The mathematical model of the modem induction traction motor (TRIM and cutting magnetic circuit traction motor), supplied with IPM inverter with different control technique is presented in the paper. In electric and...The mathematical model of the modem induction traction motor (TRIM and cutting magnetic circuit traction motor), supplied with IPM inverter with different control technique is presented in the paper. In electric and hybrid vehicle are applied: FLMC (Fuzzy Logic Mode Control), SLMC (Sliding Mode Control), NRMC (Neural Regulator Control), and Direct Power and Torque Control for Space Vector Modulated inverter (DPTC SVM). In the special solution of the electric and hybrid vehicle are also applied a Random Switching Frequency Modulation. The control of hybrid vehicle should assure the realization of established transport-assignments in the definite time, at the optimum of energy consumption. One can this realize using. The multi criteria control system. Some results of the computer simulations are presented in the paper. Results of numerical calculation were verified for laboratory model of the electric and hybrid wheel vehicles traction motor.展开更多
XML's increasing popularity highlights the security demand for XML documents. A mandatory access control model for XML document is presented on the basis of investigation of the function dependency of XML documents a...XML's increasing popularity highlights the security demand for XML documents. A mandatory access control model for XML document is presented on the basis of investigation of the function dependency of XML documents and discussion of the integrity properties of multilevel XML document. Then, the algorithms for decomposition/recovery multilevel XML document into/from single level document are given, and the manipulation rules for typical operations of XQuery and XUpdate: QUERY, INSERT, UPDATE, and REMOVE, are elaborated. The multilevel XML document access model can meet the requirement of sensitive information processing application.展开更多
Steganography techniques are used in Multimedia data transfer to prevent adversaries from eaves dropping. Synchronized audio to audio steganography deals with recording the secret audio, hiding it in another audio fil...Steganography techniques are used in Multimedia data transfer to prevent adversaries from eaves dropping. Synchronized audio to audio steganography deals with recording the secret audio, hiding it in another audio file and subsequently sending to multiple receivers. This paper proposes a Multilevel Access control in Synchronized audio steganography, so that Audio files which are meant for the users of low level class can be listened by higher level users, whereas the vice-versa is not allowed. To provide multilevel access control, symmetric polynomial based scheme is used. The steganography scheme makes it possible to hide the audio in different bit locations of host media without inviting suspicion. The Secret file is embedded in a cover media with a key. At the receiving end the key can be derived by all the classes which are higher in the hierarchy using symmetric polynomial and the audio file is played. The system is implemented and found to be secure, fast and scalable. Simulation results show that the system is dynamic in nature and allows any type of hierarchy. The proposed approach is better even during frequent member joins and leaves. The computation cost is reduced as the same algorithm is used for key computation and descendant key derivation. Steganography technique used in this paper does not use the conventional LSB’s and uses two bit positions and the hidden data occurs only from a frame which is dictated by the key that is used. Hence the quality of stego data is improved.展开更多
The stop control strategy of modular multilevel converter based HVDC transmission system is proposed. This stop process is divided into stages of energy feedback and energy consumption. The DC voltage controller is co...The stop control strategy of modular multilevel converter based HVDC transmission system is proposed. This stop process is divided into stages of energy feedback and energy consumption. The DC voltage controller is coordinated to the used modules per phase when active power is transmitted prior to reactive power, so that the energy is fed back to the AC power grid connected to the converter station which uses the fixed dc voltage controller. In addition, in view of the different forms connected to the grid, specifically when the converter station supplies power for passive network, the passive converter station can take a certain auxiliary trigger strategy to make its maximum energy feedback to the grid. Finally, a simulation system of the MMC-HVDC system is constructed in Matlab/Simulink environment, and simulation results show that the proposed stop strategies are effective.展开更多
Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations. As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although...Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations. As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although much research has been done on secure routing, security issues have largely been ignored in applying mobile ad hoc network theory to computer technology. An ad hoc network is usually assumed to be homogeneous, which is an irrational assumption for armies. It is clear that soldiers, commanders, and commanders-in-chief should have different security levels and computation powers as they have access to asymmetric resources. Imitating basic military rank levels in battlefield situations, how multilevel security can be introduced into ad hoc networks is indicated, thereby controlling restricted classified information flows among nodes that have different security levels.展开更多
In this simulation study the operation of conventional distillation column (column with one feed and two products) was investigated with the application of AspenPlus DynamicsTM software. Control structures of the colu...In this simulation study the operation of conventional distillation column (column with one feed and two products) was investigated with the application of AspenPlus DynamicsTM software. Control structures of the column which separate a two-component mixture were studied. The aim of our investigations was to discover dynamic and steady-state effects of heating and cooling on tray temperatures. The relationship of the tray temperatures and the purity of products were also identified. Based on the identified relationships a three level hierarchical control structure was developed. On the lowest level of the hierarchy there are the local controllers of heating and cooling. On the middle level of the control hierarchy the process variables are two tray temperatures and the output of the controllers is the set point of local controllers. On the top level of the control hierarchy the purity of the products are controlled over by manipulating the set point of the temperature controllers. This paper presents the functions of the control hierarchies and the middle level of the control hierarchy was analyzed in detail.展开更多
Using time-dependent multilevel approach (TDML), this paper studies the dynamics of coherent control of Rydberg lithium atoms and demonstrates that Rydberg lithium atoms can be transferred to states of higher princi...Using time-dependent multilevel approach (TDML), this paper studies the dynamics of coherent control of Rydberg lithium atoms and demonstrates that Rydberg lithium atoms can be transferred to states of higher principal quantum number by exposing them to specially designed frequency-chirped laser pulses. The population transfer from n=70 to n=75 states of lithium atoms with efficiency more than 90% is achieved by means of the sequential adiabatic rapid passages. The results agree well with the experimental ones and show that the coherent control of the population transfer from the lower n to the higher n states can be accomplished by the optimization of the chirping parameters and the intensity of laser field.展开更多
文摘The mathematical model of the modem induction traction motor (TRIM and cutting magnetic circuit traction motor), supplied with IPM inverter with different control technique is presented in the paper. In electric and hybrid vehicle are applied: FLMC (Fuzzy Logic Mode Control), SLMC (Sliding Mode Control), NRMC (Neural Regulator Control), and Direct Power and Torque Control for Space Vector Modulated inverter (DPTC SVM). In the special solution of the electric and hybrid vehicle are also applied a Random Switching Frequency Modulation. The control of hybrid vehicle should assure the realization of established transport-assignments in the definite time, at the optimum of energy consumption. One can this realize using. The multi criteria control system. Some results of the computer simulations are presented in the paper. Results of numerical calculation were verified for laboratory model of the electric and hybrid wheel vehicles traction motor.
基金The National Natural Science Foundationof China (No.60703048)Hubei Municipal Natural Science Foundation (No.2007ABA313)
文摘XML's increasing popularity highlights the security demand for XML documents. A mandatory access control model for XML document is presented on the basis of investigation of the function dependency of XML documents and discussion of the integrity properties of multilevel XML document. Then, the algorithms for decomposition/recovery multilevel XML document into/from single level document are given, and the manipulation rules for typical operations of XQuery and XUpdate: QUERY, INSERT, UPDATE, and REMOVE, are elaborated. The multilevel XML document access model can meet the requirement of sensitive information processing application.
文摘Steganography techniques are used in Multimedia data transfer to prevent adversaries from eaves dropping. Synchronized audio to audio steganography deals with recording the secret audio, hiding it in another audio file and subsequently sending to multiple receivers. This paper proposes a Multilevel Access control in Synchronized audio steganography, so that Audio files which are meant for the users of low level class can be listened by higher level users, whereas the vice-versa is not allowed. To provide multilevel access control, symmetric polynomial based scheme is used. The steganography scheme makes it possible to hide the audio in different bit locations of host media without inviting suspicion. The Secret file is embedded in a cover media with a key. At the receiving end the key can be derived by all the classes which are higher in the hierarchy using symmetric polynomial and the audio file is played. The system is implemented and found to be secure, fast and scalable. Simulation results show that the system is dynamic in nature and allows any type of hierarchy. The proposed approach is better even during frequent member joins and leaves. The computation cost is reduced as the same algorithm is used for key computation and descendant key derivation. Steganography technique used in this paper does not use the conventional LSB’s and uses two bit positions and the hidden data occurs only from a frame which is dictated by the key that is used. Hence the quality of stego data is improved.
文摘The stop control strategy of modular multilevel converter based HVDC transmission system is proposed. This stop process is divided into stages of energy feedback and energy consumption. The DC voltage controller is coordinated to the used modules per phase when active power is transmitted prior to reactive power, so that the energy is fed back to the AC power grid connected to the converter station which uses the fixed dc voltage controller. In addition, in view of the different forms connected to the grid, specifically when the converter station supplies power for passive network, the passive converter station can take a certain auxiliary trigger strategy to make its maximum energy feedback to the grid. Finally, a simulation system of the MMC-HVDC system is constructed in Matlab/Simulink environment, and simulation results show that the proposed stop strategies are effective.
基金the National Natural Science Foundation of China (60773049)the Natural Science Foundationof Jiangsu Province (BK2007086)the Fundamental Research Project of Natural Science in Colleges of Jiangsu Province(07KJB520016).
文摘Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations. As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although much research has been done on secure routing, security issues have largely been ignored in applying mobile ad hoc network theory to computer technology. An ad hoc network is usually assumed to be homogeneous, which is an irrational assumption for armies. It is clear that soldiers, commanders, and commanders-in-chief should have different security levels and computation powers as they have access to asymmetric resources. Imitating basic military rank levels in battlefield situations, how multilevel security can be introduced into ad hoc networks is indicated, thereby controlling restricted classified information flows among nodes that have different security levels.
文摘In this simulation study the operation of conventional distillation column (column with one feed and two products) was investigated with the application of AspenPlus DynamicsTM software. Control structures of the column which separate a two-component mixture were studied. The aim of our investigations was to discover dynamic and steady-state effects of heating and cooling on tray temperatures. The relationship of the tray temperatures and the purity of products were also identified. Based on the identified relationships a three level hierarchical control structure was developed. On the lowest level of the hierarchy there are the local controllers of heating and cooling. On the middle level of the control hierarchy the process variables are two tray temperatures and the output of the controllers is the set point of local controllers. On the top level of the control hierarchy the purity of the products are controlled over by manipulating the set point of the temperature controllers. This paper presents the functions of the control hierarchies and the middle level of the control hierarchy was analyzed in detail.
基金Project supported by the National Natural Science Foundation of China(Grant No.10774039)the Basic Research Program of Education Bureau of Henan Province of China(Grant No.072300410130)
文摘Using time-dependent multilevel approach (TDML), this paper studies the dynamics of coherent control of Rydberg lithium atoms and demonstrates that Rydberg lithium atoms can be transferred to states of higher principal quantum number by exposing them to specially designed frequency-chirped laser pulses. The population transfer from n=70 to n=75 states of lithium atoms with efficiency more than 90% is achieved by means of the sequential adiabatic rapid passages. The results agree well with the experimental ones and show that the coherent control of the population transfer from the lower n to the higher n states can be accomplished by the optimization of the chirping parameters and the intensity of laser field.