Search results for "Control"
showing 10 items of 13168 documents
Feedback Linearization Based Nonlinear Control of SynRM Drives Accounting for Self- and Cross-Saturation
2022
This article proposes a nonlinear controller based on feedback linearization (FL) for synchronous reluctance motor (SynRM) drives which takes into consideration the magnetic saturation. The proposed nonlinear FL control based control technique has been developed starting from the theoretical definition of an original dynamic model of the SynRM taking into consideration both the self- and the cross-saturation effects. Such a control technique permits the dynamics of both the speed and axis flux loops to be maintained constant independently from the load and the saturation of the iron core in both constant flux and variable direct axis flux operating conditions. Finally, sensitivity of the pe…
Synchrotron x-ray transmission measurements and modeling of filters investigated for Athena
2020
International audience; Advanced Telescope for High-Energy Astrophysics is a large-class astrophysics space mission selected by the European Space Agency to study the theme "Hot and Energetic Universe." The mission essentially consists of a large effective area x-ray telescope and two detectors: the X-ray Integral Field Unit (X-IFU) and the Wide Field Imager (WFI). Both instruments require filters to shield from out-of-band radiation while providing high transparency to x-rays. The mission is presently in phase B; thus, to consolidate the preliminary design, investigated filter materials need to be properly characterized by experimental test campaigns. We report results from high-resolution…
Model selection using limiting distributions of second-order blind source separation algorithms
2015
Signals, recorded over time, are often observed as mixtures of multiple source signals. To extract relevant information from such measurements one needs to determine the mixing coefficients. In case of weakly stationary time series with uncorrelated source signals, this separation can be achieved by jointly diagonalizing sample autocovariances at different lags, and several algorithms address this task. Often the mixing estimates contain close-to-zero entries and one wants to decide whether the corresponding source signals have a relevant impact on the observations or not. To address this question of model selection we consider the recently published second-order blind identification proced…
Depressive symptoms during adolescence: Do learning difficulties matter?
2011
To examine whether learning difficulties play a role in depressive symptoms, 658 Finnish adolescents were asked to complete scales for depression three times during the transition to post-comprehensive education. They also reported on their learning difficulties and feelings of inadequacy as a student. The results showed that learning difficulties prospectively predicted depressive symptoms. Moreover, the impact of learning difficulties was mediated via inadequacy as a student: learning difficulties predicted feelings of inadequacy as a student which, in turn, contributed to greater increases in depressive symptoms. Finally, gender moderated the association between learning difficulties an…
Supporting Cyber Resilience with Semantic Wiki
2016
Cyber resilient organizations, their functions and computing infrastructures, should be tolerant towards rapid and unexpected changes in the environment. Information security is an organization-wide common mission; whose success strongly depends on efficient knowledge sharing. For this purpose, semantic wikis have proved their strength as a flexible collaboration and knowledge sharing platforms. However, there has not been notable academic research on how semantic wikis could be used as information security management platform in organizations for improved cyber resilience. In this paper, we propose to use semantic wiki as an agile information security management platform. More precisely, t…
Voice traffic bicasting enhancements in mobile HSPA network
2014
This paper discusses methods for improving the effectiveness of delivering voice traffic over High-Speed Downlink Packet Access (HSDPA) network by employing transmission diversity with Single-Frequency Dual-Cell (SF-DC) Aggregation that is part of the Multiflow specification. SF-DC Aggregation allows the user to be served at the same time by two different cells. The enhancements discussed in the paper capitalize strongly on the availability of the composed Channel Quality Indication (CQI) feedback at both serving cells. According to the results obtained from the network simulations, the ability to select the better channel for each voice transmission significantly decreases the required tra…
Acoustic detection and classification of river boats
2011
We present a robust algorithm to detect the arrival of a boat of a certain type when other background noises are present. It is done via the analysis of its acoustic signature against an existing database of recorded and processed acoustic signals. We characterize the signals by the distribution of their energies among blocks of wavelet packet coefficients. To derive the acoustic signature of the boat of interest, we use the Best Discriminant Basis method. The decision is made by combining the answers from the Linear Discriminant Analysis (LDA) classifier and from the Classification and Regression Trees (CART) that is also accompanied with an additional unit, called Aisles, that reduces fal…
Seeking Technical Debt in Critical Software Development Projects : An Exploratory Field Study
2016
In recent years, the metaphor of technical debt has received considerable attention, especially from the agile community. Still, despite the fact that agile practices are increasingly used in critical domains, to the best of our knowledge, there are no studies investigating the occurrence of technical debt in critical software development projects. The results of an exploratory field study conducted across several projects reveal that a variety of business and environmental factors cause the occurrence of technical debt in critical domains. Using Grounded Theory method, these factors are categorized as ambiguity of requirement, diversity of projects, inadequate knowledge management, and res…
Anomaly detection approach to keystroke dynamics based user authentication
2017
Keystroke dynamics is one of the authentication mechanisms which uses natural typing pattern of a user for identification. In this work, we introduced Dependence Clustering based approach to user authentication using keystroke dynamics. In addition, we applied a k-NN-based approach that demonstrated strong results. Most of the existing approaches use only genuine users data for training and validation. We designed a cross validation procedure with artificially generated impostor samples that improves the learning process yet allows fair comparison to previous works. We evaluated the methods using the CMU keystroke dynamics benchmark dataset. Both proposed approaches outperformed the previou…
Measuring Distraction at the Levels of Tactical and Strategic Control: The Limits of Capacity-Based Measures for Revealing Unsafe Visual Sampling Mod…
2011
The control theory of driving suggests that driver distraction can be analyzed as a breakdown of control at three levels. Common approach for analyzing distraction experimentally is to utilize capacity-based measures to assess distraction at the level of operational control. Three driving simulation experiments with 61 participants were organized to evaluate which kind of measures could be used to analyze drivers' tactical visual sampling models and the related effects of distraction while searching textual information on in-car display. The effects of two different text types were evaluated. The utilized capacity-based measures seemed to be insufficient for revealing participants' tactical…