Bilatu
161-tik 121-130 emaitza erakusten
Methodology to Study Demagnetization Risk in Permanent Magnet Machines by Finite Element Method
(IEEE, 2017)
Nowadays the majority of applications are demanding more and more compact, cost effective and robust solutions for their electric drives. In this context permanent magnet synchronous machines are considered as a good ...
Thermal test procedure and analytical model calibration method for electrical machines
(IEEE, 2013)
In this paper a thermal test procedure and a calibration method for lumped parameter models are presented. Analytical models provide fast thermal simulations in comparison with finite element methods (FEM) and computed ...
Experimental test bench for testing DC microgrid control strategies
(IEEE, 2017)
During the last decades the number of microgrids and their research have increased notably, as they offer a high versatility for the integration of distributed generation (DG) units and renewable energies. Among the different ...
Comprehensive analysis of voltage balancing techniques for 5L NPC converters
(IEEE, 2013)
The reduced capability of the 5L-NPC Inverter to balance the voltages of the four DC-bus capacitors makes this converter unattractive for real power applications. This is especially true if the load demands active power. ...
Static Current Unbalance of Paralleled SiC MOSFET Modules in the Final Layout
(IEEE, 2020)
Silicon Carbide (SiC) MOSFETs enable enhanced performance of power converters in several applications. Parallel connection of SiC MOSFETs become mandatory for medium power applications due to the current rate of existing ...
Optimising Maintenance: What are the expectations for Cyber Physical Systems
(IEEE, 2016)
The need for maintenance is based on the wear of components of machinery. If this need can be defined reliably beforehand so that no unpredicted failures take place then the maintenance actions can be carried out economically ...
Dynamic DNS Request Monitoring of Android Applications via networking
(IEEE, 2018)
Smart devices are very popular and are becoming ubiquitous in the modern society, with Android OS as the most widespread operating system on current smartphones/tablets. However, malicious applications is one of the major ...
A collaborative framework for android malware detection using DNS & dynamic analysis
(IEEE, 2018)
Nowadays, with the predominance of smart devices such as smartphones, mobile malware attacks have increasingly proliferated. There is an urgent need of detecting potential malicious behaviors so as to hinder them. Furthermore, ...
Labor Induction failure prediction using Gabor filterbanks and Center Symmetric Local Binary Patterns
(IEEE, 2018)
Labor induction is defined as the artificial stimulation of uterine contractions aimed to induce vaginal birth. Occurring in about 20% of pregnancies labor induction has become one the most commonly practiced procedures ...
Reputation-based intrusion detection system for wireless sensor networks
(IEEE, 2012)
Wireless Sensor Networks (WSNs) can be used in a broad range of applications from complex military operations to simple domestic environments. This makes security a vital characteristic in WSNs. There have been numerous ...