Search results for "Control"

showing 10 items of 13168 documents

Feedback Linearization Based Nonlinear Control of SynRM Drives Accounting for Self- and Cross-Saturation

2022

This article proposes a nonlinear controller based on feedback linearization (FL) for synchronous reluctance motor (SynRM) drives which takes into consideration the magnetic saturation. The proposed nonlinear FL control based control technique has been developed starting from the theoretical definition of an original dynamic model of the SynRM taking into consideration both the self- and the cross-saturation effects. Such a control technique permits the dynamics of both the speed and axis flux loops to be maintained constant independently from the load and the saturation of the iron core in both constant flux and variable direct axis flux operating conditions. Finally, sensitivity of the pe…

synchronous reluctance motors (SynRM)Settore ING-INF/04 - AutomaticaControl and Systems Engineeringmagnetic saturationElectrical and Electronic EngineeringFeedback linearization (FL)Industrial and Manufacturing Engineering
researchProduct

Synchrotron x-ray transmission measurements and modeling of filters investigated for Athena

2020

International audience; Advanced Telescope for High-Energy Astrophysics is a large-class astrophysics space mission selected by the European Space Agency to study the theme "Hot and Energetic Universe." The mission essentially consists of a large effective area x-ray telescope and two detectors: the X-ray Integral Field Unit (X-IFU) and the Wide Field Imager (WFI). Both instruments require filters to shield from out-of-band radiation while providing high transparency to x-rays. The mission is presently in phase B; thus, to consolidate the preliminary design, investigated filter materials need to be properly characterized by experimental test campaigns. We report results from high-resolution…

synchrotron radiationComputer scienceAstrophysics::High Energy Astrophysical PhenomenaMechanical EngineeringAstrophysics::Instrumentation and Methods for AstrophysicsSynchrotron radiationtelescopesAstronomy and AstrophysicsElectronic Optical and Magnetic Materialslaw.inventionTelescopeFilter designSettore FIS/05 - Astronomia E AstrofisicaTransmission (telecommunications)Space and Planetary ScienceControl and Systems EngineeringlawFilter (video)[SDU]Sciences of the Universe [physics]CalibrationOptical filterInstrumentationDigital filterastrophysics space mission Athena optical and thermal filters Wide Field Imager X-ray Integral Field Unit x-ray transmissionRemote sensing
researchProduct

Model selection using limiting distributions of second-order blind source separation algorithms

2015

Signals, recorded over time, are often observed as mixtures of multiple source signals. To extract relevant information from such measurements one needs to determine the mixing coefficients. In case of weakly stationary time series with uncorrelated source signals, this separation can be achieved by jointly diagonalizing sample autocovariances at different lags, and several algorithms address this task. Often the mixing estimates contain close-to-zero entries and one wants to decide whether the corresponding source signals have a relevant impact on the observations or not. To address this question of model selection we consider the recently published second-order blind identification proced…

ta112Series (mathematics)Estimation theoryModel selectionasymptotic normalitypattern identificationAsymptotic distributionInformation Criteriaoint diagonalization SOBI AsympBlind signal separationMatrix (mathematics)Control and Systems EngineeringSOBISignal Processingjoint diagonalizationComputer Vision and Pattern RecognitionElectrical and Electronic EngineeringAlgorithmSoftwareMixing (physics)MathematicsSignal Processing
researchProduct

Depressive symptoms during adolescence: Do learning difficulties matter?

2011

To examine whether learning difficulties play a role in depressive symptoms, 658 Finnish adolescents were asked to complete scales for depression three times during the transition to post-comprehensive education. They also reported on their learning difficulties and feelings of inadequacy as a student. The results showed that learning difficulties prospectively predicted depressive symptoms. Moreover, the impact of learning difficulties was mediated via inadequacy as a student: learning difficulties predicted feelings of inadequacy as a student which, in turn, contributed to greater increases in depressive symptoms. Finally, gender moderated the association between learning difficulties an…

ta112Social Psychologymedia_common.quotation_subjecteducationPoison controlHuman factors and ergonomicsModerationSuicide preventionOccupational safety and healthEducationDevelopmental psychologyDevelopmental NeuroscienceFeelingInjury preventionDevelopmental and Educational PsychologyLife-span and Life-course StudiesAssociation (psychology)Psychologyta515Social Sciences (miscellaneous)media_commonClinical psychologyInternational Journal of Behavioral Development
researchProduct

Supporting Cyber Resilience with Semantic Wiki

2016

Cyber resilient organizations, their functions and computing infrastructures, should be tolerant towards rapid and unexpected changes in the environment. Information security is an organization-wide common mission; whose success strongly depends on efficient knowledge sharing. For this purpose, semantic wikis have proved their strength as a flexible collaboration and knowledge sharing platforms. However, there has not been notable academic research on how semantic wikis could be used as information security management platform in organizations for improved cyber resilience. In this paper, we propose to use semantic wiki as an agile information security management platform. More precisely, t…

ta113021110 strategic defence & security studiesEngineeringKnowledge managementCloud computing securitybusiness.industryStandard of Good Practiceinformation security management0211 other engineering and technologies02 engineering and technologyInformation securitycyber resiliencesemantic wikiSecurity information and event managementrisk managementSecurity controlsResilience (organizational)World Wide WebITIL security managementInformation security management020204 information systems0202 electrical engineering electronic engineering information engineeringbusiness
researchProduct

Voice traffic bicasting enhancements in mobile HSPA network

2014

This paper discusses methods for improving the effectiveness of delivering voice traffic over High-Speed Downlink Packet Access (HSDPA) network by employing transmission diversity with Single-Frequency Dual-Cell (SF-DC) Aggregation that is part of the Multiflow specification. SF-DC Aggregation allows the user to be served at the same time by two different cells. The enhancements discussed in the paper capitalize strongly on the availability of the composed Channel Quality Indication (CQI) feedback at both serving cells. According to the results obtained from the network simulations, the ability to select the better channel for each voice transmission significantly decreases the required tra…

ta113Access networkta213Computer sciencebusiness.industryNetwork packetCSoHSbicastingThroughputTransmission (telecommunications)HandovermultiflowTelecommunications linkHSPAVoHSSF-DC aggregationbusinessComputer networkPower controlCommunication channel
researchProduct

Acoustic detection and classification of river boats

2011

We present a robust algorithm to detect the arrival of a boat of a certain type when other background noises are present. It is done via the analysis of its acoustic signature against an existing database of recorded and processed acoustic signals. We characterize the signals by the distribution of their energies among blocks of wavelet packet coefficients. To derive the acoustic signature of the boat of interest, we use the Best Discriminant Basis method. The decision is made by combining the answers from the Linear Discriminant Analysis (LDA) classifier and from the Classification and Regression Trees (CART) that is also accompanied with an additional unit, called Aisles, that reduces fal…

ta113Acoustics and UltrasonicsNetwork packetbusiness.industryPattern recognitionLinear discriminant analysisRegressionWaveletDiscriminantAcoustic signatureProcess controlArtificial intelligencebusinessClassifier (UML)MathematicsApplied Acoustics
researchProduct

Seeking Technical Debt in Critical Software Development Projects : An Exploratory Field Study

2016

In recent years, the metaphor of technical debt has received considerable attention, especially from the agile community. Still, despite the fact that agile practices are increasingly used in critical domains, to the best of our knowledge, there are no studies investigating the occurrence of technical debt in critical software development projects. The results of an exploratory field study conducted across several projects reveal that a variety of business and environmental factors cause the occurrence of technical debt in critical domains. Using Grounded Theory method, these factors are categorized as ambiguity of requirement, diversity of projects, inadequate knowledge management, and res…

ta113Agile usability engineeringKnowledge managementbusiness.industryEmpirical process (process control model)Agile Unified Process020207 software engineering02 engineering and technologySoftware peer reviewcomputer.software_genreExtreme programming practicestechnical debtTechnical debt020204 information systemssoftware development0202 electrical engineering electronic engineering information engineeringLean software developmentbusinessohjelmistokehityscomputerAgile software development
researchProduct

Anomaly detection approach to keystroke dynamics based user authentication

2017

Keystroke dynamics is one of the authentication mechanisms which uses natural typing pattern of a user for identification. In this work, we introduced Dependence Clustering based approach to user authentication using keystroke dynamics. In addition, we applied a k-NN-based approach that demonstrated strong results. Most of the existing approaches use only genuine users data for training and validation. We designed a cross validation procedure with artificially generated impostor samples that improves the learning process yet allows fair comparison to previous works. We evaluated the methods using the CMU keystroke dynamics benchmark dataset. Both proposed approaches outperformed the previou…

ta113AuthenticationpääsynvalvontaComputer scienceaccess control02 engineering and technologycomputer.software_genreKeystroke dynamicstodentaminen020204 information systems0202 electrical engineering electronic engineering information engineeringBenchmark (computing)Unsupervised learningauthentication020201 artificial intelligence & image processingAnomaly detectionData miningtietoturvadata securitycomputer
researchProduct

Measuring Distraction at the Levels of Tactical and Strategic Control: The Limits of Capacity-Based Measures for Revealing Unsafe Visual Sampling Mod…

2011

The control theory of driving suggests that driver distraction can be analyzed as a breakdown of control at three levels. Common approach for analyzing distraction experimentally is to utilize capacity-based measures to assess distraction at the level of operational control. Three driving simulation experiments with 61 participants were organized to evaluate which kind of measures could be used to analyze drivers' tactical visual sampling models and the related effects of distraction while searching textual information on in-car display. The effects of two different text types were evaluated. The utilized capacity-based measures seemed to be insufficient for revealing participants' tactical…

ta113Control theory (sociology)Article SubjectComputer scienceControl (management)Sampling (statistics)Workloadlcsh:QA75.5-76.95Task (project management)Human-Computer InteractionSAFERDistractionStrategic controllcsh:Electronic computers. Computer scienceSimulationCognitive psychologyAdvances in Human-Computer Interaction
researchProduct