Search results for "Overhead"
showing 10 items of 101 documents
The Polynominal Approximation in Design of Rectification of the Roadway Overhead Crane
1993
In this chapter a new method for processing surveying results of the overhead crane in horizontal plane is presented.
A Constrained Optimal Model Predictive Control for Mono Inverter Dual Parallel PMSM Drives
2018
The actual trends in the design of AC drives are directed to the reduction of the total weight, volume and cost. Usually, this implies the necessity to adopt new motor topologies and converter architectures. An important role is played by the mono-inverter dual parallel motor (MIDP), which gives the possibility to reduce the total weight and costs of power converters. This paper proposes a novel model predictive control algorithm in order to improve the transient performances of a MIDP used for an overhead carrier. The effectiveness of the proposal control is verified through some numerical simulations.
Architectural Implementation of a Reconfigurable NoC Design for Multi-Applications
2021
With the increasing number of applications running on a Network-on-Chip (NoC) based System-on-Chip (SoC), there is a need for designing a reconfigurable NoC platform to achieve acceptable performance for all the applications. This paper proposes a novel architecture for implementing a reconfiguration logic to the NoC platform executing multiple applications. The proposed architecture reconfigures SoC modules to the routers in the NoC with the help of tri-state buffers based on the applications running. The overhead in implementing the reconfiguration circuitry is significantly less, approximately 0.9% of the area and 1% of the total power consumed by the router network. The architectures pr…
Checkpointing Workflows for Fail-Stop Errors
2017
International audience; We consider the problem of orchestrating the exe- cution of workflow applications structured as Directed Acyclic Graphs (DAGs) on parallel computing platforms that are subject to fail-stop failures. The objective is to minimize expected overall execution time, or makespan. A solution to this problem consists of a schedule of the workflow tasks on the available processors and of a decision of which application data to checkpoint to stable storage, so as to mitigate the impact of processor failures. For general DAGs this problem is hopelessly intractable. In fact, given a solution, computing its expected makespan is still a difficult problem. To address this challenge,…
Blockchain Based Delegatable Access Control Scheme for a Collaborative E-Health Environment
2018
Modern electronic healthcare (e-health) settings constitute collaborative environments requiring sophisticated fine-grained access control mechanisms to cater their access demands. Access delegatability is quite crucial to realize fine-grained, flexible access control schemes compatible with such environments. In this paper, we addressed this issue through proposing an attribute based access control scheme integrated with controlled access delegation capabilities suitable for a multi-domain e-health environment. We have utilized the blockchain technology to manage attribute assignments, delegations as well as revocations. The scheme enables delegations in a controlled manner without jeopard…
Efficient and Lightweight Data Integrity Check in In-Networking Storage Wireless Sensor Networks
2009
In In-networking storage Wireless Sensor Networks, sensed data are stored locally for a long term and retrieved on-demand instead of real-time. To maximize data survival, the sensed data are normally distributively stored at multiple nearby nodes. It arises a problem that how to check and grantee data integrity of distributed data storage in the context of resource constraints. In this paper, a technique called Two Granularity Linear Code (TGLC) that consists of Intra-codes and Inter-codes is presented. An efficient and lightweight data integrity check scheme based on TGLC is proposed. Data integrity can be checked by any one who holds short Inter-codes, and the checking credentials is shor…
Multi-cloud privacy preserving schemes for linear data mining
2015
This paper presents an approach to privacy-preserving data mining that relies upon a relatively simple secret sharing scheme. Its main feature is that users, sensitive data owners, are engaged in the secret sharing operations that protect their privacy. They are grouped in independent clouds connected to a central unit, the data miner, that only manages the aggregated data of each cloud, therefore avoiding the disclosure of information belonging to single nodes. We propose two privacy preserving schemes, with different privacy levels and communication costs. When designing them, we assume that some users' data might become inaccessible during the operation of the privacy preserving protocol…
A Geographical Self-Organizing Approach for Vehicular Networks
2012
Cooperative vehicular networks have always been considered as the perfect way to bring more comfort to the passengers and more safety to the human life. Thus, research community and governmental organizations are interested to study and deploy these networks. The vehicular networks principle is connecting vehicles to each other and to existing infrastructure. However, their industrialization faces some challenges: (i) high mobility, (ii) frequently partitioned network, (iii) geographically constrained topology, and (iv) scalability. Therefore, in contrast to traditional networks, vehicular network protocols focus on both achieving adequate QoS level and reducing overhead. Achieving these tw…
Maximizing energy transfer and RES integration using dynamic thermal rating. Italian TSO experience
2019
The production of electricity from wind and other renewable sources is rapidly increasing all over the world, causing significant changes in the management of electrical systems. The current structural asset is not adequate to manage this growing generation of energy. The hypothesis of construction of new power lines would mean taking into consideration economic, political and social problems. The following paper reports the experience gained by the Italian TSO, Terna S.p.A, on the use of the DTR (Dynamic Thermal Rating), which is able to dynamically calculate the real transport capacity of an overhead power line. The results obtained are en- couraging as they show how it is possible to inc…
Safety Concerns on Ground Fault Application Transfer Phenomenon in HV Installations
2007
When a fault to ground occurs in HV/MV substations supplied by a combined overhead-cable line, most of the fault current can be transferred and injected into the soil several kilometers far away from the fault location. This phenomenon is called "fault application transfer" and mostly concerns transition stations, where cables are connected to the overhead line. If the transition station is a dead-end steel pole structure, usually accessible to the general public, the local ground electrode could be inadequate to maintain ground potential rise within safety limits. Hence, dangerous touch and step voltages may appear at exposed locations. In the paper results of various computer simulations …