Prediction of differential-mode EMI in the AC Side of the Three-phase PWM rectifier
Kexin Wei, Haimei Zhang, Bin Liang,
Mingxing Du,Guozhen Gao
Department of Electrical Engineering,
Tianjin University of Technology,
Tianjin, 300384, China
zhmkx@163.com
Abstract—Saber simulation software is one of the most powerful power electronic simulation software in the world. A typical three-phase PWM rectifier is in order to investigate the EMI. In this paper, the lumped equivalent circuit model of DM EMI is analyzed and a simple equivalent circuit is proposed. Through the simulation we can get time-domain analysis, and obtain frequency-domain analysis after FFT. The simulation waveforms of DM EMI are compared with the previous results of the equivalent circuit of actual experiments, at last this also verified the validity of the research which involved in this paper at the same time.
Key words—power electronics; PWM rectifier; differential-mode EMI; saber
The Research on the Regularization of Flow Nets
Guorong Cao, Qingping Tan, Jingang Xie, Hao Wu
College of Computer Science, National University of Defense Technology, Changsha, China
{guorong.cao, eric.tan.6508, jingang.xie, hao.wu}@gmail.com
Abstract
Regular flow nets, extended from Petri nets and YAWL, have been proposed as bases for modeling web service behavior because of their abilities for dealing with cyclic behavior and data dependences among services. However, the corresponding approach on how to regularize flow nets into regular flow nets has not been given yet. So, in this paper we propose a methodology for the regularization of flow nets. Firstly, we introduce concepts related to flow nets and regular flow nets. Secondly, we define one pattern for each type flow net, and based on these patterns we can get the corresponding regular flow nets of almost all of flow nets through regularization. Finally, some special patterns that might not be regularized together with a particular example are discussed.
A Novel Algorithm of Coherent Integration for Moving Target Detection
WANG Yao
Department of Computer Science and Communication Engineering
Southwest Jiaotong University
Sichuan, China
e-mail: wangyao7841@tom.com
WANG Shan
Department of Electronic information engineering
Sichuan University
Sichuan, China
wangshan_0808@yahoo.cn
Abstract—The problem of detecting moving targets which migrate between rang cells is considered. The traditional MTD method can not effectively integrate the energy of targets, because it integrates multi-pulse in the same range cell in a CPI. This paper introduces a novel algorithm of coherent integration for moving target detection (MTCI), which is calculated along the track of the moving target. A mathematical formula of MTCI algorithm is derived based on the signal model of a moving target in Chirp Radar. The integrating results of MTCI and MTD methods in the Gaussian white noise background are also compared. A Monte Carlo simulation has been performed to evaluate the detecting performance of MTCI algorithm, and the detection curves are also given.
Keywords- coherently integration; LFM signal; multi-target detection; high-speed moving target detection
Adaptive Digital Predistortion based on MC-FQRD-RLS Algorithm using Indirect Learning Architecture
You Li, Xiaolin Zhang
School of Electronic and Information Engineering
Beihang University
Beijing, China
Doctorly911@sohu.com
zxl@buaa.edu.cn
Abstract—Multichannel fast QR decomposition recursive least-squares (MC-FQRD-RLS) algorithms are well known for their good numerical properties and low computational complexity. There are tow distinct ways to obtain the expended input vector, sequential-type method, and block-type one. The latter one, despite exhibiting a higher computational burden as compared to the former one, has some attractive features, e.g., suitability for parallel implementation. Predistortion techniques for linearizing power amplifier (PA) nonlinearity with indirect learning architecture (IDLA) are widely used. The benefit of the IDLA leaves unnecessary the assumption of a model for PA, corresponding parameters estimation and inverse construction. In this paper we present a new technique for predistortion using block-type MC-FQRD-RLS algorithm with IDLA, in which the predistorter is constructed by simplified volterra model. Simulations results verify that the proposed techniques have good convergence property.
Keywords- predistortion; MC-FQRD-RLS Algorithm; block-type; IDLA; volterra model
Vehicle stability sliding mode control based on RBF neural network
Zhang Jinzhu
The Power and energy college
Harbin University of Engineering
Harbin, China
zjz6301@126.com
Zhang Hongtian
The Power and energy college
Harbin University of Engineering
Harbin, China
Abstract—According to the nonlinear and parameter time-varying characteristics of vehicle stability control, a sliding control algorithm is proposed based on radial base function (RBF) neural network. The algorithm not only can reduce the chattering caused by the conventional sliding mode, but also improve the robust of the adaptive neural network control. The simulation results show the algorithm ensures that the car could run at the direction desired by the drivers.
Keywords- radial base function;neural network; vehicle stability; nonlinearity
Online Prediction-Based Dynamic Cluster Configuration for Energy Conservation
Bin Liu,Jian Yang
Department of Automation
University of Science and Technology of China,USTC
Hefei, China
e-mail: mobileice@mail.ustc.edu.cn, jianyang@ustc.edu.cn
Yu Zhao
Shanghai Institute of Microsystem and Information Technology (SIMIT), Chinese Academy of Sciences (CAS)
Shanghai, China
e-mail: yu.zhao@mail.sim.ac.cn
Abstract—Dynamic cluster configuration is dynamically adjusting the servers scale based on the network load in order to achieve optimal service performance under the minimum system power consumption. In previous methods, they adopted adjustment methods based on the specific physical experimental model without the description of mathematical models. This paper presents a prediction-based dynamic clusters configuration strategy, it uses least mean square (LMS) algorithm to predict service requests in the future according to the historical information of service requests, and then on the basis of the load requests and the cluster processing power to decide the servers scale and dynamically adjust the opening and shutdown of the computers in the clusters. Simulation verifies the feasibility and superiority of the scheduling strategy.
Keywords-server clusters; dynamic clusters configuration; prediction algorithm; LMS; energy conservation
Probability Estimation based Adaptive Media Playout Algorithm
Mingna Fan, Jian Yang
Department of Automation
University of Science and Technology of China, USTC
Hefei, China
e-mail: fmnwen93@mail.ustc.edu.cn,
jianyang@ustc.edu.cn
Yu Zhao
Shanghai Institute of Microsystem and Information Technology (SIMIT)
Chinese Academy of Sciences (CAS)
Shanghai, China
e-mail: yu.zhao@mail.sim.ac.cn
Abstract—An adaptive media playout algorithm based on probability estimation is proposed to reduce the video playout jitter and playout halt caused by buffer underflow. It adjusts the duration of each frame according to the channel state and the estimated probability of underflow and overflow. Also it controls the playout rate range and the variation of the playout rate of the consecutive video frames to achieve the purpose of eliminating buffer outage and smoothing the video playout speed at the same time. Simulation results demonstrate that as compared to other AMP schemes, the proposed algorithm provides better visual quality with reasonable complexity in reducing the probability of buffer underflow and reducing the playout latencies and smoothing the visual perception.
Keywords-Probability Estimation;Sliding Window;Adaptive Media Playout
Multi-UAV Formation Maneuvering Control Based on Q-Learning Fuzzy Controller
Pang Rui
School of Automation, Northwestern Polytechnical University, Xi’an, China
University of Sydney, Sydney,NSW, Australia
pangrui517@gmail.com
Abstract: On the basis of the relative motion relations of the formation flight, UAV longitudinal and lateral fuzzy controllers are designed to solve the multi-UAV formation control problem. The relative positions between adjacent UAVs are controlled to meet the desired commands and performance requirements. Q-Learning method, which is one kind of reinforcement learning, is used to tune the corresponding parameters in output membership functions of fuzzy controller. This auto-tuning avoids the complexity of manual tuning with expert experience and eliminates the steady state errors. Also, different conditions including coordinative turning, tense-loose shape changing, shape sequence changing and collision avoiding are simulated with the formation control methodology, which is comprised of centralized decision and decentralized control. The results prove the correctness of control method and formation control strategy under the circumstances of different formation maneuvering demands.
Key Words: Reinforcement learning, Q-learning, fuzzy control, UAVs, Formation Flight, Maneuvering
Read and Reply Behaviors in a BBS Social Network
Fei Ding
Key Laboratory of Communication and Information Systems
(Beijing Jiaotong University)
Beijing Municipal Commission of Education
Beijing 100044, China
Email: 02211279@bjtu.edu.cn
Yun Liu
Key Laboratory of Communication and Information Systems
(Beijing Jiaotong University)
Beijing Municipal Commission of Education
Beijing 100044, China
Email: liuyun@bjtu.edu.cn
Hui Cheng
Key Laboratory of Communication and Information Systems
(Beijing Jiaotong University)
Beijing Municipal Commission of Education
Beijing 100044, China
Email: 07111013@bjtu.edu.cn
Fei Xiong
Key Laboratory of Communication and Information Systems
(Beijing Jiaotong University)
Beijing Municipal Commission of Education
Beijing 100044, China
Email: 07120126@bjtu.edu.cn
Xia-meng Si
Key Laboratory of Communication and Information Systems
(Beijing Jiaotong University)
Beijing Municipal Commission of Education
Beijing 100044, China
Email: 05120329@bjtu.edu.cn
Bo Shen
Key Laboratory of Communication and Information Systems
(Beijing Jiaotong University)
Beijing Municipal Commission of Education
Beijing 100044, China
Email: bshen@bjtu.edu.cn
Abstract—Understanding user’ read and reply behaviors are important both for the study of online social network properties and the modeling of information dissemination and trend prediction. Our dataset is crawled from a famous Chinese BBS social network. By analyzing the read and reply datas of users, we observe that distributions of discussion size and user participation level follow the power-law distribution, agreeing with former empirical and analytical investigations. But the distribution of user interest does not exhibit a power-law property. Statistics from hot posts show that read and reply behaviors vary among different topic categories. For every 100 users interested in a post, one or two of them in average would join the discussion. In addition, investigation concerning time property of replies shows that decay functions with periodical fluctuations are suitable to describe the short-term evolution.
Keywords-online social networks, data analysis, user behavior,BBS.
Location Privacy in Sparse Environment
Heng Liu, Tiejun Wang, Ming Sun, Zhen Liu and Mingtian Zhou
School of Computer Science and Engineering
University of Electronic Science and Technology of China
Chengdu, Sichuan, China
Email:{noza.liu,wtj.uestc}@gmail.com,{sunm,quake,mtzhou} @uestc.edu.cn
Abstract—Privacy of personal location information is becoming an increasingly important issue. This paper develops new methods for location privacy in sparse environment based on dummy users. The true user has been mixed with a set of dummy users in that LBSs can’t distinguish the true user so as to protect user location privacy. We present two techniques, the first one is called “dummy user trigger algorithm”, which is able to achieve the balance of user’s Location privacy and system performance, and the second one is named “dummy user generation algorithm” based on the period density matrix which enhances the truthfulness of dummy user.
Keywords-pervasive computing; Location privacy; dummy user; Location-aware system
Correction and Data Processing for Tooth Surface Deviation of Hypoid Gear
Tianxing Li
School of Mechatronics
Northwestern Polytechnical University
Xi’an, China
ly_litianxing@163.com
Tianxing Li, Xiaozhong Deng and Bingyang Wei
School of Mechatronics Engineering
Henan University of Science & Technology
Luoyang, China
ly_litianxing@163.com
Abstract—The correction and the data processing for tooth surface deviation of hypoid gear are a key link to the realization of the digitized closed loop manufacture. Based on one-dimensional probe, the method of error compensation for hypoid gears is studied. By means of the principle of the proportional correction of spiral bevel gears, the theory and the method of the automatic compensation and feedback correction to machine tool settings are investigated according to the measuring data. Without the human intervention, the correction of machine tool settings can be automatically completed. And 1 to 3 trial cuts, the tooth surface deviations can meet the design requirement. Finally, the correction of machine tool settings and the contact pattern test of tooth surfaces have been carried out. All these verify that the approaches of the correction and the data processing are feasible and accurate.
Keywords-one-dimensional probe; hypoid gears; measurement of tooth surface deviation; automatic correction; digitized closed loop manufacture
Study on chaotic sequence and RS sequence for underwater communication
Chen Sheng, Cheng En, Yuan Fei
Key Lab of Underwater Acoustic Communication and Marine Information Technology
Xiamen University
Xiamen, China
chengen@xmu.edu.cn
Abstract
Underwater acoustic communication channels are generally characterized as seriously time-space-frequency variant channels with strong multi-path interference, limited bandwidth, severe environment noise and Doppler effect. In underwater acoustic hop frequency communication system, every user’s information is modulated by a special code on the transmitter, the information will be demodulated by the same code at the receiver. The code mentioned here is pseudo-random sequence, the spectrum of the signal will be expanded. Performance of pseudo-random sequence is directly related to system performance, therefore, pseudo-random sequence is a key point of implementing a hop-frequency communication system. This paper is based on the analysis of acoustic communication channel, some common sequences are evaluated, and simulation is made to compare the performance of chaotic sequence and RS sequence.
Design and Implementation of Embedded Indoor Intelligent Temperature Control System
LI Xin-chun
College of Electronic and Information Engineering
Liaoning Technical University
Huludao, China
e-mail: lixinchun63@sina.com
ZHAO Shuang-hua
College of Electronic and Information Engineering
Liaoning Technical University
Huludao, China
e-mail: hailang989@163.com
GAO Ming-ming
College of Electronic and Information Engineering
Liaoning Technical University
Huludao, China
e-mail: gaomingming2080@163.com
Abstract—To characteristics and shortcomings of winter heating system in north China, the paper designed the indoor intelligent temperature control system.based on ARM-Linux platform of embedded systems and fuzzy control technology. Using DS18B20 and ZigBee wireless networking technology, completed the collection of multi-point temperature. Using fuzzy control technology to achieve precise control of room temperature. And the establishment of the QT user interface optimized the environment of human-computer interaction, brought great convenience to the user. With the implementation measurement heating, system will play an important role to reducing energy waste and the user's heat expenses and improving people's quality of life.
Keywords-adaptive fuzzy control; ARM-Linux; Zigbee; QT
An Improved Channel Coding Scheme Based on Turbo-BICM for IBOC-AM
Fang Weiwei, Yang Gang, Li Jianping
School of Information Engineering
Communication University of China
Beijing, China
e-mail: 541764418@163.com, Gangy@cuc.edu.cn, turbo_code@163.com
Abstract—Hybrid in-band on-channel (IBOC) broadcasting system is a scheme of digital audio radio, which could transmit analog AM and digital audio simultaneously. In IBOC systems, broadcasters transmit signals within the allocated channel bands, thus the bandwidth assigned for digital audio transmission is very limited. BICM can improve BER performance over Rayleigh fading channels without bandwidth expansion, thus it is widely used in mobile-radio channels. It has been found that by using BICM, an IBOC-AM broadcasting system can yield a better coding gain. Turbo-BICM, the combination of turbo encoder and BICM, is known as a remarkable scheme with high coding diversity and high flexibility. In this paper, an improved channel coding scheme based on turbo-BICM is proposed to achieve better reliability compared with the conventional IBOC system. Simulation results show that the proposed scheme can effectively improve the receiving performance of an AM IBOC system. When BER is below 10-5, the improved coding scheme can achieve more than 4dB code gains over Rayleigh fading channels.
Keywords- IBOC AM; in-band on-channel; turbo; BICM; Rayleigh fading channels
An Improved Implementation Scheme Based on BICM for IBOC-AM
Liu Shuyang,Yang Gang,Li Jianping
School of Information Engineering
Communication University of China
Beijing, China
e-mail : maymonica2000@sina.com, Gangy@cuc.edu.cn, turbo_code@163.com
Abstract—This paper proposes an improved channel coding scheme based on bit-interleaved coded modulation (BICM) for in-band on-channel amplitude modulation (IBOC-AM). It can yield better coding gains than traditional scheme over Rayleigh fading channels. Generally, BICM embedded LDPC code for IBOC (BICM-L) has better coding performances than BICM embedded convolutional codes for IBOC (BICM-C), which has been proved to be an advanced scheme. However, there is a zone named blind-zone existing in the region of SNRs, where the performance gains of BICM-L with high-order modulation are worse than BICM-C. To achieve an improved performance, for the blind-zone, BICM-L is replaced by BICM-C in this improved scheme. Simulation results confirm that, by using the proposed improved scheme, a better performance gains up to 0.3 dB can be achieved for the blind-zone between 4 dB SNR and 5.1 dB SNR, while an additional gains about 4 dB can be achieved in regions of high SNRs.
Keywordss—In-band on-channel (IBOC), bit-interleaved coded modulation (BICM), low density parity check (LDPC) codes,convolutional codes.
Research on Fault Location System of Aircraft Cable Based on principle of least squares solution
Xiaolin Liu1,2, ZhiQuan Li1, Kun Yuan3
1 College of Electrical Engineering
Yanshan University
Qinhuangdao, HeBei, China
2 College of Aeronautical Automation
Civil Aviation University of China
TianJin, China
3 College of Astronautics
Northwestern Polytechnical University
XiAn, ShanXi, China
e-mail:missxiaolin1997@163.com
Abstract—In this paper, based on the electric theory of distribution parameter circuit, a mathematical model of aircraft cable fault location is created. The least squares solution is selected as the control algorithm because it has been applied successfully to parameter estimation. An aircraft cable fault location system is designed and the experimental results show that the system is rational and effective.
Keywords- Aircraft cable; Mathematical model; Least square estimation; Fault location system
A Novel Security Risk Assessment Model for Information System
Huiying Lv
School of Information Engineering
Capital Normal University
Beijing, 100037, China
lvhy999@163.com
Abstract—Security defense against threats is very important to information system. A novel security risk assessment model is presented. In this model, an information system consists of a series of network nodes, which have three elements: assets, rights and vulnerabilities. To analyze the relevance between vulnerabilities, an algorithm for intrusion path discovery is proposed centralized on assets. By investigating the intrusion paths found, the system risk is quantitatively evaluated on vulnerabilities, nodes, assets, or system, which indicates the risk situation of the system. A simulation experiment and results verify availability and effectiveness of the model.
Keyword: information security; model; risk assessment; vulnerability
Human-Machine Interface Evaluation Method Based on Grey Interval Relation Membership Degree
Chunyan Xia 1’2
1College of Mechanical & Electrical Engineering
Harbin Engineering University
Harbin 150001, China
2College of Materials Science & Engineering
Jiamusi University
Jiamusi 154007, China
xiachunyan2000@yahoo.com.cn
Abstract—Due to the incompleteness and complexity of the evaluation information in the human-machine interface evaluation, it is difficult to evaluate the human-machine interface with the traditional evaluation methods. In order to overcome these problems, grey interval relation membership degree is applied in the field of human-machine interface evaluation in this paper. The concept of membership degree is imported and integrated with grey relation analysis in the method. By comparing the relation membership degree between the design schemes and the reference schemes, including the ideal scheme and the negative ideal scheme, the optimal scheme can be found. Based on the proposed method, a novel evaluation model of human-machine interface is set up and applied in the evaluation on computer monitoring and controlling interface of nuclear power plant. Results of the evaluation example prove that the proposed method for human-machine interface evaluation is reasonable and feasible.
Keywords-grey relation analysis; membership degree; Human-machine interface; uncertin information; interval number
Design and Development of an Image Processing Based Automatic Library Storage System
1Umar Farooq, 2Hammad Khan, 3Muhammad Usman Asad, 4Amber Mateen, 5Asim Iqbal, 6Hassan Mahmood
Department of Electrical Engineering University of The Punjab Lahore-54590 Pakistan
1engr.umarfarooq@yahoo.com, 2khan.hammad@live.com, 3usmanasad01@hotmail.com, 4bosons.1@hotmail.com, 5its.asimiqbal@gmail.com, 6hassan_3md@yahoo.com
Abstract—This paper describes the design and development of an image processing based automatic storage system for library. The prototype system comprises of a cartesian robot, two infrared sensors, a four channel motor interface board, a web camera and a PC. After the book has been detected by the infrared sensors, camera captures the image of front cover of the book. The title of the book is extracted and passed to the search engine of library database. The database returns the class and location of the book which is then placed automatically in the corresponding shelf with the help of a cartesian robot, a mechanical structure driven by three direct current (DC) motors. MATLAB® programming environment has been used in developing the system.
Keywords- library storage;infrared sensors;digital camera; image processing;cartesian robot
Share with your friends: |