Essays about: "control of vectors"
Showing result 1 - 5 of 39 essays containing the words control of vectors.
-
1. Study of vector control strategy on Interior Permanent Magnet Synchronous Motors
University essay from Högskolan Väst/Institutionen för ingenjörsvetenskapAbstract : This thesis presents a comprehensive study of Direct Torque Control (DTC) for Interior Permanent Magnet Synchronous Motors (IPMSMs) evaluating its potential in high performance motor drive systems. The research begins with a literature review, looking into the fundamental principles of DTC, Pulse Width Modulation (PWM), Space Vector Modulation (SVM) and Field Oriented Control (FOC). READ MORE
-
2. Finite Control Set-Model Predictive control of Permanent Magnet Synchronous Motor
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The electrification of the transportation sector has been the most important goal of the current century. In the last decade, there has been a surge in the production and sale of electric vehicles, necessitating substantial research and development in the industry. READ MORE
-
3. Modelling Mosquito Prevalence on a City-Scale in Gothenburg, Sweden. A Methodological Development Study
University essay from Göteborgs universitet/Institutionen för geovetenskaperAbstract : Mosquitoes are one of the most prominent carriers (or vectors) of diseases worldwide, which has an impact on human societies, as up to 1 million people pass away each year from mosquitorelated diseases. Mosquitoes are known carriers of, e.g., malaria, dengue fever and West Nile virus. READ MORE
-
4. Cyber Attacks Against SDN Controllers And Protecting The Control Plane With A Formally Verified Microkernel
University essay from Linköpings universitet/Programvara och systemAbstract : Software-Defined Networking (SDN) is a technology that is increasing in popularity. However, with increased prevalence comes increased opportunity to exploit vulnerabilities that exist within the technology. In this thesis, several attack vectors that can be used to attack SDN controllers were identified through a literature review. READ MORE
-
5. HONEYPOT – To bee or not to bee: A study of attacks on ICS/SCADA systems.
University essay from Mälardalens högskola/Akademin för innovation, design och teknikAbstract : In the past, industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems were planned to run as isolated networks, and not interconnect with other networks e.g., the internet or other parts of a corporate’s network. Because of the isolation, no cybersecurity mechanism was required. READ MORE