6 resultados para harmonic oscillators

em Deakin Research Online - Australia


Relevância:

20.00% 20.00%

Publicador:

Resumo:

With the purpose of solving the real solutions number of the nonlinear transcendental equations in the selective harmonic eliminated PWM (SHEPWM) technology, the nonlinear transcendental equations were transformed to a set of polynomial equations with a set of inequality constraints using the multiple-angle formulas, an analytic method based on semi-algebraic systems machine proving algorithm was proposed to classify the real solution number of the switching angles. The complete classifications of the real solution number and the analytic boundary point of the single phase and three phases SHEPWM inverter with switch points of N=3 and the single phase SHEPWM inverter with switch points of N=4 are obtained. The results indicate that the relationship between the modulation ratio and the real solution number can be demonstrated theoretically by this method, which has great implications for the solution procedure of switching angles and the improvement of harmonic elimination effects of the inverter.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

With the increasing trends of mobile interactions, voice authentication applications are in a higher demand, giving rise to new rounds of research activities. Authentication is an important security mechanism that requires the intended communication parties to present valid credentials to the communication network. In a stronger sense, all the involved parties are required to be authenticated to one another (mutual authentication). In the voice authentication technique described in this paper, the voice characteristics of an intended individual wishing to take part in a communication channel will be classified and processed. This involves a low overhead voice authentication scheme, which features equalization and scaling of the voice frequency harmonics. The performance of this system is discussed in a Labview 8.5 visual development environment, following a complete security analysis. © 2013 Elsevier Ltd. All rights reserved.