X-ray security check is a prevalent placement measure that plays a vital role in ensuring public safety. However, detecting prohibited items poses a complex challenge due to their variable sizes within X-ray images. I...
详细信息
A high-reliability constant current to constant voltage power supply system has the advantages of small volume of switching power supply, high power density, high efficiency was proposed. This paper use two controller...
详细信息
Time delay has great impacts on the stability and the reliability and real-time of the communication of multi-agent systems. In multi-agent communication network, due to network congestion, transmission distance and o...
详细信息
A fault diagnosis approach for roller bearings utilizing deep transfer learning and adaptive weighting is suggested to address the issue that extra fault state samples in the target domain data of roller bearings impa...
详细信息
Stability analysis is very important for multiport *** most stability analysis methods are published only for unidirectional energy flow conditions,which cannot be used for multiport *** thispaper,a stability analysis...
详细信息
ISBN:
(数字)9789887581536
ISBN:
(纸本)9781665482561
Stability analysis is very important for multiport *** most stability analysis methods are published only for unidirectional energy flow conditions,which cannot be used for multiport *** thispaper,a stability analysis method is proposed for multi-port converter with bi-directional energy flow,which uses the unified impedance model of bidirectional converter to analyze the system ***,the bidirectional converter is modeled uniformly and the output impedance characteristics of bi-directional converter are *** the unified impedance criterion is used to judge its *** stability of the system under charging and discharging conditions is *** results show that the system stability is higher during charging than during discharging when the power of the battery is the ***,the correctness of the criterion is verified by simulation.
A small-sample photovoltaic hot spot identification method based on deep transfer learning has been proposed as a solution to the problem that traditional deep learning models require a substantial amount of training ...
详细信息
The non-intrusive load decomposition method is an essential approach of appreciating the water requirements of consumers. Traditional techniques of load breakdown have a number of drawbacks, including a poor level of ...
详细信息
This paper provides an oscillation trajectory optimization and control method for two-link underactuated manipulators (UMs) in a vertical plane. The proposed method solves the problem that the UMs cannot always enter ...
详细信息
This paper investigates the recursive filtering (RF) problem for stochastic multi-rate (MR) systems, where the information transmission is regulated by an improved weighted try-once-discard protocol (IWTODP). In order...
详细信息
Modern industrial systems are usually in large scale,consisting of massive components and variables that form a complex system *** to the interconnections among devices,a fault may occur and propagate to exert widespr...
详细信息
Modern industrial systems are usually in large scale,consisting of massive components and variables that form a complex system *** to the interconnections among devices,a fault may occur and propagate to exert widespread influences and lead to a variety of *** the root causes of alarms is beneficial to the decision supports in making corrective alarm *** data-driven methods for alarm root cause analysis detect causal relations among alarms mainly based on historical alarm event *** improve the accuracy,this paper proposes a causal fusion inference method for industrial alarm root cause analysis based on process topology and alarm events.A Granger causality inference method considering process topology is exploited to find out the causal relations among *** topological nodes are used as the inputs of the model,and the alarm causal adjacency matrix between alarm variables is obtained by calculating the likelihood of the topological Hawkes *** root cause is then obtained from the directed acyclic graph(DAG)among alarm *** effectiveness of the proposed method is verified by simulations based on both a numerical example and the Tennessee Eastman process(TEP)model.
暂无评论