Filter Results
14 results
- Data for: Predictive extended state observer design for nonlinear systems subject to unmodeled sluggish actuator dynamicsWe provide code contructed by Matlab 2016b Simulink so that anyone who is familiar with simulink could use the code to generate the data shown in the submitted manuscript. The first is the numerical example and the second is the hypersonic vehicle example. Run the main.m to load necessary model data and control paramters, then run the .slx code. Pay attention to the switch block in the simulink model to switch to different models and control laws.
- Dataset
- Data for: Advance spectral approach for condition evaluation of rolling element bearingsThe bearing signals are extracted by PCB 608A11 piezoelectric ICP Accelerometers attached over the bearing case and a NI cDAQ-9234 data acquisition system. Provision of NI Lab VIEW software with the DAQ facilitates in data acquisition. The vibration signal is collected after every 10 minutes of operation with a sampling rate of 25.6 kHz and signal length of 2560 (corresponding to 0.1 sec). The failure time for bearing B1 which is considered for further investigation is recorded to be12250 minutes in test one and that of the bearing B2 is 14990 minutes in test two.
- Dataset
- Data for: Fully Decentralized Robust Backstepping Voltage Control of Photovoltaic Systems for DC Islanded Microgrids Based on Disturbance Observer MethodThe STM32f407 codes which can be generated with WAIJUNG toolbox in Matlab/Simulinkis included as well as Psim simulations are included.
- Dataset
- Data for: New approach for regulation of the internal recirculation flow rate by fuzzy logic in biological wastewater treatmentsProposed fuzzy controller for manipulation of the internal recirculation flow rate
- Dataset
- Data for: Quality online detection in cement clinker: A soft sensor model based on multivariate time series analysis and CNNThe raw data is in the cement plant, now.My collection is the papers we have seen.
- Dataset
- Data for: Novel Uncertain Texture Features Fusion Based Framework for Performance Condition Evaluation of Complex Electromechanical SystemsMonitoring data for Novel Uncertain Texture Features Fusion Based Framework for Performance Condition Evaluation of Complex Electromechanical Systems.
- Dataset
- Data for: Sparse representation of parametric dictionary based on fault impulse matching for wheelset bearing fault diagnosisThe data is the outer and inner race fault vibration data of wheelset bearings, the detail information about it can be found in the paper.
- Dataset
- Data for: Fractional grey model based on non-singular exponential kernel and its application in the prediction of electronic waste precious metal contentThe supplementary materials include original data, introduction of basic knowledge, proof of theorem, program code, etc.
- Dataset
- Data for: A novel control strategy for mode seamless switching of PV converter in DC microgrid based on double integral sliding mode controlThis is the source program of PV converter under the environment of dSPACE,and its hardware platform is introduced in my paper.
- Dataset
- Data for: Detection and Defense of Active Attacks for Secret Key Generation Based on Wireless Channels in Static EnvironmentIn static or quasi-static environments, secret key generation (SKG) based on wireless channels is bad random and vulnerable to active attacks. To improve the randomness of the generated secret key, singular value decomposition (SVD) techniques are used to reconstitute equivalent wireless channels in multiple-input multiple-output (MIMO) systems. The eigenvector matrices obtained from the SVD and private pilot, which is generated dynamically from the equivalent wireless channels, are used to detect active attacks by authenticating the sender based on the wireless channels. To defend passive eavesdropping and active attacks, the concept of one time pad is used to generate dynamic private pilot. The proposed SKG scheme based on private pilot and SVD techniques can detect whether the SKG is under man-in-the-middle attack, impersonation attack, signal injection attack, defend passive eavesdropping and active attacks effectively, and obtain higher SKG rate and randomness than the approach via random beam-forming. Theoretical analysis and simulation results demonstrate the above results again.
- Dataset
1