In this work, we present a novel solution aimed at improving robotic manipulators' performance in contact tasks. Inspired by the human motor control system, which relies on a feedforward mechanism to anticipate an...
详细信息
Although conventional control systems are simple and widely used, they may not be effective for complex and uncertain systems. This study proposes a Hermite broad-learning recurrent neural network (HBRNN) with a wide ...
详细信息
Despite considerable research into information diffusion, most models focus on static networks. Networks in the real world change over time and information is lost when a node disappears. We sought to resolve the prob...
详细信息
Amidst rising distributed generation and its potential role in grid management, this article presents a new realistic approach to determine the operational space and flexibility potential of an unbalanced active distr...
详细信息
This work presents an accelerator that performs blind deblurring based on the dark channel prior. The alternating minimization algorithm is leveraged for latent image and blur kernel estimation. A 2-D Laplace equation...
详细信息
Fruit safety is a critical component of the global economy, particularly within the agricultural sector. There has been a recent surge in the incidence of diseases affecting fruits, leading to economic setbacks in agr...
详细信息
Power semiconductor devices cascaded topology is one of the most common solutions for solid-state circuit breakers(SSCBs)working in medium-voltage DC ***,when the number of cascaded devices is large,current series tec...
详细信息
Power semiconductor devices cascaded topology is one of the most common solutions for solid-state circuit breakers(SSCBs)working in medium-voltage DC ***,when the number of cascaded devices is large,current series technologies of power semiconductor devices will be difficult to be applied since with uneven voltage sharing ***,this paper proposes a novel cascade method of multi-SiC JFETs based on modules *** method consists of two parts:one is a single-gate driver cascaded SiC JFETs topology which is used to form the module,the other one is an active clamp control strategy which ensures that each module is protected from overvoltage when modules are *** proposed cascade method can effectively suppress voltage overshoot of cascading power devices in the switching *** on the proposed cascade method,a 5kV/63A SSCB prototype is ***,an experiment is conducted based on the designed *** results validate the effectiveness of the proposed cascaded method for SSCB.
In telemedicine applications, it is crucial to ensure the authentication, confidentiality, and privacy of medical data due to its sensitive nature and the importance of the patient information it contains. Communicati...
详细信息
In telemedicine applications, it is crucial to ensure the authentication, confidentiality, and privacy of medical data due to its sensitive nature and the importance of the patient information it contains. Communication through open networks is insecure and has many vulnerabilities, making it susceptible to unauthorized access and misuse. Encryption models are used to secure medical data from unauthorized access. In this work, we propose a bit-level encryption model having three phases: preprocessing, confusion, and diffusion. This model is designed for different types of medical data including patient information, clinical data, medical signals, and images of different modalities. Also, the proposed model is effectively implemented for grayscale and color images with varying aspect ratios. Preprocessing has been applied based on the type of medical data. A random permutation has been used to scramble the data values to remove the correlation, and multilevel chaotic maps are fused with the cyclic redundancy check method. A circular shift is used in the diffusion phase to increase randomness and security, providing protection against potential attacks. The CRC method is further used at the receiver side for error detection. The performance efficiency of the proposed encryption model is proved in terms of histogram analysis, information entropy, correlation analysis, signal-to-noise ratio, peak signal-to-noise ratio, number of pixels changing rate, and unified average changing intensity. The proposed bit-level encryption model therefore achieves information entropy values ranging from 7.9669 to 8.000, which is close to the desired value of 8. Correlation coefficient values of the encrypted data approach to zero or are negative, indicating minimal correlation in encrypted data. Resistance against differential attacks is demonstrated by NPCR and UACI values exceeding 0.9960 and 0.3340, respectively. The key space of the proposed model is 1096, which is substantially mor
Power line communication (PLC) systems enable information exchange over existing electric power grids at a low deployment cost. Such systems constitute a crucial component of smart grids. However, PLC is negatively af...
详细信息
Real-time systems experience many safety and performance issues at run time due to different uncertainties in the environment. Systems are now becoming highly interactive and must be able to execute in a changing envi...
详细信息
Real-time systems experience many safety and performance issues at run time due to different uncertainties in the environment. Systems are now becoming highly interactive and must be able to execute in a changing environment without experiencing any failure. A real-time system can have multiple modes of operation such as safety and performance. The system can satisfy its safety and performance requirements by switching between the modes at run time. It is essential for the designers to ensure that a multi-mode real-time system operates in the expected mode at run time. In this paper, we present a verification model that identifies the expected mode at run time and checks whether the multi-mode real-time system is operating in the correct mode or not. To determine the expected mode, we present a monitoring module that checks the environment of the system, identifies different real-world occurrences as events, determines their properties and creates an event-driven dataset for failure analysis. The dataset consumes less memory in comparison to the raw input data obtained from the monitored environment. The event-driven dataset also facilitates onboard decision-making because the dataset allows the system to perform a safety analysis by determining the probability of failure in each environmental situations. We use the probability of failure of the system to determine the safety mode in different environmental situations. To demonstrate the applicability of our proposed scheme, we design and implement a real-time traffic monitoring system that has two modes: safety, and performance. The experimental analysis of our work shows that the verification model can identify the expected operating mode at run time based on the safety (probability of failure) and performance (usage) requirements of the system as well as allows the system to operate in performance mode (in 3295 out of 3421 time intervals) and safety mode (in 126 out of 3421 time intervals). The experimental resul
暂无评论