The turn-to-turn short is one major fault of the motor faults of BLDC motors and can appear frequently. When the fault happens, the motor can be operated without breakdown, but it is necessary to maintain the motor fo...
详细信息
ISBN:
(纸本)9781424454402
The turn-to-turn short is one major fault of the motor faults of BLDC motors and can appear frequently. When the fault happens, the motor can be operated without breakdown, but it is necessary to maintain the motor for continuous working. In past research, several methods have been applied to detect winding faults. The representative approaches have been focusing on current signals, which can give important information to extract features and to detect faults. In this study, current sensors were installed to measure signals for fault detection of BLDC motors. In this study, the Park's vector method was used to extract the features and to isolate the faults from the current measured by sensors. Because this method can consider the three-phase current values, it is useful to detect features from one-phase and three-phase faults. After extracting two-dimensional features, the final feature was generated by using the two-dimensional values using the distance equation. The values were used in fuzzy similarity to isolate the faults. Fuzzy similarity is an available tool to diagnose the fault without model generation and the fault was converted to the percentage value that can be considered as possibility of the fault.
In this paper, the maximum power point tracking (MPPT) control problem for wind turbine systems with multi-uncertainties is considered. A tracking controller of optimal tip speed ratio is proposed based on fully actua...
In this paper, the maximum power point tracking (MPPT) control problem for wind turbine systems with multi-uncertainties is considered. A tracking controller of optimal tip speed ratio is proposed based on fully actuated system (FAS) approach. First, the dynamics of wind turbines in the region below rated wind speed is represented in FAS model. Then, with the analysis of multi-uncertainties in operation of wind turbines, an extended state observer (ESO) is designed to estimate the uncertainties. A controller with uncertainty-compensation ability is proposed based on FAS theory to obtain a closed-loop tracking system of rotor speed with fully actuated characteristics. Theorems are given to show the advantages on stability analysis, parameters selection under constraints and engineering regulation of FAS approach in MPPT control of wind turbines. Finally, an example of 5MW wind turbine of NREL is given for simulation. The results indicate the effectiveness of the proposed approach for MPPT control.
We study a class of dynamical networks modeled by linear and time-invariant systems which are described by state-space realizations. For these networks, we investigate the relations between various types of factorizat...
详细信息
Advanced autonomous vehicle strings rely on inter-vehicle communication in order to decrease the necessary safety gap so that fuel consumption can be decreased and road capacity can be increased. In case of failures o...
详细信息
Advanced autonomous vehicle strings rely on inter-vehicle communication in order to decrease the necessary safety gap so that fuel consumption can be decreased and road capacity can be increased. In case of failures of some communication channels, the corresponding back-up control strategy must be switched on. Maximal spacing errors of such back-up modes are analyzed and compared. Robustness to platoon heterogeneity and communication delays are considered. The main conclusion we can draw is that, in the full communication mode, satisfactory spacing performance can be achieved by using simple output-feedback controllers designed without detailed knowledge on engine/brake characteristics, only utilizing the existing services available today in every commercial heavy trucks with automatic gearbox. Experimental verification of the designed controllers are presented.
A differential energy based fault protection in microgrid is presented in this paper. Initially the currents at the respective buses are retrieved and processed through a novel time-frequency transform known as S-tran...
详细信息
A differential energy based fault protection in microgrid is presented in this paper. Initially the currents at the respective buses are retrieved and processed through a novel time-frequency transform known as S-transform to generate time-frequency contours. Spectral energy content of the time-frequency contours of fault current signals are calculated and differential energy is computed to register the fault patterns in the microgrid at grid-connected and islanded mode. The proposed scheme is tested for different shunt faults (symmetrical and unsymmetrical) and High Impedance Faults (HIF) in the microgrid with radial and loop structure. The results based on extensive study indicate that the differential energy based protection scheme can reliably protect the microgrid against different fault situations.
Recently, in the smartcard-based authentication system, there is an increasing trend of using fingerprint for the card holder verification, instead of passwords. However, the security of the fingerprint data is partic...
详细信息
Recently, in the smartcard-based authentication system, there is an increasing trend of using fingerprint for the card holder verification, instead of passwords. However, the security of the fingerprint data is particularly important as the possible compromise of the data will be permanent. To protect the fingerprint data, techniques such as "fuzzy vault" which is based on the difficulty of the polynomial reconstruction need to be developed for the smartcard-based environment. In this paper, we propose a secure and efficient approach which reconstructs a polynomial on a smartcard with the aid of a server by using fuzzy fingerprint vault distributed into the smartcard and the server. Based on the experimental results, we confirmed that our secret sharingbased approach can perform the fuzzy vault-based fingerprint verification more securely (by a factor of'300) and quickly (by a factor of 17) on a combination of a smartcard and a server.
In many practical applications, constraints are often present on, for example, the magnitudes of the control inputs. Recently, based on a novel successive projection framework, two constrained iterative learning contr...
详细信息
In many practical applications, constraints are often present on, for example, the magnitudes of the control inputs. Recently, based on a novel successive projection framework, two constrained iterative learning control (ILC) algorithms were developed with different convergence properties and computational requirements. This paper investigates the effectiveness of these two methods experimentally on a gantry robot facility, which has been extensively used to test a wide range of linear model based ILC algorithms. The results obtained demonstrate the effectiveness of the algorithms in solving one form of the general constrained ILC problem.
This article presents a suite of new control designs for next-generation electric smart grids. The future grid will consist of thousands of non-conventional renewable generation sources such as wind, solar, and energy...
详细信息
Imbalanced classification using a support vector machine (SVM) is a normal but crucial problem in machine learning. Compared with binary classification, multiclass classification is much more complicated. Most existin...
详细信息
Imbalanced classification using a support vector machine (SVM) is a normal but crucial problem in machine learning. Compared with binary classification, multiclass classification is much more complicated. Most existing studies on imbalanced classification using SVM focus on binary imbalanced classification; while only few of them look into imbalanced classification with multiple classes. Pre-clustering is a useful technique to prepare proper data from an imbalanced dataset for a classifier. It can be used to extract the feature of a dataset first and improve classification performance. Density peak based on Euclidean distance proves its effectiveness and generality in clustering. Motivated by this and the fact that the number of clusters is known in multi-class classification using a one-vs-rest strategy, we combine density peak clustering and SVM to propose a new pre-clustering method to perform effective imbalanced classification with multiple classes. Specifically, we transform a multi-class classification problem into several binary classification tasks. The results on 5 public datasets in terms of F-measure, G-mean and Area Under Curve (AUC) show its superiority over the original SVM and SVM with other methods including random under-sampling, Synthetic Minority Oversampling Technique, pre-clustering using K-Means and EasyEnsemble methods using either a one-vs-rest or one-vs-one strategy.
Recently, in the smart-card based authentication system, there is an increasing trend of using fingerprint for the card holder verification, instead of passwords. However, the security of the fingerprint data is parti...
详细信息
Recently, in the smart-card based authentication system, there is an increasing trend of using fingerprint for the card holder verification, instead of passwords. However, the security of the fingerprint data is particularly important as the possible compromise of the data will be permanent. In this paper, we propose an approach for secure fingerprint verification by distributing both the secret and the computation based on the fuzzy vault (a cryptographic construct which has been proposed for crypto-biometric systems). That is, a user fingerprint template which is applied to the fuzzy vault is divided into two parts, and each part is stored into a smart-card and a server, respectively. At distributing the fingerprint template, we consider both the security level and the verification accuracy. Then, the geometric hashing technique is applied to solve the fingerprint alignment problem, and this computation is also distributed over the combination of the smart-card and the server in the form of the challenge-response. Finally, the polynomial can be reconstructed from the accumulated real points from both the smart-card and the server. Based on the experimental results, we confirm that our proposed approach can perform the fuzzy vault-based fingerprint verification more securely on a combination of a smart-card and a server without significant degradation of the verification accuracy.
暂无评论