestion predicament with high penetration of renewable *** studies with a i3-bus system MGs integrated distribution network demonstrated this proposed approach is effective to manage the congestion problem in the distribution network,while the energy tracking approach can improve the welfare of the MGs engaged in energy contracts ***-Alternating giterativemethod,congestion management,microgrids,renewable energy integration.
作者:
Shirzi, Moteaal AsadiKermani, Mehrdad R.Western University
Advanced Robotics and Mechatronic Systems Laboratory Electrical and Computer Engineering Department LondonONN6A 5B9 Canada Western University
Advanced Robotics and Mechatronic Systems Laboratory The Department of Electrical and Computer Engineering LondonONN6A 5B9 Canada
In this article, we propose a new algorithm to improve plant recognition through the use of feature descriptors. The accurate results from this identification method are essential for enabling autonomous tasks, such a...
详细信息
暂无评论