This paper discusses a black-start restoration control strategy using a battery energy storage station together with wind farms. The wind farm operates with the maximum power tracking control method, and the energy st...
详细信息
It has been revealed that in the conditions of small-scale production of discrete-analog filters on switched capacitors and ADC-drivers, it is most advisable to design high-speed operational amplifiers (OAs) based on ...
详细信息
This research aims to design and implement an Internet of Things (IoT) based vibration and rotation sensor system that can be used on machine tools. These sensors are designed to collect vibration and rotation data fr...
详细信息
A significant disadvantage of classical operational amplifiers with a complementary 'folded' cascode is that in the dynamic overload mode of the input differential stage, the maximum output current of the '...
详细信息
In this commentary article, we outline research challenges and possible directions for the potential applications of AI in the judicial domain by specifically considering process analysis in the Italian context. Apply...
详细信息
With the rapid development of computer technology and the Internet of Things (IoT), a large amount of data containing both healthy and faulty states can be collected from existing devices in factories. However, the us...
详细信息
The flexible job shop scheduling problem (FJSP) is a NP-hard combinatorial optimization challenge, having extensive real-world industrial applications. For a given instance of FJSP, a scheduling solution need to be de...
详细信息
The measurement of the dynamic parameters of vehicle motion is usually carried out by measuring the velocity of motion, accelerations and angular velocities in all three axes. For research applications, e.g. the DAS-3...
详细信息
The article analyses the accuracy of contactless measurement of resonant frequency and quality factor of RFID transponders in a simplified measuring circuit that does not use an impedance meter nor vector network anal...
详细信息
Cyber-attacks that deceive people in various ways, such as phishing scams that exploit personal information by pretending to be a real service, are gaining momentum. Scam email sometimes includes important keywords th...
详细信息
暂无评论