In view of the complexity of the flux density harmonic components of bilateral-excitation flux modulation (BFM) machines, it is not easy to analyze the role of air-gap flux density harmonics on the electromagnetic tor...
详细信息
ISBN:
(数字)9798350362213
ISBN:
(纸本)9798350362220
In view of the complexity of the flux density harmonic components of bilateral-excitation flux modulation (BFM) machines, it is not easy to analyze the role of air-gap flux density harmonics on the electromagnetic torque of BFM machines. In this digest, Taking the novel asymmetric stator tooth (AST) BFM machine as the research object, the flux modulation phenomena of the PM magneto motive-force (MMF) and armature winding MMF are analyzed in detail. Meanwhile, based on the air-gap field modulation theory and Maxwell stress tensor equation, the contribution of air-gap flux density harmonics to the electromagnetic torque of the BFM machine is obtained.
The automotive industry depends on computers to control and monitor vehicles behaviour. The Universal Measurement and Calibration Protocol (XCP) connects calibration systems to electronic control units (ECUs). Nowaday...
The automotive industry depends on computers to control and monitor vehicles behaviour. The Universal Measurement and Calibration Protocol (XCP) connects calibration systems to electronic control units (ECUs). Nowadays, AUTOSAR-based XCP for single core ECUs is widely used in automotive industry. As the demand for computing power is rapidly increasing in the automotive domain, car manufacturers are gradually introducing multi-core ECUs in their electronic architectures. Multi-core ECUs provide high level of parallelism. This research work aims to deliver a multi-core implementation of an AUTOSAR-based XCP module, as it is important to have an efficient process of measurement and calibration on multi-core targets. The paper results are ensuring data consistency on the application level, avoiding race conditions between writer core and reader core which might result in processing rubbish data, and decreasing data dependency between cores.
In classical works on a planar differential pursuit-evasion game with a faster pursuer, the intercept point resulting from the equilibrium strategies lies on the Apollonius circle. This property was exploited for the ...
详细信息
In this paper, we study both multi-armed and contextual bandit problems in censored environments. Our goal is to estimate the performance loss due to censorship in the context of classical algorithms designed for unce...
ISBN:
(纸本)9781713871088
In this paper, we study both multi-armed and contextual bandit problems in censored environments. Our goal is to estimate the performance loss due to censorship in the context of classical algorithms designed for uncensored environments. Our main contributions include the introduction of a broad class of censorship models and their analysis in terms of the effective dimension of the problem - a natural measure of its underlying statistical complexity and main driver of the regret bound. In particular, the effective dimension allows us to maintain the structure of the original problem at first order, while embedding it in a bigger space, and thus naturally leads to results analogous to uncensored settings. Our analysis involves a continuous generalization of the Elliptical Potential Inequality, which we believe is of independent interest. We also discover an interesting property of decision- making under censorship: a transient phase during which initial misspecification of censorship is self-corrected at an extra cost; followed by a stationary phase that reflects the inherent slowdown of learning governed by the effective dimension. Our results are useful for applications of sequential decision-making models where the feedback received depends on strategic uncertainty (e.g., agents' willingness to follow a recommendation) and/or random uncertainty (e.g., loss or delay in arrival of information).
Advancements in autonomous mobile robots hinge on refining key components like mapping and path planning to address identified limitations. The local planner, crucial for obstacle avoidance, is a component of path pla...
详细信息
ISBN:
(数字)9798350393965
ISBN:
(纸本)9798350393972
Advancements in autonomous mobile robots hinge on refining key components like mapping and path planning to address identified limitations. The local planner, crucial for obstacle avoidance, is a component of path planning. The Follow the Gap Method (FGM) stands out as a simple and effective obstacle avoidance algorithm. FGM calculates possible passage points by assessing gap sizes and positions of obstacles. Our focus lies in enhancing FGM's adaptability to dynamic environments. Introducing Predictive FGM, we incorporate robot and dynamic obstacle data to forecast future gaps and obstacle states. By integrating predictive elements, the algorithm selects gaps based on anticipated changes, enabling safer navigation by predicting the states of gaps and obstacles when they are closest to the robot. Evaluation via Monte Carlo simulations and real-world experiments with an autonomous wheelchair in dynamic environments show the effectiveness of Predictive FGM over standard FGM.
Deep learning proved effective in detecting COVID-19 from chest X-ray images. Although computing is the current bottleneck in training and deploying models, few studies focus on developing efficient frameworks while m...
详细信息
We continue to tackle the problem of poorly defined security metrics by building on and improving our previous work on designing sound security metrics. We reformulate the previous method into a set of conditions that...
详细信息
ISBN:
(数字)9781665488105
ISBN:
(纸本)9781665488112
We continue to tackle the problem of poorly defined security metrics by building on and improving our previous work on designing sound security metrics. We reformulate the previous method into a set of conditions that are clearer and more widely applicable for deriving sound security metrics. We also modify and enhance some concepts that led to an unforeseen weakness in the previous method that was subsequently found by users, thereby eliminating this weakness from the conditions. We present examples showing how the conditions can be used to obtain sound security metrics. To demonstrate the conditions' versatility, we apply them to show that an aggregate security metric made up of sound security metrics is also sound. This is useful where the use of an aggregate measure may be preferred, to more easily understand the security of a system.
The kinds of 5G waveforms require to saturate different demands of transmitting signals. Unfortunately, the spectrum resources are limited. Thus, the spectrum sensing technique should be overcome this issue of communi...
详细信息
Deep Neural Networks (DNNs) have been found to outperform conventional programming approaches in several applications such as computer vision and natural language processing. Efficient hardware architectures for deplo...
详细信息
ISBN:
(纸本)9781665432740
Deep Neural Networks (DNNs) have been found to outperform conventional programming approaches in several applications such as computer vision and natural language processing. Efficient hardware architectures for deploying DNNs on edge devices have been actively studied. Emerging memory technologies with their better scalability, non-volatility, and good read performance are ideal candidates for DNNs which are trained once and deployed over many devices. Emerging memories have also been used in DNNs accelerators for efficient computations of dot-product. However, due to immature manufacturing and limited cell endurance, emerging resistive memories often result in reliability issues like stuck-at faults, which reduce the chip yield and pose a challenge to the accuracy of DNNs. Depending on the state, stuck-at faults may or may not cause error. Fault-tolerance of DNNs can be enhanced by reducing the impact of errors resulting from the stuck-at faults. In this work, we introduce simple and light-weight Intra-block Address remapping and weight encoding techniques to improve the fault-tolerance for DNNs. The proposed schemes effectively work at the network deployment time while preserving the network organization and the original values of the parameters. Experimental results on state-of-the-art DNN models indicate that, with a small storage overhead of just 0.98%, the proposed techniques achieve up to 300× stuck-at faults tolerance capability on Cifar10 dataset and 125× on Imagenet datatset, compared to the baseline DNNs without any fault-tolerance method. By integrating with the existing schemes, the proposed schemes can further enhance the fault resilience of DNNs.
This paper presents a novel testbed designed for 5th-Generation (5G) positioning using Universal Software Radio Peripherals (USRPs). The testbed integrates multiple units: an Operation Unit for test management, a User...
详细信息
暂无评论