The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Most of the current sensorless control schemes for BLDC (Brushless DC) motor are based on full-bridge driver. However, half-bridge driver draws a lot of attention due to its simpler structure, smaller occupied volume, lower power loss, easier control scheme and lower production cost, and it has been successfully utilized in several applications. Inspired by these applications, this paper presents...
In this paper, we describe the dynamic underlying asset with Variance Gamma process(VG), which is one of classical Lévy process with unnormal log distribution but skewness and kurtosis, we calculate the price of CB with Modified Multi-Tree (MMT) model, which is the combination of Multi-stage Compound Option model (MCO) and Multi-Tree model (MT). By estimating the pricing error and comparing our results...
By analyzing hydrogeological conditions of panxi coal, the coupling mathematical model of heat-transfer is developed in surrounding rock.Temperature field and seepage field distribution of fracture rock is described by using heat-transfer and seepage differential equations. Combined with boundary condition and parameters, the numerical solution is obtained by using numerical software. The results...
The power of nodes in the first layer of a wireless sensor network (WSN) cannot last due to their frequent relay tasks. One possible solution to this disadvantage is to adopt the first order load-balanced algorithm (LBA) to redistribute the loading of the first layer node uniformly. The balanced low-latency convergecast tree (BLLCT) algorithm, a LBA, is generally utilized in route planning in ecological...
In order to effectively evaluate the system security, a quantitative information security evaluation method which combine analytic hierarchy process (AHP) and fuzzy comprehensive evaluation were proposed. Firstly, referring to Common Criteria (CC), we established security evaluation hierarchy model. Then, the analytic hierarchy process (AHP) method was used to calculate the security factors' weights...
SRM is suitable to be used as drivers of electric bicycle (E-bike). A nonlinear dynamics model based on Matlab/Simulink of E-bike and four regenerative braking strategies of SRM are presented in this paper, such as most feedback power control strategy, most feedback efficiency control, fixed torque control, fixed feedback current control. A hybrid control strategy of PWM mode and current chopping...
The starting current is big and the torque is small when the motor begins to start with the nominal voltage .The discrete variable frequency method can solve the above two questions, at the same time brings the torque oscillation.The paper analyses the cause in detail, and then presents the solved method: the combination between discrete variable frequency method improvement and power factor closed...
Most of the researchers on watermarking techniques have focused on protecting the copyright information in various data such as audio, image and video signals. However, relatively less watermarking techniques are in respect of copyright protection of 3D model objects. After analyzing the data structure of 3D models, we propose a novel and efficient algorithm which allows embedding public watermarks...
Nowadays, face detection plays an important role in many applications. Despite of the notable successes achieved in the past decades, making a tradeoff between computational complexity and detection efficiency is the main challenge. The ultimate goal is to develop fast detection algorithms with high practicalities. Among the proposed face detection algorithms, those based on skin color form an important...
A novel robust digital image watermarking algorithm based on predictive vector quantization is proposed in this paper. The robust watermark is embedded in the image by selecting the prediction mode of each PVQ coded vector according to the watermark bit. The proposed watermarking algorithm is proved to be robust against both friendly and hostile attacks, such as JPEG compression, VQ compression and...
The research presented is mainly focused on how to simultaneously optimize concrete delivery scheduling and resource provisions for ready mixed concrete (RMC) plants based on a valid simulation modeling platform resulting from research, called HKCONSIM. Combined discrete-event simulation and genetic algorithms (GA) are applied in HKCONSIM to model and further optimize the one-plant-multisite RMC plant...
The paper presents a novel, efficient, nearest-neighbor codeword search algorithm based on three elimination criteria in the Hadamard transform (HT) domain. Before the search process, all codewords in the codebook are Hadamard-transformed and sorted in the ascending order of their first elements. During the search process, we first perform the HT on the input vector and calculate its variance and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.