The mathematical model of the modem induction traction motor (TRIM and cutting magnetic circuit traction motor), supplied with IPM inverter with different control technique is presented in the paper. In electric and...The mathematical model of the modem induction traction motor (TRIM and cutting magnetic circuit traction motor), supplied with IPM inverter with different control technique is presented in the paper. In electric and hybrid vehicle are applied: FLMC (Fuzzy Logic Mode Control), SLMC (Sliding Mode Control), NRMC (Neural Regulator Control), and Direct Power and Torque Control for Space Vector Modulated inverter (DPTC SVM). In the special solution of the electric and hybrid vehicle are also applied a Random Switching Frequency Modulation. The control of hybrid vehicle should assure the realization of established transport-assignments in the definite time, at the optimum of energy consumption. One can this realize using. The multi criteria control system. Some results of the computer simulations are presented in the paper. Results of numerical calculation were verified for laboratory model of the electric and hybrid wheel vehicles traction motor.展开更多
XML's increasing popularity highlights the security demand for XML documents. A mandatory access control model for XML document is presented on the basis of investigation of the function dependency of XML documents a...XML's increasing popularity highlights the security demand for XML documents. A mandatory access control model for XML document is presented on the basis of investigation of the function dependency of XML documents and discussion of the integrity properties of multilevel XML document. Then, the algorithms for decomposition/recovery multilevel XML document into/from single level document are given, and the manipulation rules for typical operations of XQuery and XUpdate: QUERY, INSERT, UPDATE, and REMOVE, are elaborated. The multilevel XML document access model can meet the requirement of sensitive information processing application.展开更多
Steganography techniques are used in Multimedia data transfer to prevent adversaries from eaves dropping. Synchronized audio to audio steganography deals with recording the secret audio, hiding it in another audio fil...Steganography techniques are used in Multimedia data transfer to prevent adversaries from eaves dropping. Synchronized audio to audio steganography deals with recording the secret audio, hiding it in another audio file and subsequently sending to multiple receivers. This paper proposes a Multilevel Access control in Synchronized audio steganography, so that Audio files which are meant for the users of low level class can be listened by higher level users, whereas the vice-versa is not allowed. To provide multilevel access control, symmetric polynomial based scheme is used. The steganography scheme makes it possible to hide the audio in different bit locations of host media without inviting suspicion. The Secret file is embedded in a cover media with a key. At the receiving end the key can be derived by all the classes which are higher in the hierarchy using symmetric polynomial and the audio file is played. The system is implemented and found to be secure, fast and scalable. Simulation results show that the system is dynamic in nature and allows any type of hierarchy. The proposed approach is better even during frequent member joins and leaves. The computation cost is reduced as the same algorithm is used for key computation and descendant key derivation. Steganography technique used in this paper does not use the conventional LSB’s and uses two bit positions and the hidden data occurs only from a frame which is dictated by the key that is used. Hence the quality of stego data is improved.展开更多
The stop control strategy of modular multilevel converter based HVDC transmission system is proposed. This stop process is divided into stages of energy feedback and energy consumption. The DC voltage controller is co...The stop control strategy of modular multilevel converter based HVDC transmission system is proposed. This stop process is divided into stages of energy feedback and energy consumption. The DC voltage controller is coordinated to the used modules per phase when active power is transmitted prior to reactive power, so that the energy is fed back to the AC power grid connected to the converter station which uses the fixed dc voltage controller. In addition, in view of the different forms connected to the grid, specifically when the converter station supplies power for passive network, the passive converter station can take a certain auxiliary trigger strategy to make its maximum energy feedback to the grid. Finally, a simulation system of the MMC-HVDC system is constructed in Matlab/Simulink environment, and simulation results show that the proposed stop strategies are effective.展开更多
Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations. As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although...Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations. As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although much research has been done on secure routing, security issues have largely been ignored in applying mobile ad hoc network theory to computer technology. An ad hoc network is usually assumed to be homogeneous, which is an irrational assumption for armies. It is clear that soldiers, commanders, and commanders-in-chief should have different security levels and computation powers as they have access to asymmetric resources. Imitating basic military rank levels in battlefield situations, how multilevel security can be introduced into ad hoc networks is indicated, thereby controlling restricted classified information flows among nodes that have different security levels.展开更多
文摘The mathematical model of the modem induction traction motor (TRIM and cutting magnetic circuit traction motor), supplied with IPM inverter with different control technique is presented in the paper. In electric and hybrid vehicle are applied: FLMC (Fuzzy Logic Mode Control), SLMC (Sliding Mode Control), NRMC (Neural Regulator Control), and Direct Power and Torque Control for Space Vector Modulated inverter (DPTC SVM). In the special solution of the electric and hybrid vehicle are also applied a Random Switching Frequency Modulation. The control of hybrid vehicle should assure the realization of established transport-assignments in the definite time, at the optimum of energy consumption. One can this realize using. The multi criteria control system. Some results of the computer simulations are presented in the paper. Results of numerical calculation were verified for laboratory model of the electric and hybrid wheel vehicles traction motor.
基金The National Natural Science Foundationof China (No.60703048)Hubei Municipal Natural Science Foundation (No.2007ABA313)
文摘XML's increasing popularity highlights the security demand for XML documents. A mandatory access control model for XML document is presented on the basis of investigation of the function dependency of XML documents and discussion of the integrity properties of multilevel XML document. Then, the algorithms for decomposition/recovery multilevel XML document into/from single level document are given, and the manipulation rules for typical operations of XQuery and XUpdate: QUERY, INSERT, UPDATE, and REMOVE, are elaborated. The multilevel XML document access model can meet the requirement of sensitive information processing application.
文摘Steganography techniques are used in Multimedia data transfer to prevent adversaries from eaves dropping. Synchronized audio to audio steganography deals with recording the secret audio, hiding it in another audio file and subsequently sending to multiple receivers. This paper proposes a Multilevel Access control in Synchronized audio steganography, so that Audio files which are meant for the users of low level class can be listened by higher level users, whereas the vice-versa is not allowed. To provide multilevel access control, symmetric polynomial based scheme is used. The steganography scheme makes it possible to hide the audio in different bit locations of host media without inviting suspicion. The Secret file is embedded in a cover media with a key. At the receiving end the key can be derived by all the classes which are higher in the hierarchy using symmetric polynomial and the audio file is played. The system is implemented and found to be secure, fast and scalable. Simulation results show that the system is dynamic in nature and allows any type of hierarchy. The proposed approach is better even during frequent member joins and leaves. The computation cost is reduced as the same algorithm is used for key computation and descendant key derivation. Steganography technique used in this paper does not use the conventional LSB’s and uses two bit positions and the hidden data occurs only from a frame which is dictated by the key that is used. Hence the quality of stego data is improved.
文摘The stop control strategy of modular multilevel converter based HVDC transmission system is proposed. This stop process is divided into stages of energy feedback and energy consumption. The DC voltage controller is coordinated to the used modules per phase when active power is transmitted prior to reactive power, so that the energy is fed back to the AC power grid connected to the converter station which uses the fixed dc voltage controller. In addition, in view of the different forms connected to the grid, specifically when the converter station supplies power for passive network, the passive converter station can take a certain auxiliary trigger strategy to make its maximum energy feedback to the grid. Finally, a simulation system of the MMC-HVDC system is constructed in Matlab/Simulink environment, and simulation results show that the proposed stop strategies are effective.
基金the National Natural Science Foundation of China (60773049)the Natural Science Foundationof Jiangsu Province (BK2007086)the Fundamental Research Project of Natural Science in Colleges of Jiangsu Province(07KJB520016).
文摘Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations. As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although much research has been done on secure routing, security issues have largely been ignored in applying mobile ad hoc network theory to computer technology. An ad hoc network is usually assumed to be homogeneous, which is an irrational assumption for armies. It is clear that soldiers, commanders, and commanders-in-chief should have different security levels and computation powers as they have access to asymmetric resources. Imitating basic military rank levels in battlefield situations, how multilevel security can be introduced into ad hoc networks is indicated, thereby controlling restricted classified information flows among nodes that have different security levels.