To see the other types of publications on this topic, follow the link: Control toolbox (Computer file).

Journal articles on the topic 'Control toolbox (Computer file)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Control toolbox (Computer file).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Ahmed, Afaq, Syed Bilal Javed, Ali Arshad Uppal, and Jamshed Iqbal. "Development of CAVLAB—A Control-Oriented MATLAB Based Simulator for an Underground Coal Gasification Process." Mathematics 11, no. 11 (2023): 2493. http://dx.doi.org/10.3390/math11112493.

Full text
Abstract:
The Cavity Simulation Model (CAVSIM) is a 3D, parameterisable simulator of the Underground Coal Gasification Process (UCG) that serves as a benchmark for UCG prediction. Despite yielding accurate outputs, CAVSIM has some limitations, which chiefly include inadequate graphical capabilities to visualise cavity geometry and gas production, time-ineffectiveness in terms of parametrisation, i.e., it involves editing, compiling multiple files and checking for errors, and lack of tools to synthesise a controller. Therefore, to compensate for these shortcomings, the services of third-party software, s
APA, Harvard, Vancouver, ISO, and other styles
2

Shri, Shaima Hamdan, and Ayad Fadhil Mijbas. "Chaotic theory incorporated with PSO algorithm for solving optimal reactive power dispatch problem of power system." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 3 (2021): 1739. http://dx.doi.org/10.11591/ijeecs.v22.i3.pp1739-1747.

Full text
Abstract:
In this paper, the chaotic particle swarm optimization (CPSO) algorithm is combined with MATPOWER toolbox and used as an optimization tool for attaining solving the optimal reactive power dispatch (RPD) problem, by finding the optimal adjustment of reactive power control variables like a voltage of generator buses (VG), capacitor banks (QC) and transformer taps (Tap) while satisfying some of equality and inequality constraints at the same time. CPSO and Simple PSO algorithms will be checked in a large system such as IEEE node -118. CPSO and Simple PSO algorithms have been implemented and simul
APA, Harvard, Vancouver, ISO, and other styles
3

Peditto, Matteo, Riccardo Nucera, Erasmo Rubino, et al. "Improving Oral Surgery: A Workflow Proposal to Create Custom 3D Templates for Surgical Procedures." Open Dentistry Journal 14, no. 1 (2020): 35–44. http://dx.doi.org/10.2174/1874210602014010035.

Full text
Abstract:
Background: Computer-guided technologies are adopted in various fields of surgery to limit invasiveness and obtain patient benefits in terms of surgery duration and post-operative course. Surgical templates realized through CAD/CAM technologies are widely diffused in implant dentistry. The aim of this work is to propose, beyond implantology, the feasibility of application of 3D printed surgical templates in oral surgery procedures requiring osteotomies (like maxillary cyst enucleation and tooth disimpaction) in order to obtain accurate surgeries, avoid anatomical damage of surrounding structur
APA, Harvard, Vancouver, ISO, and other styles
4

Jurczak, Mateusz, and Jakub Młyńczak. "Method for automation of generation of interlocking tables for station traffic control devices." WUT Journal of Transportation Engineering 131 (December 1, 2020): 45–58. http://dx.doi.org/10.5604/01.3001.0014.8100.

Full text
Abstract:
On account of the growing number of railway upgrading projects implemented in Poland, numerous problems are emerging when prepared and performed. While preparing detailed plans and specifications for railway traffic control devices intended to secure traffic at a railway station, one must deal with numerous alterations related to the work's phasing directly linked with the said equipment. Consequently, the variety of elements subject to change includes the schematic plan and the relevant interlocking tables for railway traffic control systems. This article aims to discuss the authors’ original
APA, Harvard, Vancouver, ISO, and other styles
5

Gupta, Anand K., Ramesh P. Rudra, Bahram Gharabaghi, et al. "CoBAGNPS: A Toolbox to Estimate Sediment Removal Efficiency of WASCoBs–Pipe Risers and Blind Inlets." Environment and Natural Resources Research 8, no. 3 (2018): 84. http://dx.doi.org/10.5539/enrr.v8n3p84.

Full text
Abstract:
Water and Sediment Control Basin (WASCoB) is an important BMP constructed along concentrated flow-paths (gullies etc.) to control the movement of water and sediment within a watershed. A WASCoB constitutes of a berm, surface inlets, and a drainage pipe to route water into a ditch. Direct runoff ponded behind the berm is routed through surface inlets into an underground drainage pipe. Therefore, surface inlets are an exceedingly important constituent of a WASCoB. Further pipe risers and blind inlets are the two most common type of surface inlets used. Therefore, maximum sediment removal efficie
APA, Harvard, Vancouver, ISO, and other styles
6

Kučera, Vladimír. "H 2 Optimal Computer Control: Polynomial Toolbox." IFAC Proceedings Volumes 34, no. 22 (2001): 123–27. http://dx.doi.org/10.1016/s1474-6670(17)32924-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

da Silveira Serafim, Vinı́cius, and Raul Fernando Weber. "Restraining and repairing file system damage through file integrity control." Computers & Security 23, no. 1 (2004): 52–62. http://dx.doi.org/10.1016/s0167-4048(04)00066-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Börlin, N., A. Murtiyoso, and P. Grussenmeyer. "IMPLEMENTING FUNCTIONAL MODULARITY FOR PROCESSING OF GENERAL PHOTOGRAMMETRIC DATA WITH THE DAMPED BUNDLE ADJUSTMENT TOOLBOX (DBAT)." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLII-2/W17 (November 29, 2019): 69–75. http://dx.doi.org/10.5194/isprs-archives-xlii-2-w17-69-2019.

Full text
Abstract:
Abstract. The Damped Bundle Adjustment Toolbox (DBAT) is a free, open-source, toolbox for bundle adjustment. The purpose of DBAT is to provide an independent, open-source toolkit for statistically rigorous bundle adjustment computations. The capabilities include bundle adjustment, network analysis, point filtering, forward intersection, spatial intersection, plotting functions, and computations of quality indicators such as posterior covariance estimates and parameter correlations. DBAT is written in the high-level Matlab language and includes several processing example files. The input format
APA, Harvard, Vancouver, ISO, and other styles
9

Don, Africa, Aaron, and Torrizo, Lorwin Felimar. "Comparative Study of Intrusion Detection Systems against Mainstream Network Sniffing Tools." International Journal of Engineering & Technology 7, no. 4.16 (2018): 188–91. http://dx.doi.org/10.14419/ijet.v7i4.16.22884.

Full text
Abstract:
As the world embraces a technological revolution on how everyday devices are connected to the internet, users provide sensitive information using the internet which is broken down and distributed as packets throughout the network. Packet sniffers tap to these packets, capable of potentially compromising security and privacy of unsuspecting users. This study aims to put into the test some well-known Intrusion Detection Systems (IDS) and observe how they fare against popular packet-sniffing tools such as Wireshark and tcpdump. The varied sniffing methods and techniques from various sniffing tool
APA, Harvard, Vancouver, ISO, and other styles
10

Verbandt, Maarten, Laurens Jacobs, Dora Turk, Taranjitsingh Singh, Jan Swevers, and Goele Pipeleers. "Linear Control Toolbox - supporting B-splines in LPV control." Mechatronics 52 (June 2018): 78–89. http://dx.doi.org/10.1016/j.mechatronics.2018.04.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Corke, P. I. "The machine vision toolbox - A MATLAB toolbox for vision and vision-based control." IEEE Robotics & Automation Magazine 12, no. 4 (2005): 16–25. http://dx.doi.org/10.1109/mra.2005.1577021.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Solnør, Petter. "A Cryptographic Toolbox for Feedback Control Systems." Modeling, Identification and Control: A Norwegian Research Bulletin 41, no. 4 (2020): 313–32. http://dx.doi.org/10.4173/mic.2020.4.3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Pornpanomchai, Chomtip. "Image-to-Video Retrieval by ResNet50." International Journal of Membrane Science and Technology 10, no. 3 (2023): 3604–15. http://dx.doi.org/10.15379/ijmst.v10i3.3411.

Full text
Abstract:
The objective of this research is to create a computer system which can retrieve a video clip by using only a single image. The developed system is called “Image-to-Video Retrieval System (I2VRS)”. The system employs the convolutional neural networks called “ResNet50”, which is a toolbox in MATLAB software to retrieve the video clip dataset. The ResNet50 is one of the powerful CNN to recognize an image in the image processing technique. The I2VRS creates its own dataset called I2VRS dataset, which consists of 101 video clips and each video clip contains 1,000 video frames. All video clips are
APA, Harvard, Vancouver, ISO, and other styles
14

Supriyati, Supriyati. "RANCANG BANGUN CNC (COMPUTER NUMERICAL CONTROL) UNTUK PEMBUATAN PCB BERBASIS ARDUINO." Orbith: Majalah Ilmiah Pengembangan Rekayasa dan Sosial 19, no. 2 (2023): 114–20. https://doi.org/10.32497/orbith.v19i2.4995.

Full text
Abstract:
Rancang Bangun Mesin CNC (Computer Numerical Control) Untuk Pembuatan PCB Berbasis Arduino merupakan dibuat dengan tujuan untuk mencetak PCB dengan proses pengerjaan cukup efisien dan dapat mengurangi penggunaan bahan kimia untuk mencetak PCB. Alat ini dirancang menggunakan sebuah sistem yang diproses melalui Arduino Uno dan menggunakan software flatcame dan juga candle sebagai user interface. Software tersebut berfungsi untuk mengubah file dengan format gerber dari software proteus menjadi file G-Code agar bisa dibaca oleh pemrosesnya. Pengujian dilakukan untuk mengetahui ketepatan gerak dari
APA, Harvard, Vancouver, ISO, and other styles
15

Khalaf, Akram Jaddoa, and Samir Jasim Mohammed. "Verification and comparison of MIT-BIH arrhythmia database based on number of beats." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 6 (2021): 4950. http://dx.doi.org/10.11591/ijece.v11i6.pp4950-4961.

Full text
Abstract:
<span lang="EN-US">The ECG signal processing methods are tested and evaluated based on many databases. The most ECG database used for many researchers is the MIT-BIH arrhythmia database. The QRS-detection algorithms are essential for ECG analyses to detect the beats for the ECG signal. There is no standard number of beats for this database that are used from numerous researches. Different beat numbers are calculated for the researchers depending on the difference in understanding the annotation file. In this paper, the beat numbers for existing methods are studied and compared to find th
APA, Harvard, Vancouver, ISO, and other styles
16

Xie, Xiao Peng, and Yun Yi Li. "Computer Simulation Study Based on Matlab." Applied Mechanics and Materials 513-517 (February 2014): 3049–52. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.3049.

Full text
Abstract:
This paper describes the use of one of the Matlab toolbox dynamic simulation tool Simulink simulation methods, and improve simulation speed, the simulation results analysis conducted in-depth elaboration. Also describes the use of SIMULINK simulation tools to achieve automatic control system modeling, analysis and design, simulation methods and Simulink-based video and image processing module sets into visualization, modular modeling idea.
APA, Harvard, Vancouver, ISO, and other styles
17

Xiong, Li Rong. "Simulating Analysis and Choosing Control Method on the Speed Control of Egg Quality’s Detection." Advanced Materials Research 268-270 (July 2011): 1179–83. http://dx.doi.org/10.4028/www.scientific.net/amr.268-270.1179.

Full text
Abstract:
This fuzzy speed controller is designed and applied in induction motor drive systems. MATLAB software fuzzy logic toolbox is used to the single closed-loop induction motor speed control system for computer-aided design, and SIMULINK dynamic digital simulation is used to achieve optimal control parameters. Tests show that the fuzzy control process is overshoot, response time is short, the system oscillation amplitude is low, it is the optimum control strategy.
APA, Harvard, Vancouver, ISO, and other styles
18

Sands, Caroline J., Arnaud M. Wolfer, Gonçalo D. S. Correia, et al. "The nPYc-Toolbox, a Python module for the pre-processing, quality-control and analysis of metabolic profiling datasets." Bioinformatics 35, no. 24 (2019): 5359–60. http://dx.doi.org/10.1093/bioinformatics/btz566.

Full text
Abstract:
Abstract Summary As large-scale metabolic phenotyping studies become increasingly common, the need for systemic methods for pre-processing and quality control (QC) of analytical data prior to statistical analysis has become increasingly important, both within a study, and to allow meaningful inter-study comparisons. The nPYc-Toolbox provides software for the import, pre-processing, QC and visualization of metabolic phenotyping datasets, either interactively, or in automated pipelines. Availability and implementation The nPYc-Toolbox is implemented in Python, and is freely available from the Py
APA, Harvard, Vancouver, ISO, and other styles
19

Supriyati, Supriyati, Tulus Pramuji, Imam Saputro, and Laily Retno Hidayati. "RANCANG BANGUN CNC (COMPUTER NUMERICAL CONTROL) UNTUK PEMBUATAN PCB BERBASIS ARDUINO." Orbith: Majalah Ilmiah Pengembangan Rekayasa dan Sosial 19, no. 1 (2023): 43–49. https://doi.org/10.32497/orbith.v19i1.4392.

Full text
Abstract:
Rancang Bangun Mesin CNC (Computer Numerical Control) Untuk Pembuatan PCB Berbasis Arduino merupakan dibuat dengan tujuan untuk mencetak PCB dengan proses pengerjaan cukup efisien dan dapat mengurangi penggunaan bahan kimia untuk mencetak PCB. Alat ini dirancang menggunakan sebuah sistem yang diproses melalui Arduino Uno dan menggunakan software flatcame dan juga candle sebagai user interface. Software tersebut berfungsi untuk mengubah file dengan format gerber dari software proteus menjadi file G-Code agar bisa dibaca oleh pemrosesnya. Pengujian dilakukan untuk mengetahui ketepatan gerak dari
APA, Harvard, Vancouver, ISO, and other styles
20

Romadhon, Rifki Hari, Nugroho Suharto, and Aad Hariyadi. "RASPBERRY PI SEBAGAI STORAGE VERSION CONTROL SYSTEM TUGAS MAHASISWA POLITEKNIK NEGERI MALANG." JASIEK (Jurnal Aplikasi Sains, Informasi, Elektronika dan Komputer) 3, no. 1 (2021): 11–20. http://dx.doi.org/10.26905/jasiek.v3i1.7793.

Full text
Abstract:
File transfer technology is now beginning to develop rapidly, many researchers have begun to develop file transfer methods, now file transfer is present in daily life in various ways. For example, in human life there are many more uses of flash memory for the process of moving files. This makes it risky to get a virus from another computer or laptop that results in file loss. In this study, we are developing a file transfer that can simultaneously manage the user to apply file version control so that the file is still written to the repository and has its own version of each uploaded file. It
APA, Harvard, Vancouver, ISO, and other styles
21

Cao, Yu, and Zhi Hui Huang. "Automatic Data Acquisition System in Wheel-Rail Monitoring Test Bench." Advanced Materials Research 706-708 (June 2013): 658–62. http://dx.doi.org/10.4028/www.scientific.net/amr.706-708.658.

Full text
Abstract:
A new automatic data acquisition method, which uses a combination of single chip microcomputer and data acquisition card, was applied in this system. Single chip microcomputer captured the signal of photoelectric switches and delivered the information to upper computer by serial communication. The velocity of the moving load was obtained by photoelectric switch signal. The data acquisition program of upper computer was written by MATLAB instrument control toolbox and data acquisition toolbox. The data acquisition function of data acquisition card was triggered by the upper computer automatical
APA, Harvard, Vancouver, ISO, and other styles
22

Ren, Jin. "Data File Security Strategy and Implementation Based on Fuzzy Control Algorithm." Security and Communication Networks 2022 (August 29, 2022): 1–10. http://dx.doi.org/10.1155/2022/2010419.

Full text
Abstract:
Today there are few studies on data file security strategies, but with the increase in information technology, the more the security of data files cannot be ignored. In this paper, based on the research of data file security policy, a model of data file security interaction based on a fuzzy control algorithm is proposed, and the correct rate of the model proposed in this paper is improved by about 1.5% under the traditional FTP server-based model.
APA, Harvard, Vancouver, ISO, and other styles
23

Vryzas, Nikolaos, Anastasia Katsaounidou, Lazaros Vrysis, Rigas Kotsakis, and Charalampos Dimoulas. "A Prototype Web Application to Support Human-Centered Audiovisual Content Authentication and Crowdsourcing." Future Internet 14, no. 3 (2022): 75. http://dx.doi.org/10.3390/fi14030075.

Full text
Abstract:
Media authentication relies on the detection of inconsistencies that may indicate malicious editing in audio and video files. Traditionally, authentication processes are performed by forensics professionals using dedicated tools. There is rich research on the automation of this procedure, but the results do not yet guarantee the feasibility of providing automated tools. In the current approach, a computer-supported toolbox is presented, providing online functionality for assisting technically inexperienced users (journalists or the public) to investigate visually the consistency of audio strea
APA, Harvard, Vancouver, ISO, and other styles
24

Eladawi, A. E., E. S. Gadelmawla, I. M. Elewa, and A. A. Abdel-Shafy. "An application of computer vision for programming computer numerical control machines." Proceedings of the Institution of Mechanical Engineers, Part B: Journal of Engineering Manufacture 217, no. 9 (2003): 1315–24. http://dx.doi.org/10.1243/095440503322420241.

Full text
Abstract:
Generation of the part programs, or tool paths, for products to be manufactured by computer numerical control (CNC) machines is very important. Many methods have been used to produce part programs, ranging from manual calculations to computer aided design/ manufacturing (CAD/CAM) systems. This work introduces a new technique for generating the part programs of existing products using the latest technology of computer vision. The proposed vision system is applicable for two-dimensional vertical milling CNC machines and is calibrated to produce both metric and imperial dimensions. Two steps are
APA, Harvard, Vancouver, ISO, and other styles
25

Liu, Hui, Hanxing Xue, and Hui Lu. "A Sensitive File Abnormal Access Detection Method Based on Application Classification." Security and Communication Networks 2021 (March 13, 2021): 1–7. http://dx.doi.org/10.1155/2021/6684456.

Full text
Abstract:
As the access control mode of notepad files cannot meet the requirements of risk control for sensitive file hierarchical access, this paper proposes an application classification-based detection method for abnormal access to sensitive files. The application classification and file classification, access control policy mapping, and basic and preset policy detection are designed. Combining the operating system’s identification control of different applications at runtime, we monitor the abnormal access of sensitive files by hierarchical applications. The cross-access experiment of different leve
APA, Harvard, Vancouver, ISO, and other styles
26

O.Pandithurai, Et al. "Cloud Storage Systems with Secure Attribute-Based Access Control." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 3 (2023): 327–31. http://dx.doi.org/10.17762/ijritcc.v11i3.9862.

Full text
Abstract:
This research presents a novel approach to safe access procedure in cloud storage structure by addressing the challenges associated with managing and distributing complex secret keys. The proposed procedure utilizes attribute-based access control and incorporates a client process, an authentication terminal process, and a storage terminal process. The client generates a main secret key and public parameters for each user using an attribute password mechanism. The authentication terminal maintains user attribute, file attribute, and attribute secret key databases. Access control is determined b
APA, Harvard, Vancouver, ISO, and other styles
27

Chang, M., and T. Kamewari. "EM-002B computer control development." Proceedings, annual meeting, Electron Microscopy Society of America 47 (August 6, 1989): 60–61. http://dx.doi.org/10.1017/s0424820100152276.

Full text
Abstract:
The EM-002B is an ultrahigh resolution TEM with unique TEM-probe analytical capabilities. In its standard configuration, one set of lens current parameters along with 20 specimen stage XY coordinate sets can be stored in a non-volatile memory. The first stage in implementing computer control of the microscope involves extending the ability to store and recall multiple lens parameter and stage position sets.This has been accomplished by adding a standard RS-232C communications channel to the EM-002B and developing a state-of-the-art window software package to run on an IBM AT PS2 or compatible
APA, Harvard, Vancouver, ISO, and other styles
28

Paganini, Alberto, and Florian Wechsung. "Fireshape: a shape optimization toolbox for Firedrake." Structural and Multidisciplinary Optimization 63, no. 5 (2021): 2553–69. http://dx.doi.org/10.1007/s00158-020-02813-y.

Full text
Abstract:
AbstractWe introduce Fireshape, an open-source and automated shape optimization toolbox for the finite element software Firedrake. Fireshape is based on the moving mesh method and allows users with minimal shape optimization knowledge to tackle with ease challenging shape optimization problems constrained to partial differential equations (PDEs).
APA, Harvard, Vancouver, ISO, and other styles
29

Ochilov, Nizomiddin. "Creating Secure File Systems in Open-Source Operating Systems." WSEAS TRANSACTIONS ON SYSTEMS 21 (November 24, 2022): 221–32. http://dx.doi.org/10.37394/23202.2022.21.24.

Full text
Abstract:
The relevance of this study is determined by insecure data storage on personal computers, as it is the main operating system that performs authentication and file access control. Bypassing these security rules is possible in case of using another open-source operating system on the same personal computer. The aim of this work is the research and development of file encryptors, disk encryptors and file system encryptors. Each of them has its shortcomings which manifest themselves during development. Combining the advantages of file encryptors and file system encryptors helped to overcome those
APA, Harvard, Vancouver, ISO, and other styles
30

Aljobouri, Hadeel K. "A Virtual EMG Signal Control and Analysis for Optimal Hardware Design." International Journal of Online and Biomedical Engineering (iJOE) 18, no. 02 (2022): 154–66. http://dx.doi.org/10.3991/ijoe.v18i02.27047.

Full text
Abstract:
Background: A muscle-computer interface is one of the new applications of the human-computer interface technologies and specifically the brain-computer interface. Brain-muscle-computer interface based on the Electromyography (EMG) signal. EMG signal is an electrical activity from a muscle that is used as an input for effecting several tasks.Objective: This work presented an interfacing process between the Graphical User Interface (GUI) and hardware system. Using the implemented system, the researcher shall deals with the raw EMG data easily by analyzing the signal from the muscle sensor detect
APA, Harvard, Vancouver, ISO, and other styles
31

Jamuna, V., and S. Palanivel Rajan. "VOICE RECOGNIZATION FOR MOUSE CONTROL USING HCI." JOURNAL OF ADVANCES IN CHEMISTRY 12, no. 10 (2016): 4440–048. http://dx.doi.org/10.24297/jac.v12i10.6708.

Full text
Abstract:
One of the most important research areas in the field of Human -Computer-Interaction (HCI) is gesture recognition as it provides a natural and intuitive way to communicate between people and machines. Voice-based HCI applications range from computer applications to virtual/augmented reality and is recently being explored in other fields. This work proposes the implementation of absolute virtual mouse based on the interpretation of voice reorganization control. The procedure is to control the mouse pointer as for the mouse movement to up/down/left/right, open the file, dragging the file. This v
APA, Harvard, Vancouver, ISO, and other styles
32

Delorme, Arnaud, Tim Mullen, Christian Kothe, et al. "EEGLAB, SIFT, NFT, BCILAB, and ERICA: New Tools for Advanced EEG Processing." Computational Intelligence and Neuroscience 2011 (2011): 1–12. http://dx.doi.org/10.1155/2011/130714.

Full text
Abstract:
We describe a set of complementary EEG data collection and processing tools recently developed at the Swartz Center for Computational Neuroscience (SCCN) that connect to and extend the EEGLAB software environment, a freely available and readily extensible processing environment running under Matlab. The new tools include (1) a new and flexible EEGLAB STUDY design facility for framing and performing statistical analyses on data from multiple subjects; (2) a neuroelectromagnetic forward head modeling toolbox (NFT) for building realistic electrical head models from available data; (3) a source in
APA, Harvard, Vancouver, ISO, and other styles
33

Hotzel, Stephan. "Comparing two concepts of the OECD-NEA RK&M Initiative (2011–2019): The Set of Essential Records and the Key Information File." Safety of Nuclear Waste Disposal 1 (November 10, 2021): 255–56. http://dx.doi.org/10.5194/sand-1-255-2021.

Full text
Abstract:
Abstract. In the last decade, the Nuclear Energy Agency (NEA) of the OECD​​​​​​​ co-ordinated an international initiative to develop understanding and guidelines related to the longer-term preservation of records, knowledge and memory (RK&M) regarding radioactive waste repositories, the so-called “RK&M Initiative”. Their final report (NEA, 2019) can be read as a general guide to the RK&M preservation topic. In terms of practical support, the group prepared an RK&M preservation toolbox, comprising 35 different preservation mechanisms. Amongst those are classical,
APA, Harvard, Vancouver, ISO, and other styles
34

Karim, Cherifi, and Hariche Kamel. "Design of a Matlab toolbox and GUI for minimal realizations." Indonesian Journal of Electrical Engineering and Computer Science (IJEECS) 17, no. 2 (2020): 929–40. https://doi.org/10.11591/ijeecs.v17.i2.pp929-940.

Full text
Abstract:
Minimal realization for linear systems has been studied extensively in the literature. Techniques proposed differ in terms of the configuration of the state space form, the time efficiency of the algorithm and the reduction of memory storage. The minimal realization toolbox presented in this paper offers the possibility to test different methods and choose the most suitable form depending on the application. The given system can be represented by a transfer function or by raw (frequency or time domain) data. A graphical user interface (GUI) was implemented in order to ease the use of this tool
APA, Harvard, Vancouver, ISO, and other styles
35

Muresan, Cristina I., Iulia Bunescu, Isabela Birs, and Robin De De Keyser. "A Novel Toolbox for Automatic Design of Fractional Order PI Controllers Based on Automatic System Identification from Step Response Data." Mathematics 11, no. 5 (2023): 1097. http://dx.doi.org/10.3390/math11051097.

Full text
Abstract:
This paper describes a novel automatic control toolbox, designed for non-experienced practitioners. Fractional order (FO) controllers are easily tuned with the main purpose of easy practical implementation. Experimental step data are required for the automatic FO controller tuning. An embedded system identification algorithm uses the step data to obtain a process model as a second order plus dead-time (SOPDT) system. Finally, the FO controller is computed based on the previously estimated SOPDT model in order to fulfil a set of user-imposed frequency domain performance specifications: phase ma
APA, Harvard, Vancouver, ISO, and other styles
36

Şuşcă, Mircea, Vlad Mihaly, Mihai Stănese, Dora Morar, and Petru Dobra. "Unified CACSD Toolbox for Hybrid Simulation and Robust Controller Synthesis with Applications in DC-to-DC Power Converter Control." Mathematics 9, no. 7 (2021): 731. http://dx.doi.org/10.3390/math9070731.

Full text
Abstract:
The current article presents the design, implementation, validation, and use of a Computer-Aided Control System Design (CACSD) toolbox for nonlinear and hybrid system uncertainty modeling, simulation, and control using μ synthesis. Remarkable features include generalization of classical system interconnection operations to nonlinear and hybrid systems, automatic computation of equilibrium points for nonlinear systems, and optimization of least conservative uncertainty bounds, with direct applicability for μ synthesis. A unified approach is presented for the step-down (buck), step-up (boost), a
APA, Harvard, Vancouver, ISO, and other styles
37

Concha, Antonio, David Luviano‐Cruz, G. Calderon, and S. K. Gadi. "Control and Identification Toolbox (CIT): An Android application for teaching automatic control and system identification." Computer Applications in Engineering Education 27, no. 5 (2019): 1186–201. http://dx.doi.org/10.1002/cae.22145.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

K. Abdul Zahra, Atheel, and Wasan A. Wali. "Design of Optimal STSMC Method Based on FPGA to Track the Trajectory of 2-DOF Robot Manipulator." Iraqi Journal for Electrical and Electronic Engineering 20, no. 2 (2024): 226–35. http://dx.doi.org/10.37917/ijeee.20.2.19.

Full text
Abstract:
This article emphasizes on a strategy to design a Super Twisting Sliding Mode Control (STSMC) method. The proposed controller depends on the device of Field Programmable Gate Array (FPGA) for controlling the trajectory of robot manipulator. The gains of the suggested controller are optimized using Chaotic Particle Swarm Optimization (PSO) in MATLAB toolbox software and Simulink environment. Since the control systems speed has an influence on their stability requirements and performance, (FPGA) device is taken in consideration. The proposed control method based on FPGA is implemented using Xili
APA, Harvard, Vancouver, ISO, and other styles
39

Bai, Ying. "Design of Motion Control System Based on DXF Graphic File." Information Technology Journal 12, no. 15 (2013): 3096–102. http://dx.doi.org/10.3923/itj.2013.3096.3102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Bezák, Pavol. "Improving Cognitive Skills of the Industrial Robot." Research Papers Faculty of Materials Science and Technology Slovak University of Technology 23, s1 (2015): 19–28. http://dx.doi.org/10.1515/rput-2015-0023.

Full text
Abstract:
Abstract At present, there are plenty of industrial robots that are programmed to do the same repetitive task all the time. Industrial robots doing such kind of job are not able to understand whether the action is correct, effective or good. Object detection, manipulation and grasping is challenging due to the hand and object modeling uncertainties, unknown contact type and object stiffness properties. In this paper, the proposal of an intelligent humanoid hand object detection and grasping model is presented assuming that the object properties are known. The control is simulated in the Matlab
APA, Harvard, Vancouver, ISO, and other styles
41

Cajo, Ricardo, Shiquan Zhao, Isabela Birs, et al. "An Advanced Fractional Order Method for Temperature Control." Fractal and Fractional 7, no. 2 (2023): 172. http://dx.doi.org/10.3390/fractalfract7020172.

Full text
Abstract:
Temperature control in buildings has been a highly studied area of research and interest since it affects the comfort of occupants. Commonly, temperature systems like centralized air conditioning or heating systems work with a fixed set point locally set at the thermostat, but users turn on or turn off the system when they feel it is too hot or too cold. This configuration is clearly not optimal in terms of energy consumption or even thermal comfort for users. Model predictive control (MPC) has been widely used for temperature control systems. In MPC design, the objective function involves the
APA, Harvard, Vancouver, ISO, and other styles
42

Numsomran, Arjin, Thanit Trisuwannawat та Vittaya Tipsuwanporn. "Adaptive Fractional Order PIλDμ Control for Multi-Configuration Tank Process (MCTP) Toolbox". International Journal of Intelligent Engineering and Systems 11, № 5 (2018): 21–35. http://dx.doi.org/10.22266/ijies2018.1031.03.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Qiu, Jing, Feng Dong, and Guanglu Sun. "Disassemble Byte Sequence Using Graph Attention Network." JUCS - Journal of Universal Computer Science 28, no. 7 (2022): 758–75. http://dx.doi.org/10.3897/jucs.76528.

Full text
Abstract:
Disassembly is the basis of static analysis of binary code and is used in malicious code detection, vulnerability mining, software optimization, etc. Disassembly of arbitrary suspicious code blocks (e.g., for suspicious traffic packets intercepted by the network) is a difficult task. Traditional disassembly methods require manual specification of the starting address and cannot automate the disassembly of arbitrary code blocks. In this paper, we propose a disassembly method based on code extension selection network by combining traditional linear sweep and recursive traversal methods. First, e
APA, Harvard, Vancouver, ISO, and other styles
44

Umesh Rai, B., and L. Umanand. "Bond graph toolbox for handling complex variable." IET Control Theory & Applications 3, no. 5 (2009): 551–60. http://dx.doi.org/10.1049/iet-cta.2007.0347.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Albadri, Nehad, and Stijn Dekeyser. "A novel file system supporting rich file classification." Computers and Electrical Engineering 103 (October 2022): 108081. http://dx.doi.org/10.1016/j.compeleceng.2022.108081.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Gabbar, Hossam A., Abderrazak Chahid, Md Jamiul Alam Khan, Oluwabukola Grace Adegboro, and Matthew Immanuel Samson. "CTIMS: Automated Defect Detection Framework Using Computed Tomography." Applied Sciences 12, no. 4 (2022): 2175. http://dx.doi.org/10.3390/app12042175.

Full text
Abstract:
Non-Destructive Testing (NDT) is one of the inspection techniques used in industrial tool inspection for quality and safety control. It is performed mainly using X-ray Computed Tomography (CT) to scan the internal structure of the tools and detect the potential defects. In this paper, we propose a new toolbox called the CT-Based Integrity Monitoring System (CTIMS-Toolbox) for automated inspection of CT images and volumes. It contains three main modules: first, the database management module, which handles the database and reads/writes queries to retrieve or save the CT data; second, the pre-pr
APA, Harvard, Vancouver, ISO, and other styles
47

Ren, Wei, Lingling Zeng, Ran Liu, and Chi Cheng. "F2AC: A Lightweight, Fine-Grained, and Flexible Access Control Scheme for File Storage in Mobile Cloud Computing." Mobile Information Systems 2016 (2016): 1–9. http://dx.doi.org/10.1155/2016/5232846.

Full text
Abstract:
Current file storage service models for cloud servers assume that users either belong to single layer with different privileges or cannot authorize privileges iteratively. Thus, the access control is not fine-grained and flexible. Besides, most access control methods at cloud servers mainly rely on computationally intensive cryptographic algorithms and, especially, may not be able to support highly dynamic ad hoc groups with addition and removal of group members. In this paper, we propose a scheme called F2AC, which is a lightweight, fine-grained, and flexible access control scheme for file st
APA, Harvard, Vancouver, ISO, and other styles
48

Gavish, Bezalel, John H. Gerdes, Suresh Sridhar, and Krishnamoorthy Srinivasan. "An Algorithm For Concurrency Control In Replicated File Systems." INFOR: Information Systems and Operational Research 35, no. 1 (1997): 1–14. http://dx.doi.org/10.1080/03155986.1997.11732315.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Cotroneo, Tommaso, and Jacob Dijk. "Modeling With the Behavioral Toolbox." Mathematical and Computer Modelling of Dynamical Systems 8, no. 4 (2002): 361–76. http://dx.doi.org/10.1076/mcmd.8.4.361.15847.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Jang, Hyeongwon, Sang Youp Rhee, Jae Eun Kim, et al. "AutoBahn: a concurrency control framework for non-volatile file buffer." Cluster Computing 23, no. 2 (2019): 895–910. http://dx.doi.org/10.1007/s10586-019-02964-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!