The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The problem of identifying dynamical models on the basis of measurement data is usually considered in a classical open-loop or closed-loop setting. In this paper this problem is generalized to linear dynamical systems that operate in a complex interconnection structure and the dynamical relationships between the measured variables signals need to be identified. It is shown that the classical Direct...
The subject of this paper is the homotopy continuation method (HCM) for solving basic motion planning problems. The validity of the HCM has been demonstrated for driftless control-affine systems belonging to a special class. In this paper, we study the validity of the HCM for control-affine systems with drift. A crucial step in the validation process is to establish a certain sublinear growth condition...
Module temperature and partial shading of a photovoltaic (PV) installation has an inconsistent impact on its power production. This paper presents solar array model and simulation of module temperature at the step of 25 °C. In this paper, the I–V equation for the PV module is solved by analyzing the effect of the series and parallel resistances on the resultant power of the PV generator. The simulations...
This paper presents a new approach for observer design for a class of nonlinear singular systems which can be transformed into a special normal form. The interest of the proposed form is to facilitate the observer synthesis for the studied nonlinear singular systems. Necessary and sufficient geometrical conditions are deduced in order to guarantee the existence of a diffeomorphism which transforms...
Sequential linear decompressors are inherently efficient and attractive for compressing test cubes with many don't cares. The test cubes are encoded by solving a system of linear equations. In continuous decompression, typically a fixed number of free variables are used to encode each test cube in a “one-size-fits-all” manner. The non-pivot free variables used in Gaussian elimination are wasted when...
One of the most important information in outdoor emergency rescue is the location of the trapped people. The more quickly and precisely the location can be determined, the more chance the victims can be saved. In this paper, an instantly deployable localization system is proposed, which takes the mobile phone carried by the trapped people as the localization carrier, and consists of several Portable...
This paper describes a method of whole body motion pattern generation for biped humanoid robots. The walking pattern is generated on the basis of preview control and compensatory motion control. It enables the robot to walk with arm swings. According to the waist motion, hand motion, and foot motion, the angles of the whole body are calculated by inverse kinematics. In order to verify the effectiveness...
The idea of using intelligent products to ensure an information continuum all along the product life cycle (PLC) is more and more shared today. However, it is not that easy to identify what information should be stored on the product. To answer this question, we propose a data dissemination process to select context-sensitive information from the database, that must be stored/replicated on the product...
Modified method for synthesis of broadband balancing transformer using three linked feeders is considered. Results of modeling balancing transformer with relative 80% pass band are presented.
This paper describes a new method and a set of equations for calculating the force-deflection characteristics of the catenary anchor leg. The traditional catenary equations reference horizontal deflection of the catenary top to the catenary generation point which is used to mathematically ?generate” the catenary curve shape. The catenary generation point is not stationary; its horizontal and vertical...
This paper describes practices of the Supplementary Instruction (SI) Problem-Solving Workshop in helping entering engineering students develop the concept of problem solving and obtain the necessary knowledge and skills required to succeed in their courses.
A new method of assessment is developed that comprehensively maps students' progress in a course. The technique involves the use of two grading rubrics measuring performance in technical and conceptual proficiency, respectively. With these rubrics, one can identify students' progress and learning more effectively and future activities can be adapted accordingly. This paper discusses the development...
In recent years, the Euler equations have been investigated extensively. This paper is concerned with the theoretical analysis of the solutions to a class of the Euler equations with damping. The derived analysis may be further extended to provide a basis for understanding the characteristics of the Euler equations with damping in a wider range of applications.
In software product lines, multiple products of a software product family, share source code of common components. New features added to the common components of a software product family, are integrated into products following a selective code integration process. Selective code integration is a process in which developers pick the commits (i.e., code changes) related to a feature from one code branch...
A secret key agreement setup between three users is considered in which each of the users 1 and 2 intends to share a secret key with user 3 and users 1 and 2 are eavesdroppers with respect to each other. The three users observe i.i.d. outputs of correlated sources and there is a generalized discrete memoryless multiple access channel (GDMMAC) from users 1 and 2 to user 3 for communication between...
Many programs access external data sources through generic APIs. The class hierarchy of such a generic API does not reflect the schema of any particular data source, and thus it is hard to clarify what data an API client accesses and how it obtains them. This makes it difficult to maintain the API clients. In this paper, we show that the data access of an API client can be recovered through static...
In this paper, we propose a unified framework OCTracker for tracking overlapping community evolution in online social networks. OCTracker adapts a preliminary community structure towards dynamic changes in social networks using a novel density-based approach for detecting overlapping community structures and automatically detects evolutionary events like birth, growth, contraction, merge, split, and...
The item response theory (IRT) gives us the valuable information about the difficulties of problems as well as the abilities of students, whereas the classical test method provides only the abilities of students with pre-determined scores to each problem. To enhance the use of the IRT, we have developed a concise IRT evaluation Web system via the drag-and-drop Excel file in which 0/1 scores of the...
Optical lenses with freeform surfaces possess good flexibility for design to generate diverse profiles of uniform illumination. However, most of the previous design formulation was applicable only for a single light source without offset. The formulation is extended for the applicability for multiple sources. The proposed approach requires designation of a freeform surface for multiple sources. The...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.