Results (2349)
Search Parameters:
Keyword: ARSignal-Based Metamodels for Predictive Reliability Analysis and Virtual Testing
In the current industrial development, an increasing number of sensors is applied for monitoring of any kind of appliances and machines. A predictive mathematical model allows for realistic assessment of the health state of the appliance, indication of service requirements, as well as control of the appliance, serving as so-called digital twin on a control…
Read MoreMission Profile Analysis of a SiC Hybrid Module for Automotive Traction Inverters and its Experimental Power-loss Validation with Electrical and Calorimetric Methods
This paper investigates the efficiency benefits of replacing the Silicon diodes of a commercial IGBT module for the main inverter application of an electric vehicle with Silicon Carbide diodes, leaving the package, operating conditions and the system unchanged. This ensures that the comparison is directly between the chip technologies without any scope for discrepancies arising…
Read MoreSimulation and FPGA Implementation of a Ring Oscillator Sensor for Complex System Design
This paper, presents the design of a temperature sensor based on RO (Ring Oscillator) in order to make a thermal study for the detection and localization of thermal peaks in a complex system. In this work, a simulation and FPGA implementation of a fully digital temperature sensor features a number of exact inverters that can…
Read MoreThe Use of LMS AMESim in the Fault Diagnosis of a Commercial PEM Fuel Cell System
The world’s pollution rates have been increasing exponentially due to the many reckless lifestyle practices of human beings as well as their choices of contaminating power sources. Eventually, this lead to a worldwide awareness on the risks of those power sources, and in turn, a movement towards the exploration and deployment of several green technologies…
Read MoreStabilization of constrained uncertain systems by an off-line approach using zonotopes
In this paper, stabilization of uncertain systems was established using zonotopic sets. The obtained state feedback control laws are computed by an off-line approach reducing computational burdens. The resolution of a robust model predictive control (MPC) allows computing a sequence of state feedback control laws corresponding to a sequence of zonotopic invariant sets. The implemented…
Read MoreA Survey of Security Challenges in Internet of Things
Internet of things (IoT) is an innovative technology subject to all kind of imaginary and science fictional solutions. Dreams and speculations are still possible about it. A technology combining real life objects and virtual life (Internet) is indeed a fertile pitch of fantasy and original ideas. However, IoT has in practice to face several challenges…
Read MoreShort CCA-Secure Attribute-Based Encryption
Chosen-ciphertext attacks (CCA) are typical threat on public-key encryption schemes. We show direct chosen-ciphertext security modification in the case of attribute-based encryption (ABE), where an ABE scheme secure against chosen-plaintext attacks (CPA) is converted into an ABE scheme secure against CCA by individual techniques. Our modification works in the setting that the Diffie-Hellman tuple to…
Read MoreMeasuring modifiability in model driven development using object oriented metrics
Model driven development is an important role in software engineering. It consists of multiple transformation functions. This development is a paradigm for writing and implementing computer program quickly, effectively, at minimum cost and reducing development efforts because it transforms design model to object-oriented code. Our approach is rule-based model driven development in which textual Umple…
Read MoreApproximate method of analysis of log-periodic antennas with in-phase currents
Log-periodic antennas have high electrical characteristics over a wide frequency range. The large length of the antennas is their significant disadvantage caused by the fact that each active region consisting of several radiators operates in a narrow frequency range. To extend this range, it is proposed to use radiators with concentrated capacitive loads, providing in-phase…
Read MoreMedium Voltage Microgrid Test Setup and Procedures Implemented on a Real Pilot Project
This paper presents various concepts related to the application of a microgrid pilot project in a residential condominium at Fortaleza / CE – Brazil, such as battery energy system, renewable and distributed generation, islanding recloser and all different units using interface based on power electronics. This papers main objective is to create information about microgrid…
Read MoreDomain Independent Feature Extraction using Rule Based Approach
Sentiment analysis is one of the most popular information extraction tasks both from business and research prospective. From the standpoint of research, sentiment analysis relies on the methods developed for natural language processing and information extraction. One of the key aspects of it is the opinion word lexicon. Product’s feature from online reviews is an…
Read MoreEffective Thermal Analysis of Using Peltier Module for Desalination Process
The key objective of this study is to analyse the heat transfer processes involved in the evaporation and condensation of water in a water distillation system employing a thermoelectric module. This analysis can help to increase the water production and to enhance the system performance. For the analysis, a water distillation unit prototype integrated with…
Read MoreDevelopment of Indicators for Technical Condition Indexing of Power Transformers
Reliable operation of a power transformer with a certain load depends on the technical condition of individual construction parts and the ability to prevent defects that can cause a failure. During the lifecycle of a transformer, valuable data is constantly accumulated, which forms the basis for technical or risk assessment of the equipment. Therefore it…
Read MoreAlgorithms for Technical Integration of Virtual Power Plants into German System Operation
This paper critically evaluates the operational perspective of Virtual Power Plants (VPP) in Germany by analyzing key factors to replace conventional power plants in the future power system. Therefore, its necessity for the secure operation as well as the technical and economic benefits for the German power system are pointed out. The single sections describe…
Read MoreModelling of the resistance heating of the moving molybdenum sheet
This article describes the modeling procedure of a direct resistive heat model of the molybdenum sheet and its simulation with electrodes made from various materials. The main characteristic of the proposed model is its dynamic behavior, because model considers the movement of the molybdenum sheet. The simulation results are mutually compared and the optimal material…
Read MoreImpact of Crosstalk on Signal Integrity of TSVs in 3D Integrated Circuits
Through-Silicon-Vias (TSVs) are utilized for high density 3D integration, which induce crosstalk problems and impact signal integrity. This paper focuses on TSV crosstalk characterization in 3D integrated circuits, where several TSV physical and environmental configurations are investigated. In particular, this work shows a detailed study on the influence of signal-ground TSV locations, distances and their…
Read MoreDesign and Simulation of an RF-MEMS Switch and analysis of its Electromagnetic aspect in realtion to stress
Microelectromechanical Systems (MEMS) are devices made up of several electrical and mechanical components. They consist of mechanical functions (sensing, thermal, inertial) and electrical functions (switching, decision making) on a single chip made by microfabrication methods. These chips exhibit combined properties of the two functions. The size of system has characteristic dimensions less than 1mm but…
Read MoreNumerical Solution of Fuzzy Differential Equations with Z-numbers using Fuzzy Sumudu Transforms
The uncertain nonlinear systems can be modeled with fuzzy differential equations (FDEs) and the solutions of these equations are applied to analyze many engineering problems. However, it is very difficult to obtain solutions of FDEs. In this paper, the solutions of FDEs are approximated by utilizing the fuzzy Sumudu transform (FST) method. Here, the uncertainties…
Read MoreFramework for the Formal Specification and Verification of Security Guidelines
Ensuring the compliance of developed software with general and application-specific security requirements is a challenging task due to the lack of automatic and formal means to lead this verification. In this paper, we present our approach that aims at integrating the formal specification and verification of security guidelines in early stages of the development lifecycle…
Read MoreVirtual Memory Introspection Framework for Cyber Threat Detection in Virtual Environment
In today’s information based world, it is increasingly important to safeguard the data owned by any organization, be it intellectual property or personal information. With ever increasing sophistication of malware, it is imperative to come up with an automated and advanced methods of attack vector recognition and isolation. Existing methods are not dynamic enough to…
Read MoreNonresonance between the first two Eigencurves of Laplacian for a Nonautonomous Neumann Problem
We consider the following Neumann elliptic problem \( \left\{ \begin{array}{rl} -\Delta u =\alpha\,m_{1}(x)\,u+m_{2}(x)\,g(u)+h(x)\quad & in \: \Omega,\\ \quad\\ \frac{\partial u}{\partial\nu} = 0\qquad\qquad\qquad\qquad\qquad\qquad\quad& on\: \partial\Omega. \end{array} \right. \) By means of Leray-Schauder degree and under some assumptions on the asymptotic behavior of the potential of the nonlinearity g, we prove an existence result for our equation…
Read MoreExistence and Boundedness of Solutions for Elliptic Equations in General Domains
This article is devoted to study the existence of solutions for the strongly nonlinear \(p(x)\)-elliptic problem: \(- \Delta_{p(x)} (u) + \alpha_0 |u|^{p(x)-2}u = d(x)\frac{|\nabla u|^{p(x)}}{|u|^{p(x)}+1} + f- div g(x) \quad \text{in } \Omega, \) \(u \in W_0^{1,p(x)}(\Omega), \) Where \(\Omega\) is an open set of \(\mathbb{R}^N\), possibly of infinite measure, we will also give some…
Read MoreS-asymptotically w-periodic solutions in the p-th mean for a Stochastic Evolution Equation driven by Q-Brownian motion
In this paper, we study the existence (uniqueness) and asymptotic stability of the p-th mean S-asymptotically !-periodic solutions for some nonautonomous Stochastic Evolution Equations driven by a Q-Brownian motion. This is done using the Banach fixed point Theorem and a Gronwall inequality.
Read MoreGroup law and the Security of elliptic curves on \(F_p[e_1,...,e_n]\)
In this paper, we study the elliptic curve \(E_{a,b}(A_P)\), with \(A_P\) the localization of the ring \(A=F _p[e_1,...,e_n]\) where \(e_ie_i=e_i\) and \(e_ie_j=0\) if \(i\neq j\), in the maximal ideal \(P=(e_1,...,e_n)\). Finally we show that \( \text{Card}(E_{a,b}(A_P)) \geq (\text{Card}(E_{a,b}(F_p)) - 3)^n + \text{Card}(E_{a,b}(F_p)) \) and the execution time to solve the problem of discrete logarithm in \(E_{a,b}(A_P)\)…
Read MoreA new color image encryption algorithm based on iterative mixing of color channels and chaos
In this paper, we present a novel secure cryptosystem for direct encryption of color images, based on an iterative mixing spread over three rounds of the R, G and B color channels and three enhanced chaotic maps. Each round includes an affine transformation that uses three invertible matrices of order 2 _ 2; whose parameters…
Read More
