Results (1649)
Search Parameters:
Keyword: POSSimulation and Implementation of Sensorless Control in Multi-Motors Electric Drives with High Dynamics
In this article we’ll tackle the control of multi-motors electric drives with high dynamic, with rapid changes in torque and speed, with rigid or flexible coupling of motors, where the control strategy is FOC (Field Oriented Control) for each drives and the distributed control in local network using the CANopen protocol. In the surface mining…
Read MoreAn Overview of Traceability: Towards a general multi-domain model
Traceability for some people, is merely a tool to keep a history over something important that happened in the past. For others, is has no added value to their actual processes or products. In fact, it is becoming more and more valued. Traceability is still a vast area of research and an undiscovered field that…
Read MoreValidity of Mind Monitoring System as a Mental Health Indicator using Voice
We have been developing a method of evaluating the mental health condition of a person based on the sound of their voice. Currently, we have applied this technology to create a smartphone application that shows the vitality and the mental activity as mental health condition indices. Using voice to measure one’s mental health condition is…
Read MoreIndoor Mobile Robot Navigation in Unknown Environment Using Fuzzy Logic Based Behaviors
This paper presents the development and design of a methodology based on fuzzy logic to control an indoor mobile robot for a complete navigation in an unknown environment. The methodology incorporates two basic behaviors, namely: reaching the goal and avoiding obstacles. The obstacle avoidance behavior is treated using wall-following scheme based on an Interval Type-2…
Read MoreReal Time Advanced Clustering System
This paper describes a system to gather information from a stationary camera to identify moving objects. The proposed solution makes only use of motion vectors between adjacent frames, obtained from any algorithm. Starting from them, the system is able to retrieve clusters of moving objects in a scene acquired by an image sensor device. Since…
Read MoreA Computationally Intelligent Approach to the Detection of Wormhole Attacks in Wireless Sensor Networks
A wormhole attack is one of the most critical and challenging security threats for wireless sensor networks because of its nature and ability to perform concealed malicious activities. This paper proposes an innovative wormhole detection scheme to detect wormhole attacks using computational intelligence and an artificial neural network (ANN). Most wormhole detection schemes reported in…
Read MoreSolving the Capacitated Network Design Problem in Two Steps
In this paper, we propose a two steps-based algorithm to solve the modular link version of the Capacitated Network Design Problem (CNDP) which consists to determine the optimal network that guarantees the routing of a set of commodities. In our proposition, CNDP is divided into two sub-problems: Network Design problem (NDP) and Network Loading Problem…
Read MoreMatrix Encryption Scheme
In classical cryptography, the Hill cipher is a polygraphic substitution cipher based on linear algebra. In this work, we proposed a new problem applicable to the public key cryptography, based on the Matrices, called “Matrix discrete logarithm problem”, it uses certain elements formed by matrices whose coefficients are elements in a finite field. We have…
Read MoreGestural Interaction for Virtual Reality Environments through Data Gloves
In virtual environments, virtual hand interactions play a key role in interactivity and realism allowing to perform fine motions. Data glove is widely used in Virtual Reality (VR) and through simulating a human hands natural anatomy (Avatar’s hands) in its appearance and motion is possible to interact with the environment and virtual objects. Recently, hand…
Read MoreValidity and efficiency of conformal anomaly detection on big distributed data
Conformal Prediction is a recently developed framework for reliable confident predictions. In this work we discuss its possible application to big data coming from different, possibly heterogeneous data sources. On example of anomaly detection problem, we study the question of saving validity of Conformal Prediction in this case. We show that the straight forward averaging…
Read MoreEnergy-Efficient Mobile Sensing in Distributed Multi-Agent Sensor Networks
In this paper, we exploit an integration between Compressive sensing (CS) and the random mobility of sensors in distributed mobile sensor networks (MSNs). A small number of distributed mobile sensors are deployed randomly in a sensing area to observe a large number of positions. The distributed mobile sensors sparsely sample the sensing area for data…
Read MoreChikungunya virus; Review of Epidemiology and Outbreak in Pakistan
Chikungunya virus (CHIKV) is mosquito-borne, alpha virus. It causes acute fever and acute and chronic musculoskeletal pain in humans. CHIKV has spread to 22 countries including Pakistan resulting in hundreds of thousands of death across the world. International travel stands out as one of the major risk factors for rapid global spread of the disease.…
Read MoreClassifying region of interests from mammograms with breast cancer into BIRADS using Artificial Neural Networks
Breast cancer is one of the most common cancers among female diseases all over the world. Early diagnosis and treatment is particularly important in reducing the mortality rate. This research is focused on the prevention of breast cancer, therefore it is important to detect micro-calcifications (MCs) which are a sign of early stage breast cancer.…
Read MoreDirectional Antenna Modulation Technique using A Two-Element Frequency Diverse Array
Direction dependent antenna modulation (DAM), as a potential physical-layer security technique, is able to enhance the security of wireless communication systems by virtue of the capability of its direction-dependent signal modulation format transmission. In this paper, DAM using frequency diverse array (FDA) to produce the modulation is presented. By phase shifting each element, the desired…
Read MoreFire extinguishing system in large underground garages
In the work is considered an acceptable constructive scheme from a practical point of view at fire extinguishing in underground garages. The garage space is divided into quadrants which covering, for example, 2 cars. In case of ignition on one of them, a sprinkler nozzle system is triggered by the effect of the vertical convective…
Read MoreEnabling Toy Vehicles Interaction With Visible Light Communication (VLC)
An effective communication among the road users is crucial for safety precautions. Nowadays, a light emitting diode (LED) are commonly installed on a motor vehicle as the lighting system. The LED lights are more reliable and flexible in terms of the design and power adjustments. To further utilize the LED applications in a vehicular system,…
Read MoreDesign of Petri Net Supervisor with 1-monitor place for a Class of Behavioral Constraints
This paper studies the design of supervisory controllers with a minimum number of monitor places for Manufacturing System modeled as safe Petri Nets. The proposed approach considers a class of safety specifications known as Behavioral Constraints with a restricted syntax. The set of Behavioral Constraints are represented as predicate logic formulas in normal conjunctive form.…
Read MoreA security approach based on honeypots: Protecting Online Social network from malicious profiles
In the recent years, the fast development and the exponential utilization of social networks have prompted an expansion of social Computing. In social networks users are interconnected by edges or links, where Facebook, twitter, LinkedIn are most popular social networks websites. Due to the growing popularity of these sites they serve as a target for…
Read MoreFault Diagnosis and Tolerant Control Using Observer Banks Applied to Continuous Stirred Tank Reactor
This paper focuses on studying the problem of fault tolerant control (FTC), including a detailed fault detection and diagnosis (FDD) module using observer banks which consists of output and unknown input observers applied to a continuous stirred tank reactor (CSTR). The main objective of this paper is to use a FDD module here proposed to…
Read MoreA synchronizing second order sliding mode control applied to decentralized time delayed multi-agent robotic systems: Stability Proof
This study investigates the synchronization issue of multiple robot manipulators in the presence of time delay. Since several previous works based on synchronization task neglect the communication delay, in this paper we develop a finite time stability based on a Lyaponov functional for synchronization of a networked robotic system where time delay exists during the…
Read MoreControl design for axial flux permanent magnet synchronous motor which operates above the nominal speed
The axial flux permanent magnet synchronous motor (AFPM motor) using magnet bearings instead of ball-bearings at both two shaft ends could allow rotational speed of shaft much greater than nominal speed. One of the solutions to increase motor speed higher than its nameplate speed is reducing rotor’s pole magnetic flux of rotor (Yp). This paper…
Read MoreOptimal Synthesis of Universal Space Vector Digital Algorithm for Matrix Converters
This paper presents the synthesis of a dynamic space vector modulation for power matrix converters so that it is possible to implement a universal modulator that provides a control algorithm dynamically optimized according to the requirements for the matrix converter.
Read MoreGPSR+Predict: An Enhancement for GPSR to Make Smart Routing Decision by Anticipating Movement of Vehicles in VANETs
Vehicular ad-hoc networks (VANETs) are still more challenging to overcome even if they have been widely studied during the last decades. The routing mechanism is the essentially relevant issue in this field. Indeed, it must strictly to be adapted to specific and unique characteristics such as the high mobility of the vehicles, the dynamic nature…
Read MoreADOxx Modelling Method Conceptualization Environment
The importance of Modelling Methods Engineering is equally rising with the importance of domain specific languages (DSL) and individual modelling approaches. In order to capture the relevant semantic primitives for a particular domain, it is necessary to involve both, (a) domain experts, who identify relevant concepts as well as (b) method engineers who compose a…
Read MoreMedical imbalanced data classification
In general, the imbalanced dataset is a problem often found in health applications. In medical data classification, we often face the imbalanced number of data samples where at least one of the classes constitutes only a very small minority of the data. In the same time, it represent a difficult problem in most of machine…
Read More
