The worm experimental environment is a pivotal foundation for the worm research. In this paper, with a comprehensive analysis of existing technologies for building worm experimental environment, including analytical m...
详细信息
A comparative study on photovoltaic characterizations in crisscrossed-silicon-nanorod (CSNR) solar cells with an n-type-CSNR/intrinsic- CSNR/polycrystalline-silicon/p-type-Si(100)-stacked structure was demonstrated by...
详细信息
In the research of Emergency Preparedness (EP), knowledge representation and storage of the EP is one of the most important tasks. However, most of the existing plans are ill-structured and lacked compatibility, which...
详细信息
Event log is the important starting point of any process analysis technique. Existent business process analysis techniques are applied mainly to manual or simulated logs, considering mainly information about control p...
详细信息
In this paper we study fault diagnosis of systems modeled by untimed continuous Petri *** particular,we generalize our previous works in this framework where we solved this problem only for special classes of continuo...
详细信息
In this paper we study fault diagnosis of systems modeled by untimed continuous Petri *** particular,we generalize our previous works in this framework where we solved this problem only for special classes of continuous Petri nets,namely state machines and backward conflict free *** show that the price to pay for this generalization is that only three diagnosis states can be defined,rather than ***,this is not a significant restriction because it is in accordance with all the literature on finite state automata.
This paper presents a method for estimating the torque and speed of line-start induction motor (IM). IM is being used for various purposes because that is a high trust machine for the load mechanism and can be used ea...
详细信息
This paper presents a method for estimating the torque and speed of line-start induction motor (IM). IM is being used for various purposes because that is a high trust machine for the load mechanism and can be used easily. So, IM is non-breakable. However, load mechanism sometime break. We try to check the condition of load mechanism by estimate the torque and speed of IM. We take up the motor-operated valve for load mechanism. Motor-operated valve is driven by line-start IM. Movement environment of IM is characterized by high temperature and humidity and therefore, it is difficult to position sensors near motor. In such a case, we must troubleshoot the system without using torque or speed sensors. The proposal method can estimate the torque and speed of IM by using the current and voltage near the switchboard. We use the inner and outer products between currents and voltages. Furthermore, we propose the parameter identification method of mutual inductance, leaked inductance and rotor resistance. The proposed method is validated by experimental results.
This paper presents a new interface framework which has been added to Easy Java Simualtions' environment in order to improve its graphical features for 3D modeling. These new 3D capabilities provide users a set of...
详细信息
ISBN:
(纸本)9783902661562
This paper presents a new interface framework which has been added to Easy Java Simualtions' environment in order to improve its graphical features for 3D modeling. These new 3D capabilities provide users a set of new view elements which can be used to develop models with a high degree of reality. In this way, Easy Java Simulations becomes a powerful tool to easily and quickly create 3D realistic simulations.
In traditional reliability theory, both the system and its components are allowed to take only two possible states: working or failed. On the other hand, in a multi-state system, both the system and the components are...
详细信息
Currently, it is noticed that users tend to choose shorter password as their authentication which can be easily attacked. Biometric technologies such as fingerprint scanning, voice authentication, face recognition, si...
详细信息
Currently, it is noticed that users tend to choose shorter password as their authentication which can be easily attacked. Biometric technologies such as fingerprint scanning, voice authentication, face recognition, signature, hand geometry and iris recognition is now playing an important role especially in application related to security issue. In this work, we present an approach to generate a unique and more secure cryptographic key from iris template. The iris images are processed to produce iris template or code to be utilized for the encryption and decryption tasks. AES cryptography algorithm are employed to encrypt and decrypt the identity data. Distance metric such as hamming distance and Euclidean distance are used for the template matching identification process. Experimental results show that this system can obtain a higher security with a low false rejection or false acceptance rate.
KF-SLAM(Kalman filter-SLAM) have been used as a popular solution by researchers in many SLAM application. Nevertheless, it shortcomings of assumption for Gaussian noise limited its efficiency and demand researcher to ...
详细信息
暂无评论