Bidirectional electric vehicle (EV) charging enables stored energy to reduce peak loads for buildings (V2B) and the grid (V2G). However, building owners investing in V2B infrastructure while generating revenue from V2...
详细信息
The magnetic flux in a permanent magnet transverse flux generator(PMTFG) is three-dimensional(3D), therefore, its efficacy is evaluated using 3D magnetic field analysis. Although the 3D finite-element method(FEM) is h...
详细信息
The magnetic flux in a permanent magnet transverse flux generator(PMTFG) is three-dimensional(3D), therefore, its efficacy is evaluated using 3D magnetic field analysis. Although the 3D finite-element method(FEM) is highly accurate and reliable for machine simulation, it requires a long computation time, which is crucial when it is to be used in an iterative optimization process. Therefore, an alternative to 3DFEM is required as a rapid and accurate analytical technique. This paper presents an analytical model for PMTFG analysis using winding function method. To obtain the air gap MMF distribution, the excitation magneto-motive force(MMF) and the turn function are determined based on certain assumptions. The magnetizing inductance, flux density, and back-electro-magnetomotive force of the winding are then determined. To assess the accuracy of the proposed method, the analytically calculated parameters of the generator are compared to those obtained by a 3D-FEM. The presented method requires significantly shorter computation time than the 3D-FEM with comparable accuracy.
The growing prevalence of Internet of Things (IoT) devices has heightened vulnerabilities to botnet-based cyberattacks, necessitating robust detection mechanisms. This paper proposes DenseRSE-ASPPNet, an advanced deep...
详细信息
Photovoltaic(PV)modules age with time for various reasons such as corroded joints and terminals and glass coating defects,and their ageing degrades the PV array *** the help of the PV array numerical model,this paper ...
详细信息
Photovoltaic(PV)modules age with time for various reasons such as corroded joints and terminals and glass coating defects,and their ageing degrades the PV array *** the help of the PV array numerical model,this paper explores the effects of PV module ageing on the PV array power,and the power gains and costs of rearranging and recabling aged PV modules in a PV *** numerical PV array model is first revised to account for module ageing,rearrangement and recabling,with the relevant equations presented *** updated numerical model is then used to obtain the array powers for seven different PV *** power results are then analysed in view of the attributes of the seven PV array examples.A guiding method to recommend recabling after rearranging aged modules is then proposed,leading to further significant power gains,while eliminating intra-row *** certain conditions are met,it was shown that recabling PV modules after rearranging them may lead to further significant power gains,reaching 57%and 98%in two considered PV array *** gains are possible in other arrays.A cost-benefit analysis weighing annual power gains versus estimated recabling costs is also given for the seven considered PV array examples to guide recabling decisions based on technical and economic *** the considered examples,recabling costs can be recovered in<4 *** with the powers of the aged arrays,power gains due to our proposed rearranging and recabling the PV arrays ranged between 73%and 131%in the considered examples—well over the gains reported in the ***,the cost of our static module rearrangement and recabling method outshines the costs of dynamic reconfiguration methods recently published in the literature.
Dear Editor,This letter presents a novel process monitoring model based on ensemble structure analysis(ESA).The ESA model takes advantage of principal component analysis(PCA),locality preserving projections(LPP),and m...
详细信息
Dear Editor,This letter presents a novel process monitoring model based on ensemble structure analysis(ESA).The ESA model takes advantage of principal component analysis(PCA),locality preserving projections(LPP),and multi-manifold projections(MMP)models,and then combines the multiple solutions within an ensemble result through Bayesian *** the developed ESA model,different structure features of the given dataset are taken into account simultaneously,the suitability and reliability of the ESA-based monitoring model are then illustrated through ***:The requirement for ensuring safe operation and improving process efficiency has led to increased research activity in the field of process monitoring.
As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management *** has become a promi...
详细信息
As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management *** has become a promising solution to this problem due to its powerful modeling capability,which has become a consensus in academia and ***,because of the data-dependence and inexplicability of AI models and the openness of electromagnetic space,the physical layer digital communication signals identification model is threatened by adversarial *** examples pose a common threat to AI models,where well-designed and slight perturbations added to input data can cause wrong ***,the security of AI models for the digital communication signals identification is the premise of its efficient and credible *** this paper,we first launch adversarial attacks on the end-to-end AI model for automatic modulation classifi-cation,and then we explain and present three defense mechanisms based on the adversarial *** we present more detailed adversarial indicators to evaluate attack and defense ***,a demonstration verification system is developed to show that the adversarial attack is a real threat to the digital communication signals identification model,which should be paid more attention in future research.
Constructing an effective common latent embedding by aligning the latent spaces of cross-modal variational autoencoders(VAEs) is a popular strategy for generalized zero-shot learning(GZSL). However, due to the lac...
详细信息
Constructing an effective common latent embedding by aligning the latent spaces of cross-modal variational autoencoders(VAEs) is a popular strategy for generalized zero-shot learning(GZSL). However, due to the lack of fine-grained instance-wise annotations, existing VAE methods can easily suffer from the posterior collapse problem. In this paper, we propose an innovative asymmetric VAE network by aligning enhanced feature representation(AEFR) for GZSL. Distinguished from general VAE structures, we designed two asymmetric encoders for visual and semantic observations and one decoder for visual reconstruction. Specifically, we propose a simple yet effective gated attention mechanism(GAM) in the visual encoder for enhancing the information interaction between observations and latent variables, alleviating the possible posterior collapse problem effectively. In addition, we propose a novel distributional decoupling-based contrastive learning(D2-CL) to guide learning classification-relevant information while aligning the representations at the taxonomy level in the latent representation space. Extensive experiments on publicly available datasets demonstrate the state-of-the-art performance of our method. The source code is available at https://***/seeyourmind/AEFR.
The modern university computer lab and kindergarden through 12th grade classrooms require a centralized solution to efficiently manage a large number of desktops. The existing solutions either bring virtualization ove...
详细信息
The modern university computer lab and kindergarden through 12th grade classrooms require a centralized solution to efficiently manage a large number of desktops. The existing solutions either bring virtualization overhead in runtime or requires loading a large image over 30 GB leading to an unacceptable network latency. In this work, we propose Troy which takes advantage of the differencing virtual hard disk techniques in Windows *** such, Troy only loads the modifications made on one machine to all other machines. Troy consists of two modules that are responsible to generate an initial image and merge a differencing image with its parent image, respectively. Specifically, we identify the key fields in the virtual hard disk image that links the differencing image and the parent image and find the modified blocks in the differencing images that should be used to replace the blocks in the parent image. We further design a lazy copy solution to reduce the I/O burden in image merging. We have implemented Troy on bare metal machines. The evaluation results show that the performance of Troy is comparable to the native implementation in Windows, without requiring the Windows environment.
Boolean satisfiability (SAT) is widely used as a solver engine in electronic design automation (EDA). Typically, SAT is used to determine whether one or more groups of variables can be combined to form a true formula....
详细信息
Boolean satisfiability (SAT) is widely used as a solver engine in electronic design automation (EDA). Typically, SAT is used to determine whether one or more groups of variables can be combined to form a true formula. All solutions SAT (AllSAT) is a variant of the SAT problem. In the fields of formal verification and pattern generation, AllSAT is particularly useful because it efficiently enumerates all possible solutions. In this paper, a semi-tensor product (STP) based AllSAT solver is proposed. The solver can solve instances described in both the conjunctive normal form (CNF) and circuit form. The implementation of our method differs from incremental enumeration because we do not add blocking conditions for existing solutions, but rather compute the matrices to obtain all the solutions in one pass. Additionally, the logical matrices support a variety of logic operations. Results from experiments with MCNC benchmarks using CNF-based and circuit-based forms show that our method can accelerate CPU time by 8.1x (238x maximum) and 19.9x (72x maximum), respectively.
Photovoltaic arrays receive varying levels of solar radiation due to factors such as shadows created by clouds, surrounding buildings, and other obstructions. Therefore, an effective Maximum Power Point Tracking (MPPT...
详细信息
暂无评论