A control method for small domestic power plants using renewable energy is described in this paper. This method is not only capable of optimizing the working point of the plant but also implements active power factor ...
详细信息
A control method for small domestic power plants using renewable energy is described in this paper. This method is not only capable of optimizing the working point of the plant but also implements active power factor correction and lowers the extant harmonic distortion in the line. The novel element in the proposed complex controller structure is the upper harmonic controller that minimizes the amplitudes of the 3rd, 5th 7th, 9th, and the 11th upper harmonic component in the output voltage. The proposed controller has been investigated by simulation in Matlab environment, and as a result, substantial improvement of the output voltage and current waveform could be achieved. Robustness of the method against nonlinear loads has also been tested.
作者:
Gábor SzederkényiProcess Control Research Group
Systems and Control Laboratory Computer and Automation Research Institute (MTA-SZTAKI) Hungarian Academy of Sciences P.O. Box 63 H-1518 Budapest Hungary
The reaction kinetic realizations of nonnegative polynomial systems are studied in this paper. It is briefly reviewed that a wide class of positive systems can be written in or simply transformed to kinetic form. Base...
详细信息
The reaction kinetic realizations of nonnegative polynomial systems are studied in this paper. It is briefly reviewed that a wide class of positive systems can be written in or simply transformed to kinetic form. Based on the structure of kinetic realizations, valuable information can be obtained about the dynamical properties of the investigated systems using the results of chemical reaction network theory (CRNT). Since the realizations of a given system can have many different structures, mixed integer linear programming is used to generate the ones with required properties (i.e. the minimal/maximal number of reactions or complexes).
In atomic force microscopy (AFM) the imaging speed is strongly limited by the bandwidth of the feedback loop that controls the interaction between the measurement tip and the sample. A significant increase in closed-l...
详细信息
The objective of the discrete-time modeling tools is twofold. First, they give an insight into the basic ideas of discrete-time modeling of dc-dc converters for university students and interested power electronics spe...
详细信息
Short nap is a good relaxation way when people feel sleepy and tired during the day time. An automatic light sleep level estimation technique was presented for short nap sleep evaluation. Parameters were extracted fro...
详细信息
This paper deals with the topic of qLPV statespace model based control design in which LMIs are used to optimize the multi-objective control performance. In this paper we investigate how the convex hull of the polytop...
详细信息
This paper falls in the topic of qLPV state-space model based control design in which LMIs are used to optimize the multi-objective control performance. In this paper we investigate how the convex hull of the polytopi...
详细信息
We analyze the effects of dynamic packet traffic on jamming attacks in wireless networks. For random access over collision channels, the jamming problem is formulated as a non-cooperative game in which nodes choose th...
详细信息
ISBN:
(纸本)9781424475254
We analyze the effects of dynamic packet traffic on jamming attacks in wireless networks. For random access over collision channels, the jamming problem is formulated as a non-cooperative game in which nodes choose their transmission probabilities under energy and delay constraints. We relax the standard assumption of backlogged nodes and evaluate the Nash equilibrium strategies for random arrivals, which introduces the possibility that jamming attacks fail due to empty packet queues at the transmitters. The maximum feasible throughput is derived depending on whether jammers have the queue state knowledge, or not. We also model the effects of erroneous queue state inference due to random packet traffic and incorporate the channel sensing capability before jamming. The analysis extends from one transmitter-jammer pair transmitting over a single channel at a single access point to multiple transmitters and jammers, and then to an arbitrary number of subchannels at multiple channel access points. In the resulting jamming games, we show that jammers cannot effectively increase the average energy cost and cannot decrease the feasible throughput for transmitters, if they face uncertainty on transmitter queue states. Therefore, medium access is less vulnerable to jamming attacks under increasing traffic uncertainty. This motivates the use of traffic dynamics as a defense mechanism to mitigate denial of service attacks in wireless access.
The paper describes the design and performance of a novel technique that can be used to calculate the geographic locations of nodes that form wireless sensor network system (WSN). Location awareness is required for ma...
详细信息
Since data sharing mechanism between the various business systems lacks of specification and standardization, information shares hardly and data exchange are inefficient, the paper proposes a data exchange platform fo...
详细信息
暂无评论