To see the other types of publications on this topic, follow the link: Control toolbox (Computer file).

Journal articles on the topic 'Control toolbox (Computer file)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Control toolbox (Computer file).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Shri, Shaima Hamdan, and Ayad Fadhil Mijbas. "Chaotic theory incorporated with PSO algorithm for solving optimal reactive power dispatch problem of power system." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 3 (June 1, 2021): 1739. http://dx.doi.org/10.11591/ijeecs.v22.i3.pp1739-1747.

Full text
Abstract:
In this paper, the chaotic particle swarm optimization (CPSO) algorithm is combined with MATPOWER toolbox and used as an optimization tool for attaining solving the optimal reactive power dispatch (RPD) problem, by finding the optimal adjustment of reactive power control variables like a voltage of generator buses (VG), capacitor banks (QC) and transformer taps (Tap) while satisfying some of equality and inequality constraints at the same time. CPSO and Simple PSO algorithms will be checked in a large system such as IEEE node -118. CPSO and Simple PSO algorithms have been implemented and simulated in the MATLAB program, version (R2013b/m-file). Then compassion these results with the results obtained in the other algorithms in the literature like the comprehensive learning particle swarm optimization (CLPSO) algorithm. The simulation results confirm that the CPSO algorithm has high efficiency and ability in terms of decrease real power losses (P loss), and improve voltage profile compared with the obtained by using the simple (PSO) algorithm and (CLPSO) at light load.
APA, Harvard, Vancouver, ISO, and other styles
2

Peditto, Matteo, Riccardo Nucera, Erasmo Rubino, Antonia Marcianò, Marco Bitto, Antonio Catania, and Giacomo Oteri. "Improving Oral Surgery: A Workflow Proposal to Create Custom 3D Templates for Surgical Procedures." Open Dentistry Journal 14, no. 1 (February 14, 2020): 35–44. http://dx.doi.org/10.2174/1874210602014010035.

Full text
Abstract:
Background: Computer-guided technologies are adopted in various fields of surgery to limit invasiveness and obtain patient benefits in terms of surgery duration and post-operative course. Surgical templates realized through CAD/CAM technologies are widely diffused in implant dentistry. The aim of this work is to propose, beyond implantology, the feasibility of application of 3D printed surgical templates in oral surgery procedures requiring osteotomies (like maxillary cyst enucleation and tooth disimpaction) in order to obtain accurate surgeries, avoid anatomical damage of surrounding structures and decrease patient’s morbidity, using a simple, low-cost protocol of fabrication. Objective: To provide a reliable CAD-CAM workflow for the realization of surgical templates in oral surgery. Methods: Three clinical scenarios are described: A maxillary canine disimpaction, a mandibular cyst removal, and an orthodontic miniscrew placement. Each one was managed using custom surgical templates realized using the proposed workflow. A Stereolithography (STL) file of maxillary structures was obtained by the use of a 3D medical image processing software (Materialise Mimics 20.0) a segmentation toolbox acquiring RX volumes by Cone-Beam Computed Tomography (CBCT). Digital models of the teeth, acquired as STL files directly, are imported in the same 3D medical image processing freeware (Materialise Mimics 20.0) to merge STL files of maxillary structures and teeth. Data are transported into Blue Sky Plan 4.0 (Blue Sky Bio, LLC), a software for 3D implant guides fabrication, together with the DICOM images package of maxillary volumes to carry out the pre-surgical treatment planning. Anatomical structures at risk are identified; a contour of ideal incision shape and bone osteotomy extent is drawn. Finally, the resulting three-dimensional guide is digitally generated and the surgical guide printed. The resulting 3D template shows the following major features: teeth support, flap management and bone osteotomy design. Results: The proposed work-flow aided the surgeon in both pre-operative and intra-operative work phases through accurate virtual planning and the fabrication of precise surgical guides to be used in oral surgery practice. In each clinical scenario, the use of custom 3D templates allowed better control of the osteotomy planes and flap management. No adverse events occurred during both surgical and healing phases. Conclusion: The proposed digital workflow represents a reliable and straightforward way to produce a surgical guide for oral surgery procedures. These templates represent a versatile tool in maxillary cyst enucleations, tooth disimpaction, and other surgical procedures, increasing accuracy, minimizing surgical complications, and decreasing patient’s morbidity.
APA, Harvard, Vancouver, ISO, and other styles
3

Jurczak, Mateusz, and Jakub Młyńczak. "Method for automation of generation of interlocking tables for station traffic control devices." WUT Journal of Transportation Engineering 131 (December 1, 2020): 45–58. http://dx.doi.org/10.5604/01.3001.0014.8100.

Full text
Abstract:
On account of the growing number of railway upgrading projects implemented in Poland, numerous problems are emerging when prepared and performed. While preparing detailed plans and specifications for railway traffic control devices intended to secure traffic at a railway station, one must deal with numerous alterations related to the work's phasing directly linked with the said equipment. Consequently, the variety of elements subject to change includes the schematic plan and the relevant interlocking tables for railway traffic control systems. This article aims to discuss the authors’ original method for automation of the generation of interlocking tables for station traffic control equipment. The solution to the problem in question is assumed to be a model consisting of two components. One of them is the design part identifying individual objects comprising the railway station being designed. Subsequently, by the application of adequate algorithms, data are implemented in the other model component. Further calculations are performed to generate a list of all possible movements from main signals and shunting signals at the station referred to as railway routes. The method has been verified using the authors’ original computer program. Its first part corresponds to the design process. The station’s track layout is built using the program’s dedicated toolbar combined with an additional database of layers created in computer-aided design software. Next, such a track layout, saved into a dxf file, is imported to a dedicated application where train and shunting routes are generated. The method is verified by checking the routes thus generated against those in the existing interlocking tables by applying an adequate significance indicator. Assuming that the design process's basic assumptions are satisfied, the method in question makes it possible to accelerate the generation of interlocking tables in a secure manner.
APA, Harvard, Vancouver, ISO, and other styles
4

Kučera, Vladimír. "H 2 Optimal Computer Control: Polynomial Toolbox." IFAC Proceedings Volumes 34, no. 22 (November 2001): 123–27. http://dx.doi.org/10.1016/s1474-6670(17)32924-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gupta, Anand K., Ramesh P. Rudra, Bahram Gharabaghi, Prasad Daggupati, Gary Parkin, Pradeep K. Goel, and Rituraj Shukla. "CoBAGNPS: A Toolbox to Estimate Sediment Removal Efficiency of WASCoBs–Pipe Risers and Blind Inlets." Environment and Natural Resources Research 8, no. 3 (September 19, 2018): 84. http://dx.doi.org/10.5539/enrr.v8n3p84.

Full text
Abstract:
Water and Sediment Control Basin (WASCoB) is an important BMP constructed along concentrated flow-paths (gullies etc.) to control the movement of water and sediment within a watershed. A WASCoB constitutes of a berm, surface inlets, and a drainage pipe to route water into a ditch. Direct runoff ponded behind the berm is routed through surface inlets into an underground drainage pipe. Therefore, surface inlets are an exceedingly important constituent of a WASCoB. Further pipe risers and blind inlets are the two most common type of surface inlets used. Therefore, maximum sediment removal efficiency of WASCoBs at a watershed-scale can be attained by the appropriate selection of a surface inlet, since the efficiency of a WASCoB is greatly impacted by the quantity of runoff and sediment leaving the surface inlet. In this study a toolbox was developed viz., CoBAGNPS to compute the sediment removal efficiency of pipe risers and blind inlets. A watershed-scale model (AGNPS) was integrated within the toolbox. Output files of the AGNPS model are fed as input files into the toolbox where a sediment routing module is programmed separately for pipe risers and blind inlets to obtain the sediment removal efficiency for each type of surface inlet. Further, the sediment routing module programmed for blind inlets integrates the AGNPS model with the HYDRUS 1-D model. The toolbox developed was applied to the Gully Creek watershed in Ontario, and the sediment load routed through pipe risers and blind inlets were compared.
APA, Harvard, Vancouver, ISO, and other styles
6

da Silveira Serafim, Vinı́cius, and Raul Fernando Weber. "Restraining and repairing file system damage through file integrity control." Computers & Security 23, no. 1 (February 2004): 52–62. http://dx.doi.org/10.1016/s0167-4048(04)00066-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Verbandt, Maarten, Laurens Jacobs, Dora Turk, Taranjitsingh Singh, Jan Swevers, and Goele Pipeleers. "Linear Control Toolbox - supporting B-splines in LPV control." Mechatronics 52 (June 2018): 78–89. http://dx.doi.org/10.1016/j.mechatronics.2018.04.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Corke, P. I. "The machine vision toolbox - A MATLAB toolbox for vision and vision-based control." IEEE Robotics & Automation Magazine 12, no. 4 (December 2005): 16–25. http://dx.doi.org/10.1109/mra.2005.1577021.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Solnør, Petter. "A Cryptographic Toolbox for Feedback Control Systems." Modeling, Identification and Control: A Norwegian Research Bulletin 41, no. 4 (2020): 313–32. http://dx.doi.org/10.4173/mic.2020.4.3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Börlin, N., A. Murtiyoso, and P. Grussenmeyer. "IMPLEMENTING FUNCTIONAL MODULARITY FOR PROCESSING OF GENERAL PHOTOGRAMMETRIC DATA WITH THE DAMPED BUNDLE ADJUSTMENT TOOLBOX (DBAT)." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLII-2/W17 (November 29, 2019): 69–75. http://dx.doi.org/10.5194/isprs-archives-xlii-2-w17-69-2019.

Full text
Abstract:
Abstract. The Damped Bundle Adjustment Toolbox (DBAT) is a free, open-source, toolbox for bundle adjustment. The purpose of DBAT is to provide an independent, open-source toolkit for statistically rigorous bundle adjustment computations. The capabilities include bundle adjustment, network analysis, point filtering, forward intersection, spatial intersection, plotting functions, and computations of quality indicators such as posterior covariance estimates and parameter correlations. DBAT is written in the high-level Matlab language and includes several processing example files. The input formats have so far been restricted to PhotoModeler export files and Photoscan (Metashape) native files. Fine-tuning of the processing has so far required knowledge of the Matlab language.This paper describes the development of a scripting language based on the XML (eXtensible Markup Language) language that allow the user a fine-grained control over what operations are applied to the input data, while keeping the needed programming skills at a minimum. Furthermore, the scripting language allows a wide range of input formats. Additionally, the XML format allows simple extension of the script file format both in terms of adding new operations, file formats, or adding parameters to existing operations. Overall, the script files will in principle allow DBAT to process any kind of photogrammetric input and should extend the usability of DBAT as a scientific and teaching tool for photogrammetric computations.
APA, Harvard, Vancouver, ISO, and other styles
11

Khalaf, Akram Jaddoa, and Samir Jasim Mohammed. "Verification and comparison of MIT-BIH arrhythmia database based on number of beats." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 6 (December 1, 2021): 4950. http://dx.doi.org/10.11591/ijece.v11i6.pp4950-4961.

Full text
Abstract:
<span lang="EN-US">The ECG signal processing methods are tested and evaluated based on many databases. The most ECG database used for many researchers is the MIT-BIH arrhythmia database. The QRS-detection algorithms are essential for ECG analyses to detect the beats for the ECG signal. There is no standard number of beats for this database that are used from numerous researches. Different beat numbers are calculated for the researchers depending on the difference in understanding the annotation file. In this paper, the beat numbers for existing methods are studied and compared to find the correct beat number that should be used. We propose a simple function to standardize the beats number for any ECG PhysioNet database to improve the waveform database toolbox (WFDB) for the MATLAB program. This function is based on the annotation's description from the databases and can be added to the Toolbox. The function is removed the non-beats annotation without any errors. The results show a high percentage of 71% from the reviewed methods used an incorrect number of beats for this database.</span>
APA, Harvard, Vancouver, ISO, and other styles
12

Sands, Caroline J., Arnaud M. Wolfer, Gonçalo D. S. Correia, Noureddin Sadawi, Arfan Ahmed, Beatriz Jiménez, Matthew R. Lewis, Robert C. Glen, Jeremy K. Nicholson, and Jake T. M. Pearce. "The nPYc-Toolbox, a Python module for the pre-processing, quality-control and analysis of metabolic profiling datasets." Bioinformatics 35, no. 24 (July 27, 2019): 5359–60. http://dx.doi.org/10.1093/bioinformatics/btz566.

Full text
Abstract:
Abstract Summary As large-scale metabolic phenotyping studies become increasingly common, the need for systemic methods for pre-processing and quality control (QC) of analytical data prior to statistical analysis has become increasingly important, both within a study, and to allow meaningful inter-study comparisons. The nPYc-Toolbox provides software for the import, pre-processing, QC and visualization of metabolic phenotyping datasets, either interactively, or in automated pipelines. Availability and implementation The nPYc-Toolbox is implemented in Python, and is freely available from the Python package index https://pypi.org/project/nPYc/, source is available at https://github.com/phenomecentre/nPYc-Toolbox. Full documentation can be found at http://npyc-toolbox.readthedocs.io/ and exemplar datasets and tutorials at https://github.com/phenomecentre/nPYc-toolbox-tutorials.
APA, Harvard, Vancouver, ISO, and other styles
13

Paganini, Alberto, and Florian Wechsung. "Fireshape: a shape optimization toolbox for Firedrake." Structural and Multidisciplinary Optimization 63, no. 5 (February 11, 2021): 2553–69. http://dx.doi.org/10.1007/s00158-020-02813-y.

Full text
Abstract:
AbstractWe introduce Fireshape, an open-source and automated shape optimization toolbox for the finite element software Firedrake. Fireshape is based on the moving mesh method and allows users with minimal shape optimization knowledge to tackle with ease challenging shape optimization problems constrained to partial differential equations (PDEs).
APA, Harvard, Vancouver, ISO, and other styles
14

Eladawi, A. E., E. S. Gadelmawla, I. M. Elewa, and A. A. Abdel-Shafy. "An application of computer vision for programming computer numerical control machines." Proceedings of the Institution of Mechanical Engineers, Part B: Journal of Engineering Manufacture 217, no. 9 (September 1, 2003): 1315–24. http://dx.doi.org/10.1243/095440503322420241.

Full text
Abstract:
Generation of the part programs, or tool paths, for products to be manufactured by computer numerical control (CNC) machines is very important. Many methods have been used to produce part programs, ranging from manual calculations to computer aided design/ manufacturing (CAD/CAM) systems. This work introduces a new technique for generating the part programs of existing products using the latest technology of computer vision. The proposed vision system is applicable for two-dimensional vertical milling CNC machines and is calibrated to produce both metric and imperial dimensions. Two steps are used to generate the part program. In the first step, the vision system is used to capture an image for the product to be manufactured. In the second step, the image is processed and analysed by software specially written for this purpose. The software CNCVision is fully written (in lab) using Microsoft Visual C++ 6.0. It is ready to run on any Windows environment. The CNCVision software processes the captured images and applies computer vision techniques to extract the product dimensions, then generates a suitable part program. All required information for the part program is calculated automatically, such as G-codes, X and Y coordinates of start-points and end-points, radii of arcs and circles and direction of arcs (clockwise or counterclockwise). The generated part program can be displayed on screen, saved to a file or sent to MS Word or MS Excel. In addition, the engineering drawing of the product can be displayed on screen or sent to AutoCAD as a drawing file.
APA, Harvard, Vancouver, ISO, and other styles
15

Chang, M., and T. Kamewari. "EM-002B computer control development." Proceedings, annual meeting, Electron Microscopy Society of America 47 (August 6, 1989): 60–61. http://dx.doi.org/10.1017/s0424820100152276.

Full text
Abstract:
The EM-002B is an ultrahigh resolution TEM with unique TEM-probe analytical capabilities. In its standard configuration, one set of lens current parameters along with 20 specimen stage XY coordinate sets can be stored in a non-volatile memory. The first stage in implementing computer control of the microscope involves extending the ability to store and recall multiple lens parameter and stage position sets.This has been accomplished by adding a standard RS-232C communications channel to the EM-002B and developing a state-of-the-art window software package to run on an IBM AT PS2 or compatible computer. This package accepts the commands from a mouse input and allows storage and automatic setting of lens current and stage position sets. After transfer to the computer parameter, sets are assigned a file name and may be stored on a floppy or hard disk. These files are easily modified and transferred via the communications channel to the EM-002B.
APA, Harvard, Vancouver, ISO, and other styles
16

Bai, Ying. "Design of Motion Control System Based on DXF Graphic File." Information Technology Journal 12, no. 15 (July 15, 2013): 3096–102. http://dx.doi.org/10.3923/itj.2013.3096.3102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Xie, Xiao Peng, and Yun Yi Li. "Computer Simulation Study Based on Matlab." Applied Mechanics and Materials 513-517 (February 2014): 3049–52. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.3049.

Full text
Abstract:
This paper describes the use of one of the Matlab toolbox dynamic simulation tool Simulink simulation methods, and improve simulation speed, the simulation results analysis conducted in-depth elaboration. Also describes the use of SIMULINK simulation tools to achieve automatic control system modeling, analysis and design, simulation methods and Simulink-based video and image processing module sets into visualization, modular modeling idea.
APA, Harvard, Vancouver, ISO, and other styles
18

Xiong, Li Rong. "Simulating Analysis and Choosing Control Method on the Speed Control of Egg Quality’s Detection." Advanced Materials Research 268-270 (July 2011): 1179–83. http://dx.doi.org/10.4028/www.scientific.net/amr.268-270.1179.

Full text
Abstract:
This fuzzy speed controller is designed and applied in induction motor drive systems. MATLAB software fuzzy logic toolbox is used to the single closed-loop induction motor speed control system for computer-aided design, and SIMULINK dynamic digital simulation is used to achieve optimal control parameters. Tests show that the fuzzy control process is overshoot, response time is short, the system oscillation amplitude is low, it is the optimum control strategy.
APA, Harvard, Vancouver, ISO, and other styles
19

Concha, Antonio, David Luviano‐Cruz, G. Calderon, and S. K. Gadi. "Control and Identification Toolbox (CIT): An Android application for teaching automatic control and system identification." Computer Applications in Engineering Education 27, no. 5 (July 26, 2019): 1186–201. http://dx.doi.org/10.1002/cae.22145.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Gavish, Bezalel, John H. Gerdes, Suresh Sridhar, and Krishnamoorthy Srinivasan. "An Algorithm For Concurrency Control In Replicated File Systems." INFOR: Information Systems and Operational Research 35, no. 1 (February 1997): 1–14. http://dx.doi.org/10.1080/03155986.1997.11732315.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Numsomran, Arjin, Thanit Trisuwannawat, and Vittaya Tipsuwanporn. "Adaptive Fractional Order PIλDμ Control for Multi-Configuration Tank Process (MCTP) Toolbox." International Journal of Intelligent Engineering and Systems 11, no. 5 (October 31, 2018): 21–35. http://dx.doi.org/10.22266/ijies2018.1031.03.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Umesh Rai, B., and L. Umanand. "Bond graph toolbox for handling complex variable." IET Control Theory & Applications 3, no. 5 (May 1, 2009): 551–60. http://dx.doi.org/10.1049/iet-cta.2007.0347.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Jang, Hyeongwon, Sang Youp Rhee, Jae Eun Kim, Yoonhee Kim, Hyuck Han, Sooyong Kang, and Hyungsoo Jung. "AutoBahn: a concurrency control framework for non-volatile file buffer." Cluster Computing 23, no. 2 (July 29, 2019): 895–910. http://dx.doi.org/10.1007/s10586-019-02964-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Moyer, Steven A., and V. S. Sunderam. "Characterizing Concurrency Control Performance for the PIOUS Parallel File System." Journal of Parallel and Distributed Computing 38, no. 1 (October 1996): 81–91. http://dx.doi.org/10.1006/jpdc.1996.0130.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Liu, Hui, Hanxing Xue, and Hui Lu. "A Sensitive File Abnormal Access Detection Method Based on Application Classification." Security and Communication Networks 2021 (March 13, 2021): 1–7. http://dx.doi.org/10.1155/2021/6684456.

Full text
Abstract:
As the access control mode of notepad files cannot meet the requirements of risk control for sensitive file hierarchical access, this paper proposes an application classification-based detection method for abnormal access to sensitive files. The application classification and file classification, access control policy mapping, and basic and preset policy detection are designed. Combining the operating system’s identification control of different applications at runtime, we monitor the abnormal access of sensitive files by hierarchical applications. The cross-access experiment of different levels of application to different sensitive files verified the effectiveness and security of hierarchical access control strategy and sensitive file abnormal access detection and reduced the risk of disclosure of sensitive files.
APA, Harvard, Vancouver, ISO, and other styles
26

Cotroneo, Tommaso, and Jacob Dijk. "Modeling With the Behavioral Toolbox." Mathematical and Computer Modelling of Dynamical Systems 8, no. 4 (December 1, 2002): 361–76. http://dx.doi.org/10.1076/mcmd.8.4.361.15847.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Lovyagin, Nikita Yu, George A. Chernishev, Kirill K. Smirnov, and Roman Yu Dayneko. "FGACFS: A fine-grained access control for *nix userspace file system." Computers & Security 88 (January 2020): 101632. http://dx.doi.org/10.1016/j.cose.2019.101632.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Şuşcă, Mircea, Vlad Mihaly, Mihai Stănese, Dora Morar, and Petru Dobra. "Unified CACSD Toolbox for Hybrid Simulation and Robust Controller Synthesis with Applications in DC-to-DC Power Converter Control." Mathematics 9, no. 7 (March 28, 2021): 731. http://dx.doi.org/10.3390/math9070731.

Full text
Abstract:
The current article presents the design, implementation, validation, and use of a Computer-Aided Control System Design (CACSD) toolbox for nonlinear and hybrid system uncertainty modeling, simulation, and control using μ synthesis. Remarkable features include generalization of classical system interconnection operations to nonlinear and hybrid systems, automatic computation of equilibrium points for nonlinear systems, and optimization of least conservative uncertainty bounds, with direct applicability for μ synthesis. A unified approach is presented for the step-down (buck), step-up (boost), and single-ended primary-inductor (SEPIC) converters to showcase the use and flexibility of the toolbox. Robust controllers were computed by minimization of the H∞ norm of the augmented performance systems, encompassing a wide range of uncertainty types, and have been designed using the well-known mixed-sensitivity closed loop shaping μ synthesis method.
APA, Harvard, Vancouver, ISO, and other styles
29

Jamuna, V., and S. Palanivel Rajan. "VOICE RECOGNIZATION FOR MOUSE CONTROL USING HCI." JOURNAL OF ADVANCES IN CHEMISTRY 12, no. 10 (October 11, 2016): 4440–048. http://dx.doi.org/10.24297/jac.v12i10.6708.

Full text
Abstract:
One of the most important research areas in the field of Human -Computer-Interaction (HCI) is gesture recognition as it provides a natural and intuitive way to communicate between people and machines. Voice-based HCI applications range from computer applications to virtual/augmented reality and is recently being explored in other fields. This work proposes the implementation of absolute virtual mouse based on the interpretation of voice reorganization control. The procedure is to control the mouse pointer as for the mouse movement to up/down/left/right, open the file, dragging the file. This virtual device is designed specifically as an alternative non-contact pointer for people with mobility impairments in the upper extremities. The implementation of the virtual mouse by voice control is to make HCI simplification for disabled persons especially for the person who are not having the hands and arms, and Alternative mouse cursor positioning system for laptops.
APA, Harvard, Vancouver, ISO, and other styles
30

Jia-Yush Yen and So-Zen Tsai. "A trajectory feedback control for the computer disk file track-accessing/following servo." IEEE Transactions on Industrial Electronics 44, no. 5 (1997): 739–41. http://dx.doi.org/10.1109/41.633483.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

S. Li, L., Z. M. Fauzee, N. Zamin, N. Kamarudin, N. A.Sabri, and N. S.Nik Ab Aziz. "An Encrypted Log File Keylogger System for Parental Control." International Journal of Engineering & Technology 7, no. 2.28 (May 16, 2018): 193. http://dx.doi.org/10.14419/ijet.v7i2.28.12910.

Full text
Abstract:
Keystroke logging, often referred to as keylogger, keylogging or keyboard capturing, is the process of recording all the pressed keys on a keyboard autonomously so that the person who is using the keyboard is unaware that their actions on the computer are being monitored. In the world of cyber-crime, keylogger tool has been used mostly for malicious purposes such as stealing personal information and credit card details. However, for ethical purposes, keylogger can be useful in terms of monitoring user’s activities without being noticed. For instance, parents can use keylogger to monitor their child’s activity on the web. The log file is used to store the recorded keystrokes. However, current log files in keylogger are not encrypted, which can be easily hacked for malicious purposes. This paper proposes a new software based keylogger with log file encryption to increase the keylogging security towards Industrial Revolution 4.0.
APA, Harvard, Vancouver, ISO, and other styles
32

Cao, Yu, and Zhi Hui Huang. "Automatic Data Acquisition System in Wheel-Rail Monitoring Test Bench." Advanced Materials Research 706-708 (June 2013): 658–62. http://dx.doi.org/10.4028/www.scientific.net/amr.706-708.658.

Full text
Abstract:
A new automatic data acquisition method, which uses a combination of single chip microcomputer and data acquisition card, was applied in this system. Single chip microcomputer captured the signal of photoelectric switches and delivered the information to upper computer by serial communication. The velocity of the moving load was obtained by photoelectric switch signal. The data acquisition program of upper computer was written by MATLAB instrument control toolbox and data acquisition toolbox. The data acquisition function of data acquisition card was triggered by the upper computer automatically. Testing data show that this system could automatic collect data of test bench stably. This system also shows high efficiency and reliability.
APA, Harvard, Vancouver, ISO, and other styles
33

Yi, Gang, Craig Herdsman, and Julian Morris. "A MATLAB toolbox for data pre-processing and multivariate statistical process control." Chemometrics and Intelligent Laboratory Systems 194 (November 2019): 103863. http://dx.doi.org/10.1016/j.chemolab.2019.103863.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Testa, Andrea, Andrea Camisa, and Giuseppe Notarstefano. "ChoiRbot: A ROS 2 Toolbox for Cooperative Robotics." IEEE Robotics and Automation Letters 6, no. 2 (April 2021): 2714–20. http://dx.doi.org/10.1109/lra.2021.3061366.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Ren, Wei, Lingling Zeng, Ran Liu, and Chi Cheng. "F2AC: A Lightweight, Fine-Grained, and Flexible Access Control Scheme for File Storage in Mobile Cloud Computing." Mobile Information Systems 2016 (2016): 1–9. http://dx.doi.org/10.1155/2016/5232846.

Full text
Abstract:
Current file storage service models for cloud servers assume that users either belong to single layer with different privileges or cannot authorize privileges iteratively. Thus, the access control is not fine-grained and flexible. Besides, most access control methods at cloud servers mainly rely on computationally intensive cryptographic algorithms and, especially, may not be able to support highly dynamic ad hoc groups with addition and removal of group members. In this paper, we propose a scheme called F2AC, which is a lightweight, fine-grained, and flexible access control scheme for file storage in mobile cloud computing. F2AC can not only achieve iterative authorization, authentication with tailored policies, and access control for dynamically changing accessing groups, but also provide access privilege transition and revocation. A new access control model called directed tree with linked leaf model is proposed for further implementations in data structures and algorithms. The extensive analysis is given for justifying the soundness and completeness of F2AC.
APA, Harvard, Vancouver, ISO, and other styles
36

Chouza, Ander, Oscar Barambones, Isidro Calvo, and Javier Velasco. "Sliding Mode-Based Robust Control for Piezoelectric Actuators with Inverse Dynamics Estimation." Energies 12, no. 5 (March 12, 2019): 943. http://dx.doi.org/10.3390/en12050943.

Full text
Abstract:
This paper presents an improved control approach to be used for piezoelectric actuators. The proposed approach is based on sliding mode control with estimation perturbation (SMCPE) techniques. Also, a proportional–integral–derivative (PID)-type sliding surface is proposed for position tracking. The proposed approach has been studied and implemented in a commercial actuator. A model for the system is introduced, which includes the Bouc–Wen (BW) model to represent the hysteresis, and it is identified by means of the System Identification Toolbox in Matlab/Simulink. Experimental data show that the proposed controller has a better performance when compared to a proportional-integral (PI) controller or a conventional SMCPE in motion tracking. Furthermore, a sub-micrometer accuracy tracking can be obtained while compensating for the hysteresis effect.
APA, Harvard, Vancouver, ISO, and other styles
37

McIntosh, Timothy, Paul Watters, A. S. M. Kayes, Alex Ng, and Yi-Ping Phoebe Chen. "Enforcing situation-aware access control to build malware-resilient file systems." Future Generation Computer Systems 115 (February 2021): 568–82. http://dx.doi.org/10.1016/j.future.2020.09.035.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Kim, JeongYeon. "Protecting Metadata of Access Indicator and Region of Interests for Image Files." Security and Communication Networks 2020 (January 22, 2020): 1–10. http://dx.doi.org/10.1155/2020/4836109.

Full text
Abstract:
With popularity of social network services, the security and privacy issues over shared contents receive many attentions. Besides, multimedia files have additional concerns of copyright violation or illegal usage to share over communication networks. For image file management, JPEG group develops new image file format to enhance security and privacy features. Adopting a box structure with different application markers, new standards for privacy and security provide a concept of replacement substituting a private part of the original image or metadata with an alternative public data. In this paper, we extend data protection features of new JPEG formats to remote access control as a metadata. By keeping location information of access control data as a metadata in image files, the image owner can allow or deny other’s data consumption regardless where the media file is. License issue also can be resolved by applying new access control schemes, and we present how new formats protect commercial image files against unauthorized accesses.
APA, Harvard, Vancouver, ISO, and other styles
39

Delorme, Arnaud, Tim Mullen, Christian Kothe, Zeynep Akalin Acar, Nima Bigdely-Shamlo, Andrey Vankov, and Scott Makeig. "EEGLAB, SIFT, NFT, BCILAB, and ERICA: New Tools for Advanced EEG Processing." Computational Intelligence and Neuroscience 2011 (2011): 1–12. http://dx.doi.org/10.1155/2011/130714.

Full text
Abstract:
We describe a set of complementary EEG data collection and processing tools recently developed at the Swartz Center for Computational Neuroscience (SCCN) that connect to and extend the EEGLAB software environment, a freely available and readily extensible processing environment running under Matlab. The new tools include (1) a new and flexible EEGLAB STUDY design facility for framing and performing statistical analyses on data from multiple subjects; (2) a neuroelectromagnetic forward head modeling toolbox (NFT) for building realistic electrical head models from available data; (3) a source information flow toolbox (SIFT) for modeling ongoing or event-related effective connectivity between cortical areas; (4) a BCILAB toolbox for building online brain-computer interface (BCI) models from available data, and (5) an experimental real-time interactive control and analysis (ERICA) environment for real-time production and coordination of interactive, multimodal experiments.
APA, Harvard, Vancouver, ISO, and other styles
40

Ninness, Brett, Adrian Wills, and Adam Mills. "UNIT: A freely available system identification toolbox." Control Engineering Practice 21, no. 5 (May 2013): 631–44. http://dx.doi.org/10.1016/j.conengprac.2012.10.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Deroo, Frederik, and Sandra Hirche. "A MATLAB Toolbox for Large-Scale Networked Systems." at - Automatisierungstechnik 61, no. 7 (July 2013): 506–14. http://dx.doi.org/10.1524/auto.2013.0041.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Safeea, Mohammad, and Pedro Neto. "KUKA Sunrise Toolbox: Interfacing Collaborative Robots With MATLAB." IEEE Robotics & Automation Magazine 26, no. 1 (March 2019): 91–96. http://dx.doi.org/10.1109/mra.2018.2877776.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Williamson, Carey L. "Optimizing file transfer response time using the loss-load curve congestion control mechanism." ACM SIGCOMM Computer Communication Review 23, no. 4 (October 1993): 117–26. http://dx.doi.org/10.1145/167954.166249.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Tseng, J. H., and K. Asanovic. "A Speculative Control Scheme for an Energy-Efficient Banked Register File." IEEE Transactions on Computers 54, no. 6 (June 2005): 741–51. http://dx.doi.org/10.1109/tc.2005.88.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Vogt, Patrick, Eric Lenz, and Ulrich Konigorski. "gammasyn – eine Toolbox zur robusten Polbereichsvorgabe mittels beschränkter Optimierung und Straffunktionen." at - Automatisierungstechnik 68, no. 10 (October 25, 2020): 893–904. http://dx.doi.org/10.1515/auto-2020-0078.

Full text
Abstract:
ZusammenfassungZum Entwurf robuster, strukturbeschränkter Ausgangsrückführungen existieren bereits einige frei verfügbare oder in weitverbreiteten Programmen enthaltene Werkzeuge, die vor allem auf dem {\mathcal{H}_{\infty }}-Ansatz zum Entwurf von Regelungen basieren, jedoch ist die Anzahl frei verfügbarer Werkzeuge überschaubar und es existieren keine freien Werkzeuge zur Polbereichsvorgabe. Aus diesem Grund wird im vorliegenden Beitrag ein Werkzeug namens gammasyn vorgestellt, mit dem über einen Multimodellansatz strukturbeschränkte Ausgangsrückführungen robust mittels Polbereichsvorgabe entworfen werden können. Die Toolbox verwendet den in [9] vorgeschlagenen Straffunktionsansatz sowie beschränkte Optimierung und es werden einige Erweiterungen dieses Ansatzes sowie der Funktionsumfang der Toolbox beschrieben.
APA, Harvard, Vancouver, ISO, and other styles
46

Bezák, Pavol. "Improving Cognitive Skills of the Industrial Robot." Research Papers Faculty of Materials Science and Technology Slovak University of Technology 23, s1 (August 1, 2015): 19–28. http://dx.doi.org/10.1515/rput-2015-0023.

Full text
Abstract:
Abstract At present, there are plenty of industrial robots that are programmed to do the same repetitive task all the time. Industrial robots doing such kind of job are not able to understand whether the action is correct, effective or good. Object detection, manipulation and grasping is challenging due to the hand and object modeling uncertainties, unknown contact type and object stiffness properties. In this paper, the proposal of an intelligent humanoid hand object detection and grasping model is presented assuming that the object properties are known. The control is simulated in the Matlab Simulink/ SimMechanics, Neural Network Toolbox and Computer Vision System Toolbox.
APA, Harvard, Vancouver, ISO, and other styles
47

Attenberger, Andreas, and Klaus Buchenrieder. "Modeling and visualization of classification-based control schemes for upper limb prostheses." Computer Science and Information Systems 10, no. 1 (2013): 349–67. http://dx.doi.org/10.2298/csis120601007a.

Full text
Abstract:
During the development of control schemes for upper-limb prostheses, the selection of a classification method is the decisive factor on predicting the correct hand movements. This contribution brings forward an approach to validate and visualize the output of a chosen classifier by simulative means. Using features extracted from a collection of recorded myoelectric signals (MES), a training set for different classes of hand movements is produced and validated with additional MES recordings. Using the output of the classifier, the behavior of an actual prosthesis is simulated by controlling the 3D model of a prosthetic hand. For systematic comparison of feature sets and classification methods, a toolbox for MATLABTM has been developed. Our classification results show, that existing classification schemes based on EMG data can be improved significantly by adding NIR sensor data. Employing only two combined EMGNIR sensors, five motion classes comprising full movements, including pronation and supination, can be distinguished with 100% accuracy.
APA, Harvard, Vancouver, ISO, and other styles
48

Doukari, Michaela, Marios Batsaris, and Konstantinos Topouzelis. "UASea: A Data Acquisition Toolbox for Improving Marine Habitat Mapping." Drones 5, no. 3 (August 3, 2021): 73. http://dx.doi.org/10.3390/drones5030073.

Full text
Abstract:
Unmanned aerial systems (UAS) are widely used in the acquisition of high-resolution information in the marine environment. Although the potential applications of UAS in marine habitat mapping are constantly increasing, many limitations need to be overcome—most of which are related to the prevalent environmental conditions—to reach efficient UAS surveys. The knowledge of the UAS limitations in marine data acquisition and the examination of the optimal flight conditions led to the development of the UASea toolbox. This study presents the UASea, a data acquisition toolbox that is developed for efficient UAS surveys in the marine environment. The UASea uses weather forecast data (i.e., wind speed, cloud cover, precipitation probability, etc.) and adaptive thresholds in a ruleset that calculates the optimal flight times in a day for the acquisition of reliable marine imagery using UAS in a given day. The toolbox provides hourly positive and negative suggestions, based on optimal or non-optimal survey conditions in a day, calculated according to the ruleset calculations. We acquired UAS images in optimal and non-optimal conditions and estimated their quality using an image quality equation. The image quality estimates are based on the criteria of sunglint presence, sea surface texture, water turbidity, and image naturalness. The overall image quality estimates were highly correlated with the suggestions of the toolbox, with a correlation coefficient of −0.84. The validation showed that 40% of the toolbox suggestions were a positive match to the images with higher quality. Therefore, we propose the optimal flight times to acquire reliable and accurate UAS imagery in the coastal environment through the UASea. The UASea contributes to proper flight planning and efficient UAS surveys by providing valuable information for mapping, monitoring, and management of the marine environment, which can be used globally in research and marine applications.
APA, Harvard, Vancouver, ISO, and other styles
49

Hamidane, Hafsa, Samira El Faiz, Mohammed Guerbaoui, Abdelali Ed-Dahhak, Abdeslam Lachhab, and Benachir Bouchikhi. "Constrained discrete model predictive control of a greenhouse system temperature." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 2 (April 1, 2021): 1223. http://dx.doi.org/10.11591/ijece.v11i2.pp1223-1234.

Full text
Abstract:
In this paper, a constrained discete model predictive control (CDMPC) strategy for a greenhouse inside temperature is presented. To describe the dynamics of our system’s inside temperature, an experimental greenhouse prototype is engaged. For the mathematical modeling, a state space form which fits properly the acquired data of the greenhouse temperature dynamics is identified using the subspace system identification (N4sid) algorithm. The obtained model is used in order to develop the CDMPC starategy which role is to select the best control moves based on an optimization procedure under the constraints on the control notion. For efficient evaluation of the proposed control approach Matlab/Simulink and Yalmip optimization toolbox are used for algorithm and blocks implementation. The simulation results confirm the accuracy of the controller that garantees both the control and the reference tracking objectives.
APA, Harvard, Vancouver, ISO, and other styles
50

Wei, Yu Qing, Xing Gao, and Jing Hua Gao. "Virtools Based Development of Computer Experiment." Advanced Materials Research 756-759 (September 2013): 2887–91. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.2887.

Full text
Abstract:
Virtools is a set of integrated 2D graphic images, 3D models, audio, video, and so a variety of file formats, interactive software itself has a wealth of interactive behavior module, 3D games can be created, virtual experiments simulation objects very strong interaction with the display and other three-dimensional product. This paper presents a virtual experiment based on 3D and Virtools technology, which is built with 3D experiments scenes, making 3D animation; with Virtools data processing, interactive control. The experiments show that this method has the authenticity, interactivity, simple and easy to implement features.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography