The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Simulation is often used to evaluate the behaviour and measure the performance of computing systems. Specifically, in high-performance interconnection networks, the simulation has been extensively considered to verify the behaviour of the network itself and to evaluate its performance. In this context, network simulation must be fed with network traffic, also referred to as network workload, whose...
Evolution of information technologies and increased automation of manufacturing processes allow organizing the control of remote dynamic objects at real-time operation mode. The application of web-technology for organization of human machine interface makes it possible to conduct data-processing via local network and Internet. This paper is devoted to processes of identification of dynamic properties...
This paper mainly introduces OpenADR(Open automatic demand response) transfer agreement. At the same time, this paper will introduce a new concept of wireless transmission in this protocol. The thesis also introduces the contents of protocol, such as the transfer mechanism and interactive mode. In this article, we based on OMNeT + + software to simulate the protocol communication behavior.
This work presents development of a prototype for the automatic engraving machine. The proposed system controlled using computer, by setting drawing for engrave. Constructed prototype consists of XYZ coordinates table (working area), where XY for position in the engraving area and Z axis for establish little driller. Arduino board has been chosen as a controller. Movements of the machine are generated...
With the rapid development of the internet of things and intelligent manufacturing technology, the computer numerical controllers are required to reflect the running status of the manufacturing equipments, but the existing discrete manufacturing equipments and their control systems cannot extract, transport and process the running information, while the existing workshop management systems don't have...
The author has introduced a generic method for photogrammetric survey using a multi-rotor unmanned aerial vehicle (UAV) for mapping a simulated model and slope area. The objective of this study is to assess the capabilities of UAV for slope mapping. This study only concentrates on multi-rotor UAV, which is known as Hexacopter. Several ground control points (GCP) and checked point (CP) were established...
In order to realize the pressure energy harvesting of pneumatic system, a novel pneumatic-piezoelectric generator is proposed in this paper. The bending deformation of piezoelectric plate is induced under the impact of air supply pressure. The transformation from pressure energy to electric energy is realized based on direct piezoelectric effect. The simulation analysis of flow field distribution...
This article describes the development of software for control of factory floor production equipment which is developed in the eScop project (Embedded systems Service-based Control for Open manufacturing and Process automation). The software is running on a network of configurable embedded devices called RTUs (Remote Terminal/Telemetry Units) which are communicating with upper layers via RESTful web...
Early and reliable detection of a back-fed ground fault is of critical importance in the operation of a power distribution system. The operating distribution companies have been searching for a fully acceptable solution for decades. A current carrying conductor on the Earth ground that is not tripped by conventional protection systems presents a safety hazard for the general public. In this paper...
Petri nets are often used as a design tool amenable to model specification, simulation, and verification. They are typically used in the design phase often with no clear connection to the requirements phase, including requirements specification. This paper shows how a class of non-autonomous Petri Nets can be used as an executable model for the design and implementation of machine domains in the context...
Risk management is an important area in software engineering. An effective risk management process positively influences project success. ARMI is a physical card game which simulates risk management in software engineering. During the simulation, participants follow principles of risk management and aim to complete the cycles while economizing their expenses. ARMI 2.0 aims to improve shortcomings...
A novel high speed booth encoder is designed by utilizing a new truth table. The important advantage of this structure is its low delay with respect to the previously presented papers. Moreover, generating partial products and putting the partial products array in order are done at the same time. Simulation results applied to the Hspice software in TSMC 0.18μm technology proves that the total delay...
In Software Defined Networks (SDN), each flow table entry is dedicated to an individual flow and has an idle timeout value associated with it. Due to limited flow table and controller processing resources, SDN suffers from scalability problem especially when dealing with a large number of flows. As Instant Messaging (IM) applications usually generate too many different flows and idle timeout has effect...
Several areas of knowledge have become interested in simulators made using Virtual Reality (VR) because of the possibility of reducing risks, costs, etc. One of these areas is Medicine, which currently has a range of simulators for the practice of surgical procedures. A large number of components is required to assemble these simulators and the ability to simulate incisions in the models of the organs...
Service migration is an important approach for service availability and system survivability in a security incident. When a system is under attack and some platforms have been compromised, the services executed on those platforms must be migrated to other platforms in order for them to be continuously provided to users. Service migration strategy is the guideline and high-level decision regarding...
The steadily increasing complexity of integrated circuits raises the burden on verification engineers of sophisticated System on Chips (SoCs). Simulations and formal verification alone are not able to detect all problems in a design due to unforeseen interactions between modules. These problems may occur even if the modules are logically independent from each other due to physical effects. Bugs found...
Hardware-in-loop (HiL) simulation focuses on testing of Electronic Control Units (ECU) in virtual real time environment in order to scrutinize the behavior of controller under test. Use of HiL simulation in development process reduces time and cost involved in verification and validation of the ECU's development. Generally, HiL systems developed using dSPACE®, National Instruments® and other platforms...
Brain computer interface based functional electrical stimulation is a comparatively newer technique which is being used for rehabilitative and assistive technologies these days. This process needs precise calculations of relative factors and repetitive testing of those factors to provide approximate efficiency and stability. It is required to perform modelling and simulation of such systems in order...
As the high energy particles generated by laser-plasma interaction are widely used in laser fusion, accelerators, and medic al applications and so on, modeling and simulation technique s have been playing a more and more important role in research of laser-plasma interactions.
The vertiginous change in technologies and the increasing sophistication that cyber space present require organization and permanent preparation. However, time, education and training, results too short and not appropriate enough through traditional training methods. Training through simulation may offer proper preparation to fight against new threats that exist in this digital battlefield. The paper...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.