scholarly journals A Comparative Study of Over-Current Sensing for Traction Inverters

2021 ◽  
Vol 2021 ◽  
pp. 1-6
Author(s):  
He Niu

The over-current condition for a traction inverter can indicate flaws on control algorithms, interference on logic signals, hardware aging, or hardware misconduct. Thus, proper detection of over-current conditions during inverter operation is a critical item for inverter development and product validation. This paper reviews several widely used over-current detection methods and a few theoretically approved over-current detection methods. The main focus of this review includes the sensing bandwidth, sensing accuracy, and implementation complexity of the studied over-current detection methods. The advantages of those widely used methods and the application requirements for the theoretically and prototypingly approved methods are concluded by this review.

Author(s):  
Geoffrey Tyolaha ◽  
Moses Israel

In recent years, the number of mobile transactions has skyrocketed. Because mobile payments are made on the fly, many consumers prefer the method to the traditional local payment approach. The rise in mobile payments has inspired this study into the security of mobile networks in order to instill trust in those who may be involved in the transaction in some way. This report is a precursor to explain and compare some of the most popular wireless networks that enable mobile payments, from a security standpoint, this research presents, explains, and compares some of the most common wireless networks that enable mobile payments. Threat models in 3G with connections to GSM, WLAN, and 4G networks are classified into four categories: attacks on privacy, attacks on integrity, attacks on availability, and assaults on authentication. In addition, we offer classification countermeasures which are divided into three categories: cryptographic methods, human factors, and intrusion detection methods. One of the most important aspects we analyze is the security procedures that each network employs. Since the security of these networks is paramount, it gives hope to subscribers. In summary, the study aims to verify if mobile payments offer acceptable security to the average user.


2021 ◽  
Author(s):  
Scott Sherrill-Mix ◽  
Gregory D. Van Duyne ◽  
Frederic D. Bushman

AbstractOver the course of the COVID-19 pandemic, several SARS-CoV-2 genetic variants of concern have appeared and spread throughout the world. Detection and identification of these variants is important to understanding and controlling their rapid spread. Current detection methods for a particularly concerning variant, B.1.1.7, require expensive qPCR machines and depend on the absence of a signal rather than a positive indicator of variant presence. Here we report an assay using a pair of molecular beacons paired with reverse transcription loop mediated amplification to allow isothermal amplification from saliva to specifically detect B.1.1.7 and other variants which contain a characteristic deletion in the gene encoding the viral spike protein. This assay is specific, affordable and allows multiplexing with other SARS-CoV-2 LAMP primer sets.


2012 ◽  
Vol 548 ◽  
pp. 623-626
Author(s):  
Tao Li ◽  
Li Ping Zheng ◽  
Wen Yan ◽  
Chun Yang Qi

This paper researches the current methods of liquid measure in the recuperator, for the deficiency of current detection methods, design a new system for measuring the liquid volume. The system changes the gas pressure and volume by releasing liquid ,and utilize pressure sensor to measure the liquid volume. Using advanced sensor technology and computer technology to quickly and accurately calculate fluid volume,effectively solve the conflict between accuracy and efficiency.


Sign in / Sign up

Export Citation Format

Share Document