نتایج جستجو برای: intelligent protection
تعداد نتایج: 254231 فیلتر نتایج به سال:
This article introduces a sort of intelligent brushless DC motor driver and its concrete application in electric bicycle, and discusses the hardware and software design scheme of the controller, and realizes the speed control, over-current protection and battery under-voltage protection of the brushless DC motor. And the experiment result indicates that the control effect is good, and it could ...
Microgrids can operate both in grid-connected and islanded modes. It is essential to protect microgrids against all types of faults in both of the operation modes. Conventional overcurrent protection schemes are not adequate for microgrids due to bidirectional flow of fault current and limited flow of fault current through semiconductor devices. In addition, the setting values of all the concer...
Over the course of the 20th century, the electrical power systems of industrialized economies have become one of the most complex systems created by mankind. A number of ongoing trends will drastically change the way this critical infrastructure is operated. Demand for electricity keeps growing while the controllability of generation capacity is decreasing due to introduction of renewable energ...
Cooperative Intelligent Transportation Systems must incorporate privacy enhancing mechanisms to gain acceptance by all involved parties. The PRECIOSA Privacy-enforcing Runtime Architecture (PeRA) provides a holistic privacy protection approach, which implements user-defined privacy policies. A data-centric protection chain ensures that ITS components process data according to attached privacy p...
In this paper, an Intelligent Content Management System with Chaotic Copyright Protection scheme called iJADE CMS is presented. iJADE CMS focuses on how web mining techniques can be effectively applied on Chinese content, with the integration of various AI techniques including intelligent agents, agent ontology and fuzzy logic based data mining scheme. Through the adoption of chaotic encryption...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید