The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Impacts of temperature on the distribution of electric field in high voltage direct current (HVDC) cable joint have been investigated with COMSOL Multi-physics. The simulation of electric field under combined thermal-electrical conditions was carried out on a three-dimensional joint model, in which constant dc voltage and combined dc/impulse voltage were applied on the cable core while the temperatures...
The deformation and motion behaviors of droplets under electric field are important research tasks regarding the mechanisms of emulsion electric dehydration. In order to study the dehydration characteristics of droplets under a non-uniform electric field, the simulation model of droplets under a non-uniform electric field was established using the phase field method, based on Cahn-Hilliard formulation...
Power electronic transformer(PET) has been the focus of interest in recent years. Compared with conventional low frequency transformers, PETs can offer many additional functions such as phase shifting, frequency shifting and reactive power/harmonic compensation. This paper proposes a single phase PET for the Scott railway power system. The PET achieves active power control which balances the Scott's...
Cognitive radio is able to effectively increase spectral utilization. However, cooperative spectrum sensing gives malicious users chances to interfere with its decision processes. If a mobile secondary user's energy detection results become unreliable, conventional trust-value based cooperative spectrum sensing algorithms, which are used to resist malicious attacks, cannot distinguish whether it's...
QoS prediction for Web services is a hot research problem in the field of services computing. As one of the most important methods for QoS prediction, Collaborative Filtering (CF) makes prediction based on the historical QoS data contributed by similar users and services. The key issue in this process is to detect the unreliable data offered by untrustworthy users, which has attracted limited attentions...
To support the migration of software applications to the cloud environment, cloud venders have proposed different migration methodologies and guidelines. Yet, most of them require human intervention, involving manually performing repetitive tasks. This paper proposes a pattern-based transformation approach for cloud application migration. The approach automatically modifies the source code of an application...
In this paper, a novel obstacle avoidance method is developed in the framework of shared control for teleoperation robot manipulator, such that the human operator only need to tele-operate the end-effector motion of the manipulator, while the manipulator will avoid obstacle by itself without sacrificing the end-effector performance by using its joint space redundancy. The obstacle is detected using...
Modulated wideband converter system offers an under- sampling method aiming at the issue that sparse wideband signals require high sampling rates. In this paper, we propose a multi-bit pseudo-random measurement matrices construction method based on discrete chaotic sequences since Bernoulli random measurement matrix currently used in an MWC system is difficult to be implemented by hardware. Simulation...
Screen-capture tool can record a user's interaction with software and application content as a stream of screenshots which is usually stored in certain video format. Researchers have used screen-captured videos to study the programming activities that the developers carry out. In these studies, screen-captured videos had to be manually transcribed to extract software usage and application content...
3D motion capture is to track and record human movements. In recent years, it has been applied into many fields, such as human computer interaction, animation, etc. Low-level segmentation of motion capture data is of significance to the various applications of 3D motion capture, however, due to the high dimensionality of motion capture data, traditional low-level segmentation methods can hardly work...
Over the past few years, many architectures have been proposed for the future Internet. Nevertheless, such new schemes usually require existing systems to migrate to their proposed namespaces, which may compromise the adoption of new technologies. In addition, we note that most existing networked systems have their own namespaces, but inter-operation among them is rather static and lacks of flexibility...
In recent years the amount of research on human aspects of software engineering has increased. Many studies use screen-capture software (e.g., Snagit) to record developers' behavior as they work on software development tasks. The recorded task videos capture direct information about which activities the developers carry out with which content and in which applications during the task. Such behavioral...
One cycle PFC technique has advantages of AC voltage sensor elimination and simplified current loop, thus it has been utilized on various rectifier topologies. In this paper, a modified one cycle PFC method for the delta-connected cascade H bridge (CHB) rectifier is proposed, which combines the one cycle PFC control, zero sequence current injection control and DC voltage balancing control. With the...
This paper proposes a path planning algorithm for autonomous driving in urban environments. The processing of video and Velodyne pointcloud provides information about the positions of lane markers and obstacles in the local map, which are then converted to a lane costmap and obstacle costmap. The referenced GIS follow line is used for generating a series of offset curves, and the best follow line...
Cognitive radio has outstanding advantages in solving scarcity of spectrum resource and low utilization rate of spectrum in current wireless communication. Spectrum sensing method in multi-bit decision model can effectively improve the detection performance when comparing with the conventional 1- bit decision model. Aiming at the actual scenarios that there may exist malicious users in the network,...
Cognitive radio is able to effectively solve problems like spectrum resource scarcity and low spectrum utilization rate in wireless communication system. The detection performance of multi-bit decision algorithm is much better than that of conventional 1-bit decision algorithm. Aiming at attacks from malicious users in multi-bit decision model when cognitive users are mobile, this paper proposes a...
Due to the complexity of software systems, defects are inevitable. Understanding the types of defects could help developers to adopt measures in current and future software releases. In practice, developers often categorize defects into various types. One common categorization is based on fault triggers of defects. Fault trigger is a set of conditions which activate a defect (i.e., Fault) and propagate...
Traditional financial trading systems were developed in database-based standalone model years ago. Given that there exist some evident drawbacks like high latency and low availability in such architecture, it is imperative to design a new model which can meet the requirements of time-sensitive financial transactions. Therefore, in this paper we design and implement a state-replication based matching...
Software build system (e.g., Make) plays an important role in compiling human-readable source code into an executable program. One feature of build system such as make-based system is that it would use a build configuration file (e.g., Make file) to record the dependencies among different target and source code files. However, sometimes important dependencies would be missed in a build configuration...
The lane detection system is one of the most important subsystems to achieve the environmental perception of autonomous vehicles. This paper addresses the problem of detecting multiple lanes in a relatively large range around the autonomous vehicle without making too much approximation on the shape of the lane marks. A panoramic camera and a LIDAR is used to obtain a wide range of image information...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.