This paper presents a method for estimating the torque and speed of line-start induction motor (IM). IM is being used for various purposes because that is a high trust machine for the load mechanism and can be used ea...
详细信息
This paper presents a method for estimating the torque and speed of line-start induction motor (IM). IM is being used for various purposes because that is a high trust machine for the load mechanism and can be used easily. So, IM is non-breakable. However, load mechanism sometime break. We try to check the condition of load mechanism by estimate the torque and speed of IM. We take up the motor-operated valve for load mechanism. Motor-operated valve is driven by line-start IM. Movement environment of IM is characterized by high temperature and humidity and therefore, it is difficult to position sensors near motor. In such a case, we must troubleshoot the system without using torque or speed sensors. The proposal method can estimate the torque and speed of IM by using the current and voltage near the switchboard. We use the inner and outer products between currents and voltages. Furthermore, we propose the parameter identification method of mutual inductance, leaked inductance and rotor resistance. The proposed method is validated by experimental results.
This paper presents a new interface framework which has been added to Easy Java Simualtions' environment in order to improve its graphical features for 3D modeling. These new 3D capabilities provide users a set of...
详细信息
ISBN:
(纸本)9783902661562
This paper presents a new interface framework which has been added to Easy Java Simualtions' environment in order to improve its graphical features for 3D modeling. These new 3D capabilities provide users a set of new view elements which can be used to develop models with a high degree of reality. In this way, Easy Java Simulations becomes a powerful tool to easily and quickly create 3D realistic simulations.
In traditional reliability theory, both the system and its components are allowed to take only two possible states: working or failed. On the other hand, in a multi-state system, both the system and the components are...
详细信息
Currently, it is noticed that users tend to choose shorter password as their authentication which can be easily attacked. Biometric technologies such as fingerprint scanning, voice authentication, face recognition, si...
详细信息
Currently, it is noticed that users tend to choose shorter password as their authentication which can be easily attacked. Biometric technologies such as fingerprint scanning, voice authentication, face recognition, signature, hand geometry and iris recognition is now playing an important role especially in application related to security issue. In this work, we present an approach to generate a unique and more secure cryptographic key from iris template. The iris images are processed to produce iris template or code to be utilized for the encryption and decryption tasks. AES cryptography algorithm are employed to encrypt and decrypt the identity data. Distance metric such as hamming distance and Euclidean distance are used for the template matching identification process. Experimental results show that this system can obtain a higher security with a low false rejection or false acceptance rate.
KF-SLAM(Kalman filter-SLAM) have been used as a popular solution by researchers in many SLAM application. Nevertheless, it shortcomings of assumption for Gaussian noise limited its efficiency and demand researcher to ...
详细信息
This paper describes environmental recognition and motion control using weightless neural network classifier and interval type-2 fuzzy logic controller. The weightless neural network classifies geometric feature such ...
详细信息
This paper describes environmental recognition and motion control using weightless neural network classifier and interval type-2 fuzzy logic controller. The weightless neural network classifies geometric feature such as U-shape, corridor and left or right corner using ultrasonic sensors. The neural network utilizes previous sensor data and analyzes the situation of the current environment. The behavior of mobile robot is implemented by means of fuzzy control rules. Based on the performance criteria the quality of controller is evaluated to make navigation decisions. This functionality is demonstrated on a mobile robot using modular platform and containing several microcontrollers implies the implementation of a robust architecture. The proposed architecture implemented using low cost range sensor and low cost microprocessor. The experiment results show that the mobile robot can recognize the current environment and was able to successfully avoid obstacle in real time.
In order to introduce cognition, i.e. perception and autonomously reconfigured control, into manufacturing systems for increasing the flexibility and adaptivity this paper proposes an architecture of a cognitive safet...
详细信息
This paper presents an architecture for context-aware Ubiquitous Robotics applications, where mobile robots cooperate with intelligent environments to fulfill their tasks. Specifically, the work is focused on distribu...
详细信息
This paper presents an architecture for context-aware Ubiquitous Robotics applications, where mobile robots cooperate with intelligent environments to fulfill their tasks. Specifically, the work is focused on distributed knowledge representation issues and context assessment strategies, and introduces a technique for on-line context recognition in highly dynamic environments. Experimental validation, performed in a civillian hospital building, is described and discussed.
The paper explores new expansions of eigenvalues for - Δ u = λ ρ u in S with Dirichlet boundary conditions by Wilson's element. The expansions indicate that Wilson's element provides lower bounds of the eig...
详细信息
The present paper discusses results of the global study carried out during the past two years to estimate the student workload (an ECTS preliminary estimate) for the first course of the degree in Electrical and Electr...
详细信息
The present paper discusses results of the global study carried out during the past two years to estimate the student workload (an ECTS preliminary estimate) for the first course of the degree in Electrical and Electronic engineering. At the same time, the different methodologies advocated by the European Space for Higher Education have been put into practice in order to promote the acquisition of both specific and generic competences and skills belonging to the degree. The process of adaptation to the new European Space for Higher Education brings with itself a new understanding of both teaching and learning procedures. The gradual adaptation of the subjects will allow lecturers to act carefully and thoughtfully when facing the necessary adaptation to the new educational framework; results obtained will let us correct the tested methodological strategies and work on their improvement.
暂无评论