Search results for "Bust"
showing 10 items of 1000 documents
A Multi-Port Approach to Solve Distribution Networks with Meshes and PV Nodes
2007
A new methodology based on the backward/forward (b/f) technique for the load flow solution in distribution systems is here proposed. The methodology takes efficiently into account the fixed voltage nodes and uses a reduced bus impedance matrix. In this way, it is possible to attain, for the unknowns at the PV nodes, the same values that are attainable solving the network with the methods adopted for transmission systems. With the same methodology it is possible to take into account also the meshes. If the network contains only meshes, the relevant model is linear and it is the one including the compensation currents. The presence of PV nodes introduces non linearity in the model and an iter…
Fuel Cell in configurazione Range Extender
2005
L’obiettivo che questo articolo si propone di perseguire è di valutare la fattibilità tecnica e le implicazioni conseguenti alla sostituzione, in un gruppo di continuità statico, delle batterie tradizionali con le celle a combustibile, quali sorgenti di energia in corrente continua. La configurazione circuitale proposta, denominata fuel cell in configurazione range extender, presenta una struttura estremamente versatile e modulare sotto almeno due punti di vista. In primo luogo il sistema si integra perfettamente con i gruppi di continuità statici tradizionali, per i quali è sufficiente sostituire i pacchi batteria con uno stack di celle a combustibile. In secondo luogo per modificare le ca…
Robust Discrete-Time Lateral Control of Racecars by Unknown Input Observers
2023
This brief addresses the robust lateral control problem for self-driving racecars. It proposes a discrete-time estimation and control solution consisting of a delayed unknown input-state observer (UIO) and a robust tracking controller. Based on a nominal vehicle model, describing its motion with respect to a generic desired trajectory and requiring no information about the surrounding environment, the observer reconstructs the total force disturbance signal, resulting from imperfect knowledge of the time-varying tire-road interface characteristics, presence of other vehicles nearby, wind gusts, and other model uncertainty. Then, the controller actively compensates the estimated force and as…
Logical Consensus for Distributed Network Agreement
2008
In this paper we introduce a novel consensus mechanism where agents of a network are able to share logical values, or Booleans, representing their local opinions on e.g. the presence of an intruder or of a fire within an indoor environment. Under suitable joint conditions on agents? visibility and communication capability, we provide an algorithm generating a logical linear consensus system that is globally stable. The solution is optimal in terms of the number of messages to be exchanged and the time needed to reach a consensus. Moreover, to cope with possible sensor failure, we propose a second design approach that produces robust logical nonlinear consensus systems tolerating a maximum n…
BioAnalysis: A Framework for Structural and Functional Robustness Analysis of Metabolic Networks
2010
The main objective of this work is to analyze metabolic networks evolution in terms of their robustness and fault tolerance capabilities. In metabolic networks, errors can be seen as random removal of network nodes, while attacks are high-connectivity-degree node deletion aimed at compromising network activity. This paper proposes a software framework, namely BioAnalysis, used to test the robustness and the fault tolerance capabilities of real metabolic networks, when mutations and node deletions affect the network structure. The performed simulations are related to the central metabolic network of the well-known E. coli single-celled bacterium and involve either hub nodes or non-hub nodes,…
METABOLIC NETWORKS ROBUSTNESS: THEORY, SIMULATIONS AND RESULTS
2011
Metabolic networks are composed of several functional modules, reproducing metabolic pathways and describing the entire cellular metabolism of an organism. In the last decade, an enormous interest has grown for the study of tolerance to errors and attacks in metabolic networks. Studies on their robustness have suggested that metabolic networks are tolerant to errors, but very vulnerable to targeted attacks against highly connected nodes. However, many findings on metabolic networks suggest that the above classification is too simple and imprecise, since hub node attacks can be by-passed if alternative metabolic paths can be exploited. On the contrary, non-hub nodes attacks can affect cell …
ConformalALU: A Conformal Geometric Algebra Coprocessor for Medical Image Processing
2015
Medical imaging involves important computational geometric problems, such as image segmentation and analysis, shape approximation, three-dimensional (3D) modeling, and registration of volumetric data. In the last few years, Conformal Geometric Algebra (CGA), based on five-dimensional (5D) Clifford Algebra, is emerging as a new paradigm that offers simple and universal operators for the representation and solution of complex geometric problems. However, the widespread use of CGA has been so far hindered by its high dimensionality and computational complexity. This paper proposes a simplified formulation of the conformal geometric operations (reflections, rotations, translations, and uniform …
A Simulation Software for the Evaluation of Vulnerabilities in Reputation Management Systems
2019
Multi-agent distributed systems are characterized by autonomous entities that interact with each other to provide, and/or request, different kinds of services. In several contexts, especially when a reward is offered according to the quality of service, individual agents (or coordinated groups) may act in a selfish way. To prevent such behaviours, distributed Reputation Management Systems (RMSs) provide every agent with the capability of computing the reputation of the others according to direct past interactions, as well as indirect opinions reported by their neighbourhood. This last point introduces a weakness on gossiped information that makes RMSs vulnerable to malicious agents’ intent …
Bayesian Network Based Classification of Mammography Structured Reports
2013
In modern medical domain, documents are created directly in electronic form and stored on huge databases containing documents, text in integral form and images. Retrieving right informations from these servers is challenging and, sometimes, this is very time consuming. Current medical technology do not provide a smart methodology classification of such documents based on their content. In this work the radiological structured reports are analysed classified and assigning an appropriate label. The text classifier is used to label a mammographic structured report. The experimental data are real clinical report coming from a hospital server. Analysing the structured report content, the classif…
Secure random number generation in wireless sensor networks
2011
The increasing adoption of wireless sensor networks as a flexible and inexpensive tool for the most diverseapplications, ranging from environmental monitoring to home automation, has raised more and more atten-tion to the issues related to the design of specifically customized security mechanisms. The scarcity ofcomputational, storage, and bandwidth resources cannot definitely be disregarded in such context, and thismakes the implementation of security algorithms particularly challenging. This paper proposes a securityframework for the generation of true random numbers, which are paramount as the core building blockfor many security algorithms; the intrinsic nature of wireless sensor nodes …