The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper examines the problem of generating testing actions for electronic industry test systems designed for verification of electronic packages of UHF band. This paper shows complex problems of setting amplitude and time parameters of multichannel generators of test signals. The problems of multichannel wide range signal generation and frequency control, rise and fall time control, pulse time...
Dataflow models of computation have early on been acknowledged as an attractive methodology to describe parallel algorithms, hence they have become highly relevant for programming in the current multicore processor era. While several frameworks provide tools to create dataflow descriptions of algorithms, generating parallel code for programmable processors is still sub-optimal due to the scheduling...
An accurate synchronization method for 5G channel measurement is proposed. This method provides stable and accurate (< 1 ns error) synchronized trigger signal to the transmitter and the receiver. Because this method does not need a long cable to provide the synchronized trigger signal, the setup for channel measurement is easy. A verification of a channel in a simple environment is measured. By...
Markov Chain Monte Carlo methods provide a tool for tackling high dimensional problems. With many-core systems readily available today, it is no surprise that leveraging parallelism in these samplers has been a subject of recent research. The focus has been on solutions for shared-memory architectures, however these perform poorly in a distributed-memory environment. This paper introduces a fully...
In this paper, we give a construction of optimal sets of N-ary perfect sequences of period N, where N a positive odd integer. For this, we first re-define generators, perfect generators, and optimal generators which were originally defined for odd prime lengths by Park, Song, Kim, and Golomb in 2016. Based on this, we propose a construction of optimal generators of odd lengths by using optimal generators...
Conventional approach of power system transient stability analysis use time-domain simulation and detailed system information. Recent efforts on non-uniform Kuramoto oscillators and basin stability have revealed new ways to address stability problems on power systems. In this paper, we introduce a method that can quantify how likely a generator remains synchronized after a disturbance. We show that...
A method to synchronize a group of microcontrollers with different clock frequencies of their own generator is proposed. The algorithm of each microcontroller operation in the group and the block diagram of the group consisting of N microcontrollers are presented. Timing diagrams of signals of synchronous operation and clock pulses of the microcontrollers group are given. The result of the work, at...
IEEE1588 (PTP: Precise Time Protocol), which aims for the sub-microsecond range of clock synchronization in a minimal network, is currently focused on highly precise clock synchronization. Boundary Clock (BC) and VLAN Priority are considered to be features that improve PTP accuracy. Although some papers addressed the accuracy, these evaluations were realized using different evaluation metrics and...
In the report signal and code constructions (SCC) on the basis of continuous phase frequency shift key (CPFSK-64, CPFSK-256, CPFSK-1024) using low-speed turbo codes are provided. In the course of simulation program models of the modulator, demodulator, coder and decoder on a high-level language C++ were developed for application in system of simulation modeling of the digital communication systems...
In this study a numerical cryptanalysis of a random number generator (RNG) which is built on a continuous-time chaotic oscillator is introduced. In order to scrutinize the security weaknesses of the RNG, a master-slave synchronization approach is presented as the basis of an attack scheme. By proposing this attack scheme, it is aimed to verify whether there exist any possibility to divulge the hidden...
In this paper, we aim to investigate the output group consensus problem for a switching network of heterogeneous linear systems such that outputs of the agents synchronize with each other in every cluster. From the internal model principle perspective, a necessary condition is first derived in terms of the system dynamics. With this necessary condition, a dynamic controller is then designed to solve...
This paper presents a deterministic unified unit commitment and economic dispatch model that integrates storage devices in the short-term power system scheduling under high renewable energy penetration. The presented model is a single multi-hour look-ahead real time tool that uses multiple time resolution to reduce its computational requirements. Operating on a rolling basis, the decisions of the...
Traction application inverter runs in very low switching frequency to reduce switching losses, whereas in case of PMSM as traction applications, there is not a the whole speed range strategy can not only achieve synchronized SVPWM modulation but also transit to six-step mode. Based on zero-sequence voltage injection SVPWM, synchronized modulation and over-modulation methods, this paper put forward...
The approach of programmed trajectory motion control (PTMC) is proposed for stabilization of synchronous generators after short-circuit faults followed by islanding and for further synchronization of islanded system with the main grid. This approach is especially useful for small size synchronous machines connected to distribution grid. Integrated solution of both stabilization and synchronization...
A major limitation in authenticating passive and remotely powered sensors, tags and cards (for e.g. radio-frequency identification tags or credit cards) is that these devices do not have access to a continuously running system clock. This obviates the use of SecureID type authentication techniques involving random keys and tokens that need to be periodically generated and synchronized. In this paper...
Multi-resource arbitration is used where interchangeable resources need to be assigned among a number of client users. An efficient arbiter is thus critical to manage these shared resources. There has been only limited prior research on efficient asynchronous solutions, which have mainly focused on serial approaches. In this paper, a new high-throughput multi-resource arbiter is proposed, based on...
In this paper, recurrent neural networks (RNNs) are used in combination with phasor measurement units (PMUs) to predict the critical clearing time of a multi-machine power system in real-time. RNNs make use of real-time data from Phasor Measurement Unit (PMU). Simulation results are presented to show the effectiveness of the proposed approach in predicting the critical clearing time.
In this paper a numerical study of harmonic and chaotic oscillators synchronization is presented. Disturbed path of synchronization signal was simulated. Experiments show that chaotic systems couple is more sensitive to disturbances of any shape, that makes an exploitation of chaotic oscillations prospective for sensors construction.
In this work, numerical cryptanalysis of a random number generator (RNG) designed using a continuous time chaotic oscillator is presented. For the purpose of examining the vulnerabilities of the RNG, a master-slave synchronization approach was presented as a basis for an attack scheme. By suggesting this attack scheme, we intend to verify whether there is the possibility of revealing the secret information...
This paper proposes a hybrid sorted table design for minimizing electronic trading latency, with three main contributions. First, a hierarchical sorted table with two levels, a fast cache table in reconfigurable hardware storing megabytes of data items and a master table in software storing gigabytes of data items. Second, a full set of operations, including insertion, deletion, selection and sorting,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.