Academic literature on the topic 'Control toolbox (Computer file)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Control toolbox (Computer file).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Control toolbox (Computer file)"

1

Shri, Shaima Hamdan, and Ayad Fadhil Mijbas. "Chaotic theory incorporated with PSO algorithm for solving optimal reactive power dispatch problem of power system." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 3 (June 1, 2021): 1739. http://dx.doi.org/10.11591/ijeecs.v22.i3.pp1739-1747.

Full text
Abstract:
In this paper, the chaotic particle swarm optimization (CPSO) algorithm is combined with MATPOWER toolbox and used as an optimization tool for attaining solving the optimal reactive power dispatch (RPD) problem, by finding the optimal adjustment of reactive power control variables like a voltage of generator buses (VG), capacitor banks (QC) and transformer taps (Tap) while satisfying some of equality and inequality constraints at the same time. CPSO and Simple PSO algorithms will be checked in a large system such as IEEE node -118. CPSO and Simple PSO algorithms have been implemented and simulated in the MATLAB program, version (R2013b/m-file). Then compassion these results with the results obtained in the other algorithms in the literature like the comprehensive learning particle swarm optimization (CLPSO) algorithm. The simulation results confirm that the CPSO algorithm has high efficiency and ability in terms of decrease real power losses (P loss), and improve voltage profile compared with the obtained by using the simple (PSO) algorithm and (CLPSO) at light load.
APA, Harvard, Vancouver, ISO, and other styles
2

Peditto, Matteo, Riccardo Nucera, Erasmo Rubino, Antonia Marcianò, Marco Bitto, Antonio Catania, and Giacomo Oteri. "Improving Oral Surgery: A Workflow Proposal to Create Custom 3D Templates for Surgical Procedures." Open Dentistry Journal 14, no. 1 (February 14, 2020): 35–44. http://dx.doi.org/10.2174/1874210602014010035.

Full text
Abstract:
Background: Computer-guided technologies are adopted in various fields of surgery to limit invasiveness and obtain patient benefits in terms of surgery duration and post-operative course. Surgical templates realized through CAD/CAM technologies are widely diffused in implant dentistry. The aim of this work is to propose, beyond implantology, the feasibility of application of 3D printed surgical templates in oral surgery procedures requiring osteotomies (like maxillary cyst enucleation and tooth disimpaction) in order to obtain accurate surgeries, avoid anatomical damage of surrounding structures and decrease patient’s morbidity, using a simple, low-cost protocol of fabrication. Objective: To provide a reliable CAD-CAM workflow for the realization of surgical templates in oral surgery. Methods: Three clinical scenarios are described: A maxillary canine disimpaction, a mandibular cyst removal, and an orthodontic miniscrew placement. Each one was managed using custom surgical templates realized using the proposed workflow. A Stereolithography (STL) file of maxillary structures was obtained by the use of a 3D medical image processing software (Materialise Mimics 20.0) a segmentation toolbox acquiring RX volumes by Cone-Beam Computed Tomography (CBCT). Digital models of the teeth, acquired as STL files directly, are imported in the same 3D medical image processing freeware (Materialise Mimics 20.0) to merge STL files of maxillary structures and teeth. Data are transported into Blue Sky Plan 4.0 (Blue Sky Bio, LLC), a software for 3D implant guides fabrication, together with the DICOM images package of maxillary volumes to carry out the pre-surgical treatment planning. Anatomical structures at risk are identified; a contour of ideal incision shape and bone osteotomy extent is drawn. Finally, the resulting three-dimensional guide is digitally generated and the surgical guide printed. The resulting 3D template shows the following major features: teeth support, flap management and bone osteotomy design. Results: The proposed work-flow aided the surgeon in both pre-operative and intra-operative work phases through accurate virtual planning and the fabrication of precise surgical guides to be used in oral surgery practice. In each clinical scenario, the use of custom 3D templates allowed better control of the osteotomy planes and flap management. No adverse events occurred during both surgical and healing phases. Conclusion: The proposed digital workflow represents a reliable and straightforward way to produce a surgical guide for oral surgery procedures. These templates represent a versatile tool in maxillary cyst enucleations, tooth disimpaction, and other surgical procedures, increasing accuracy, minimizing surgical complications, and decreasing patient’s morbidity.
APA, Harvard, Vancouver, ISO, and other styles
3

Jurczak, Mateusz, and Jakub Młyńczak. "Method for automation of generation of interlocking tables for station traffic control devices." WUT Journal of Transportation Engineering 131 (December 1, 2020): 45–58. http://dx.doi.org/10.5604/01.3001.0014.8100.

Full text
Abstract:
On account of the growing number of railway upgrading projects implemented in Poland, numerous problems are emerging when prepared and performed. While preparing detailed plans and specifications for railway traffic control devices intended to secure traffic at a railway station, one must deal with numerous alterations related to the work's phasing directly linked with the said equipment. Consequently, the variety of elements subject to change includes the schematic plan and the relevant interlocking tables for railway traffic control systems. This article aims to discuss the authors’ original method for automation of the generation of interlocking tables for station traffic control equipment. The solution to the problem in question is assumed to be a model consisting of two components. One of them is the design part identifying individual objects comprising the railway station being designed. Subsequently, by the application of adequate algorithms, data are implemented in the other model component. Further calculations are performed to generate a list of all possible movements from main signals and shunting signals at the station referred to as railway routes. The method has been verified using the authors’ original computer program. Its first part corresponds to the design process. The station’s track layout is built using the program’s dedicated toolbar combined with an additional database of layers created in computer-aided design software. Next, such a track layout, saved into a dxf file, is imported to a dedicated application where train and shunting routes are generated. The method is verified by checking the routes thus generated against those in the existing interlocking tables by applying an adequate significance indicator. Assuming that the design process's basic assumptions are satisfied, the method in question makes it possible to accelerate the generation of interlocking tables in a secure manner.
APA, Harvard, Vancouver, ISO, and other styles
4

Kučera, Vladimír. "H 2 Optimal Computer Control: Polynomial Toolbox." IFAC Proceedings Volumes 34, no. 22 (November 2001): 123–27. http://dx.doi.org/10.1016/s1474-6670(17)32924-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gupta, Anand K., Ramesh P. Rudra, Bahram Gharabaghi, Prasad Daggupati, Gary Parkin, Pradeep K. Goel, and Rituraj Shukla. "CoBAGNPS: A Toolbox to Estimate Sediment Removal Efficiency of WASCoBs–Pipe Risers and Blind Inlets." Environment and Natural Resources Research 8, no. 3 (September 19, 2018): 84. http://dx.doi.org/10.5539/enrr.v8n3p84.

Full text
Abstract:
Water and Sediment Control Basin (WASCoB) is an important BMP constructed along concentrated flow-paths (gullies etc.) to control the movement of water and sediment within a watershed. A WASCoB constitutes of a berm, surface inlets, and a drainage pipe to route water into a ditch. Direct runoff ponded behind the berm is routed through surface inlets into an underground drainage pipe. Therefore, surface inlets are an exceedingly important constituent of a WASCoB. Further pipe risers and blind inlets are the two most common type of surface inlets used. Therefore, maximum sediment removal efficiency of WASCoBs at a watershed-scale can be attained by the appropriate selection of a surface inlet, since the efficiency of a WASCoB is greatly impacted by the quantity of runoff and sediment leaving the surface inlet. In this study a toolbox was developed viz., CoBAGNPS to compute the sediment removal efficiency of pipe risers and blind inlets. A watershed-scale model (AGNPS) was integrated within the toolbox. Output files of the AGNPS model are fed as input files into the toolbox where a sediment routing module is programmed separately for pipe risers and blind inlets to obtain the sediment removal efficiency for each type of surface inlet. Further, the sediment routing module programmed for blind inlets integrates the AGNPS model with the HYDRUS 1-D model. The toolbox developed was applied to the Gully Creek watershed in Ontario, and the sediment load routed through pipe risers and blind inlets were compared.
APA, Harvard, Vancouver, ISO, and other styles
6

da Silveira Serafim, Vinı́cius, and Raul Fernando Weber. "Restraining and repairing file system damage through file integrity control." Computers & Security 23, no. 1 (February 2004): 52–62. http://dx.doi.org/10.1016/s0167-4048(04)00066-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Verbandt, Maarten, Laurens Jacobs, Dora Turk, Taranjitsingh Singh, Jan Swevers, and Goele Pipeleers. "Linear Control Toolbox - supporting B-splines in LPV control." Mechatronics 52 (June 2018): 78–89. http://dx.doi.org/10.1016/j.mechatronics.2018.04.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Corke, P. I. "The machine vision toolbox - A MATLAB toolbox for vision and vision-based control." IEEE Robotics & Automation Magazine 12, no. 4 (December 2005): 16–25. http://dx.doi.org/10.1109/mra.2005.1577021.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Solnør, Petter. "A Cryptographic Toolbox for Feedback Control Systems." Modeling, Identification and Control: A Norwegian Research Bulletin 41, no. 4 (2020): 313–32. http://dx.doi.org/10.4173/mic.2020.4.3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Börlin, N., A. Murtiyoso, and P. Grussenmeyer. "IMPLEMENTING FUNCTIONAL MODULARITY FOR PROCESSING OF GENERAL PHOTOGRAMMETRIC DATA WITH THE DAMPED BUNDLE ADJUSTMENT TOOLBOX (DBAT)." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLII-2/W17 (November 29, 2019): 69–75. http://dx.doi.org/10.5194/isprs-archives-xlii-2-w17-69-2019.

Full text
Abstract:
Abstract. The Damped Bundle Adjustment Toolbox (DBAT) is a free, open-source, toolbox for bundle adjustment. The purpose of DBAT is to provide an independent, open-source toolkit for statistically rigorous bundle adjustment computations. The capabilities include bundle adjustment, network analysis, point filtering, forward intersection, spatial intersection, plotting functions, and computations of quality indicators such as posterior covariance estimates and parameter correlations. DBAT is written in the high-level Matlab language and includes several processing example files. The input formats have so far been restricted to PhotoModeler export files and Photoscan (Metashape) native files. Fine-tuning of the processing has so far required knowledge of the Matlab language.This paper describes the development of a scripting language based on the XML (eXtensible Markup Language) language that allow the user a fine-grained control over what operations are applied to the input data, while keeping the needed programming skills at a minimum. Furthermore, the scripting language allows a wide range of input formats. Additionally, the XML format allows simple extension of the script file format both in terms of adding new operations, file formats, or adding parameters to existing operations. Overall, the script files will in principle allow DBAT to process any kind of photogrammetric input and should extend the usability of DBAT as a scientific and teaching tool for photogrammetric computations.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Control toolbox (Computer file)"

1

Tang, Wai-hung, and 鄧偉雄. "An anonymity scheme for file retrieval systems." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2008. http://hub.hku.hk/bib/B40887972.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mazières, David (David Folkman) 1972. "Security and decentralized control of the SFS global file system." Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/43610.

Full text
Abstract:
Thesis (M.S.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1997.
Includes bibliographical references (p. 47-53).
SFS (secure file system) is a global file system designed to be secure against all active and passive network attacks, provide a single namespace across all machines in the world, and avoid any form of centralized control. Using SFS, any unprivileged user can access any file server in the world securely and with no prior arrangement on the part of system administrators. New file servers are immediately accessible securely by all client machines. Users can name such new servers from any existing file system by specifying public keys in symbolic links. A prototype implementation of SFS installs easily, coexists with other file systems, and should port trivially to most UNIX platforms. Preliminary performance numbers on application benchmarks show that, despite its use of encryption and user-level servers, SFS delivers performance competitive with an in-kernel NFS implementation.
by David Mazières.
M.S.
APA, Harvard, Vancouver, ISO, and other styles
3

Leung, Ka-ho Andrew. "Localized topology control in wireless peer-to peer file sharing networks." Click to view the E-thesis via HKUTO, 2005. http://sunzi.lib.hku.hk/hkuto/record/B32048208.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Leung, Ka-ho Andrew, and 梁嘉浩. "Localized topology control in wireless peer-to peer file sharing networks." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2005. http://hub.hku.hk/bib/B32048208.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Merritt, John W. "Distributed file systems in an authentication system." Thesis, Kansas State University, 1986. http://hdl.handle.net/2097/9938.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Faltemier, Timothy Collin. "A groupware interface to a shared file system." Texas A&M University, 2004. http://hdl.handle.net/1969.1/1352.

Full text
Abstract:
Current shared file systems (NFS and SAMBA) are based on the local area network model. To these file systems, performance is the major issue. However, as the Internet grows, so does the distance between users and the Local Area Network. With this increase in distance, the latency increases as well. This creates a problem when multiple users attempt to work in a shared environment. Traditionally, the only way to collaborate over the Internet required the use of locks. These requirements motivated the creation of the State Difference Transformation algorithm that allows users non-blocking and unconstrained interaction across the Internet on a tree based structure. Fine Grain Locking, on the other hand, allows a user the ability to set a lock on a character or range of characters while using a form of the transformation algorithm listed above. This thesis proposes an implementation that integrates these two technologies as well as demonstrating the effectiveness and flexibility of State Difference Transformation. The implementation includes two applications that can be used to further research in both the transformation and locking communities. The first application allows users to create tests for SDT and Fine Grain Locking and verify the correctness of the algorithms in any given situation. The second application then furthers this research by creating a real-world groupware interface to a shared file system based on a clientserver architecture. This implementation demonstrates the usability and robustness of these algorithms in real world situations.
APA, Harvard, Vancouver, ISO, and other styles
7

Chung, Jae Won. "Congestion control for streaming media." Link to electronic thesis, 2005. http://www.wpi.edu/Pubs/ETD/Available/etd-081805-084831/.

Full text
Abstract:
Dissertation (Ph.D.) -- Worcester Polytechnic Institute.
Keywords: streaming media; streaming transport protocol; active queue management (AQM); Internet congestion control. Includes bibliographical references (p. 236-248).
APA, Harvard, Vancouver, ISO, and other styles
8

Beedu, Atul. "Integrated inventory control to manage blanket orders in a contract manufacturing environment a case study /." Diss., Online access via UMI:, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Perera, Dinesh Sirimal. "Design metrics analysis of the Harris ROCC project." Virtual Press, 1995. http://liblink.bsu.edu/uhtbin/catkey/935930.

Full text
Abstract:
The Design Metrics Research Team at Ball State University has developed a quality design metric D(G), which consists of an internal design metric Di, and an external design metric De. This thesis discusses applying design metrics to the ROCC-Radar On-line Command Control project received from Harris Corporation. Thus, the main objective of this thesis is to analyze the behavior of D(G), and the primitive components of this metric.Error and change history reports are vital inputs to the validation of design metrics' performance. Since correct identification of types of changes/errors is critical for our evaluation, several different types of analyses were performed in an attempt to qualify the metric performance in each case.This thesis covers the analysis of 666 FORTRAN modules with approximately 142,296 lines of code.
Department of Computer Science
APA, Harvard, Vancouver, ISO, and other styles
10

Bhargava, Manjari. "Analysis of multiple software releases of AFATDS using design metrics." Virtual Press, 1991. http://liblink.bsu.edu/uhtbin/catkey/834502.

Full text
Abstract:
The development of high quality software the first time, greatly depends upon the ability to judge the potential quality of the software early in the life cycle. The Software Engineering Research Center design metrics research team at Ball State University has developed a metrics approach for analyzing software designs. Given a design, these metrics highlight stress points and determine overall design quality.The purpose of this study is to analyze multiple software releases of the Advanced Field Artillery Tactical Data System (AFATDS) using design metrics. The focus is on examining the transformations of design metrics at each of three releases of AFATDS to determine the relationship of design metrics to the complexity and quality of a maturing system. The software selected as a test case for this research is the Human Interface code from Concept Evaluation Phase releases 2, 3, and 4 of AFATDS. To automate the metric collection process, a metric tool called the Design Metric Analyzer was developed.Further analysis of design metrics data indicated that the standard deviation and mean for the metric was higher for release 2, relatively lower for release 3, and again higher for release 4. Interpreting this means that there was a decrease in complexity and an improvement in the quality of the software from release 2 to release 3 and an increase in complexity in release 4. Dialog with project personnel regarding design metrics confirmed most of these observations.
Department of Computer Science
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Control toolbox (Computer file)"

1

Frederick, Dean K. Feedback control problems: Using MATLAB and the Control System Toolbox. Pacific Grove, CA: Brooks/Cole, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Frederick, Dean K. Feedback control problems: Using MATLAB and the control system toolbox. Boston: PWS Pub. Co., 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cavallo, Alberto. Using MATLAB, SIMULINK, and Control Toolbox: A practical approach. London: Prentice Hall, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Negus, Chris. BSD UNIX Toolbox. New York: John Wiley & Sons, Ltd., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Myer, Thomas. MAC OS X UNIX Toolbox. New York: John Wiley & Sons, Ltd., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

International, Borland. Turbo graphix toolbox: Version 1.0 : owner's handbook. Scotts Valley, CA: Borland International, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Advanced Turbo Pascal: Now includes Borland's Turbo Pascal database toolbox and Turbo Pascal graphix toolbox. Berkeley, Calif: Osborne McGraw-Hill, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Schildt, Herbert. Advanced Turbo Pascal version 4: Now includes Borland's Turbo Pascal Database Toolbox and Turbo Pascal Graphix Toolbox. Berkeley, Calif., U.S.A: Osborne McGraw-Hill, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hunt, William James. The C toolbox. Reading, Mass: Addison Wesley, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Aladʹev, V. Z. Systems of computer algebra: New software toolbox for Maple. Tallinn: International Academy of Noosphere, the Baltic Branch, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Control toolbox (Computer file)"

1

Weik, Martin H. "job recovery control file." In Computer Science and Communications Dictionary, 847. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_9702.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Moyer, Steven A., and V. S. Sunderam. "Scalable Concurrency Control for Parallel File Systems." In The Kluwer International Series in Engineering and Computer Science, 225–43. Boston, MA: Springer US, 1996. http://dx.doi.org/10.1007/978-1-4613-1401-1_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tian, Liye, Xing Rong, and Tingting Liu. "Design and Implementation of Linux File Mandatory Access Control." In Communications in Computer and Information Science, 15–22. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35211-9_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kohana, Masaki, Hiroki Sakaji, Akio Kobayashi, and Shusuke Okamoto. "File Assignment Control for a Web System of Contents Categorization." In Lecture Notes in Computer Science, 89–102. Berlin, Heidelberg: Springer Berlin Heidelberg, 2019. http://dx.doi.org/10.1007/978-3-662-59540-4_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Najar, Jihane, and Vassilis Prevelakis. "A Secure and Efficient File System Access Control Mechanism (FlexFS)." In Lecture Notes in Computer Science, 15–26. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-12085-6_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kelley, James, Roberto Tamassia, and Nikos Triandopoulos. "Hardening Access Control and Data Protection in GFS-like File Systems." In Computer Security – ESORICS 2012, 19–36. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33167-1_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Feliu, Anthony L. "Facilitating the Design and Operation of Computer-Controlled Radiochemistry Synthesizers with an “Electronic Toolbox”." In New Trends in Radiopharmaceutical Synthesis, Quality Assurance, and Regulatory Control, 329–37. Boston, MA: Springer US, 1991. http://dx.doi.org/10.1007/978-1-4899-0626-7_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

BYE, A., S. NILSEN, F. HANDELSBY, and T. WINSNES. "COAST - COMPUTERISED ALARM SYSTEM TOOLBOX." In Computer Software Structures Integrating Ai/kbs Systems in Process Control, 145–50. Elsevier, 1994. http://dx.doi.org/10.1016/b978-0-08-042360-9.50026-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Seiche, W., and H. Rake. "EXPERIENCE WITH THE APPLICATION OF SOFTWARE TOOLS FOR DATA FILE MANAGEMENT IN AUTOMATIC CONTROL." In Computer Aided Design in Control Systems 1988, 215–18. Elsevier, 1989. http://dx.doi.org/10.1016/b978-0-08-035738-6.50037-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Manzo, V. J. "Control Interfaces." In Max/MSP/Jitter for Music. Oxford University Press, 2011. http://dx.doi.org/10.1093/oso/9780199777679.003.0012.

Full text
Abstract:
In this chapter, we will examine some premade patches demonstrating a few techniques for designing diatonic musical instruments. We will review some of the basic ins and outs of MIDI, learn some ways to program more efficiently, and discuss a number of control options for your patches. As we examine some working patches and encounter many new objects, please read carefully and, in your mind, follow the flow of data from one object to the next as the process is described in the text. Remember that it will be beneficial to look at the Help file for any objects you may have forgotten about or do not fully understand as you encounter them in this chapter. In the last chapter, you installed the EAMIR SDK (Soft ware Development Kit) which, in addition to putting the Modal Object Library into the Max search path, put a bunch of patches I’ve created into the path as well. In fact, if you select Extras from the top menu, you will see an item marked EAMIR among the other extras. 1. Click on Extras>EAMIR from the top menu to view the main menu of the EAMIR SDK 2. In the umenu labeled Examples, click the first item 1.EAMIR _MIDI_Basics.maxpat If you did a manual install of the EAMIR SDK, you will need to locate the EAMIR_SDK folder on your computer and open the file EAMIR.maxpat. A patch will open containing two rectangular boxes. Unlock the patch to see that these two rectangular boxes have inlets and outlets just like the objects we’ve been working with, except that they, in themselves, contain other objects. These two boxes are called bpatchers. A bpatcher is an object that allows an existing Max patch to be loaded into a viewable window; that window is the bpatcher object itself. 3. Open the Inspector for the upper bpatcher Note that the line Patcher File within the Inspector displays the filename of the Max patch currently loaded in the bpatcher: EAMIR_MIDI_in.maxpat. This is just a Max patch that is being displayed in the bpatcher.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Control toolbox (Computer file)"

1

Wilson, Christopher G., Robert Dean, George T. Flowers, and John Y. Hung. "A Technique for Embedding SPICE in a Simulink Environment for MEMS Simulations." In ASME 2010 International Mechanical Engineering Congress and Exposition. ASMEDC, 2010. http://dx.doi.org/10.1115/imece2010-38394.

Full text
Abstract:
Computer simulations are powerful tools in the designer’s toolbox, giving an estimate of what the device will actually do once realized. Two such tools, Simulink and SPICE are commonly used to design, simulate, and verify models in the mechanical and electronic domains, respectively. Challenges can arise, however, when attempting to simulate behaviors of hybrid systems that possies both electronic and mechancial subsystems. For example, in microelectromechanical systems (MEMS) designs, variable capacitors are frequent methods for sensing and actuating. While straightforward to model in Simulink, MEMS are not intuitive to model in SPICE, where the control electronics are simulated. On the other hand, SIMULINK is a less mature tool than SPICE for simulating electronic behaviors — SPICE already posseses large libraries of electronic device models. Thus, current MEMS designers lack a straightforward method to simulate and verify variable capacitors in a transient electronic circuit in SPICE, since the entire mechanical system must be converted from Simulink and verified. This paper presents a technique for embedding NGSPICE, an open-source SPICE implementation, inside a Simulink model via a S-function block, enabling a full system model for transient responses to be realized. A Level 2 M-file S-function block implements the calling and parsing of the associated electronic subsystem circuit file. The required modifications for the circuit file to the Simulink model are described. Validation testing using a low-pass filter type circuits with constant and variable capacitance are presented. Some examples are presented and discussed.
APA, Harvard, Vancouver, ISO, and other styles
2

Sucha, Premysl, Michal Kutil, Michal Sojka, and Zdenek Hanzalek. "TORSCHE Scheduling Toolbox for Matlab." In 2006 IEEE Conference on Computer-Aided Control Systems Design. IEEE, 2006. http://dx.doi.org/10.1109/cacsd.2006.285479.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Peaucelle, Dimitri, and Denis Arzelier. "Robust Multi-Objective Control Toolbox." In 2006 IEEE Conference on Computer Aided Control System Design, 2006 IEEE International Conference on Control Applications, 2006 IEEE International Symposium on Intelligent Control. IEEE, 2006. http://dx.doi.org/10.1109/cacsd.2006.285454.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Peaucelle, Dimitri, and Denis Arzelier. "Robust Multi-Objective Control toolbox." In 2006 IEEE Conference on Computer Aided Control System Design, 2006 IEEE International Conference on Control Applications, 2006 IEEE International Symposium on Intelligent Control. IEEE, 2006. http://dx.doi.org/10.1109/cacsd-cca-isic.2006.4776805.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Matcovschi, M., C. Mahulea, C. Lefter, and O. Pastravanu. "Petri Net Toolbox in Control Engineering Education." In 2006 IEEE Conference on Computer-Aided Control Systems Design. IEEE, 2006. http://dx.doi.org/10.1109/cacsd.2006.285513.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Varga, A. "A Fault Detection Toolbox for MATLAB." In 2006 IEEE Conference on Computer-Aided Control Systems Design. IEEE, 2006. http://dx.doi.org/10.1109/cacsd.2006.285538.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sucha, Premysl, Michal Kutil, Michal Sojka, and Zdenek Hanzalek. "TORSCHE Scheduling toolbox for Matlab." In 2006 IEEE Conference on Computer Aided Control System Design, 2006 IEEE International Conference on Control Applications, 2006 IEEE International Symposium on Intelligent Control. IEEE, 2006. http://dx.doi.org/10.1109/cacsd-cca-isic.2006.4776810.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Varga, A. "A Fault Detection Toolbox for MATLAB." In 2006 IEEE Conference on Computer Aided Control System Design, 2006 IEEE International Conference on Control Applications, 2006 IEEE International Symposium on Intelligent Control. IEEE, 2006. http://dx.doi.org/10.1109/cacsd-cca-isic.2006.4777118.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Wenle. "Toolbox for Analysis and Synthesis of Petri Nets." In 2006 IEEE Conference on Computer-Aided Control Systems Design. IEEE, 2006. http://dx.doi.org/10.1109/cacsd.2006.285543.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Matcovschi, M. H., C. Mahulea, C. Lefter, and O. Pastravanu. "Petri Net Toolbox in Control Engineering Education." In 2006 IEEE Conference on Computer Aided Control System Design, 2006 IEEE International Conference on Control Applications, 2006 IEEE International Symposium on Intelligent Control. IEEE, 2006. http://dx.doi.org/10.1109/cacsd-cca-isic.2006.4776998.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography