In order to analyze and optimize the structure of existing permanent magnet spherical motors, a method for 3D motion singularity analysis of permanent magnet spherical motors is presented in this paper. This calculati...
详细信息
At present,aircraft taxiing at ground airports needs to be provided with a thrust by the main *** taxiing process is inefficient,has high fuel consumption and serious pollution,and is prone to safety *** this paper,a ...
详细信息
At present,aircraft taxiing at ground airports needs to be provided with a thrust by the main *** taxiing process is inefficient,has high fuel consumption and serious pollution,and is prone to safety *** this paper,a new configuration of aircraft autonomous traction taxiing system is proposed based on the principle of hydraulic secondary control,in which a hydraulic motor drive device is installed at the front wheels of the aircraft to drive the wheels to rotate forward or *** on this,autonomous taxiing can be realized without relying on the main engines,thus greatly improving airport operation ***,this paper analyzes the influencing factors of the autonomous traction taxiing process,and investigates the parameter matching design of the new configuration ***,this paper develops the ground principle prototype,designs the aircraft longitudinal bonding force observer and the aircraft wheel disturbance moment observer,and proposes the speed control method of the aircraft front wheel autonomous traction taxiing by considering the ground bonding force saturation ***,the ground taxiing test is conducted,and the results show that the new configuration proposed in this paper presents a new solution for aircraft autonomous traction taxiing.
Negative Bias Temperature Instability (NBTI) is the main reason for the degradation of gate oxide in P-channel power MOSFETs. Affected by long-term negative bias gate voltage and high temperature, the threshold voltag...
详细信息
ISBN:
(数字)9798350351330
ISBN:
(纸本)9798350351347
Negative Bias Temperature Instability (NBTI) is the main reason for the degradation of gate oxide in P-channel power MOSFETs. Affected by long-term negative bias gate voltage and high temperature, the threshold voltage of power MOSFETs drifts, which in turn affects the performance of the device. Based on the analysis of NBTI failure mechanism, this paper conducted accelerated degradation test on six different types of P-channel power MOSFETs. Secondly, the Iterative Reweighted Least Square (IRLS) method was applied to establish a threshold voltage drift’s degradation model, which can accurately describe actual degradation data. In addition, a transfer model was established using multiple linear regression theory to approximately describe the relationship between the fitting parameters of degradation model and power MOSFETs’ process parameters, providing a new approach for the fast reliability assessment of P-channel power MOSFETs.
Outstanding autonomous evasion decision-making capability has an important significance for ensuring flight safety and enhancing the autonomy of the aircraft. In this paper, a prediction information-based TD3(PITD3) e...
详细信息
ISBN:
(数字)9789887581581
ISBN:
(纸本)9798350366907
Outstanding autonomous evasion decision-making capability has an important significance for ensuring flight safety and enhancing the autonomy of the aircraft. In this paper, a prediction information-based TD3(PITD3) evasion decision-making algorithm for aircraft is proposed, which can autonomously evade the interceptors' attack in an antagonistic environment. Firstly,an antagonistic environment is described according to environmental constraints and the dynamics of the aircraft and interceptor. Secondly, the autonomous decision-making process of the aircraft facing the threat target is modelled as a Markov decision process to describe the state information of the aircraft and interceptor. Finally, an autonomous evasion decision-making method based on the twin delayed deep deterministic policy gradient(TD3) is designed to find the optimal strategy, and the effectiveness of the proposed autonomous evasion decision-making method is demonstrated by simulation results and comparative experiments.
The adaptive observer is a well-developed datadriven algorithm for co-estimation of system parameters and ***,inevitable disturbances can affect the systems and lead to deterioration of the algorithm *** disturbance e...
The adaptive observer is a well-developed datadriven algorithm for co-estimation of system parameters and ***,inevitable disturbances can affect the systems and lead to deterioration of the algorithm *** disturbance estimation methods require prior knowledge about model parameters and disturbance *** paper presents a robust adaptive observer method for multiple-inputmultiple-output linear systems subject to *** proposed method can perform joint estimation of unknown parameters,states and disturbances without any prior information about the model parameters and *** stability and convergence of the algorithm are rigorously proved to ensure that the estimation errors converge exponentially to *** results of a numerical example demonstrate the effectiveness of the algorithm.
This paper contributes to the development of reinforcement fuzzy Q-learning incorporated with genetic kinematics analysis for self-organizing holonomic motion control of six-link Stewart platforms. The fuzzy theory is...
详细信息
This paper studies the subspace identification of a MIMO wafer rapid thermal processing (RTP) system driven by standard tungsten halogen lamps and output temperatures for the RTP system are measured by pyrometers. In ...
详细信息
With the development of wireless communication technology,cyber physical systems are applied in various fields such as industrial production and infrastructure,where lots of information exchange brings cyber security ...
详细信息
With the development of wireless communication technology,cyber physical systems are applied in various fields such as industrial production and infrastructure,where lots of information exchange brings cyber security threats to the *** the perspective of system identification with binary-valued observations,we study the optimal attack problem when the system is subject to both denial of service attacks and data tampering *** packet loss rate and the data tampering rate caused by the attack is given,and the estimation error is *** the optimal attack strategy to maximize the identification error with the least energy is described as a min–max optimization problem with *** explicit expression of the optimal attack strategy is *** examples are presented to verify the effectiveness of the main conclusions.
Fatigue driving is one of the important factors that cause traffic accidents. To solve this problem, this paper proposes a classification model based on the traditional convolutional neural network (CNN) to distinguis...
详细信息
暂无评论