A fuzzy immune PID controller is designed for the water supply system and simulation is presented.Simulation results by Matlab shows that the fuzzy immune controller is better than PID controller in respect of control effect with fast response and little overshoot.
In this paper, a new sensorless detection scheme for PMSM is presented. This detection scheme consits of PMSM's mathematical model and the flux-linkage observer. The mathematical model is used to approximate the nonlinear system of PMSM. Due to the current modification scheme with error-correction fashion, as detailed in this paper, the actual rotor position and the machine speed can be estimated even in the transient state, and the sensorless drive system has a good robustness to the motor parameter's variation. The proposed detection scheme is not only to reduce the speed estimate error largely, but also to stabilize the PMSM system. The high performance of the proposed sensorless algorithm is verified by the simulation results of PMSM.
The complete high-order perturbation formulas are established by both crystal-field (CF) and charge-transfer (CT) mechanisms. The EPR g factors of MgTiO 3 : Cr 3+ , SrTiO 3 : Cr 3+ and SrTiO 3 : Mn 4+ crystals are calculated from the formulas. The calculations of the EPR g factors are in agreement with the experimental values. The contribution rate of the CT mechanism (|Δg T /Δg F |) to EPR parameters, increases with the growth of the valence state for the 3d n ions in the crystals. For the higher valence state 3d 3 ion Mn 4+ in crystals, the explanation of the EPR parameters reasonably involves both CF and CT mechanisms. The g values are also given from one-spin-orbit-parameter model and crystal-field (CF) mechanism for comparison.
Considered the characteristic of the media of wireless communication,the communication nodes in the mobile IPv6 are confronted with the threats of the DoS attack,reply attack and information theft attack and so on.Firstly,it is proposed a secure communication scheme which is used in the communication between the mobile nodes based on the certificate.In this scheme,any communication peer must execute a handshake process before communication.After the two-ways authentication,the confidentiality is protected by the session key which is negotiated during the handshake process.According to the characteristic of mobile nodes,the certificate is modified in this paper.