265 research outputs found

    Modeling and Simulation of Working Characteristics of Lithium Titanate Batteries for Emergency Power Transmission

    Get PDF
    This paper presents a battery model applied to dynamic simulation software. The simulation model uses only the battery State-Of-Charge (SOC) as a state variable in order to avoid the algebraic loop problem. It is shown that this model, composed of a controlled voltage source in series with a resistance, can accurately describe the lithium titanate battery discharge process. The model’s parameters can be easily extracted from the manufacturer’s discharge curve. In this paper, it is actually applied to the self-starting system after the emergency stop of the EMU, the simulation model of the system is established by MATLAB/Simulink, and the ground test platform is used to simulate the actual working condition of EMU to complete the experimental verification. The results of both simulation and experiment proved that the scheme of battery self-shifting driven system is feasible and correct

    Secure Tensor Decomposition Using Fully Homomorphic Encryption Scheme

    Get PDF
    As the rapidly growing volume of data are beyond the capabilities of many computing infrastructures, to securely process them on cloud has become a preferred solution which can both utilize the powerful capabilities provided by cloud and protect data privacy. This paper puts forward a new approach to securely decompose tensor, the mathematical model widely used in data-intensive applications, to a core tensor and some truncated orthogonal bases. The structured, semi-structured as well as unstructured data are all transformed to low-order sub-tensors which are then encrypted using the fully homomorphic encryption scheme. A unified high-order cipher tensor model is constructed by collecting all the cipher sub-tensors and embedding them to a base tensor space. The cipher tensor is decomposed through a proposed secure algorithm, in which the square root operations are eliminated during the Lanczos procedure. The paper makes an analysis of the secure algorithm in terms of time consumption, memory usage and decomposition accuracy. Experimental results reveals that this approach can securely decompose tensor models. With the advancement of fully homomorphic encryption scheme, the proposed secure tensor decomposition method is expected to be widely applied on cloud for privacy-preserving data processing

    High-Performance PVC Gel for Adaptive Micro-Lenses with Variable Focal Length.

    Get PDF
    This paper presents a bio-inspired adaptive micro-lens with electrically tunable focus made of non-ionic high-molecular-weight polyvinyl chloride (PVC) gel. The optical device mimics the design of the crystalline lens and ciliary muscle of the human eye. It consists of a plano-convex PVC gel micro-lens on Indium Tin Oxide (ITO) glass, confined with an annular electrode operating as an artificial ciliary muscle. Upon electrical activation, the electroactive adhesive force of the PVC gel is exerted on the annular anode electrode, which reduces the sagittal height of the plano-convex PVC gel lens, resulting in focal length variation of the micro-lens. The focal length increases from 3.8 mm to 22.3 mm as the applied field is varied from 200 V/mm to 800 V/mm, comparable to that of the human lens. The device combines excellent optical characteristics with structural simplicity, fast response speed, silent operation, and low power consumption. The results show the PVC gel micro-lens is expected to open up new perspectives on practical tunable optics
    • …
    corecore