In this paper, to expand a control bandwidth of AC servo motor, a new current vector control considering an output delay of PWM Inverter is proposed. The proposed current control is a I-P control with an additional fe...
In this paper, to expand a control bandwidth of AC servo motor, a new current vector control considering an output delay of PWM Inverter is proposed. The proposed current control is a I-P control with an additional feedback gain, which is based on an extended state feedback consisted from a d-q motor model, the output delay of PWM inverter and an integrator of ACR. In addition, the proposed method is easy to implement to the existing AC servo system. The effectiveness of proposed method is validated in a computer simulation and an experiments using a 3.7 kW class motor test bench. In the condition that a cut-off frequency of ACR is close to a carrier frequency, the simulation results show that the proposed method dramatically improves the current response at the higher cut-off frequency. Moreover, the experimental results show that the proposed method dramatically improves the current response at each operating point. From the results, the proposed method is effective to the expand the bandwidth of AC servo motor.
Several distinguishing characteristics have made Modular Multilevel Converters (MMCs) an appealing option for high-voltage and high-power applications, especially in HVDC transmission systems. When DC faults occur, MM...
Several distinguishing characteristics have made Modular Multilevel Converters (MMCs) an appealing option for high-voltage and high-power applications, especially in HVDC transmission systems. When DC faults occur, MMC-HVDC systems are prone to temporary outages. Blocking DC faults effectively is essential to protect converters and minimize power transmission interruptions in MMC-based HVDC transmissions. This paper presents a novel protective submodule for MMCs that can be used in HVDC transmission systems. This approach isolates the AC grid from the DC fault and blocks the AC feeding phenomenon. Further, the proposed DC protection scheme facilitates converter fault ride-through and system restoration after fault removal. Analytical, simulation, and experimental results are presented in the paper.
Blockchain technology has emerged as a transformative including data security, interoperability, patient data ownership, and operational inefficiencies. This paper evaluates blockchain's impact on electronic healt...
详细信息
ISBN:
(数字)9798350355468
ISBN:
(纸本)9798350355475
Blockchain technology has emerged as a transformative including data security, interoperability, patient data ownership, and operational inefficiencies. This paper evaluates blockchain's impact on electronic health records (EHR) security, supply chain transparency, clinical research cooperation, and patient data control. Through comprehensive literature analysis, we highlight the benefits, limitations, and potential improvements for blockchain adoption in healthcare. Furthermore, a combined methodology of blockchain with artificial intelligence (AI) is presented, offering novel solutions to enhance healthcare data management and analytics. These findings lay a foundation for future research aimed at overcoming blockchain's current scalability and regulatory challenges to promote wider healthcare adoption.
The proposed Energy Internet threat modeling technique identifies system constraints, components, and resources appropriately. Threat Modeling Algorithm classifies and identifies dangers using STRIDE. It assigns relev...
详细信息
ISBN:
(数字)9798331539948
ISBN:
(纸本)9798331539955
The proposed Energy Internet threat modeling technique identifies system constraints, components, and resources appropriately. Threat Modeling Algorithm classifies and identifies dangers using STRIDE. It assigns relevance and probability to each system vulnerability. Risk and vulnerability assessments can forecast and influence such scenarios. Grouping hazards by significance affects priorities. To demonstrate threat implications, we design and assess instances. Upon reviewing and revising the threat model, we establish risk ratings and determine their importance. Develop the risk model, inform the necessary stakeholders, and then mitigate the risk. A comprehensive risk assessment ensures that all hazards are effectively managed at the end of the activity. The assessment and management of cyber-physical risks in the energy Internet are implemented to enhance system security and resilience.
This leads to in the development of malignant cells because of the body's cells growing abnormally. In the past, biopsy techniques—which are time-consuming and invasive—have been used to determine the tumour. By...
详细信息
ISBN:
(数字)9798331537579
ISBN:
(纸本)9798331537586
This leads to in the development of malignant cells because of the body's cells growing abnormally. In the past, biopsy techniques—which are time-consuming and invasive—have been used to determine the tumour. By training a Convolutional Neural Network (CNN), we hope to detect the three most common types of brain tumours: pituitary, glioma, and meningioma. The model provides radiologists with an effective decision-support tool by utilizing data augmentation and optimized architectures to attain state-of-the-art accuracy. The most dangerous cancerous tumours that can shorten life expectancy are gliomas. High-level mathematical functions are implemented utilising the anaconda frameworks in the proposed study, which uses tensor flow to segment brain tumours. When brain tumours are detected early, patient survival rates increase. A convolutional neural network (CNN) is made up of one or more convolutional layers, sometimes with a subsampling layer in between. Like a regular neural network, it is followed by one or more fully connected layers. Data augmentation is used to the publicly accessible brain tumour dataset in order to improve the training model's efficiency. The compiled dataset contains a wide range of instances, such as 2,548 glioma photographs, 2,658 pituitary tumour images, 2,582 meningioma images, and 2,500 non-tumorous condition images.
Quality healthcare delivery guarantees good health. In turn, good health is a perquisite to the attainment of the United Nations Sustainable Development Goal #3. The need for quality and accessible healthcare delivery...
详细信息
ISBN:
(数字)9798331542559
ISBN:
(纸本)9798331542566
Quality healthcare delivery guarantees good health. In turn, good health is a perquisite to the attainment of the United Nations Sustainable Development Goal #3. The need for quality and accessible healthcare delivery has been made bare following the COVID-19 pandemic and other recent health challenges. The ubiquitous capability of the Internet is a feature that when harnessed very well will be vital to the attainment of one of the targets of the United Nations Sustainable Development Goal 3 - achieving universal health coverage. The development of an Internet of Things-based Medical Triage for Sustainable Healthcare Delivery is presented in this paper. Specifically, a web application is developed herein to provide common platforms where key actors of a healthcare delivery facility: doctors, nurses, administrators and patients can interact with IoT nodes that measure vital body signs like body temperature and pulse. The i-med triage developed with the Laravel PHP framework uses Application Program Interface (API) keys that enable IoT sensors to write the measured data to a database. From the database, API read keys enable the measured data to be displayed on dashboards which are visible to healthcare providers.
This research proposes a novel approach for data encryption employing a multilevel compressive strategy. The process initiates by reading heterogeneous data, followed by the conversion of the data into Base64 encoding...
详细信息
ISBN:
(数字)9798350359299
ISBN:
(纸本)9798350359305
This research proposes a novel approach for data encryption employing a multilevel compressive strategy. The process initiates by reading heterogeneous data, followed by the conversion of the data into Base64 encoding. Subsequently, an encryption key is generated to secure the data, utilizing the Fernet encryption algorithm. The encrypted data is then subjected to compression using the zlib algorithm, introducing an additional layer of security and efficiency. The final step involves the storage of the encrypted and compressed data. The study also emphasizes the evaluation of the compressed data size, providing insights into the effectiveness of the proposed approach in optimizing storage and transmission requirements while ensuring robust data security. This multilevel compressive technique not only enhances data protection but also addresses the challenges of data volume and transmission efficiency in contemporary information systems.
Dhaka Metro Rail is a mesmerizing initiative of the Bangladesh Government that has brought comfort to people. This project got a huge appreciation from people for its continuous service. Mass people use the train for ...
Dhaka Metro Rail is a mesmerizing initiative of the Bangladesh Government that has brought comfort to people. This project got a huge appreciation from people for its continuous service. Mass people use the train for rambling, going to the workplace, etc. Again, for some unwanted circumstances, Dhaka Metro Rail gleaned negative criticism from various *** this research, we analyzed public sentiment on Dhaka Metro Rail from popular social media using recent NLP architectures like BERT, XLNet and Electra, where BERT outperformed than other with an accuracy of 91.11% in correctly identifying the sentiments of the public *** sentiment of a comment is identified into predefined categories, such as positive, negative, or neutral.
This research investigates beamforming and Non-Orthogonal Multiple Access (NOMA) techniques to enhance the performance of Unmanned Aerial Vehicle (UAV)-assisted communication in Industrial Internet of Things (IIoT) ne...
This research investigates beamforming and Non-Orthogonal Multiple Access (NOMA) techniques to enhance the performance of Unmanned Aerial Vehicle (UAV)-assisted communication in Industrial Internet of Things (IIoT) networks. The primary objective is to maximize Energy Efficiency (EE) while considering the challenges of variable user locations and optimizing UAV height. An iterative algorithm is proposed to effectively tackle the non-convex optimization problem, leading to improved EE and overall system performance. Extensive simulations demonstrate the significance of UAV height optimization, which positively impacts EE. Additionally, the performance of different beamforming methods is compared, highlighting the trade-off between complexity and EE performance. The results show that the proposed algorithm outperforms existing approaches, achieving better EE and communication efficiency. This study provides valuable insights for optimizing resource allocation and energy utilization in UAV-assisted IIoT networks, contributing to the advancement of sustainable and efficient wireless communication technologies.
Federated Learning (FL) is a promising distributed learning mechanism which still faces two major challenges, namely privacy breaches and system efficiency. In this work, we reconceptualize the FL system from the pers...
详细信息
暂无评论