2,050 research outputs found

    Improved Direct Torque Control method of brushless doubly-fed reluctance machines for wind turbine

    Full text link
    Direct Torque Control (DTC) method is an excellent technique for torque and flux control for a brushless doubly-fed reluctance machine (BDFRM). The advantages of the DTC method are simple implementation, fast response and little dependence on the machine parameters. However, the conventional DTC method has high torque and flux ripple and variable switching frequency problems. This paper proposes an improved DTC method for the BDFRM when used in wind power generation systems. The Space Vector Modulation (SVM) method is used for reducing the torque and flux ripple, and also for holding constant the switching frequency of the inverter. The control method is implemented in SIMULINK®/MATLAB® and the results show that the proposed DTC method can overcome the issues and problems associated with the conventional DTC method and improve the system operation performance. © 2013 IEEE

    Optimal submission problem in a limit order book with VaR constraints

    Get PDF
    We consider an optimal selection problem for bid and ask quotes subject to a value-at-Risk (VaR) constraint when arrivals of the buy and sell orders are governed by a Poisson process. The problem is formulated as a constrained utility maximization problem over a finite time horizon. Using a diffusion approximation to Poisson arrivals of market orders, the dynamic programming principle can be applied here. We propose an efficient procedure to solve this constrained utility maximization problem based on a successive approximation algorithm. Numerical examples with and without the VaR constraint are used to illustrate the effect of the risk constraint on the dealer's choices. We also conduct numerical experiments to analyze the impacts of the risk constraint on dealer's terminal profit. © 2012 IEEE.published_or_final_versionThe 5th International Joint Conference on Computational Sciences and Optimization (CSO 2012), Harbin, Heilongjiang Province, China, 23-26 June 2012. In Proceedings of the 5th CSO, 2012, p. 266-27

    Single nucleotide polymorphisms of complement component 5 and periodontitis

    Get PDF
    BACKGROUND AND OBJECTIVE: Polymorphisms of host defence genes might increase one's risks for periodontitis. This study investigated whether tagging single nucleotide polymorphisms (SNPs) of the gene encoding complement component 5 (C5) are associated with periodontitis in a Hong Kong Chinese population. MATERIAL AND METHODS: Eleven tagging SNPs of 229 patients with at least moderate periodontitis and 207 control subjects without periodontitis were genotyped using an i-plexGOLD MassARRAY mass-spectrometry system. RESULTS: Genotype AG of SNP rs17611 was more prevalent in the group of periodontitis patients than in the controls (54.6% vs. 41.7%, p = 0.007). The haplotype CGCA of the haplotype block consisting of rs1035029, rs17611, rs25681 and rs992670 was significantly associated with periodontitis in a dominant model (p = 0.001). The SNP rs17611 showed high linkage disequilibrium with rs1035029, rs25681 and rs992670. Smoking was also significantly associated with periodontitis (p = 0.006). CONCLUSION: The tagging SNP rs17611 of the C5 gene and smoking may be associated with periodontitis among the Hong Kong Chinese population.postprin

    Genetic polymorphisms and periodontitis in Hong Kong Chinese

    Get PDF
    published_or_final_versio

    Asset allocation under regime-switching models

    Get PDF
    We discuss an optimal asset allocation problem in a wide class of discrete-time regime-switching models including the hidden Markovian regime-switching (HMRS) model, the interactive hidden Markovian regime-switching (IHMRS) model and the self-exciting threshold autoregressive (SETAR) model. In the optimal asset allocation problem, the object of the investor is to select an optimal portfolio strategy so as to maximize the expected utility of wealth over a finite investment horizon. We solve the optimal portfolio problem using a dynamic programming approach in a discrete-time set up. Numerical results are provided to illustrate the practical implementation of the models and the impacts of different types of regime switching on optimal portfolio strategies. © 2012 IEEE.published_or_final_versio

    Message from general co-chairs and program co-chairs

    Get PDF
    On the cover - Computational Sciences And Optimization: Theoretical Development And Engineering Practicepublished_or_final_versionThe 3rd International Joint Conference On Computational Sciences And Optimization (Cso 2010), Huangshan, Anhui, China , 28-31 May 2010. In Computational Sciences And Optimization: Theoretical Development And Engineering Practice, 2010, v. 1, p. 15-1

    Association between FCGR3A polymorphisms and periodontitis in Hong Kong Chinese

    Get PDF
    published_or_final_versio

    Three-dimensional jamming and flows of soft glassy materials

    Get PDF
    Various disordered dense systems such as foams, gels, emulsions and colloidal suspensions, exhibit a jamming transition from a liquid state (they flow) to a solid state below a yield stress. Their structure, thoroughly studied with powerful means of 3D characterization, exhibits some analogy with that of glasses which led to call them soft glassy materials. However, despite its importance for geophysical and industrial applications, their rheological behavior, and its microscopic origin, is still poorly known, in particular because of its nonlinear nature. Here we show from two original experiments that a simple 3D continuum description of the behaviour of soft glassy materials can be built. We first show that when a flow is imposed in some direction there is no yield resistance to a secondary flow: these systems are always unjammed simultaneously in all directions of space. The 3D jamming criterion appears to be the plasticity criterion encountered in most solids. We also find that they behave as simple liquids in the direction orthogonal to that of the main flow; their viscosity is inversely proportional to the main flow shear rate, as a signature of shear-induced structural relaxation, in close similarity with the structural relaxations driven by temperature and density in other glassy systems.Comment: http://www.nature.com/nmat/journal/v9/n2/abs/nmat2615.htm

    Quantum simulation of the wavefunction to probe frustrated Heisenberg spin systems

    Full text link
    Quantum simulators are controllable quantum systems that can reproduce the dynamics of the system of interest, which are unfeasible for classical computers. Recent developments in quantum technology enable the precise control of individual quantum particles as required for studying complex quantum systems. Particularly, quantum simulators capable of simulating frustrated Heisenberg spin systems provide platforms for understanding exotic matter such as high-temperature superconductors. Here we report the analog quantum simulation of the ground-state wavefunction to probe arbitrary Heisenberg-type interactions among four spin-1/2 particles . Depending on the interaction strength, frustration within the system emerges such that the ground state evolves from a localized to a resonating valence-bond state. This spin-1/2 tetramer is created using the polarization states of four photons. The single-particle addressability and tunable measurement-induced interactions provide us insights into entanglement dynamics among individual particles. We directly extract ground-state energies and pair-wise quantum correlations to observe the monogamy of entanglement

    Quantum homomorphic encryption for circuits of low TT-gate complexity

    Get PDF
    Fully homomorphic encryption is an encryption method with the property that any computation on the plaintext can be performed by a party having access to the ciphertext only. Here, we formally define and give schemes for quantum homomorphic encryption, which is the encryption of quantum information such that quantum computations can be performed given the ciphertext only. Our schemes allows for arbitrary Clifford group gates, but become inefficient for circuits with large complexity, measured in terms of the non-Clifford portion of the circuit (we use the "π/8\pi/8" non-Clifford group gate, which is also known as the TT-gate). More specifically, two schemes are proposed: the first scheme has a decryption procedure whose complexity scales with the square of the number of TT-gates (compared with a trivial scheme in which the complexity scales with the total number of gates); the second scheme uses a quantum evaluation key of length given by a polynomial of degree exponential in the circuit's TT-gate depth, yielding a homomorphic scheme for quantum circuits with constant TT-depth. Both schemes build on a classical fully homomorphic encryption scheme. A further contribution of ours is to formally define the security of encryption schemes for quantum messages: we define quantum indistinguishability under chosen plaintext attacks in both the public and private-key settings. In this context, we show the equivalence of several definitions. Our schemes are the first of their kind that are secure under modern cryptographic definitions, and can be seen as a quantum analogue of classical results establishing homomorphic encryption for circuits with a limited number of multiplication gates. Historically, such results appeared as precursors to the breakthrough result establishing classical fully homomorphic encryption
    corecore