Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 4921 - 4950 of 11923

Full-Text Articles in Computer Engineering

Dynamics Of Microbubble Confined In Concave Wall In Ultrasound Filed, Jiwen Hu, Jiana Sun Jan 2019

Dynamics Of Microbubble Confined In Concave Wall In Ultrasound Filed, Jiwen Hu, Jiana Sun

Journal of System Simulation

Abstract: The interactions between an ultrasound contrast agent (UCA) microbubble and a concave surface can be applied to understanding of the response of the UCA near blood vessel wall in ultrasound field. A dynamics model of microbubble near a concave wall is presented by a virtual image method and the acoustic reflection effects of the surface. The dynamic behavior of the microbubble is analyzed by numerical calculation. The results show that the microbubble vibration is suppressed near the wall. Inhibitory effects to microbubble vibration near rigid wall are stronger than that of near elastic wall. The microbubble vibration is easier …


Evolutionary Simulation On User Behavior Of Learning-Oriented Network Community, Lina Jiang, Xiaohong Shan, Xiaoyan Liu, Li Hong Jan 2019

Evolutionary Simulation On User Behavior Of Learning-Oriented Network Community, Lina Jiang, Xiaohong Shan, Xiaoyan Liu, Li Hong

Journal of System Simulation

Abstract: As the Learning-Oriented network platform aims to share knowledge, its users’ behavior is different from that of other network communities. Based on the Mental Accounting Theory, affecting factors of the users’ behavior is analyzed with Structural Equation Model. The simulation model using social computing method is established. This paper makes the comparative analysis on the NETLOGO simulation platform to explore and summarize the rules of users’ behavior. The final mental accounts including "Gaining Knowledge", "Learning Interest", "Sense of Belonging", and "Time". According to the conclusions and experiments, This paper provides the basis of decision making for the …


Design And Implementation Of Signal Level Mono-Pulse Tracking Radar Simulation System, Chaoxuan Shang, Zhao Yang, Zhuangzhi Han, Han Ning Jan 2019

Design And Implementation Of Signal Level Mono-Pulse Tracking Radar Simulation System, Chaoxuan Shang, Zhao Yang, Zhuangzhi Han, Han Ning

Journal of System Simulation

Abstract: In view of the poor compatibility between the particle size of simulation and tracking feedback control in tracking radar simulation system, a signal level mono-pulse tracking radar simulation system is constructed based on SystemVue simulation platform. Simulation system is layered and simulation framework is built according to the requirements of the simulation system. The key technologies in the process of simulation are analyzed, and the simulation results with distance and angle tracking loop are given. System implementation is of great significance for mono-pulse radar system design, demonstration, equipment development appraisal as well as combat training and …


An Improved Cs Algorithm And Its Application In Micro Grid Optimization, Changliang Liu, Pengfei Wang, Liu Shuai, Luo Lei, Zhenqiao Hui Jan 2019

An Improved Cs Algorithm And Its Application In Micro Grid Optimization, Changliang Liu, Pengfei Wang, Liu Shuai, Luo Lei, Zhenqiao Hui

Journal of System Simulation

Abstract: In order to solve the shortcomings in cuckoo search algorithm, such as slow convergence, low accuracy and easy to fall into the local optimal solution, an improved cuckoo search algorithm is proposed: CS-EO search algorithm. In this search algorithm, the fast convergence speed and global searching advantage of CS algorithm and the strong local search ability of EO algorithm are combined organically. Under the premise of guaranteeing the solving speed, the accuracy of the solution is improved. The results of optimization test functions show that CS- EO algorithm has better optimization performance compared with CS algorithm and PSO …


Mathematical Modeling And Simulation Of Hydraulic Governor For Marine Diesel Engine, Chen Jian Jan 2019

Mathematical Modeling And Simulation Of Hydraulic Governor For Marine Diesel Engine, Chen Jian

Journal of System Simulation

Abstract: The speed control and load limit of marine diesel engine are implemented by hydraulic governor, of which the characteristics directly determines the performance of generator set. Therefore, it is an important content of marine engine room simulator training to strengthen the students’ training and understanding of the working characteristics of the hydraulic governor. In the existing marine engine room simulators, the simulation model of hydraulic governor is too simple to carry out further training tasks. According to the working principle of hydraulic governor and the training purpose of marine engine room simulator, the mathematical model of UG-8 hydraulic governor …


A Simulation Study Of Appointment Rulesin Ct Department, Li Jun, Xuemei Lin, Zhou Jie Jan 2019

A Simulation Study Of Appointment Rulesin Ct Department, Li Jun, Xuemei Lin, Zhou Jie

Journal of System Simulation

Abstract: A discrete event simulation model was established onExtendSimsoftware, , with the average patient waiting time, average idle time of the examination rooms and total cost which wasthe linearlyweighted sum of them being as performance measures.Estimated value and sample data of these performance measures of 9 basic appointment scheduling rules and 9 adjusted ones were produced by the de-duplication methodso that analysis of variance and efficient frontier were carried out to compare the effects of different “staggered reservation rules” on this queuing system.It was showed that, for different beneficiaries (patients, hospital or both), the appointment scheduling rules …


Research On Two-Dimensional Imaging Algorithm Of Tomography For Near-Field Radiation Of Rf Objects, Shaohui Quan, Changtai Shi, Xuwang Cui, Bin Shi Jan 2019

Research On Two-Dimensional Imaging Algorithm Of Tomography For Near-Field Radiation Of Rf Objects, Shaohui Quan, Changtai Shi, Xuwang Cui, Bin Shi

Journal of System Simulation

Abstract: Two two-dimensional imaging algorithms of tomography are presented for observing different sections of RF objects. Two-dimensional images of the cross and coronal sections of the model are obtained based on the near-field radiation data calculated by FEKO. The effects of different variables on the imaging resolution are studied by changing near field scanning points and distance between the observation plane and RF objects. After the analysis of the simulation results, the proposed algorithms are compared with other imaging algorithms from different aspects. The advantages and limitations are discussed. The change of images and the corresponding solution are studied …


Modeling And Numerical Simulation Of Tissue Engineering Scaffold 3d Printing Process, Congping Chen, Jieguang Huang, Hu Qiong, Yanhua Ran, Li Bo Jan 2019

Modeling And Numerical Simulation Of Tissue Engineering Scaffold 3d Printing Process, Congping Chen, Jieguang Huang, Hu Qiong, Yanhua Ran, Li Bo

Journal of System Simulation

Abstract: In the process of tissue engineering scaffold fabrication using injecting 3D printing, the viscous fluid material is extruded out with a style of microfilament, which is deposited on a substrate layer by layer. The materials spread, pile up, remelt and solidify as a consequence of the couple effects of gravity, surface tension, viscous force and solidification drag force. Aiming at the above issues, the forming process of scaffold with homogeneously-sized space pores is studied with a CFD approach to research the pore forming mechanism. The results show that the viscous fluid is cooled mainly by the substrate, and heat …


Fast False Scene Jamming Algorithm For Sar-Gmti Based On Moving Jamming Station, Mingxing Fang, Daping Bi, Aiguo Shen Jan 2019

Fast False Scene Jamming Algorithm For Sar-Gmti Based On Moving Jamming Station, Mingxing Fang, Daping Bi, Aiguo Shen

Journal of System Simulation

Abstract: Traditional false scene jamming of SAR is invalid for SAR-GMTI system, which does not have the feature of moving targets, so a fast false scene jamming algorithm for SAR-GMTI based on moving jamming station is proposed. Through reasonable simplification of the traditional algorithm, the fast false scene jamming algorithm of matrix form is put forward. The method is proposed to take advantage of both fast false scene jamming algorithm and moving jamming station, so it can produce false scene jamming with real moving feature. It not only solves the real-time problem of traditional false scene jmming, but …


Smooth Transition Method Over Entire Speed Range Of Switched Reluctance Motor, Diansheng Sun Jan 2019

Smooth Transition Method Over Entire Speed Range Of Switched Reluctance Motor, Diansheng Sun

Journal of System Simulation

Abstract: In order to smoothly switch different control modes of switched reluctance motor under the condition of low speed and high speed, a novel scheme using function fitting method to control turn-on angle, turn-off angle and phase current chopping is proposed. The active disturbance rejection speed control system is structured for switched reluctance motor in order to restrain all kinds of disturbance and improve the dynamic performance. Simulation results indicate that the principle of the method is correct and the turn-on angle, turn-off angle and phase current chopping is coordinated to realize the smooth switching of different control modes with …


Relevance Analysis Of Deicing Parameters And Deicing Efficiency Of Aircraft Ground, Bin Chen, Liwen Wang Jan 2019

Relevance Analysis Of Deicing Parameters And Deicing Efficiency Of Aircraft Ground, Bin Chen, Liwen Wang

Journal of System Simulation

Abstract: Aircraft ground freezing could lead to potential danger and delay for flight. To alleviate these problems, the main method is to use the deicing fluids to clean ice or snow on the aircraft body, which lacks of reference of the deicing fluids parameters and efficiency. To study the effect of the deicing fluids parameters on the aircraft deicing efficiency, the deicing mechanism is analyzed.The black box mathematical model of the deicing process is generalized abstractly. The deicing process is divided into two subprocesses to establish the deicing model.The relevance between the deicing fluids parameters and deicing efficiency is studied …


Transformer Fault Diagnosis Based On Feature Extraction Of Relative Transformation Principal Component Analysis, Yongbo Tang, Yinguo Xiong Jan 2019

Transformer Fault Diagnosis Based On Feature Extraction Of Relative Transformation Principal Component Analysis, Yongbo Tang, Yinguo Xiong

Journal of System Simulation

Abstract: In order to handle the problem that the feature extraction of dissolved gas analysis (DGA) data by principal component analysis (PCA) is not distinct, a new transformer fault diagnosis method based on relative transformation (RT) PCA is proposed. The original data space is converted to the relative data space by relative transformation which makes the transformed data more distinguishable. PCA is employed to reduce the dimension of relative space to make the features more representative in the relative space. Diagnosis model based on least squares support vector machine (LSSVM) is set up according to the fault characteristic of transformer. …


Integrated Berth And Quay Crane Allocation Multi-Objective Algorithm For Container Terminal, Wang Xu, Shixin Liu, Ruiyou Zhang, Wang Jia Jan 2019

Integrated Berth And Quay Crane Allocation Multi-Objective Algorithm For Container Terminal, Wang Xu, Shixin Liu, Ruiyou Zhang, Wang Jia

Journal of System Simulation

Abstract: This paper researches on a continuous berth and quay crane allocation problem for low carbon container terminal. Considering the constraints of stochastic arrival time and limited truck transportation ability, a multi-objective nonlinear mixed integer programming model is established to minimize carbon emissions and average delay time. An efficient non-dominate sorting genetic algorithm II (ENSGA-II) is designed to deal with this problem. According to the characteristics of the problem, encoding rule and decoding rule based on rolling-horizon simulation, PPX crossover operator with elite selection, multi constraints mutation operator and repair operator are adopted. The results of several simulation experiments …


Interval Fuzzy Modeling Based On Minimizing-Norm On Approximation Error, Xiaoyong Liu, Zhonggang Xiong, Changguo Yan Jan 2019

Interval Fuzzy Modeling Based On Minimizing-Norm On Approximation Error, Xiaoyong Liu, Zhonggang Xiong, Changguo Yan

Journal of System Simulation

Abstract: As the obtained data in many practical applications tend to be uncertain or inaccurate, conventional modeling methods characterized by deterministic model for this type of data have become undesirable. Taking linear programming and TS fuzzy model and some ideas from norm minimization into consideration, a novel method identifying interval fuzzy model (INFUMO) consisting of upper and lower TS fuzzy model (referred to as fU and fL) has been studied. In order to solve INFUMO, optimization problems based on minimizing-norm with respect to approximation error corresponding to fU and fL are constructed. Finally, optimization problems …


Exploring Age-Related Metamemory Differences Using Modified Brier Scores And Hierarchical Clustering, Chelsea Parlett-Pelleriti, Grace C. Lin, Masha R. Jones, Erik Linstead, Susanne M. Jaeggi Jan 2019

Exploring Age-Related Metamemory Differences Using Modified Brier Scores And Hierarchical Clustering, Chelsea Parlett-Pelleriti, Grace C. Lin, Masha R. Jones, Erik Linstead, Susanne M. Jaeggi

Engineering Faculty Articles and Research

Older adults (OAs) typically experience memory failures as they age. However, with some exceptions, studies of OAs’ ability to assess their own memory functions—Metamemory (MM)— find little evidence that this function is susceptible to age-related decline. Our study examines OAs’ and young adults’ (YAs) MM performance and strategy use. Groups of YAs (N = 138) and OAs (N = 79) performed a MM task that required participants to place bets on how likely they were to remember words in a list. Our analytical approach includes hierarchical clustering, and we introduce a new measure of MM—the modified Brier—in order to adjust …


Analyzing Public View Towards Vaccination Using Twitter, Mahajan Rutuja Jan 2019

Analyzing Public View Towards Vaccination Using Twitter, Mahajan Rutuja

Browse all Theses and Dissertations

Educating people about vaccination tends to target vaccine acceptance and reduction of hesitancy. Social media provides a promising platform for studying public perception regarding vaccination. In this study, we harvested tweets over a year related to vaccines from February 2018 to January 2019. We present a two-stage classifier to: (1) classify the tweets as relevant or non-relevant and (2) categorize them in terms of pro-vaccination, anti-vaccination, or neutral outlook. We found that the classifier was able to distinguish clearly between anti-vaccination and pro-vaccination tweets, but also misclassified many of these as neutral. Using Latent Dirichlet Allocation, we found that two …


A Practitioner Survey Exploring The Value Of Forensic Tools, Ai, Filtering, & Safer Presentation For Investigating Child Sexual Abuse Material, Laura Sanchez, Cinthya Grajeda, Ibrahim Baggili, Cory Hall Jan 2019

A Practitioner Survey Exploring The Value Of Forensic Tools, Ai, Filtering, & Safer Presentation For Investigating Child Sexual Abuse Material, Laura Sanchez, Cinthya Grajeda, Ibrahim Baggili, Cory Hall

Electrical & Computer Engineering and Computer Science Faculty Publications

For those investigating cases of Child Sexual Abuse Material (CSAM), there is the potential harm of experiencing trauma after illicit content exposure over a period of time. Research has shown that those working on such cases can experience psychological distress. As a result, there has been a greater effort to create and implement technologies that reduce exposure to CSAM. However, not much work has explored gathering insight regarding the functionality, effectiveness, accuracy, and importance of digital forensic tools and data science technologies from practitioners who use them. This study focused specifically on examining the value practitioners give to the tools …


Procure-To-Pay Software In The Digital Age: An Exploration And Analysis Of Efficiency Gains And Cybersecurity Risks In Modern Procurement Systems, Drew Lane Jan 2019

Procure-To-Pay Software In The Digital Age: An Exploration And Analysis Of Efficiency Gains And Cybersecurity Risks In Modern Procurement Systems, Drew Lane

MPA/MPP/MPFM Capstone Projects

Procure-to-Pay (P2P) softwares are an integral part of the payment and procurement processing functions at large-scale governmental institutions. These softwares house all of the financial functions related to procurement, accounts payable, and often human resources, helping to facilitate and automate the process from initiation of a payment or purchase, to the actual disbursal of funds. Often, these softwares contain budgeting and financial reporting tools as part of the offering. As such an integral part of the financial process, these softwares obviously come at an immense cost from a set of reputable vendors. In the case of government, these vendors mainly …


Data-Driven Intelligent Scheduling For Long Running Workloads In Large-Scale Datacenters, Guoyao Xu Jan 2019

Data-Driven Intelligent Scheduling For Long Running Workloads In Large-Scale Datacenters, Guoyao Xu

Wayne State University Dissertations

Cloud computing is becoming a fundamental facility of society today. Large-scale public or private cloud datacenters spreading millions of servers, as a warehouse-scale computer, are supporting most business of Fortune-500 companies and serving billions of users around the world. Unfortunately, modern industry-wide average datacenter utilization is as low as 6% to 12%. Low utilization not only negatively impacts operational and capital components of cost efficiency, but also becomes the scaling bottleneck due to the limits of electricity delivered by nearby utility. It is critical and challenge to improve multi-resource efficiency for global datacenters.

Additionally, with the great commercial success of …


Forecasting Anomalous Events And Performance Correlation Analysis In Event Data, Sonya Leech [Thesis] Jan 2019

Forecasting Anomalous Events And Performance Correlation Analysis In Event Data, Sonya Leech [Thesis]

Dissertations

Classical and Deep Learning methods are quite common approaches for anomaly detection. Extensive research has been conducted on single point anomalies. Collective anomalies that occur over a set of two or more durations are less likely to happen by chance than that of a single point anomaly. Being able to observe and predict these anomalous events may reduce the risk of a server’s performance. This paper presents a comparative analysis into time-series forecasting of collective anomalous events using two procedures. One is a classical SARIMA model and the other is a deep learning Long-Short Term Memory (LSTM) model. It then …


An Investigation Into The Predictive Capability Of Customer Spending In Modelling Mortgage Default, Donal Finn [Thesis] Jan 2019

An Investigation Into The Predictive Capability Of Customer Spending In Modelling Mortgage Default, Donal Finn [Thesis]

Dissertations

The mortgage arrears crisis in Ireland was and is among the most severe experienced on record and although there has been a decreasing trend in the number of mortgages in default in the past four years, it still continues to cause distress to borrowers and vulnerabilities to lenders. There are indications that one of the main factors associated with mortgage default is loan affordability, of which the level of disposable income is a driver. Additionally, guidelines set out by the European Central Bank instructed financial institutions to adopt measures to further reduce and prevent loans defaulting, including the implementation and …


Use Of Virtual Reality Technology In Medical Training And Patient Rehabilitation, Sankalp Mishra Jan 2019

Use Of Virtual Reality Technology In Medical Training And Patient Rehabilitation, Sankalp Mishra

Browse all Theses and Dissertations

Coaching patients to follow the rehabilitation routines correctly and timely after surgery is often a challenge due to the limited medical knowledge of patients and limited availability of clinicians. Similarly, it is also a challenge to train medical professionals with both the technical and communication skills required in their practices. The recent emergence of VR technologies shines the light on improving the current training practices. In this thesis research, I will look at the development and application of VR-based immersive training games for two particular cases: 1. Post hand surgery rehab; and, 2. Training for Social determinants of health (SDOH) …


Comprehending The Safety Paradox And Privacy Concerns With Medical Device Remote Patient Monitoring, Marc Doyle Jan 2019

Comprehending The Safety Paradox And Privacy Concerns With Medical Device Remote Patient Monitoring, Marc Doyle

CCE Theses and Dissertations

Medical literature identifies a number of technology-driven improvements in disease management such as implantable medical devices (IMDs) that are a standard treatment for candidates with specific diseases. Among patients using implantable cardiac defibrillators (ICD), for example, problems and issues are being discovered faster compared to patients without monitoring, improving safety. What is not known is why patients report not feeling safer, creating a safety paradox, and why patients identify privacy concerns in ICD monitoring.

There is a major gap in the literature regarding the factors that contribute to perceived safety and privacy in remote patient monitoring (RPM). To address this …


Deep Learning: Edge-Cloud Data Analytics For Iot, Katarina Grolinger, Ananda M. Ghosh Jan 2019

Deep Learning: Edge-Cloud Data Analytics For Iot, Katarina Grolinger, Ananda M. Ghosh

Electrical and Computer Engineering Publications

Sensors, wearables, mobile and other Internet of Thing (IoT) devices are becoming increasingly integrated in all aspects of our lives. They are capable of collecting massive quantities of data that are typically transmitted to the cloud for processing. However, this results in increased network traffic and latencies. Edge computing has a potential to remedy these challenges by moving computation physically closer to the network edge where data are generated. However, edge computing does not have sufficient resources for complex data analytics tasks. Consequently, this paper investigates merging cloud and edge computing for IoT data analytics and presents a deep learning-based …


Accelerating Reverse Engineering Image Processing Using Fpga, Matthew Joshua Harris Jan 2019

Accelerating Reverse Engineering Image Processing Using Fpga, Matthew Joshua Harris

Browse all Theses and Dissertations

In recent decades, field programmable gate arrays (FPGAs) have evolved beyond simple, expensive computational components with minimal computing power to complex, inexpensive computational engines. Today, FPGAs can perform algorithmically complex problems with improved performance compared to sequential CPUs by taking advantage of parallelization. This concept can be readily applied to the computationally dense field of image manipulation and analysis. Processed on a standard CPU, image manipulation suffers with large image sets processed by highly sequential algorithms, but by carefully adhering to data dependencies, parallelized FPGA functions or kernels offer the possibility of significant improvement through threaded CPU functions. This thesis …


A Policy Mechanism For Federal Recommendation Of Security Standards For Mobile Devices That Conduct Transactions, Ariel Huckabay Jan 2019

A Policy Mechanism For Federal Recommendation Of Security Standards For Mobile Devices That Conduct Transactions, Ariel Huckabay

Electronic Theses and Dissertations

The proliferation of mobile devices in the BRIC countries has prompted them to develop policies to manage the security of these devices. In China, mobile devices are a primary tool for payments. As a result, China instituted in 2017 a cyber security policy that applies to mobile devices giving China broad authority to manage cyber threats. The United States has a similar need for a cyber policy. Mobile devices are likely to become a primary payment tool in the United States soon. DHS has also identified a need for more effective security policy in mobile devices for government operations. This …


Dedicated Hardware For Machine/Deep Learning: Domain Specific Architectures, Angel Izael Solis Jan 2019

Dedicated Hardware For Machine/Deep Learning: Domain Specific Architectures, Angel Izael Solis

Open Access Theses & Dissertations

Artificial intelligence has come a very long way from being a mere spectacle on the silver screen in the 1920s [Hml18]. As artificial intelligence continues to evolve, and we begin to develop more sophisticated Artificial Neural Networks, the need for specialized and more efficient machines (less computational strain while maintaining the same performance results) becomes increasingly evident. Though these “new” techniques, such as Multilayer Perceptron’s, Convolutional Neural Networks and Recurrent Neural Networks, may seem as if they are on the cutting edge of technology, many of these ideas are over 60 years old! However, many of these earlier models, at …


Ieee Access Special Section Editorial: Wirelessly Powered Networks, And Technologies, Theofanis P. Raptis, Nuno B. Carvalho, Diego Masotti, Lei Shu, Cong Wang, Yuanyuan Yang Jan 2019

Ieee Access Special Section Editorial: Wirelessly Powered Networks, And Technologies, Theofanis P. Raptis, Nuno B. Carvalho, Diego Masotti, Lei Shu, Cong Wang, Yuanyuan Yang

Computer Science Faculty Publications

Wireless Power Transfer (WPT) is, by definition, a process that occurs in any system where electrical energy is transmitted from a power source to a load without the connection of electrical conductors. WPT is the driving technology that will enable the next stage in the current consumer electronics revolution, including battery-less sensors, passive RF identification (RFID), passive wireless sensors, the Internet of Things and 5G, and machine-to-machine solutions. WPT-enabled devices can be powered by harvesting energy from the surroundings, including electromagnetic (EM) energy, leading to a new communication networks paradigm, the Wirelessly Powered Networks.


Sec-Lib: Protecting Scholarly Digital Libraries From Infected Papers Using Active Machine Learning Framework, Nir Nissim, Aviad Cohen, Jian Wu, Andrea Lanzi, Lior Rokach, Yuval Elovici, Lee Giles Jan 2019

Sec-Lib: Protecting Scholarly Digital Libraries From Infected Papers Using Active Machine Learning Framework, Nir Nissim, Aviad Cohen, Jian Wu, Andrea Lanzi, Lior Rokach, Yuval Elovici, Lee Giles

Computer Science Faculty Publications

Researchers from academia and the corporate-sector rely on scholarly digital libraries to access articles. Attackers take advantage of innocent users who consider the articles' files safe and thus open PDF-files with little concern. In addition, researchers consider scholarly libraries a reliable, trusted, and untainted corpus of papers. For these reasons, scholarly digital libraries are an attractive-target and inadvertently support the proliferation of cyber-attacks launched via malicious PDF-files. In this study, we present related vulnerabilities and malware distribution approaches that exploit the vulnerabilities of scholarly digital libraries. We evaluated over two-million scholarly papers in the CiteSeerX library and found the library …


Sensorless Second-Order Switching Surface For A Three-Level Boost Converter, Tarek Messikh, Nasrudin Abd Rahim, Saad Mekhilef Jan 2019

Sensorless Second-Order Switching Surface For A Three-Level Boost Converter, Tarek Messikh, Nasrudin Abd Rahim, Saad Mekhilef

Turkish Journal of Electrical Engineering and Computer Sciences

This paper proposes a sensorless second-order switching surface to control a three-level boost converter (TLBC). A predictive current method is proposed to reduce the number of sensors in the normal second-order switching surface method. Based on a developed model of the TLBC, the current is estimated and a switching surface is formulated in the state-energy plane. Simulation and hardware tests are carried out to verify the viability and the effectiveness of the proposed control technique. Results obtained show a good performance of the converter in term of DC-bus balancing and fast dynamic response under sudden load change.