Search results for "Overhead"

showing 10 items of 101 documents

The Polynominal Approximation in Design of Rectification of the Roadway Overhead Crane

1993

In this chapter a new method for processing surveying results of the overhead crane in horizontal plane is presented.

RectificationComputingMethodologies_SIMULATIONANDMODELINGComputer scienceMechanical engineeringComputerApplications_COMPUTERSINOTHERSYSTEMSOverhead craneHardware_CONTROLSTRUCTURESANDMICROPROGRAMMINGHorizontal planeAutomotive engineering
researchProduct

A Constrained Optimal Model Predictive Control for Mono Inverter Dual Parallel PMSM Drives

2018

The actual trends in the design of AC drives are directed to the reduction of the total weight, volume and cost. Usually, this implies the necessity to adopt new motor topologies and converter architectures. An important role is played by the mono-inverter dual parallel motor (MIDP), which gives the possibility to reduce the total weight and costs of power converters. This paper proposes a novel model predictive control algorithm in order to improve the transient performances of a MIDP used for an overhead carrier. The effectiveness of the proposal control is verified through some numerical simulations.

Renewable Energy Sustainability and the EnvironmentComputer scienceAC drive020209 energy020208 electrical & electronic engineeringConstrained optimizationEnergy Engineering and Power Technology02 engineering and technologyPermanent Magnet Synchronous MachineConvertersPower (physics)Reduction (complexity)Model predictive controlControl theory0202 electrical engineering electronic engineering information engineeringOverhead (computing)InverterTransient (oscillation)Electrical and Electronic EngineeringConstrained optimizationDual motorModel Predictive Control2018 7th International Conference on Renewable Energy Research and Applications (ICRERA)
researchProduct

Architectural Implementation of a Reconfigurable NoC Design for Multi-Applications

2021

With the increasing number of applications running on a Network-on-Chip (NoC) based System-on-Chip (SoC), there is a need for designing a reconfigurable NoC platform to achieve acceptable performance for all the applications. This paper proposes a novel architecture for implementing a reconfiguration logic to the NoC platform executing multiple applications. The proposed architecture reconfigures SoC modules to the routers in the NoC with the help of tri-state buffers based on the applications running. The overhead in implementing the reconfiguration circuitry is significantly less, approximately 0.9% of the area and 1% of the total power consumed by the router network. The architectures pr…

RouterFunctional verificationComputer sciencebusiness.industryOverhead (engineering)Control reconfigurationHardware_PERFORMANCEANDRELIABILITYNetwork topologyMultiplexerNetwork on a chipEmbedded systemHardware_INTEGRATEDCIRCUITSVerilogbusinesscomputercomputer.programming_language2021 24th Euromicro Conference on Digital System Design (DSD)
researchProduct

Checkpointing Workflows for Fail-Stop Errors

2017

International audience; We consider the problem of orchestrating the exe- cution of workflow applications structured as Directed Acyclic Graphs (DAGs) on parallel computing platforms that are subject to fail-stop failures. The objective is to minimize expected overall execution time, or makespan. A solution to this problem consists of a schedule of the workflow tasks on the available processors and of a decision of which application data to checkpoint to stable storage, so as to mitigate the impact of processor failures. For general DAGs this problem is hopelessly intractable. In fact, given a solution, computing its expected makespan is still a difficult problem. To address this challenge,…

ScheduleComputer scienceworkflowDistributed computing[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS]010103 numerical & computational mathematics02 engineering and technologyParallel computing[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]01 natural sciencesTheoretical Computer Science[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]checkpointfail-stop error0202 electrical engineering electronic engineering information engineeringOverhead (computing)[INFO]Computer Science [cs]0101 mathematicsresilienceClass (computer programming)020203 distributed computingJob shop schedulingProbabilistic logic020206 networking & telecommunications[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationDynamic programmingTask (computing)[INFO.INFO-PF]Computer Science [cs]/Performance [cs.PF]WorkflowComputational Theory and MathematicsHardware and Architecture[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Task analysis[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]Software
researchProduct

Blockchain Based Delegatable Access Control Scheme for a Collaborative E-Health Environment

2018

Modern electronic healthcare (e-health) settings constitute collaborative environments requiring sophisticated fine-grained access control mechanisms to cater their access demands. Access delegatability is quite crucial to realize fine-grained, flexible access control schemes compatible with such environments. In this paper, we addressed this issue through proposing an attribute based access control scheme integrated with controlled access delegation capabilities suitable for a multi-domain e-health environment. We have utilized the blockchain technology to manage attribute assignments, delegations as well as revocations. The scheme enables delegations in a controlled manner without jeopard…

Scheme (programming language)DelegationRevocationbusiness.industryComputer sciencemedia_common.quotation_subject010401 analytical chemistryControl (management)Overhead (engineering)020206 networking & telecommunicationsAccess control02 engineering and technologyAttribute-based access controlComputer securitycomputer.software_genre01 natural sciences0104 chemical sciences0202 electrical engineering electronic engineering information engineeringInformationSystems_MISCELLANEOUSbusinessKey managementcomputermedia_commoncomputer.programming_language2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)
researchProduct

Efficient and Lightweight Data Integrity Check in In-Networking Storage Wireless Sensor Networks

2009

In In-networking storage Wireless Sensor Networks, sensed data are stored locally for a long term and retrieved on-demand instead of real-time. To maximize data survival, the sensed data are normally distributively stored at multiple nearby nodes. It arises a problem that how to check and grantee data integrity of distributed data storage in the context of resource constraints. In this paper, a technique called Two Granularity Linear Code (TGLC) that consists of Intra-codes and Inter-codes is presented. An efficient and lightweight data integrity check scheme based on TGLC is proposed. Data integrity can be checked by any one who holds short Inter-codes, and the checking credentials is shor…

Scheme (programming language)Distributed databasebusiness.industryComputer scienceDistributed computingContext (language use)Term (time)Data integrityDistributed data storeOverhead (computing)businessWireless sensor networkcomputerComputer networkcomputer.programming_language2009 IEEE International Symposium on Parallel and Distributed Processing with Applications
researchProduct

Multi-cloud privacy preserving schemes for linear data mining

2015

This paper presents an approach to privacy-preserving data mining that relies upon a relatively simple secret sharing scheme. Its main feature is that users, sensitive data owners, are engaged in the secret sharing operations that protect their privacy. They are grouped in independent clouds connected to a central unit, the data miner, that only manages the aggregated data of each cloud, therefore avoiding the disclosure of information belonging to single nodes. We propose two privacy preserving schemes, with different privacy levels and communication costs. When designing them, we assume that some users' data might become inaccessible during the operation of the privacy preserving protocol…

Scheme (programming language)privacy linear data miningSIMPLE (military communications protocol)Computer sciencebusiness.industryPrivacy softwareSettore ING-INF/03 - TelecomunicazioniCloud computingcomputer.software_genreSecret sharingComputer Networks and CommunicationFeature (machine learning)Overhead (computing)Data miningElectrical and Electronic EngineeringbusinesscomputerComputer networkcomputer.programming_language
researchProduct

A Geographical Self-Organizing Approach for Vehicular Networks

2012

Cooperative vehicular networks have always been considered as the perfect way to bring more comfort to the passengers and more safety to the human life. Thus, research community and governmental organizations are interested to study and deploy these networks. The vehicular networks principle is connecting vehicles to each other and to existing infrastructure. However, their industrialization faces some challenges: (i) high mobility, (ii) frequently partitioned network, (iii) geographically constrained topology, and (iv) scalability. Therefore, in contrast to traditional networks, vehicular network protocols focus on both achieving adequate QoS level and reducing overhead. Achieving these tw…

Self-organizationVehicular ad hoc network[SPI] Engineering Sciences [physics]Computer sciencebusiness.industryQuality of serviceself-organizationvirtual backboneperformance evaluationScalabilityKey (cryptography)Overhead (computing)vehicular networksElectrical and Electronic EngineeringCommunications protocolbusinessProtocol (object-oriented programming)analytical study.clusteringComputer networkJournal of Communications
researchProduct

Maximizing energy transfer and RES integration using dynamic thermal rating. Italian TSO experience

2019

The production of electricity from wind and other renewable sources is rapidly increasing all over the world, causing significant changes in the management of electrical systems. The current structural asset is not adequate to manage this growing generation of energy. The hypothesis of construction of new power lines would mean taking into consideration economic, political and social problems. The following paper reports the experience gained by the Italian TSO, Terna S.p.A, on the use of the DTR (Dynamic Thermal Rating), which is able to dynamically calculate the real transport capacity of an overhead power line. The results obtained are en- couraging as they show how it is possible to inc…

Settore ING-IND/33 - Sistemi Elettrici Per L'EnergiaDTR Overhead transmission lines RES integration
researchProduct

Safety Concerns on Ground Fault Application Transfer Phenomenon in HV Installations

2007

When a fault to ground occurs in HV/MV substations supplied by a combined overhead-cable line, most of the fault current can be transferred and injected into the soil several kilometers far away from the fault location. This phenomenon is called "fault application transfer" and mostly concerns transition stations, where cables are connected to the overhead line. If the transition station is a dead-end steel pole structure, usually accessible to the general public, the local ground electrode could be inadequate to maintain ground potential rise within safety limits. Hence, dangerous touch and step voltages may appear at exposed locations. In the paper results of various computer simulations …

Settore ING-IND/33 - Sistemi Elettrici Per L'EnergiaEngineeringTransfer phenomenonbusiness.industryGroundTransfer (computing)Electrical engineeringSafety Substations Fault currents Soil Fault location Cables Steel Electrodes Voltage Computer simulationbusinessFault (power engineering)Overhead lineLine (electrical engineering)Voltage2007 IEEE Symposium on Product Compliance Engineering
researchProduct