-
1
An adaptive voltage reference based multi-objective line flow control methods for MMC-MTDC system
Published 2025-03-01Subjects: Get full text
Article -
2
-
3
Perspectives on Soft Actor–Critic (SAC)-Aided Operational Control Strategies for Modern Power Systems with Growing Stochastics and Dynamics
Published 2025-01-01Subjects: Get full text
Article -
4
Hamilton Energy Control for the Chaotic System with Hidden Attractors
Published 2021-01-01“…Compared with the line feedback control, the control effect of Hamilton energy control is better.…”
Get full text
Article -
5
Left-Turning Vehicle Trajectory Modeling and Guide Line Setting at the Intersection
Published 2014-01-01“…Through instance verification, we could get the conclusion that the method of using left-turning guide line to control vehicles’ turning process can effectively reduce traffic conflicts and delay and improve traffic efficiency.…”
Get full text
Article -
6
A three-phase current source inverter with third harmonic injection for grid-connected renewable power sources
Published 2024-01-01“…It is based on a three-phase six-pulse inverter topology with unidirectional switches using line-synchronous control to achieve unity displacement factor at the point of common connection. …”
Get full text
Article -
7
Optimal Scheme for Process Quality and Cost Control by Integrating a Continuous Sampling Plan and the Process Yield Index
Published 2018-01-01“…The single level continuous sampling plan (CSP-1) is an in-line process control tool that has been commonly adopted in various manufacturing industries. …”
Get full text
Article -
8
Research on the Parametric Design Method of Torque Converters of the Heavy-duty Hydraulic Automatic Transmission
Published 2023-11-01“…The connection is established between the blade camber line shape control method and the curve control points, and the constraint conditions of camber line control parameters are designed. …”
Get full text
Article -
9
Independent Modal Variable Structure Fuzzy Active Vibration Control of Cylindrical Thin Shells Laminated with Photostrictive Actuators
Published 2013-01-01“…Moreover, considering the time-variant and nonlinear dynamic characteristics of photostrictive actuator, variable structure self-adjusting parameter fuzzy active controller is explored to overcome disadvantages of conventional control schemes, in which off-line fuzzy control table is adopted. The optimal switching surface is derived to increase the range of sliding mode to facilitate vibration suppression. …”
Get full text
Article -
10
Polarization conversion in soft glass fluoride and chalcogenide fibers for mid-infrared applications
Published 2025-01-01“…This work is the first proof that in-line polarization control using soft glass fibers is achievable, paving the way toward the development of all-fiber MIR systems.…”
Get full text
Article -
11
Coordinated control and protection scheme for fault identification in hybrid three-terminal DC line based on pre-estimation of fault characteristics
Published 2025-03-01“…In this paper, according to the threshold of the protection criterion, the pre-estimation of the fault point resistance and the fault pole selection are realized, a hybrid three-terminal DC line cooperative control and protection strategy based on estimated fault characteristics is proposed. …”
Get full text
Article -
12
Research Status and Prospect of Quality Intelligent Control Technology in Facilities Environment of Characteristic Agricultural Products
Published 2024-11-01“…And popularize it in a wider area, making full use of the advantages of intelligent equipment and data elements will promote the realization of light simplification of production equipment, scene of intelligent technology, diversification of service models, on-line quality control, large-scale production of digital intelligence, and value of data elements, further cultivate facilities to produce new quality productivity.…”
Get full text
Article -
13
Exploring Feed Digestibility and Broiler Performance in Response to Dietary Supplementation of <i>Chlorella vulgaris</i>
Published 2024-12-01“…Data were analyzed using linear, quadratic, and broken-line models. Control feeds without microalgae inclusion achieved a crude protein digestibility of 82.04 ± 1.42% (trial 1) and 81.63 ± 1.90% (trial 2), while feed with 20% non-processed microalgae inclusion only had a protein digestibility of 66.96 ± 1.16% (trial 1) and feed with PEF processed microalgae at 20% had a protein digestibility of 72.75 ± 0.34% (trial 2). …”
Get full text
Article -
14
AI-driven 3D bioprinting for regenerative medicine: From bench to bedside
Published 2025-03-01“…This paper commences by introducing the QbD theory into 3D bioprinting, followed by summarizing the technology roadmap of AI integration in 3D bioprinting, including multi-scale and multi-modal sensing, data-driven design, and in-line process control. This paper further describes specific AI applications in 3D bioprinting's key elements, including bioink formulation, model structure, printing process, and function regulation. …”
Get full text
Article -
15
Application of Controlled Flexible Electric Power Lines in Power System Networks
Published 2010-10-01“…A special attention has been given to controlled flexible power lines and control over them.…”
Get full text
Article -
16
Development of Intermediate Cooling Technology and Its Control for Two-Stand Plate Rolling
Published 2016-01-01“…In a plate rolling production line, thermomechanically controlled processing is critical for plate quality. …”
Get full text
Article -
17
Development of Education Districts in the Strategy of Strengthening the Axiological Foundations of the Russian Education Space
Published 2020-02-01“…This approach meets the objective of improving the quality of higher education in the regions of the country by establishing clear links with regional universities in the most “advanced” areas, organizing scientific and educational activities.Creating education districts serves as the foundation of building up a multicultural education space of the Russian Federation, the resource of lining up control at the federal and regional levels, the formation of a new vector of education policy focused on the preservation and development of a unified, internally differentiated scientific and education space of the country.…”
Get full text
Article -
18
Automotive ethernet controller authentication method based on national cryptographic algorithms
Published 2022-12-01“…With the development of intelligent and connected cars, cyber security of automotive ethernet becomes the focus of automotive industry.Authentication is one of the key technologies for automotive ethernet security.The existing authentication methods have shortcomings to meet the requirements of both safety and electronic controllers’ performance.Besides, national cryptographic algorithms are becoming a trend for automotive network security, while the related research in automotive ethernet area is still in starting phase.In order to balance the limited computing performance of electronic controllers and high security requirements of automotive ethernet, a two-stage trust chain authentication method based on national cryptographic algorithms was proposed.The method can be used in different automotive ethernet topologies.A trust chain was built up based on authentication credentials, which linked the two authentication stages, namely the initial stage and the vehicle using stage.The initial stage was triggered by diagnosis instrument at end of line or controller replacement.It deployed complete authentication based on SM2 algorithm and certificates in the initial stage.The vehicle using stage was triggered by ethernet gateway at vehicle power-on or network wakeup.In this stage, the method deployed fast authentication based on SM4 algorithm and authentication credential trust chain.The authentication credentials for trust chain were generated by credential functions.In order to ensure security, each credential was generated based on last successful authentication parameters dynamically.The test results on automotive ethernet controllers show that the method has lower computing cost and higher security level, and it can guarantee both performance and security.…”
Get full text
Article