Browse

You are looking at 1 - 10 of 546 items for :

  • Information Technology x
Clear All
Open access

Zsolt Horváth and András Edelmayer

Abstract

The objective of this paper is solving of the Modified Filter Algebraic Riccati Equation (MFARE) for calculating of the filter gain. The results are used for model-based fault detection filtering of faults in the air path of diesel engines. The Hinfinity optimization approach requires the solution of a linear-quadratic optimization problem that leads to the solution of MFARE. In our paper two basic concepts for solving MFARE are examined, namely the analytically implemented gamma-iteration and casting the problem as a convex optimization problem based on Linear Matrix Inequalities (LMIs).

The algorithms are implemented in MATLAB. Each algorithm has to ensure the condition for a global convergence and also has to deliver an optimal solution. Not at least, the computational cost has to be as small as possible.

Open access

Albert-Zsombor Fekete, András Kelemen and László Jakab-Farkas

Abstract

The paper presents in detail a unique multilevel control architecture designed for the comprehensive management of the DC magnetron sputtering process and of all subsystems of the sputtering equipment. The ultimate goal is to increase the repeatability, stability and the controllability of the complex process. The presented topics include embedded and distributed electronics, data acquisition and supervisory control, networking, data management, redundant local and remote data-archiving. There are presented platform independent algorithms managing the data exchange between computational devices, and conclusions are drawn regarding the efficiency of the various algorithms used.

Open access

Áron Fehér and Dénes Nimród Kutasi

Abstract

In this work, an explicit Model Predictive Control algorithm is devised and compared to classical control algorithms applied to a series resonant DC/DC converter circuit. In the first part, a model of the converter as a hybrid system is created and studied. In the second part, the predictive algorithm is applied and tested on the model. Finally, the designed control algorithm is compared to classical PI and sliding mode controllers.

Open access

Mihály Varga and Zsolt Alfréd Polgár

Abstract

The goal of Radio Resource Management (RRM) mechanisms is to allocate the transmission resources to the users such that the transmission requests are satisfied while several constraints are fulfilled. These constraints refer to low complexity and power consumption and high spectral efficiency and can be met by multidimensional optimization. This paper proposes a Game Theory (GT) based suboptimal solution to this multidimensional optimization problem. The results obtained by computer simulations show that the proposed RRM algorithm brings significant improvement in what concerns the average delay and the throughput, compared to other RRM algorithms, at the expense of somewhat increased complexity.

Open access

Márton Máté and Dénes Hollanda

Abstract

Gear hobs are the most widely and frequently used gear cutting tools. During the time passed between the moment of invention (Schiele, 1876) and the present, gear hobs reached a considerable evolution regarding the geometry, the profile of the edge, the relieving technologies finalizing in the latest constructive and design solutions. This paper deals with the calculus of the edge profile in the case the basic worm of the hob has involute helicoid surfaces. In order to obtain a constant grinding allowance on the relief faces of the gear hob teeth it is necessary to compute the edge of the roughing relieving cutter. The equations are deduced considering that the provenience involute worm is a one teethed helical gear with shifted profile. The presented mathematical model proves that linearizing the relieving cutter profile is not an adequate solution if aspiring to higher precision.

Open access

Vivek Kaundal, Paawan Sharma and Manish Prateek

Abstract

The paper aims at localization of the anchor node (fixed node) by pursuit nodes (movable node) in outdoor location. Two methods are studied for node localization. The first method is based on LNSM (Log Normal Shadowing Model) technique to localize the anchor node and the second method is based on Hybrid TLBO (Teacher Learning Based Optimization Algorithm)- Unilateral technique. In the first approach the ZigBee protocol has been used to localize the node, which uses RSSI (Received Signal Strength Indicator) values in dBm. LNSM technique is implemented in the self-designed hardware node and localization is studied for Outdoor location. The statistical analysis using RMSE (root mean square error) for outdoor location is done and distance error found to be 35 mtrs. The same outdoor location has been used and statistical analysis is done for localization of nodes using Hybrid TLBO-Unilateral technique. The Hybrid- TLBO Unilateral technique significantly localizes anchor node with distance error of 0.7 mtrs. The RSSI values obtained are normally distributed and standard deviation in RSSI value is observed as 1.01 for outdoor location. The node becomes 100% discoverable after using hybrid TLBO- Unilateral technique.

Open access

Shruti Kalra and Amalendu B. Bhattacharyya

Abstract

Circuits operating in the subthreshold region are synonymous to low energy operation. However, the penalty in performance is colossal. In this paper, we investigate how designing in moderate inversion region recuperates some of that lost performance, while remaining very near to the minimum energy point. An power based minimum energy delay modeling that is continuous over the weak, moderate, and strong inversion regions is presented. The value of α is obtained through interpolation following EKV model. The effect of supply voltage and device sizing on the minimum energy and performance is determined. The proposed model is utilized to design a temperature to time generator at 32nm technology node as the application of the proposed model. The abstract goes here.

Open access

Marek Janiszewski

Abstract

The paper presents a set of concepts which can establish a basis for the creation of new evaluation model of trust and reputation management systems (TRM). The presented approach takes into account essential characteristics of such systems to provide an assessment of its robustness. The model also specifies measures of effectiveness of trust and reputation systems. There is still a need to create a comprehensive evaluation model of attacks on trust and reputation management systems and evaluation model of TRM systems itself, which could facilitate establishing a framework to deeply evaluate the security of existing TRM systems. We believe that this paper could be perceived as a small step forward towards this goal.