The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We proposed a gating exposure technique for femtosecond laser direct writing. The average laser power could be linearly controlled with the scanning speed while maintaining the exposure dose on the scanning path.
A method that optimizes visual odometry, especially using visual odometry in the scene with absence of features is proposed in this paper. First, in order to estimate the pose of camera when the effect of using feature-based method is not good enough, direct method is implemented as the solution. Second, comparing with traditional visual odometry method, this method takes the environment restriction...
The renewable energy and Demand Response in the combined cooling heating and power (CCHP) system operation is considered in this paper. The authors propose a kind of integrated scheduling of energy supply and demand which considers the coupling between them. In energy demand side, smart appliances are introduced to participant Demand Respond. In energy supply side, solar energy, storage device and...
A cyber-physical system (CPS) approach for branch and bound algorithm (BnB) based model predictive control (MPC) of permanent magnet synchronous machine (PMSM) drive system fed by three-level NPC inverter is proposed in this work. The proposed control strategy deals with both the physical states and a cyber state, i.e. the sampling frequency. With the help of cyber controller, the cyber resource and...
A cyber-physical system (CPS) approach for branch and bound algorithm based direct model predictive control (BnB-DMPC) for grid-tied Active Front End (AFE) power converters is proposed in this work. The proposed control strategy deals with both the physical states and a cyber state, i.e. the sampling frequency. With the help of cyber controller, the cyber resource and sampling rate are regulated based...
In view of short distance, inaccurate counting and slow speed of the intelligent meter reading system, the design scheme of a remote intelligent meter reading system based on GPRS is put forward. The hardware of system mainly includes four parts: GPRS wireless communication module, concentrator, collector, and monitoring center. The communication layer adopts double layer structure, the upper layer...
The optimal operation system is the key instruction system in CCHP (combined cooling, heating and power) systems, while its development and test always keep a challenge due to the structure complexity and high energy coupling degree. To solve this problem, an emulation testing platform was designed for CCHP systems to test and verify the specified optimal operation system. The stability and reliability...
Demand side management (DSM) exploits flexibility of the end-user side to help improve the performance of the power grid. However, how to model and evaluate the multi-dimensional flexibility (MDF) of the energy consumers (such as the flexibilities in terms of energy, power, time period and locations, etc.) is an important and challenging issue. To handle this, we propose a day-ahead market design...
Through Silicon via (TSV) technology makes the stacked chip to achieve the shortest distance of interconnection in vertical direction (z direction). However, there are many challenges for TSV wafer processes. One of the challenges is TSV wafer backside grinding process. In this paper, a predictive model was introduced to calculate the normal grinding force, and a dynamic finite element modeling methodology...
X-ray scattering is a key technique in modern synchrotron facilities towards material analysis and discovery via structural characterization at the molecular scale and nano-scale. Image classification and tagging play a crucial role in recognizing patterns, inferring meaningful physical properties from sample, and guiding subsequent experiment steps. We designed deeplearning based image classification...
Mission failure evolution is a unique aspect of complex human-machine system (CHMS), which contains failure regularity and directs emergent reconfiguration measures. Oriented to all varieties of system components, an analysis of how the parts are connected and contribute to CHMS failure is necessary. Prior work paid more attention to system design with the law of system normal operation, where a single...
Aircraft scheduling is a typical dynamic scheduling problem when carrying out certain missions. Due to unfixed mission, disruption and limited time, space and resources, aircraft scheduling generally has strong constraint and many uncertainties. In this paper, we propose an improved direct graph to describe the complex scheduling process. We add the temporary point to deal with the strong constraint,...
This paper presents a dual-band 2×2 WiFi transceiver in 28nm bulk CMOS. Achieved receiver and transmitter EVM floor at 5GHz for 160MHz per channel are −35dB and −33dB, respectively. The 2.4GHz integrated PA provides 26.5dBm saturated output power while its 5GHz counterpart delivers 26dBm. The 2.4GHz receiver features mixer first architecture while the transmitter includes a 2nd harmonic notch for...
For a double-pendulum crane system with multi-state variables, strong coupling and under-actuated, the mathematical model is a nonlinear second order differential equations and the controller is a multi-input single-output system, leading to the challenge of controller design. Most of the existing good methods are based on advanced control theories or optimization theories, but it is difficult to...
This paper reports a large-scale study that aims to understand how mobile application (app) vulnerabilities are associated with software libraries. We analyze both free and paid apps. Studying paid apps was quite meaningful because it helped us understand how differences in app development/maintenance affect the vulnerabilities associated with libraries. We analyzed 30k free and paid apps collected...
This paper presents our work in the FG 2017 Facial Expression Recognition and Analysis challenge (FERA 2017) and we participate in the AU occurrence sub-challenge. Our work of AU occurrence recognition is based on deep learning, and we design convolution neural network (CNN) models for two types of work: facial view recognition and AU occurrence recognition. For facial view recognition, our model...
A novel method based on the analytical multi-physics simulation to predict the lifetime for LED systems is presented in this paper. LED is a typical multidisciplinary system that transfers electrical input into photonic output, and lifetime prediction is a must for new electronic device before releasing to market. The lifetime feature of LED systems is closely connected to the power, thermal, and...
In this work, a physics-of-failure (PoF) reliability prediction methodology is combined with statistical models to consider the interaction between the lumen depreciation and catastrophic failures of LEDs. The current in each LED may redistribute when the catastrophic failure occurs in one of LEDs in an array, thus affecting the operation conditions of the entire LED array. A physics-of-failure based...
With the vast resource and techniques increasingly available to attackers, application layer DDoS (App-DDoS) attacks have become a serious threat to webserver. In order to deal with this kind of complex and varied attacks, a novel approach based on time series prediction model is proposed, which includes the following work: Firstly, App-DDoS attacks are divided into flooding attacks and asymmetric...
ith the wide deployment of various kinds of sensors in fixed infrastructures and in mobile devices, technologies and applications of crowd-sensing has drawn attentions in the fields of mobile computing. This paper studies the design of frameworks for crowd-sensing process in a distributed environment. We discuss the realization of the compatibilities of devices and services, as well as the algorithms...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.