http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Guodong Chen,Miao Zhu,Xu Cai 전력전자학회 2014 JOURNAL OF POWER ELECTRONICS Vol.14 No.1
The cascaded H-Bridge Dynamic Voltage Restorer (DVR) is used for protecting high voltage and large capacity loads from voltage sags. The LC filter in the DVR is needed to eliminate switching ripples, which also provides an accurate tracking feature in a certain frequency range. Therefore, the parameter optimization of the LC filter is especially important. In this paper, the value range functions for the inductance and capacitance in LC filters are discussed. Then, parameter variations under different conditions of voltage sags and power factors are analyzed. In addition, an optimized design method is also proposed with the consideration of multiple impact factors. A detailed optimization procedure is presented, and its validity is demonstrated by simulation and experimental results. Both results show that the proposed method can improve the LC filter design for a cascaded H-Bridge DVR and enhance the performance of the whole system.
A remark on the exponential inequality for negatively associated random variables
Guodong Xing,Shanchao Yang,Ailin Liu,Xiangping Wang 한국통계학회 2009 Journal of the Korean Statistical Society Vol.38 No.1
We give an exponential inequality for negatively associated random variables. The inequality improves the corresponding result which was obtained in [Kim, T. S., & Kim, H. C. (2007). On the exponential inequality for negatively dependent sequence. Korean Mathematical Society. Communications, 22(2), 315321]. We also obtain the convergence rate n-1/2.log n3/2 for the strong law of large numbers, which improves the corresponding one obtained by the authors in the above-cited reference.
Barycentric Location Estimation for Wireless Network Indoors Localization
GuoDong Kang,Tanguy Perennou,Michel Diaz 보안공학연구지원센터 2009 International Journal of Hybrid Information Techno Vol.2 No.2
The localization requirements for mobile nodes in wireless (sensor) networks are increasing. However, most research works are based on range measurements between nodes which are often oversensitive to the measurement error. In this paper we propose a location estimation scheme based on moving nodes that opportunistically exchange known positions. The user couples a linear matrix inequality (LMI) method with a barycenter computation to estimate its position. Simulations have shown that the accuracy of the estimation increases when the number of known positions increases, the radio range decreases and the node speeds increase. The proposed method only depends on a maximum RSS threshold to take into account a known position, which makes it robust and easy to implement. To obtain an accuracy of 1 meter, a user may have to wait at the same position for 5 minutes, with 8 pedestrians moving within range on average.
Guodong Zhao,Yonggang Liu,Kening Zhai,Fengyang Jiang,Qi Huang,Zheng Chen 대한기계학회 2022 JOURNAL OF MECHANICAL SCIENCE AND TECHNOLOGY Vol.36 No.7
Vehicle launching has an important influence on driving performance of the vehicle. For vehicles with dual clutch transmissions (DCT), the clutch torque control is the key to the launching control. Therefore, a data-driven control method for DCT launching process based on adaptive neural fuzzy inference system (ANFIS) is proposed. Firstly, the vehicle test data during launching process is collected and the optimal clutch torque is obtained based on multi-objective particle swarm optimization (MOPSO). Afterward, to learn the launching control rules from optimization results, the combination of neural network and fuzzy logic algorithm, referred to as an ANFIS, is established. The dataset of the optimized launching clutch torque is utilized to train the ANFIS controller. Finally, the simulation and test results show that the datadriven control can accurately learn the launching control rules from the optimality, thereby achieving the optimal control for different launching intentions.
Estimates for certain shifted convolution sums involving Hecke eigenvalues
Guodong Hua 대한수학회 2023 대한수학회논문집 Vol.38 No.2
In this paper, we obtain certain estimates for averages of shifted convolution sums involving Hecke eigenvalues of classical holomorphic cusp forms. This generalizes some results of L\"{u} and Wang in this direction.
MI-Trigger-based Language Modeling
( Guodong Zhou ),( Kimteng Lua ) 한국언어정보학회 1998 국제 워크샵 Vol.1998 No.-
This paper proposes a new MI0Trigger-based modeling approach to capture the preferred relationships between words over a short or long distance. It is implemented by the concept of trigger pair, which is selected by average mutual information and measured by mutual information. Both the distance-independent(DI) and distance-dependent(DD) MI-Trigger-based models are constructed within a window of a size from 1 to 10. It is found that the DD MI-trigger models have better performance than the DI MI-trigger models for the same window size and it is better to model the preferred relationships in a distance-dependent way. It is also found that the number of the trigger pairs in an MI-rigger model can be kept to a reasonable size without Iosing too much of its modeling power. Finally, it is concluded that the preferred relationships between words are useful to language disambiguation and can be modeled efficiently by the MI-Trigger-based modeling approach.
Quantum Cryptanalysis of Multivariate Permutation Problem
Guodong Sun,Shenghui Su,Maozhi Xu 보안공학연구지원센터 2014 International Journal of Security and Its Applicat Vol.8 No.6
Quantum computation is a new computational model based on quantum mechanical principle. Shor invented the polynomial time algorithms for the prime factorization and discrete logarithm problem, which indicated that the cryptosystems based on them are totally unsafe in the quantum world. Grover constructed an algorithm that finds a solution in only O(2n)steps whereas the exhaustive search algorithm needs O(2n) steps on average. In this paper we investigate the cryptanalysis of a new cryptography problem----multivariate permutation problem (MPP), which could be used to design public-key cryptosystem, with the help of the two quantum algorithms. Specially, we discuss the strength of a private key of the REESSE1+ public-key cryptosystem, whose security is based on the hardness of MPP. Besides, some suggestions are also given about the implementation of the REESSE1+.
Thickness effect on the stability of unipolar resistance switching in tin ferrite thin films
Guodong Gong,Changjin Wu,Pengfei Hu,Ying Li,Namic Kwon,Chunli Liu 한국물리학회 2016 Current Applied Physics Vol.16 No.9
We report the reproducible unipolar resistance switching behavior in Pt/SnFe2O4/Pt structures. The amorphous SnFe2O4 thin film was spin-coated on the Pt/TiO2/SiO2/Si substrate by a sol-gel method. The current-voltage characterization showed that as the spin coating cycles increased, the resistive switching (RS) characteristics became stable, and an excellent RS performance showing uniform set voltage distribution, stable resistance of both low resistance and high resistance states, and narrow reset current distribution can be obtained in SFO films with a thickness about 220 nm. Based on the conducting filament model, the variation of the RS behavior was ascribed to the increase of the electroforming voltage in the thicker films, which consequently induced more oxygen vacancies to participate in the RS process. Our results indicated that the electroforming voltage performs a significant role in the RS properties of the amorphous SnFe2O4 and the optimized RS behavior through the regulation of preparation process can be used for the resistance random access memory applications.
Leakage Magnetic Field Suppression Using Dual-Transmitter Topology in EV Wireless Charging
Guodong Zhu,Dawei Gao,Shulin Lin 전력전자학회 2019 JOURNAL OF POWER ELECTRONICS Vol.19 No.3
This paper proposes an active leakage magnetic field (LMF) suppression scheme, which uses the dual-transmitter (DT) topology, for EV wireless charging systems (EVWCS). The two transmitter coils are coplanar, concentric and driven by separate inverters. The LMF components generated by the three coils cancel each other out to reduce the total field strength. This paper gives a detailed theoretical analysis on the operating principles of the proposed scheme. Finite element analysis is used to simulate the LMF distribution patterns. Experimental results show that when there is no coil misalignment, 97% of the LMF strength can be suppressed in a 1kW prototype. These results also show that the impact on efficiency is small. The trade-off between LMF suppression and efficiency is revealed, and a control strategy to balance these two objectives is presented.