Results (88)
Search Parameters:
Keyword: StrainPerformance Analysis of Joint Precoding and Equalization Design with Shared Redundancy for Imperfect CSI MIMO Systems
Analytical researches on a potential performance of multipath multiple-input multiple-output (MIMO) systems inspire the development of new technologies that decompose a MIMO channel into independent sub-channels on the condition of constrained transmit power. Moreover, in current studies of inter-symbol interference (ISI) MIMO systems, there is an assumption that channel state information (CSI) at receivers and/or…
Read MoreTerritorial Sales Redesign Using Geotechnical Tools
In recent years there has been technological growth in the field of facility location, considering it as a significant factor to achieve greater competition among companies. The present work gives a methodological solution for a territorial redesign in a Mexican automotive parts distribution company with the support of Geotechnological tools like Geographic Information Systems (GIS)…
Read MoreDesign and Validation of a Meter Band Rate in OpenFlow and OpenDaylight for Optimizing QoS
Technological developments in the Internet and communications have created a vastly complex and dynamic context with diverse heterogeneous networks and fast growth of mobile devices and multimedia. As the Internet becomes the primary mode of communication for many organisations there is requirement to enhance quality of service (QoS) from heterogeneous systems and networks. Traditional networks…
Read MoreOptimization of the Feeding Point Location of Rectangular Microstrip Patch Antenna
Microstrip patch antennas (MPAs) are comfortable and have better anticipation compared to traditional antennas. Not only the weight of this type of antennas is lighter but also, they have little capacity, minimum price, reduced in measurement as well as affluence of fiction then observance. Recently, it has been many times reevaluated for the improvement of…
Read MoreA Multi-Objective Voltage Optimization Technique in Distribution Feeders with High Photovoltaic Penetration
With increasing photovoltaic (PV) penetration on distribution feeders, voltage functions is always a challenge. To control these variations due to the intermittent nature of PV generation,many utility companies use the traditional voltage regulating devices such as ON/OFF load tap changers, voltage regulators, switched capacitor banks and reactors. The use of smart inverters (SI) has been…
Read MoreTransmission Line Restoration Using ERS Structure
In the past decades, various ideas have proposed for reconductoring of overhead lines to enhance power transmission capacity considering growing energy demand. Conventional method of reconductoring is use to take couple of weeks but availability of shutdown for a prolong period is a major constraint in line uprating. Emergency restoration structure (ERS) is effective to…
Read MoreOverview on 5G Radio Frequency Energy Harvesting
The current industrial landscape is becoming increasingly aware of the need to optimize energy use and management for all domains, including telecommunications. Among others, RF Energy Harvesting is a promising technique for 5G systems as an alternative to traditional energy supply sources. This paper presents 5G landscape and ecosystem. It positions RF-Energy Harvesting in 5G…
Read MoreA Formal Ontology-based Framework Towards an Intelligent Temporal Scheduler
Time scheduling as seen in timetabling processes with few and/or competing resources has exposed complex interoperable time scheduling. Attempts to resolving these time scheduling processes has been undertaken, using several classical methods, with difficulty due to inherent complexities, constraints and conflicting issues. The use of ontology-based approaches to resolve time complexity is recently adopted due…
Read MoreEstimation of Software Development Project Success using Fuzzy Logics
To date, software development is vital since software is a critical element in information technology. Requirements gathering, planning, estimation, estimation, development, collaboration, testing, and deployment. The problem is when it is delivered, so it reduces the risk of the problem which could happen is important. Threat prediction should be made. It will be aimed at…
Read MoreTwo Degree-of-Freedom Vibration Control of a 3D, 2 Link Flexible Manipulator
Considering link vibrations, the main limitation affecting flexible manipulators, this article seeks to make a contribution by presenting an enhanced two degree of freedom vibration controller. This controller uses a filtered right inverse controller in the feedforward and strain feedback controller in the feedback path. The Filtered inverse controller damps transient vibrations while preserving joint…
Read MoreMetaheuristics for Solving Facility Location Optimization Problem in Lagos, Nigeria
Facility location problem is a problem that many organizations still face today because of its increasing constraints and objectives. Decision makers want this problem solved in order to maximize profit and as such, it became a field of interest to many computer scientists over the years. The solution tool used by these scientists; a function…
Read MoreA Novel Fair and Efficient Resource Allocation Scheduling Algorithm for Uplink in LTE-A
With the introduction of new services and new more sophisticated mobile devices the radio network operators are faced with new challanges to increase the system performance. The most recent standards introduced by 3GPP for the new architectures of the Long Term Evolution network address these issues and outline possibilities for optimizing network performance and user…
Read MoreImpacts of Synchronous Generator Capability Curve on Systems Locational Marginal Price through a Convex Optimal Power Flow
This paper deals about an application of optimal power flows (OPF) constrained with synchronous generator capability curve for power market analysis (SGCC). OPF main features gather in its mathematical formulation non-convexity, non-linearity, and it shows to be a hard to solve optimization problem. In some operational scenarios, SGCC can limit power flows bringing the theoretical…
Read MoreAn Approach for Determining Rules used to Select Viable Junction Design Alternatives Based on Multiple Objectives
Transport planners and engineers frequently face the challenge to determine the best design for a specific junction. Many road design manuals provide guidelines for the design and evaluation of different junction alternatives, however these mostly refer to specialized software in which the performances of design alternatives can be modelled. In the first stage of the…
Read MoreMinimizing Time Delay of Information Routed Across Dynamic Temporal Sensor Networks
In this research we address the problem of routing information across dynamic temporal sensor networks. The goal is to determine which information, generated by sensors on resources at various times, is able to be routed to other resources, consumer resources, within the given information time window, while being constrained by temporally dynamic bandwidth limitations across…
Read MoreA Comparative Analysis of two Controllers for Trajectory Tracking Control: Application to a Biological Process
The aim of the present work is to guarantee the trajectory tracking of a nonlinear biological process and compare two control approaches. The main objective of this work is to elaborate a fuzzy model and build a fuzzy controllers for a biological process by using the fuzzy Takagi-Sugeno. Two controllers are synthesized, the parallel distributed…
Read MoreA novel mixed-mode universal biquad employing plus current output DVCCs
This paper refers to a novel mixed-mode universal biquad employing plus current output differential voltage current conveyors with grounded passive components. The circuit performs mixed-mode operation with the selection of the input and output terminals, and it enables low-pass, band-pass, high-pass, band-stop and all-pass responses choosing suitable input signals. The circuit needs no component matching…
Read MoreStream Cipher by Reed-Solomon Codes
Stream cipher can be used in constrained environments to provide information security and reduce energy expense at data transmission. In this paper, it is shown that Reed-Solomon (RS) code can be used to implement stream cipher, which is widely used for error corrections of data in transmission and storages. The proposed stream cipher combines the…
Read MoreSimulation Strategy to Enhance Oxygen Uptake and Reaction Forces at Leg Joints and Vertebral Bodies During Ergometer Exercise Under Altered Gravity
Moderate exercise has been implemented in spaceflight programs to prevent muscle and joint damage under extreme circumstances such as microgravity. Although the physical effects of exercise have been investigated experimentally, advanced modeling and simulation techniques are powerful tools that could provide insight into the physical limitations, optimal conditions, and mechanisms that might lead to muscle…
Read MoreOntology Modeling of Social Roles of Users in Mobile Computing Environments
Today, computing devices of various types with wireless interconnections are used for diverse tasks and increasingly in ad hoc manners. It is not always obvious which devices are present, reachable, and connected when users and their devices are mobile. In such mobile computing environment, the number of registered lines on the network via network operators…
Read MoreComputation of Viability Kernels on Grid Computers for Aircraft Control in Windshear
This paper is devoted to the analysis of aircraft dynamics in the cruise flight phase under windshear conditions. The study is conducted with reference to a point-mass aircraft model restricted to move in a vertical plane. We formulate the problem as a differential game against the wind disturbances: The first player, autopilot, manages, via additional…
Read MoreA Joint Safety and Security Analysis of message protection for CAN bus protocol
One of the prominent challenges of the automotive-transportation system is represented by the integration of security and safety properties within protocols, applications and connectivity mechanisms. A joint safety/security design can sometimes expose to trade-offs, since their requirements may not match perfectly or even be incompatible. This paper analyses an example of security and safety design,…
Read MoreTheoretical Investigation of Combined Use of PSO, Tabu Search and Lagrangian Relaxation methods to solve the Unit Commitment Problem
Solving the Unit Commitment problem (UCP) optimizes the combination of production units operations and determines the appropriate operational scheduling of each production units to satisfy the expected consumption which varies from one day to one month. Besides, each production unit is conducted to constraints that render this problem complex, combinatorial and nonlinear. In this paper,…
Read MoreA New profiling and pipelining approach for HEVC Decoder on ZedBoard Platform
New multimedia applications such as mobile video, high-quality Internet video or digital television requires high-performance encoding of video signals to meet technical constraints such as runtime, bandwidth or latency. Video coding standard h.265 HEVC (High Efficiency Video Coding) was developed by JCT-VC to replace the MPEG-2, MPEG-4 and h.264 codecs and to respond to these…
Read MoreModeling and Control of Collaborative Robot System using Haptic Feedback
When two robot systems can share understanding using any agreed knowledge, within the constraints of the system’s communication protocol, the approach may lead to a common improvement. This has persuaded numerous new research inquiries in human-robot collaboration. We have built up a framework prepared to do independent following and performing table-best protest object manipulation with…
Read More
