The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the increase of transformer DC bias events in power system, management and control of transformer DC bias has become an important problem to be solved by power enterprise. Therefore, the global control and optimization algorithm based on NSGA-III is proposed, which takes multiple functions as the optimization objective with considering kinds of causes. Firstly, the optimization method model of...
For revealing the influences of thermomigration effect (TM) on the creep properties of interconnecting solder joints in electronic packaging industry, the creep behavior of Cu/Sn0.7Cu/Cu solder joints were researched under temperature gradient of 1043°C/cm and isothermal temperature of 100°C(median temperature) with different shear stress, respectively. It is approved that the creep lifetime of the...
The main function of the DC-link decoupling capacitors, integrated between the voltage source and the power devices, is to suppress the effect of the parasitic inductors and minimize the voltage overshoot. Besides, decoupling capacitors can also affect the electromagnetic interference frequency spectra. In this paper, the elïects of decoupling capacitors are explained from the time-domain and the...
For one hand, graduates students from university cannot find a job. For another, enterprises cannot find a proper employee. This embarrassing situation needs university make reform from traditional structure of education in China. We need to do something to change this phenomenon. This article focuses on integration of education and industry, it is one method try to solve this problem.
In this paper a full-bridge phase-shift DC-DC converter that has the function of realizing zero-voltage switching (ZVS) is adopted into power electronic transformer (PET), and the functions of every part employing proper control strategy in the PET are analyzed. The simulation results show that this converter can still realize soft-switching in PET and it is appropriate to work in high frequency state...
Alternative polyadenylation (APA) can lead to various mRNA isforms differing in their 3' UTR, which contributes to the dynamics of gene regulation, including stability, localization and translation of mRNA. However, clustering of genes using poly(A) site data has not been extensively studied. Here we constructed a two-layer model based on canonical correlation analysis (CCA) to explore the clustering...
Compared with the silicon semiconductors, silicon carbide (SiC) metal-oxide-semiconductor Field-Efïect transistor (MOSFET) can operate at higher switching frequency and higher temperature, which makes the junction temperature estimation more significant and challenging. In this paper, different thermo- sensitive electrical parameters (TSEPs) are investigated about their potential to measure the junction...
We report a detailed characterization of the bound states solitons in a dispersion-managed fiber laser with respect to the dynamics of time domain separation and phase difference. The theoretical results reveal that the bound states solitons in a nonlinear system have two equilibria, and different initial conditions would induce the pulse separation and phase difference to distinct fixed points. Moreover,...
The effects of fast neutron radiation up to flux of 1014 cm−2 (1 MeV equivalent flux) upon the turn-on and forward static characteristics of MOS-Controlled Thyristor (MCT) are described in this work, based on physics-based 1-dimension analytical calculation and 2-dimension Silvaco simulation. It is reported for the first time that dependency of on-state specific resistance (Ron) upon neutron flux...
As a result of the influence of man-made or other factors, the recorded fault data in the process of keeping maintenance of ship electromechanical system are often inaccurate with incomplete record information, low-quality data and small size sample. For the incomplete failure data, this paper will analyze the failure data of the certain type of ship electromechanical system thoroughly and comprehensively...
Up to ∼0.16 μJ noise-like-toped dissipative soliton resonances at ∼1954.7 nm are directly produced from a thulium-doped fiber laser with ∼1.04 km ultra-long cavity. Cladding-pumping is utilized for overcoming the accumulated large attenuation loss of silica fiber at 2 μm band.
The keypoints detection, matching and tracking based online tracking algorithm, which is called CMT (Clustering of the Static-Adaptive Correspondences for Deformable Object Tracking), is robust and accurate for deformable object tacking. However, its optical flow tracker is error-prone when active points run outside the scope of the target. Worse still, the computational complexity of CMT greatly...
In order to achieve better network communication between embedded devices, we complete a network driver program based on embedded processor platform. In the definition of internal data type, We choose little-endian due to our processor and use LwIP build-in error code in arch.h file. Moreover, LwIP provides users with a convenient configuration at the beginning of its design. Additionally, in order...
With the fast development of embedded Web, the needs of communication between different embedded devices through Internet become increasingly intense. Taking application requirements into account, we utilized a customized embedded 32-bit processsor as the hardware platform which contains a MAC module. On this basis. We design the protocol layer network interface and a network driver based on descriptor-based...
In this paper, we consider the uplink transmission of a system with one multi-antenna base station (BS) and multiple single antenna user equipments (UEs), which forms a virtual multiple-input multiple-output (MIMO) system. To investigate the capacity maximization problem under per-antenna power constraints, the alternating direction method of multipliers (ADMM) is exploited to obtain the optimal solution...
In this paper, we consider the balance between the energy efficiency (EE) and the short-term fairness among individual users in a muiticell MISO downlink. Firstly, the power consumption and sum proportional rate are utilized jointly to construct an objective function. Then a transmit beamformer optimization problem for the objective maximization subject to transmit power constraints is formulated...
This paper considers the problem of tracking a mobile receiver using signals of Low Earth Orbit (LEO) satellites. Based on Time-Difference of Arrival (TDOA) and Frequency-Difference of Arrival (FDOA), we joint the time synchronization and localization together with a static reference anchor, which has unknown position. In this scenario, the satellites is asynchronous. Considering the time- and frequency-...
Based on theories from service science, collaborative innovation, and knowledge management, this study investigates the interplays between trust, specific asset investment, knowledge sharing, collaborative design and service innovation performance. The mediating role of collaborative design was also carefully examined. This paper empirically studied 375 service providing Chinese enterprises as research...
This paper investigates a high-order PDα — type iterative learning control strategy for a class of fractional-order linear time-invariant systems with Caputo derivative 0<α<1. On the basis of fractional integration by parts and generalized Young inequality, sufficient convergence condition of the learning control law is established in the sense of Lebesgue-p norm. It is shown that the convergence...
The vulnerabilities of face-based biometric systems to presentation attacks have been finally recognized but yet we lack generalized software-based face presentation attack detection (PAD) methods performing robustly in practical mobile authentication scenarios. This is mainly due to the fact that the existing public face PAD datasets are beginning to cover a variety of attack scenarios and acquisition...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.