Search results for "ComputerApplications_COMPUTERSINOTHERSYSTEMS"
showing 10 items of 254 documents
Robotic face milling path correction and vibration reduction
2015
In this paper the developed method for off-line compensation of tool deflections and vibration reduction when milling aluminum with an industrial robot is presented. The efficiency of this approach is verified with high precision measurements of deflections using a laser tracker. The compensation method is based on the static milling process model which can predict the mean value components of the tool forces and the passive damping system mounted on the spindle to reduce vibrations. With a process model such as the one presented in this paper and estimates of the robot's joint stiffness values, the tool path can be adjusted to counteract deflections of the tool during milling operations. T…
A Dynamic Attribute-Based Authentication Scheme
2015
Attribute-based authentication (ABA) is an approach to authenticate users by their attributes, so that users can get authenticated anonymously and their privacy can be protected. In ABA schemes, required attributes are represented by attribute trees, which can be combined with signature schemes to construct ABA schemes. Most attribute trees are built from top to down and can not change with attribute requirement changes. In this paper, we propose an ABA scheme based on down-to-top built attribute trees or dynamic attribute trees, which can change when attribute requirements change. Therefore, the proposed dynamic ABA scheme is more efficient in a dynamic environment by avoiding regenerating…
UAV Communication Strategies in the Next Generation of Mobile Networks
2020
| openaire: EC/H2020/857031/EU//5G!Drones The Next Generation of Mobile Networks (NGMN) alliance advocates the use of different means to support vehicular communications. This aims to cope with the massive data generated by these devices which could affect the Quality of Service (QoS) of the associated applications, but also the overall operation carried out by the vehicles. However, efficient communication strategies must be considered in order to select, for each vehicle, the communication mean ensuring the best QoS. In this paper, we tackle this issue and we propose efficient communication strategies for Unmanned Aerial Vehicles (UAVs). In addition to direct UAV-to-Infrastructure communi…
Developing a Tool Point Control Scheme for a Hydraulic Crane Using Interactive Real-time Dynamic Simulation
2010
This paper describes the implementation of an interactive real-time dynamic simulation model of a hydraulic crane. The user input to the model is given continuously via joystick and output is presented continuously in a 3D animation. Using this simulation model, a tool point control scheme is developed for the specific crane, considering the saturation phenomena of the system and practical implementation. This paper describes the implementation of an interactive real-time dynamic simulation model of a hydraulic crane. The user input to the model is given continuously via joystick and output is presented continuously in a 3D animation. Using this simulation model, a tool point control scheme…
Computer-aided synthesis of complex pump and valve operations
1988
Abstract Process plant operators often have to synthesize sequences of valve and pump operations. On large plants there may be so many possible pipe routes and vessels that it is not practical to provide a priori computer support for every possible operation. The paper describes a program that could form the basis of an operator aid to synthesize appropriate operations from a knowledge of the plant layout and existing pumping operations. The paper concentrates on finding paths through the pipework and on generating a sequence of operations that establishes the path whilst simultaneously satisfying other safety and operating constraints. The paper includes two example problems which were use…
Cost analysis for a future helicopter for passenger transport
2015
Purpose - This paper aims to identify the parameters that influence the cost competitiveness of helicopter services for scheduled passenger transport on a regional area. Design/methodology/approach - The approach used is based on an analysis of demand and on a bi-level model (modal split model - service supply optimization model) optimization. Performance optimization in the supply of helicopter transport services is obtained by a sensitivity analysis on the recognized cost factors. Findings - The identification of the variation margins in the cost factors that might make an helicopter competitive for scheduled passenger services. Research limitations/implications - The inability to conside…
Transportation Services as Specific Logistics Projects for Oversized Cargo in Poland
2016
Market observation demonstrates that the transportation-freight forwarding-logistics sector carries out diverse projects based on clients’ orders. The majority of those orders are unique and project related. Recently, the project approach to logistics has gained significance. Logistics project management is a relatively new area of knowledge about logistics and supply chains. The paper presents the essence and characteristics of transportation services as a specific logistics project. The authors characterize the transportation-freight forwarding-logistics sector, with particular focus on the sector of oversized cargo transportation. The demand for such services depends on the industry, ene…
Inspection Policies in Service of Fatigued Aircraft Structures
2011
Fatigue is one of the most important problems of aircraft arising from their nature as multiple-component structures, subjected to random dynamic loads. For guaranteeing safety, the structural life ceiling limits of the fleet aircraft are defined from three distinct approaches: Safe-Life, Fail-Safe, and Damage Tolerance approaches. The common objectives to define fleet aircraft lives by the three approaches are to ensure safety while at the same time reducing total ownership costs. In this paper, the damage tolerance approach is considered and the focus is on the inspection scheme with decreasing intervals between inspections. The paper proposes an analysis methodology to determine appropri…
Model-based approaches for the development of event-based systems using embedded services
2010
This paper presents a development use case of event-based system using (embedded) services specified in UPnP specification. Although we use only UPnP, we considered that the use case is also applicable for other (XML-based) service description technologies.
On WQO Property for Different Quasi Orderings of the Set of Permutations
2013
The property of certain sets being well quasi ordered (WQO) has several useful applications in computer science – it can be used to prove the existence of efficient algorithms and also in certain cases to prove that a specific algorithm terminates.