Search results for " controller"

showing 10 items of 139 documents

uMemristorToolbox: Open source framework to control memristors in Unity for ternary applications

2020

This paper presents uMemristorToolbox, a novel open source framework that reads and writes non-volatile ternary states to memristors. The Unity (C#) framework is a port of the open source Java project Memristor-Discovery and adds a closed-loop ternary memory controller to enable both PC and real-time embedded ternary applications. We validate the closed-loop ternary memory controller in an embedded system case study with 16 M+SDC Tungsten dopant memristors. We measure an average switching speed of 3 Hz, worst case energy usage of 1 μW per switch, 0.03% random write error and no decay in (non-volatile) state retention after 15 minutes. We conclude with observations and open questions when wo…

Hardware_MEMORYSTRUCTURESComputer sciencebusiness.industry020208 electrical & electronic engineeringElectrical engineeringComputingMilieux_LEGALASPECTSOFCOMPUTINGPort (circuit theory)02 engineering and technologyMemristorAC power021001 nanoscience & nanotechnologyMemory controllerlaw.inventionSwitching timeVDP::Teknologi: 500Memory managementlaw0202 electrical engineering electronic engineering information engineeringState (computer science)0210 nano-technologyTernary operationbusiness2020 IEEE 50th International Symposium on Multiple-Valued Logic (ISMVL)
researchProduct

Experimental Assessment of the Backoff Behavior of Commercial IEEE 802.11b Network Cards

2007

It has been observed that different IEEE 802.11 commercial cards produced by different vendors experience different performance, either when accessing alone the channel, as well as when competing against each other. These differences persist also when thorough measurement methodologies (such as RF shielding, laptop rotation, etc) are applied, and alignment of the environmental factors (same laptop models, traffic generators, etc) is carried out. This paper provides an extensive experimental characterization of the backoff operation of six commercial NIC cards. It suggests a relevant methodological approach, namely a repeatable, well defined, set of experiments, for such a characterization. …

IEEE 802business.product_categoryComputer scienceNetwork cardsSoftware performance testingComputer software; Laptop computers; Telecommunication traffic; Low level backoff distribution measurements; Network cards; Traffic generators; Window size; Network architectureLaptop computerscomputer.software_genreSettore ING-INF/01 - ElettronicaSoftwareMicrocodeComputer softwareWindow sizeTraffic generatorsSettore ING-INF/03 - Telecomunicazionibusiness.industryFirmwareNetwork architecturePortable computers Rotation measurement Radio frequency Environmental factorsTelecommunication trafficNetwork interface controllerLaptopEmbedded systemLow level backoff distribution measurementsbusinesscomputerCommunication channelIEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications
researchProduct

Advanced control system for optimal filtration in submerged anaerobic MBRs (SAnMBRs)

2013

The main aim of this study was to develop an advanced controller to optimise filtration in submerged anaerobic MBRs (SAnMBRs). The proposed controller was developed, calibrated and validated in a SAnMBR demonstration plant fitted with industrial-scale hollow-fibre membranes with variable influent flow and load. This 2-layer control system is designed for membranes operating sub-critically and features a lower layer (on/off and PID controllers) and an upper layer (knowledge-based controller). The upper layer consists of a MIMO (multiple-input-multiple-output) control structure that regulates the gas sparging for membrane scouring and the frequency of physical cleaning (ventilation and back f…

INGENIERIA HIDRAULICAIndustrial-scale hollow-fibre membranesFoulingKnowledge-based controllerEnvironmental engineeringPID controllerFiltration and SeparationEnergy savingsBiochemistrylaw.inventionAdvanced control systemMembraneControl theorylawControl systemSubmerged anaerobic MBRVentilation (architecture)Environmental scienceGeneral Materials SciencePhysical and Theoretical ChemistrySpargingFiltrationTECNOLOGIA DEL MEDIO AMBIENTE
researchProduct

An MDE Approach for Rapid Prototyping and Implementation of Dynamic Reconfigurable Systems

2015

This article presents a co-design methodology based on RecoMARTE, an extension to the well-known UML MARTE profile, which is used for the specification and automatic generation of Dynamic and Partially Reconfigurable Systems-on-Chip (DRSoC). This endeavor is part of a larger framework in which Model-Driven Engineering (MDE) techniques are extensively used for modeling and via model transformations, generating executable models, which are exploited by implementation tools to create reconfigurable systems. More specifically, the methodological aspects presented in this article are concerned with expediting the conception and implementation of the hardware platform and the integration of corre…

IP ReuseComputer scienceIP-XACT02 engineering and technologyDiscrete Controller Synthesis020204 information systemsIP-XACTVHDLPartial Reconfiguration0202 electrical engineering electronic engineering information engineeringCAD[ INFO.INFO-ES ] Computer Science [cs]/Embedded SystemsElectrical and Electronic EngineeringField-programmable gate arrayFPGAcomputer.programming_languagebusiness.industrySystem GenerationControl reconfigurationcomputer.file_formatComputer Graphics and Computer-Aided DesignAutomationUML MARTE020202 computer hardware & architectureComputer Science Applications[INFO.INFO-ES] Computer Science [cs]/Embedded SystemsModel Driven EngineeringEmbedded system[INFO.INFO-ES]Computer Science [cs]/Embedded SystemsExecutableModel-driven architecturebusinesscomputer
researchProduct

Magnetic Levitation – Modelling, Identification and Open Loop Verification

2020

<p>The paper describes a procedure using the first principle modelling and experimental identification of the Magnetic Levitation Model CE 152. It is a modified version of the paper [1]. The difference is that the identification and verification is done in open loop and constraints logic is added in the current paper. The author optimized and simplified dynamic model to a minimum to what is needed to characterize given system for the simulation and control design purposes. Only few open-loop experiments are needed to estimate the unknown parameters. Model quality is verified in open loop where the real and simulated data are compared. The model can serve as a simulation model for some…

Identification (information)Control algorithmComputer scienceControl theorySimulated dataProcess (computing)Open-loop controllerModel qualityMagnetic levitationControl methodsTRANSACTIONS ON ELECTRICAL ENGINEERING
researchProduct

Network-based H∞ output feedback control for uncertain stochastic systems

2013

This paper investigates the problem of network-based Floc, output feedback control for a class of stochastic nonlinear systems. A novel model is proposed to describe the systems taken into two sides of communication channels in the network environment, which is more general than one side of communication channel. The design procedure of observer-based controller is presented, which, guarantees the asymptotic stability in the mean square of the resulting closed-loop system with an H-infinity performance. Finally, a crane example is utilized to show the effectiveness and potential of the developed techniques. Refereed/Peer-reviewed

Information Systems and ManagementObserver (quantum physics)Computer scienceControl (management)observer-based controllerClass (philosophy)Networked control systemstochastic systemSeparation principleComputer Science ApplicationsTheoretical Computer ScienceNonlinear systemExponential stabilityArtificial IntelligenceControl and Systems EngineeringControl theorynetworked control systemSoftwareInformation Sciences
researchProduct

An Experimental Testbed and Methodology for Characterizing IEEE 802.11 Network Cards

2006

It has been observed that IEEE 802.11 commercial cards produced by different vendors show a different behavior in terms of perceived throughput or access delay. Performance differences are evident both when the cards contend alone to the channel, and when heterogeneous cards contend together. Since the performance misalignment does not disappear by averaging the environmental factors (such as propagation conditions, laptop models, traffic generators, etc), it is evident that the well known throughput-fairness property of the DCF protocol is not guaranteed in actual networks. In this paper we propose a methodological approach devised to experimentally characterize the IEEE 802.11 commercial …

Inter-Access Point ProtocolComputer sciencebusiness.industryReal-time computingWireless local area networks (WLAN)Network allocation vectorThroughputbackoff algorithmIEEE 802.11Network interface controllerMedia access controlIEEE 802.11e-2005IEEE 802.1XbusinessThroughput (business)Computer network
researchProduct

Exploratory approach for network behavior clustering in LoRaWAN

2021

AbstractThe interest in the Internet of Things (IoT) is increasing both as for research and market perspectives. Worldwide, we are witnessing the deployment of several IoT networks for different applications, spanning from home automation to smart cities. The majority of these IoT deployments were quickly set up with the aim of providing connectivity without deeply engineering the infrastructure to optimize the network efficiency and scalability. The interest is now moving towards the analysis of the behavior of such systems in order to characterize and improve their functionality. In these IoT systems, many data related to device and human interactions are stored in databases, as well as I…

IoTGeneral Computer ScienceComputer sciencek-meansReliability (computer networking)02 engineering and technologyLoRaMachine LearningHome automation0202 electrical engineering electronic engineering information engineeringCluster AnalysisWirelessCluster analysisIoT LoRa LoRaWAN Machine Learning k-means Anomaly Detection Cluster AnalysisNetwork packetbusiness.industry020206 networking & telecommunicationsIoT; LoRa; LoRaWAN; Machine Learning; k-means; Anomaly Detection; Cluster AnalysisLoRaWANWireless network interface controllerScalabilityAnomaly Detection020201 artificial intelligence & image processingAnomaly detectionbusinessComputer networkJournal of Ambient Intelligence and Humanized Computing
researchProduct

Robust control of a Hammerstein model of DC/DC converters

2007

This paper deals with the robust control of a Hammerstein mathematical model of DC/DC converters, consisting of the nonlinear static characteristics of the converter followed by one of a few number of linear time- invariant models which describe the converter in the useful working range. One of these models is assumed as the nominal model of the system and the remaining models are used for describing the model uncertainty. Nominal behaviour is assured using H-2 optimal control method, Robust stability and behaviour are assured by imposing H-infin specifications. The closed loop control system consisting of the converter Hammerstein model and the robust controller is analyzed by means of sim…

Linear systemControl engineeringInvariant (physics)ConvertersOptimal controlRobust controllersWorking rangeNonlinear systemSettore ING-INF/04 - AutomaticaControl theoryNonlinear static characteristicRobust controlHammerstein modelTime complexityMathematics2007 46th IEEE Conference on Decision and Control
researchProduct

A new fuzzy robust dynamic controller for autonomous vehicles with nonholonomic constraints

2005

Abstract In this paper a novel algorithm with a dynamic fuzzy controller applied to the control of trajectory of vehicles with two independent wheels is proposed. An automatic control of trajectory of a vehicle can behave in a not efficient way. It is necessary to consider the friction of the actuators and possible perturbations coming from the outside environment, as for instance the variable characteristics of the ground where the vehicle moves. These perturbations, which depend also on the contact between the wheel and the ground, involve violations of nonholonomic constraints. Thus it is necessary to compensate for these perturbations to obtain a robust control system. The controller sy…

Lyapunov functionMathematical optimizationAdaptive controlAutomatic controlComputer scienceGeneral MathematicsFuzzy logicComputer Science::Roboticssymbols.namesakeExponential stabilityControl theoryNonholonomic systemAdaptive neuro fuzzy inference systembackstepping controlautonomous vehicleFuzzy control systemComputer Science Applicationsnonholonomic systemFuzzy controllerControl and Systems EngineeringBacksteppingsymbolsTrajectoryRobust controlActuatorrobust controlSoftwareRobotics and Autonomous Systems
researchProduct