Results (2366)
Search Parameters:
Keyword: REA delay-dependent distributed SMC for stabilization of a networked robotic system exposed to external disturbances
In this paper, a delay-dependent controller based on the sliding mode concept is proposed to stabilize a networked robotic system in a decentralized synchronization scheme. In addition to being affected by communication time-delays between agents, and seen that external disturbances obviously affect any physical and dynamic system, an unsettling action resulting from measurement errors affects…
Read MoreDesign, Fabrication and Testing of a Dual-Range XY Micro-Motion Stage Driven by Voice Coil Actuators
Nowadays, compliant micro-motion stages offer high positioning accuracy and repeatability. When assembled with conventional stages, the resulting dual-range positioning systems allow for nanometer scale accuracy within a centimeter scale working area. However, such systems invoke a high cost and large footprint. This paper presents a low-cost, compact compliant XY micro-motion stage where dual-range manipulation has…
Read MoreRFID Antenna Near-field Characterization Using a New 3D Magnetic Field Probe
In this paper the design of a new 3D magnetic field (H-field) probe with a near-field scanning system is presented, then the near electromagnetic fields radiated by a Library RFID system is characterized. The proposed system is developed in order to determine the magnetic near-field emitted by electronic devices. The designed isotropic H-field probe consists…
Read MoreIntrusion detection in cloud computing based attack patterns and risk assessment
This paper is an extension of work originally presented in SYSCO CONF.We extend our previous work by presenting the initial results of the implementation of intrusion detection based on risk assessment on cloud computing. The idea focuses on a novel approach for detecting cyber-attacks on the cloud environment by analyzing attacks pattern using risk assessment…
Read MorePrincipal Component Analysis Application on Flavonoids Characterization
Flavonoid is one of the bioactive compounds that are currently used in pharmaceutical and medicinal industries due to their health benefit. The focus of current research is mainly on the extraction and isolation of bioactive compounds; however non to date has explored on the identification of flavonoids classes under the Fourier Transform Infrared spectroscopy (FTIR).…
Read MoreComputational Intelligence Methods for Identifying Voltage Sag in Smart Grid
In recent years pattern recognition of power quality (PQ) disturbances in smart grids has developed into crucial topic for system equipments and end-users. Undoubtedly analyzing the PQ disturbances develop and maintain smart grids effectiveness. Voltage sags are the most common events that affect power quality. These faults are also the most costly. This paper represents…
Read MoreFault Tolerant Inverter Topology for the Sustainable Drive of an Electrical Helicopter
The paper describes the results of the system analysis of various options of electric inverter topologies for the use in the traction drive of an electrical helicopter. The paper explains the optimal choice, in terms of the design requirements and future operational conditions, and the type and topology of the electric inverter to supply the…
Read MoreSecurity in SWIPT with Power Splitting Eavesdropper
Simultaneous wireless information and power transfer (SWIPT) has drawn significant research interest in recent years. In this paper, we investigate the information theoretic secrecy of a SWIPT system under Weibull fading channel. To be specific, we analyze the information security in the presence of an energy harvesting and information decoding eavesdropper. All links are subjected…
Read MoreSimulation and Implementation of Sensorless Control in Multi-Motors Electric Drives with High Dynamics
In this article we’ll tackle the control of multi-motors electric drives with high dynamic, with rapid changes in torque and speed, with rigid or flexible coupling of motors, where the control strategy is FOC (Field Oriented Control) for each drives and the distributed control in local network using the CANopen protocol. In the surface mining…
Read MoreAn Overview of Traceability: Towards a general multi-domain model
Traceability for some people, is merely a tool to keep a history over something important that happened in the past. For others, is has no added value to their actual processes or products. In fact, it is becoming more and more valued. Traceability is still a vast area of research and an undiscovered field that…
Read MoreThe Model of Adaptive Learning Objects for virtual environments instanced by the competencies
This article presents the instantiation of the Model of Adaptation of Learning Objects (MALO) developed in previous works, using the competencies to be developed in a given educational context. MALO has been developed for virtual environments based on an extension of the LOM standard. The model specifies modularly and independently two categories of rules, of…
Read MoreValidity of Mind Monitoring System as a Mental Health Indicator using Voice
We have been developing a method of evaluating the mental health condition of a person based on the sound of their voice. Currently, we have applied this technology to create a smartphone application that shows the vitality and the mental activity as mental health condition indices. Using voice to measure one’s mental health condition is…
Read MoreIndoor Mobile Robot Navigation in Unknown Environment Using Fuzzy Logic Based Behaviors
This paper presents the development and design of a methodology based on fuzzy logic to control an indoor mobile robot for a complete navigation in an unknown environment. The methodology incorporates two basic behaviors, namely: reaching the goal and avoiding obstacles. The obstacle avoidance behavior is treated using wall-following scheme based on an Interval Type-2…
Read MoreSolving the Capacitated Network Design Problem in Two Steps
In this paper, we propose a two steps-based algorithm to solve the modular link version of the Capacitated Network Design Problem (CNDP) which consists to determine the optimal network that guarantees the routing of a set of commodities. In our proposition, CNDP is divided into two sub-problems: Network Design problem (NDP) and Network Loading Problem…
Read MoreMatrix Encryption Scheme
In classical cryptography, the Hill cipher is a polygraphic substitution cipher based on linear algebra. In this work, we proposed a new problem applicable to the public key cryptography, based on the Matrices, called “Matrix discrete logarithm problem”, it uses certain elements formed by matrices whose coefficients are elements in a finite field. We have…
Read MoreValidity and efficiency of conformal anomaly detection on big distributed data
Conformal Prediction is a recently developed framework for reliable confident predictions. In this work we discuss its possible application to big data coming from different, possibly heterogeneous data sources. On example of anomaly detection problem, we study the question of saving validity of Conformal Prediction in this case. We show that the straight forward averaging…
Read MoreEnergy-Efficient Mobile Sensing in Distributed Multi-Agent Sensor Networks
In this paper, we exploit an integration between Compressive sensing (CS) and the random mobility of sensors in distributed mobile sensor networks (MSNs). A small number of distributed mobile sensors are deployed randomly in a sensing area to observe a large number of positions. The distributed mobile sensors sparsely sample the sensing area for data…
Read MoreMagnetically Levitated and Guided Systems
The paper describes the fundamentals of magnetic levitation technology. A general background of the magnetic levitation is given in this article, including applications of this technology, several comparisons with other types of technologies, the real stage of its development, etc. Further in the paper, the two main types of magnetically levitated systems are compared within…
Read MoreAnalysis of Fractional-Order 2xn RLC Networks by Transmission Matrices
In this study, a new method is devised and presented for the dynamic analysis of a 2xn RLC circuit network modeled with the fractional-order circuit elements. The analysis method is based on the principles of dynamic analysis with transfer function approximation. Firstly, the fractional-order 2xn RLC circuit network of interest which is divided into n…
Read MoreEnabling Toy Vehicles Interaction With Visible Light Communication (VLC)
An effective communication among the road users is crucial for safety precautions. Nowadays, a light emitting diode (LED) are commonly installed on a motor vehicle as the lighting system. The LED lights are more reliable and flexible in terms of the design and power adjustments. To further utilize the LED applications in a vehicular system,…
Read MorePulse Generator for Ultrasonic Piezoelectric Transducer Arrays Based on a Programmable System-on-Chip (PSoC)
This paper describes the design of a pulse generator to excite PZT and PVDF ultrasonic transducer arrays, based on the Programmable System-on-Chip (PSoC) module. In this module, using programmable logic different pulses were implemented; these pulses are required in ultrasonic applications for multiple channels to excite PZT and PVDF transducer arrays. To excite multiple elements,…
Read MoreToward Confirming a Framework for Securing the Virtual Machine Image in Cloud Computing
The concept of cloud computing has arisen thanks to academic work in the fields of utility computing, distributed computing, virtualisation, and web services. By using cloud computing, which can be accessed from anywhere, newly-launched businesses can minimise their start-up costs. Among the most important notions when it comes to the construction of cloud computing is…
Read MoreDesign of Petri Net Supervisor with 1-monitor place for a Class of Behavioral Constraints
This paper studies the design of supervisory controllers with a minimum number of monitor places for Manufacturing System modeled as safe Petri Nets. The proposed approach considers a class of safety specifications known as Behavioral Constraints with a restricted syntax. The set of Behavioral Constraints are represented as predicate logic formulas in normal conjunctive form.…
Read MoreA security approach based on honeypots: Protecting Online Social network from malicious profiles
In the recent years, the fast development and the exponential utilization of social networks have prompted an expansion of social Computing. In social networks users are interconnected by edges or links, where Facebook, twitter, LinkedIn are most popular social networks websites. Due to the growing popularity of these sites they serve as a target for…
Read MoreKinect-Based Moving Human Tracking System with Obstacle Avoidance
This paper is an extension of work originally presented and published in IEEE International Multidisciplinary Conference on Engineering Technology (IMCET). This work presents a design and implementation of a moving human tracking system with obstacle avoidance. The system scans the environment by using Kinect, a 3D sensor, and tracks the center of mass of a…
Read More
