This paper describes the design procedure of an optimal wind farm controller. The controller optimizes the structural load and power production simultaneously, on the basis of an analytical wind farm model. The farm m...
详细信息
The ultrasonic motor (USM) possesses heavy nonlinearities which vary with driving conditions and load-dependent characteristics such as the dead-zone. In this paper, an identification method for the rotary travelling-...
详细信息
The ultrasonic motor (USM) possesses heavy nonlinearities which vary with driving conditions and load-dependent characteristics such as the dead-zone. In this paper, an identification method for the rotary travelling-wave type ultrasonic motor (RTWUSM) with dead-zone is proposed based on a modified Hammerstein model structure. The driving voltage contributing effect on the nonlinearities of the RTWUSM was transformed to the change of dynamic parameters against the driving voltage. The dead-zone of the RTWUSM is identified based upon the above transformation. Experiment results showed good agreement be- tween the output of the proposed model and actual measured output.
Battery impedance and nonlinearity yield critical insights into dynamic response and electrochemical behavior, which are advantageous for state estimation and degradation diagnostics. However, the characterization met...
详细信息
Camera-equipped underwater vehicle-manipulator systems (UVMS) can achieve autonomous underwater operations through visual servoing. However, current methods excessively rely on auxiliary means for target's visual ...
详细信息
The nearest level approximation control algorithm (nlm) is employed for multi-level multi-module (mmc) in the flexible high-voltage direct current (hdvc) converter. The decimal part of this algorithm needs to input si...
详细信息
This paper describes a seamless three-dimensional (3-D) localization and navigation system for smartphones. The smartphone includes an atmospheric pressure sensor to measure the user's altitude that is combined wit...
详细信息
This paper describes a seamless three-dimensional (3-D) localization and navigation system for smartphones. The smartphone includes an atmospheric pressure sensor to measure the user's altitude that is combined with the outdoor Global Positioning system (GPS) and indoor WiFi-APs localization systems in a seamless 3-D localization system. The smartphone software also provides seamless navigation services by updating map information for both indoor and outdoor locations through the mobile Internet. The indoor floor information calculated from the altitude information is used to project localization anchor nodes, e.g., WiFi-AP, on different floors onto the user's floor with an indoor 3-D localization algorithm using projection distances based on a Received Signal Strength (RSS) algorithm. Tests show that the 3-D method reduces systematic errors and achieves much higher accuracy than the traditional two-dimensional localization method.
In this paper, we propose a novel view-invariant gait authentication method based on silhouette contours analysis and view estimation. The approach extracts Lucas-Kanade based gait flow image and head and shoulder mea...
详细信息
An improved Razumikhin-type theorem is established, and the advantage of the established theorem for reducing conservatism is discussed. For a class of time-delay systems, a simple asymptotic stability condition is de...
详细信息
An improved Razumikhin-type theorem is established, and the advantage of the established theorem for reducing conservatism is discussed. For a class of time-delay systems, a simple asymptotic stability condition is deduced as an application of the established theorem. Two illustrative examples are given to show the superiority of our results to those in the literature.
PRINCE is a 64-bit lightweight block cipher with a 128-bit key published at ASIACRYPT 2012. Assuming one nibble fault is injected, previous different fault analysis(DFA) on PRINCE adopted the technique from DFA on AES...
详细信息
PRINCE is a 64-bit lightweight block cipher with a 128-bit key published at ASIACRYPT 2012. Assuming one nibble fault is injected, previous different fault analysis(DFA) on PRINCE adopted the technique from DFA on AES and current results are different. This paper aims to make a comprehensive study of algebraic fault analysis(AFA) on PRINCE. How to build the equations for PRINCE and faults are explained. Extensive experiments are conducted. Under nibble-based fault model, AFA with three or four fault injections can succeed within 300 seconds with a very high probability. Under other fault models such as byte-based, half word-based, word-based fault models, the faults become overlapped in the last round and previous DFAs are difficult to work. Our results show that AFA can still succeed to recover the full master key. To evaluate security of PRINCE against fault attacks, we utilize AFA to calculate the reduced entropy of the secret key for given amount of fault injections. The results can interpret and compare the efficiency of previous work. Under nibble-based fault model, the master key of PRINCE can be reduced to 29.69 and 236.10 with 3 and 2 fault injections on average, respectively.
暂无评论