In this paper,an adaptive control scheme is introduced for permanent magnet synchronous machines (PMSMs)as an alternative to classical control techniques.The adaptive control strategy capitalizes on the machine’s inverse dynamics to achieve accurate tracking by using an observer to approximate disturbance in the form of friction and load torque.The controller’s output is then fed to a space vector pulse width modulation(SVPWM)algorithm to produce duty cycles for the inverter.The control scheme is validated through a set of simulations on an experimentally validated PMSM model.Results for different situations highlight its high speed tracking accuracy and high performance in compensating for friction and load disturbances of various magnitudes. 相似文献
Significant growth of multimedia content on the World Wide Web (or simply ??Web??) has made it an essential part of peoples lives. The web provides enormous amount of information, however, it is very important for the users to be able to gauge the trustworthiness of web information. Users normally access content from the first few links provided to them by search engines such as Google or Yahoo!. This is assuming that these search engines provide factual information, which may be popular due to criteria such as page rank but may not always be trustworthy from the factual aspects. This paper presents a mechanism to determine trust of websites based on the semantic similarity of their multimedia content with already established and trusted websites. The proposed method allows for dynamic computation of the trust level of websites of different domains and hence overcomes the dependency on traditional user feedback methods for determining trust. In fact, our method attempts to emulate the evolving process of trust that takes place in a user??s mind. The experimental results have been provided to demonstrate the utility and practicality of the proposed method. 相似文献
Crack propagation behaviour in single edge notched specimens prepared from medium-density polyethylene (MDPE) pipe is examined under creep condition. The crack grown from an exterior notch (inbound) initiated faster than that grown from an interior notch (outbound). Subsequently, the outbound crack propagated monotonically to ultimate failure. The inbound crack showed anomalous behaviour involving two arrest stages prior to ultimate failure. The pipe is found to possess substantial residual stresses. The energy release rate for each case was calculated taking into account the respective residual stream distribution. The fact that the rates of crack propagation are not a unique function of the energy release rate indicates that the fracture is also influenced by morphological gradients imposed by processing conditions. 相似文献
The quantitative investigation of the radical scavenging properties of polyaniline (PANI) upon reaction with excess of the stable DPPH radical (a 4:1 ratio of DPPH to aniline units in the polymer) was carried out using 15N and 13C solid state NMR spectroscopy. During the process the polyaniline was oxidised so that the imine content increased from 45 to 65%. The extent of oxidation measured by NMR was confirmed by N1s XPS analysis. However, within a 30 min reaction time, about 85% of the DPPH radicals were scavenged as monitored by the decay in its EPR signal. This is about 20 times greater than the fraction of DPPH required to oxidize PANI from an imine content of 45-65%. An identification of further redox processes is required to explain the high degree of radical scavenging. At the same time, there was no evidence of significant chemical binding or trapping of DPPH in the PANI structure. 相似文献
The cloud computing introduces several changes in technology that have resulted a new ways for cloud providers to deliver their services to cloud consumers mainly in term of security risk assessment, thus, adapting a current risk assessment tools to cloud computing is a very difficult task due to its several characteristics that challenge the effectiveness of risk assessment approaches. Consequently, there is a need of risk assessment approach adapted to cloud computing. With such an approach, the cloud consumers can be guaranteed the effectiveness of data security and the cloud providers can win the trust of their cloud consumers. This paper requires the formalization of risk assessment method for conventional system as fundamental steps towards the development of flexible risk assessment approach regarding cloud consumers. 相似文献
A frequency-domain identification method is proposed by Bai (2003) for Wiener systems. The key component is a phase estimator that gives estimates of the linear subsystem phase for different frequencies. These estimates are then used to identify the whole system. In this note, it is shown that the phase estimator is not generally consistent. Consequently, consistency of the overall identification method is in turn not generally guaranteed. 相似文献
In this article, we will present a new set of hybrid polynomials and their corresponding moments, with a view to using them for the localization, compression and reconstruction of 2D and 3D images. These polynomials are formed from the Hahn and Krawtchouk polynomials. The process of calculating these is successfully stabilized using the modified recurrence relations with respect to the n order, the variable x and the symmetry property. The hybrid polynomial generation process is carried out in two forms: the first form contains the separable discrete orthogonal polynomials of Krawtchouk–Hahn (DKHP) and Hahn–Krawtchouk (DHKP). The latter are generated as the product of the discrete orthogonal Hahn and Krawtchouk polynomials, while the second form is the square equivalent of the first form, it consists of discrete squared Krawtchouk–Hahn polynomials (SKHP) and discrete polynomials of Hahn–Krawtchouk squared (SHKP). The experimental results clearly show the efficiency of hybrid moments based on hybrid polynomials in terms of localization property and computation time of 2D and 3D images compared to other types of moments; on the other hand, encouraging results have also been shown in terms of reconstruction quality and compression despite the superiority of classical polynomials.
Hammerstein system identification is considered in presence of preload and dead zone nonlinearities. The discontinuous feature of these nonlinearities makes it difficult to get a single system parameterization involving linearly all unknown parameters (those of the linear subsystem and those of the nonlinearity). Therefore, system identification has generally been dealt with using multiple stage schemes including different parametrizations and several data acquisition experiences. However, the consistency issue has only been solved under restrictive assumptions regarding the identified system. In this paper, a new identification scheme is designed and shown to be consistent under mild assumptions. 相似文献
A process for deep trench filling by BenzoCycloButene (BCB) polymer is explored. Deep trenches with 100-μm depth and different
aspect ratios from 1.4 to 20 have been successfully filled by BCB. Besides, chemical mechanical polishing (CMP) of BCB is
studied with the main goals of smoothing surface topography of substrate after BCB filling and removing excess BCB coating
which may be necessary in some applications. Removal rate for BCB, VRR, of about 0.24 μm/min has been achieved for hard cured BCB films using acid slurry. After CMP, the BCB layer showed a roughness
of about 1.36 nm (Rq, measured by atomic force microscopy, AFM). 相似文献
This paper deals with a multiobjective parallel machines scheduling problem. It consists in scheduling n independent jobs on m identical parallel machines. The job data such as processing times, release dates, due dates and sequence dependent setup times are considered. The goal is to optimize two different objectives: the makespan and the total tardiness. A mixed integer linear program is proposed to model the studied problem. As this problem is NP-hard in the strong sense, a metaheuristic method which is the second version of the non dominated sorting genetic algorithm (NSGA-II) is proposed to solve this problem. Since the parameters setting of a genetic algorithm is difficult, a fuzzy logic controller coupled with the NSGA-II (FLC-NSGA-II) is therefore proposed. The role of the fuzzy logic is to better set the crossover and the mutation probabilities in order to update the search ability. After that, an exact method based on the two phase method is also developed. We have used four measuring criteria to compare these methods. The experimental results show the advantages and the efficiency of FLC-NSGA-II. 相似文献