9,364 research outputs found

    A 2-MHz 2-kW voltage-source inverter for low-temperature plasma generators: implementation of fast switching with a third-order resonant circuit

    Get PDF
    This paper presents a specially designed third-order resonant circuit intended to achieve fast switching operation for a voltage-source series-resonant inverter using four MOSFETs. The third-order resonant current superimposed on a sinusoidal load current helps to quickly charge or discharge the output capacitance of each MOSFET. This results not only in a reduction of the commutation period which is required to turn the MOSFET on and off, but also in an improvement of the displacement factor at the output of the inverter. Moreover, the third-order resonant circuit acts as a low-pass filter to suppress the parasitic oscillation between line inductance and stray capacitance. The viability and effectiveness of the third-order resonant circuit is verified by a 2 MHz 2 kW prototype inverter developed for a low-temperature plasma generator </p

    MODELING AND ANALYSIS OF DISTRIBUTION LOAD CURRENTS PRODUCED BY AN AD JUSTABLE SPEED DRIVE HEAT PUMP

    Get PDF
    A number of demand side management techniques have been proposed for the efficient use of electric power in the commercial and residential sector. The adjustable speed drive heat pump is a technology which has the prospect of decreasing power demands for space heating. This design has the advantage over conventional designs of higher efficiency and, potentially, reduction of peak power demand. Its main disadvantage is higher cost. Further, it has the disadvantage that it produces a load current with a substantial harmonic content. This load current waveform is injected into the distribution system and causes extra losses in the distribution transformer. These high efficiency heat pumps are being promoted by some utility rebate programs to encourage residential customers to install the high efficiency devices. This thesis presents an introduction to adjustable speed drives as they are applied to the refrigeration cycle. The impact of these devices on distribution transformers and the significant transformer derating is discussed. In addition, an Advanced Continuous Simulation Language, (ACSL), simulation is presented that models the induction motor, six step adjustable speed drive, and distribution transformer. The results of this simulation are presented1 to show typical system waveforms, such as the load current and its frequency spectrum. These waveforms are compared to results obtained from an actual installation. In addition, the ANSI Standard C57.110 is used to assess the transformer derating. The main contribution of the thesis is the presentation of a detailed method for the analysis of adjustable speed drive heat pump loads. General conclusions are drawn concerning the appliciability of the high efficiency, adjustable speed drive heat pump including the added losses in the distribution system

    Design analysis of levitation facility for space processing applications

    Get PDF
    Containerless processing facilities for the space laboratory and space shuttle are defined. Materials process examples representative of the most severe requirements for the facility in terms of electrical power, radio frequency equipment, and the use of an auxiliary electron beam heater were used to discuss matters having the greatest effect upon the space shuttle pallet payload interfaces and envelopes. Improved weight, volume, and efficiency estimates for the RF generating equipment were derived. Results are particularly significant because of the reduced requirements for heat rejection from electrical equipment, one of the principal envelope problems for shuttle pallet payloads. It is shown that although experiments on containerless melting of high temperature refractory materials make it desirable to consider the highest peak powers which can be made available on the pallet, total energy requirements are kept relatively low by the very fast processing times typical of containerless experiments and allows consideration of heat rejection capabilities lower than peak power demand if energy storage in system heat capacitances is considered. Batteries are considered to avoid a requirement for fuel cells capable of furnishing this brief peak power demand

    Microwave Discharge Ion Sources

    Full text link
    This chapter describes the basic principles, design features and characteristics of microwave discharge ion sources. A suitable source for the production of intense beams for high-power accelerators must satisfy the requirements of high brightness, stability and reliability. The 2.45 GHz off-resonance microwave discharge sources are ideal devices to generate the required beams, as they produce multimilliampere beams of protons, deuterons and singly charged ions. A description of different technical designs will be given, analysing their performance, with particular attention being paid to the quality of the beam, especially in terms of its emittance.Comment: 21 pages, contribution to the CAS-CERN Accelerator School: Ion Sources, Senec, Slovakia, 29 May - 8 June 2012, edited by R. Baile

    Rapid analysis & design methodologies of High-Frequency LCLC Resonant Inverter as Electrodeless Fluorescent Lamp Ballast

    Get PDF
    The papers presents methodologies for the analysis of 4th-order LCLC resonant power converters operating at 2.63 MHz as fluorescent lamp ballasts, where high frequency operation facilitates capacitive discharge into the tube, with near resonance operation at high load quality factor enabling high efficiency. State-variable dynamic descriptions of the converter are employed to rapidly determine the steady-state cyclic behaviour of the ballast during nominal operation. Simulation and experimental measurements from a prototype ballast circuit driving a 60 cm, 8W T5 fluorescent lamp are also included

    Transmission électromagnétique rotative d'énergie et d'information sans contact

    Get PDF
    The transmission of energy or signals to a rotating device is generally carried out by systems with sliding contacts. This technology, apparently simple, generates serious nuisance such as abrasion of the elements in contact, electric noises and requires a relatively important volume. These devices, of limited life cycle, generally request quite expensive maintenance. The transmission of energy or information by induction seems then an interesting alternative to this technology. In fact, the constant evolution of electronic components and ferromagnetic materials developed for high frequency power applications opens the way to reliable, integrated and economical system supplied by induction. This thesis can be a useful reference document to make a choice and to design an energy and/or information transmission device by induction, based on the principle of the transformer. Various solutions with or without carried ferrite structures are proposed, also for different geometries including all invariance of the system parameters in relation to the rotation speed and the angular position. The first part of this work presents some high frequency converters integrating a transformer (Flyback, Forward…). This approach shows their possibilities as well as some of the corresponding elements of design. This part demonstrates also the interest of using sinusoidal signals to limit the disturbances caused by the power transmission system. Several calculation models of inductances, of the heating, of the iron losses and of the transformer (equivalent electric model) have been developed. Then different rotating transformers, the most adapted to this kind of transmission, have been designed. After validation and implementation of these models into a design software, several examples have been achieved and also integrated into a real system. The second part of this study is devoted to the transmission of information by induction. From the start, the transformer appears as a band pass type hence, penalizing the transmission modes using low and null frequencies. The transmission modes of certain communication systems are compatible with the characteristics of the transformer and then the information transformer is inserted directly within the data communication channel, without any other electronic components. In the contrary case, the modulation intervenes like an alternative to the transmission in baseband and proves to be an adapted solution when the transmission of power generates disturbances in the data communication channel of information (coupling between the two systems). In this case the modulation allows to separate the two respective spectra (disturbances and information) so that a filter device eliminates the disturbances without deteriorating the signal carrying information. Various approaches to transmit information were approached and are presented in this work. Design methods are also proposed. Besides, various developments show at the same time the feasibility and the obvious interest of these principles

    Electromagnetic containerless processing requirements and recommended facility concept and capabilities for space lab

    Get PDF
    Containerless melting, reaction, and solidification experiments and processes which potentially can lead to new understanding of material science and production of new or improved materials in the weightless space environment are reviewed in terms of planning for spacelab. Most of the experiments and processes discussed are amenable to the employment of electromagnetic position control and electromagnetic induction or electron beam heating and melting. The spectrum of relevant properties of materials, which determine requirements for a space laboratory electromagnetic containerless processing facility are reviewed. Appropriate distributions and associated coil structures are analyzed and compared on the basis of efficiency, for providing the functions of position sensing, control, and induction heating. Several coil systems are found capable of providing these functions. Exchangeable modular coils in appropriate sizes are recommended to achieve the maximum power efficiencies, for a wide range of specimen sizes and resistivities, in order to conserve total facility power

    Incremental learning for large-scale stream data and its application to cybersecurity

    Get PDF
    As many human currently depend on technologies to assist with daily tasks, there are more and more applications which have been developed to be fit in one small gadget such as smart phone and tablet. Thus, by carrying this small gadget alone, most of our tasks are able to be settled efficiently and fast. Until the end of 20th century, mobile phones are only used to call and to send short message service (sms). However, in early 21st century, a rapid revolution of communi�cation technology from mobile phone into smart phone has been seen in which the smart phone is equipped by 4G Internet line along with the telephone service provider line. Thus, the users are able to make a phone call, send messages using variety of application such as Whatsapp and Line, send email, serving websites, accessing maps and handling some daily tasks via online using online banking, online shopping and online meetings via video conferences. In previous years, if there are cases of missing children or missing cars, the victims would rely on the police investigation. But now, as easy as uploading a notification about the loss on Facebook and spread the news among Facebook users, there are more people are able to help in the search. Despite the advantages that can be obtained using these technologies, there are a group of irresponsible people who take advan�tage of current technologies for their own self-interest. Among the applications that are usually being used by almost Internet users and also are often misused by cyber criminals are email and websites. Therefore, we take this initiative to make enhancement in cyber security application to avoid the Internet users from being trapped and deceived by the trick of cyber criminals by developing detec�tion system of malicious spam email and Distributed Denial of Services (DDoS) 3773(53867 3(53867.1781.8781$0,1$+ iii backscatter. Imagine that a notice with a logo of Mobile Phone company is received by an email informing that the customer had recently run up a large mobile phone bill. A link regarding the bill is attached for him/her to find out the details. Since, the customer thinks that the billing might be wrong, thus the link is clicked. However, the link is directed to a webpage which displays a status that currently the webpage is under construction. Then the customer closes the page and thinking of to visit the website again at other time. Unfortunately, after a single click actually a malicious file is downloaded and installed without the customer aware of it. That malicious file most probably is a Trojan that capable to steal confidential information from victim’s computer. On the next day, when the same person is using the same computer to log in the online banking, all of a sudden find out that his/her money is lost totally. This is one of a worst case scenario of malicious spam email which is usually handled by cybersecurity field. Another different case of cybersecurity is the Distributed Denial of Services (DDoS) attack. Let say, Company X is selling flowers via online in which the market is from the local and international customer. The online business of Company X is running normally as usual, until a day before mother’s day, the webpage of Company X is totally down and the prospective customers could not open the webpage to make order to be sent specially for their beloved mother. Thus, the customers would search another company that sells the same item. The Company X server is down, most probably because of the DDoS attack where a junk traffic is sent to that company server which makes that server could not serve the request by the legitimate customers. This attack effect not only the profit of the company, but also reputation damage, regular customer turnover and productivity decline. Unfortunately, it is difficult for a normal user like us to detect malicious spam 377$ 3(53867$.1781.87810,10,1+ email or DDoS attack with naked eyes. It is because recently the spammers and attacker had improved their strategy so that the malicious email and the DDoS packets are hardly able to be differentiated with the normal email and data packets. Once the Social Engineering is used by the spammers to create relevant email content in the malicious spam email and when a new campaign of DDoS attack is launched by the attacker, no normal users are capable to distinguish the benign and malicious email or data packets. This is where my Ph.D project comes in handy. My Ph.d is focusing on constructing a detection system of malicious spam email and DDoS attack using a large number of dataset which are obtained by a server that collect double-bounce email and darknet for malicious spam email detection system and DDoS backscatter detection system, respectively. As many up-to-date data are used during the learning, the detection system would become more robust to the latest strategy of the cybercriminal. Therefore, the scenario mentioned above can be avoided by assisting the user with important information at the user-end such as malicious spam email filter or at the server firewall. First of all, the method to learn large-scale stream data must be solved before implementing it in the detection system. Therefore, in Chapter 2, the general learning strategy of large-scale data is introduced to be used in the cybersecurity applications which are discussed in Chapter 3 and Chapter 4, respectively. One of a critical criterion of the detection system is capable to learn fast because after the learning, the updated information needs to be passed to user to avoid the user from being deceived by the cybercriminal. To process large-scale data sequences, it is important to choose a suitable learning algorithm that is capable to learn in real time. Incremental learning has an ability to process large data in chunk and update the parameters after learning each chunk. Such type of learning keep and update only the minimum information on a classifier model. 3773(53867 3(53867.1781.8781$0,1$+ Therefore, it requires relatively small memory and short learning time. On the other hand, batch learning is not suitable because it needs to store all training data, which consume a large memory capacity. Due to the limited memory, it is certainly impossible to process online large-scale data sequences using the batch learning. Therefore, the learning of large-scale stream data should be conducted incrementally. This dissertation contains of five chapters. In Chapter 1, the concept of in�cremental learning is briefly described and basic theories on Resource Allocating Network (RAN) and conventional data selection method are discussed in this chapter. Besides that, the overview of this dissertation is also elaborated in this chapter. In Chapter 2, we propose a new algorithm based on incremental Radial Basis Function Network (RBFN) to accelerate the learning in stream data. The data sequences are represented as a large chunk size of data given continuously within a short time. In order to learn such data, the learning should be carried out incrementally. Since it is certainly impossible to learn all data in a short pe�riod, selecting essential data from a given chunk can shorten the learning time. In our method, we select data that are located in untrained or “not well-learned” region and discard data at trained or “well-learned” region. These regions are represented by margin flag. Each region is consisted of similar data which are near to each other. To search the similar data, the well-known LSH method pro�posed by Andoni et al. is used. The LSH method indeed has proven be able to quickly find similar objects in a large database. Moreover, we utilize the LSH ʼs properties; hash value and Hash Table to further reduced the processing time. A flag as a criterion to decide whether to choose or not the training data is added in the Hash Table and is updated in each chunk sequence. Whereas, the hash value of RBF bases that is identical with the hash value of the training data is used to select the RBF bases that is near to the training data. The performance results of 377$ 3(53867$.1781.87810,10,1+ vi the numerical simulation on nine UC Irvine (UCI) Machine Learning Repository datasets indicate that the proposed method can reduce the learning time, while keeping the similar accuracy rate to the conventional method. These results indi�cate that the proposed method can improve the RAN learning algorithm towards the large-scale stream data processing. In Chapter 3, we propose a new online system to detect malicious spam emails and to adapt to the changes of malicious URLs in the body of spam emails by updating the system daily. For this purpose, we develop an autonomous system that learns from double-bounce emails collected at a mail server. To adapt to new malicious campaigns, only new types of spam emails are learned by introducing an active learning scheme into a classifier model. Here, we adopt Resource Allocating Network with Locality Sensitive Hashing (RAN-LSH) as a classifier model with data selection. In this data selection, the same or similar spam emails that have already been learned are quickly searched for a hash table using Locally Sensitive Hashing, and such spam emails are discarded without learning. On the other hand, malicious spam emails are sometimes drastically changed along with a new arrival of malicious campaign. In this case, it is not appropriate to classify such spam emails into malicious or benign by a classifier. It should be analyzed by using a more reliable method such as a malware analyzer. In order to find new types of spam emails, an outlier detection mechanism is implemented in RAN-LSH. To analyze email contents, we adopt the Bag-of-Words (BoW) approach and generate feature vectors whose attributes are transformed based on the normalized term frequency-inverse document frequency. To evaluate the developed system, we use a dataset of double-bounce spam emails which are collected from March 1, 2013 to May 10, 2013. In the experiment, we study the effect of introducing the outlier detection in RAN-LSH. As a result, by introducing the outlier detection, we confirm that the detection accuracy is enhanced on 3773(53867 3(53867.1781.87810,10,1+ average over the testing period. In Chapter 4, we propose a fast Distributed Denial of Service (DDoS) backscat�ter detection system to detect DDoS backscatter from a combination of protocols and ports other than the following two labeled packets: Transmission Control Protocol (TCP) Port 80 (80/TCP) and User datagram Protocol (UDP) Port 53 (53/UDP). Usually, it is hard to detect DDoS backscatter from the unlabeled packets, where an expert is needed to analyze every packet manually. Since it is a costly approach, we propose a detection system using Resource Allocating Network (RAN) with data selection to select essential data. Using this method, the learning time is shorten, and thus, the DDoS backscatter can be detected fast. This detection system consists of two modules which are pre-processing and classifier. With the former module, the packets information are transformed into 17 feature-vectors. With the latter module, the RAN-LSH classifier is used, where only data located at untrained region are selected. The performance of the proposed detection system is evaluated using 9,968 training data from 80/TCP and 53/UDP, whereas 5,933 test data are from unlabeled packets which are col�lected from January 1st, 2013 until January 20th, 2014 at National Institute of Information and Communications Technology (NICT), Japan. The results indi�cate that detection system can detect the DDoS backscatter from both labeled and unlabeled packets with high recall and precision rate within a short time. Finally, in Chapter 5, we discussed the conclusions and the future work of our study: RAN-LSH classifier, malicious spam email detection system and DDoS backscatter detection system
    corecore