The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A known drawback of interior permanent magnet synchronous machines are the high eddy-current losses in the stator teeth, especially in the field-weakening region. For a deep analysis of this phenomenon, an analytic loss modeling approach solely based on fundamental machine parameters like the inductances, the permanent magnet flux, and the magnet configuration is derived. Due to its formulation, the...
Usually the analytical approach for modeling CMUTs uses the single layer plate equation to obtain the deflection and does not take anisotropy and residual stress into account. A highly accurate model is developed for analytical characterization of CMUTs taking an arbitrary number of layers and residual stress into account. Based on the stress-strain relation of each layer and balancing stress resultants...
Recently, one of the problems is high efficiency for the electromagnetic machinery like a motor. This paper presents a new method of shape optimization. The target is flux barriers in the interior permanent magnetic synchronous motor (IPMSM) which is adopted as the benchmark model in IEE of Japan. Authors use the polygon model method with genetic programming (GP) by the two-dimensional finite element...
Today, gesture analysis lacks of global models able to characterize motion expressivity and its communicational character. In this paper, we propose a set of new gesture descriptors inspired from Laban Movement Analysis (LMA) and based on 3D body trajectories. We test our descriptors ability to characterize human actions in a machine learning framework (with SVM and different random forest techniques)...
To investigate the intraerythrocytic cycle of Plasmodium falciparum, time-series gene expression data are measured of infected red blood cells. However, the observed data is blurred due to cell asynchrony during experiments. In this paper, the effects of cell asynchrony are investigated by conducting numerical experiments. The simulation results suggest that cell asynchrony has varying effects on...
The human body has an important effect on the performance of on-body wireless communication systems. Given the dynamic and complex nature of the on-body channels, link quality estimation models are crucial in the design of mobility management protocols and power control protocols. In order to achieve a good estimation of link quality in WBSNs, we combine multiple body-related factors into a model...
Coverage control is one of the fundamental problems in WSN (wireless sensor network) and determines the ability to monitor the entire WSN system. Based on the Voronoi diagram and the CVT (Centralized Voronoi Tessellation) theory, and combined with the Lloyd's algorithm, we propose a dynamic covering algorithm of WSN to achieve a dynamic coverage among different areas by adjusting the geometric boundaries...
This paper presents a flexible shape-based texture analysis method by investigating the co-occurrence patterns of shapes. More precisely, a texture image is represented by a tree of shapes, each of which is associated with several attributes. The modeling of texture is thus converted to characterize the tree of shapes. To this aim, we first learn a set of co-occurrence patterns of shapes from texture...
A simplified method for in - plane buckling analysis of pylons of multi - span suspension b ridges was proposed. The analysis model is a pylon with an equivalent spring connected to it at the saddle. The stiffness of the equivalent spring was derived from the relation of the horizontal displacement at the saddle and restoring forces from the cables and was expressed with a simple formula . The stiffness...
The modal analysis and seismic time history analysis were performed of cathead transmission towers with different tower legs heights by the software Open SEES, the material nonlinearity and geometrical nonlinearity were considered in model. The results show that with the increase of the height of the cathead tower, the fundamental period increases linearly, the tower top maximum displacement and tower...
The advance of mobile electronics applications has been demanding higher drop/shock reliability performance under more severe drop/shock impacts. This in turn is requiring the board level reliability (BLR) drop test to be able to reach higher peak acceleration, particularly higher than 5000 G. One method to reach this high acceleration is to use an apparatus called Dual Mass Shock Amplifier (DMSA)...
Two groups of subjects (21 healthy, 21 hypertensive patients) were tested during two measurement protocols (exercise, tilt). Two models of QT-RR coupling were tested — linear (LM) and nonlinear (NLM). QTc reproducibility was used as evidence of model validity. Results: LM was significantly better (lower QTc irreproducibility) than NLM (P<0.01) during the tilt-table test. The differences were not...
Liquid epoxy resin is used in various types of mobile information equipment and devices and expected to be a key material for flip chip packaging [1-2]. The flip chip connection process is a thermo-compression molding process. In this process, air voids may remain behind due to the bump shape and resin properties; therefore, an appropriate molding condition is necessary. We developed a computer-aided...
Enterprise security management requires capturing different security and IT systems' details, analyzing and enforcing these security details, and improving employed security to meet new risks. Adopting structured models greatly helps in simplifying and organizing security specification and enforcement processes. However, existing security models are generally limited to specific security details and...
A space charge model is built to analyze the process of the discharge for single phase conductor under lightning strike. The special electric filed around the conductor is calculated by charge simulation method and Lapalace method. In the calculation, the operating voltage, lightning downward leader, induced charge, space charge and upward leader are considered. The shape of space charge zone is guided...
In this paper, we propose a novel linear model for modeling the propagation of security threats among the system's architectural components which is the Threats Propagation model (TP). Our model is based on the Mean Failure Cost cyber-security model (MFC) and applied to an e-learning system. The Threats propagation model (TP) enables to show if a threat can propagate to other e-learning systems components...
The peak envelope or intensity of a sonar signal is an important quantity in many applications (e.g., object detection, fish density estimation, and quantifying risk to marine mammals). However, modeling, prediction, and analysis is often limited to second-order statistics (e.g., sonar equation, transmission loss). Standard techniques from order-statistics are applied to approximate sonar signal peak...
Shape information is essential in medical image analysis as the anatomical structures usually have strong shape characteristics. Shape priors can resolve ambiguities when the low level appearance is weak or misleading due to imaging artifacts and diseases. In this paper, we propose a shape prior model based on the Gaussian-Bernoulli Restricted Boltzmann Machine (GB-RBM). This powerful generative model...
In this paper we propose a method to convert a VRML file into a WebGL rendered scene through an online application that is capable of rendering this uploaded VRML file within the Web browser itself without any plug-ins being installed. The conversion process between the input VRML file and the WebGL using our Web-based converter application is done by analyzing the uploaded VRML file content represented...
This paper proposes a new design and implementation method in supporting a smart surveillance system that can automatically detect abandoned and stolen objects in public places such as bus stations, train stations or airports. The developing system is implemented by using image processing techniques. In the circumstance such as when suspicious events (i.e. left unattended or stolen objects) have been...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.