Academic literature on the topic 'Guaranteed Transmission System'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Guaranteed Transmission System.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Guaranteed Transmission System"

1

Sugawara, Yoh, Tetsuya Miyashita, Yusuke Mizuno, et al. "Comparison between High- and Low-Cost Transmission of Tele-Anesthesia in Japan." Journal of Healthcare Engineering 2018 (June 11, 2018): 1–6. http://dx.doi.org/10.1155/2018/9615264.

Full text
Abstract:
Background. We previously reported a tele-anesthesia system that connected Sado General Hospital (SGH) to Yokohama City University Hospital (YCUH) using a dedicated virtual private network (VPN) that guaranteed the quality of service. The study indicated certain unresolved problems, such as the high cost of constantly using a dedicated VPN for tele-anesthesia. In this study, we assessed whether use of a best-effort system affects the safety and cost of tele-anesthesia in a clinical setting. Methods. One hundred patients were enrolled in this study. We provided tele-anesthesia for 65 patients u
APA, Harvard, Vancouver, ISO, and other styles
2

Doi, H., Y. Serizawa, H. Tode, and H. Ikeda. "Simulation study of QoS guaranteed ATM transmission for future power system communication." IEEE Transactions on Power Delivery 14, no. 2 (1999): 342–48. http://dx.doi.org/10.1109/61.754072.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Xiao, Mei Hua, Jie Tan, and Li Ke Zhuang. "The Research and Implementation of an Electronic Seal System Based on CAPICOM." Advanced Materials Research 734-737 (August 2013): 3228–33. http://dx.doi.org/10.4028/www.scientific.net/amr.734-737.3228.

Full text
Abstract:
In order to guarantee the secure transmission and efficient authentication of electronic official document paper, this paper puts forward the design plan of the electronic seal system with the technologies of CAPICOM, SHA-1 and USBKey. The design plan implements document protection function with major forms of electronic signature, handwritten signature and keyboard notation. Examination result and analysis proves that the system can ensure the security of the seal and guaranteed the integrality, authentication and non-repudiation of the documents. The system has broad application potential in
APA, Harvard, Vancouver, ISO, and other styles
4

Filin, S. A., S. N. Moiseev, and M. S. Kondakov. "Fast and Efficient QoS-Guaranteed Adaptive Transmission Algorithm in the Mobile WiMAX System." IEEE Transactions on Vehicular Technology 57, no. 6 (2008): 3477–87. http://dx.doi.org/10.1109/tvt.2008.919930.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Yali, Shuangxi Hong, and Junna Zhang. "Providing delay-guaranteed multicast transmission services for an SDN-based publish/subscribe system." China Communications 16, no. 12 (2019): 176–87. http://dx.doi.org/10.23919/jcc.2019.12.014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zhu, Qixin, Kaihong Lu, Guangming Xie, and Yonghong Zhu. "Guaranteed Cost Fault-Tolerant Control for Networked Control Systems with Sensor Faults." Mathematical Problems in Engineering 2015 (2015): 1–9. http://dx.doi.org/10.1155/2015/549347.

Full text
Abstract:
For the large scale and complicated structure of networked control systems, time-varying sensor faults could inevitably occur when the system works in a poor environment. Guaranteed cost fault-tolerant controller for the new networked control systems with time-varying sensor faults is designed in this paper. Based on time delay of the network transmission environment, the networked control systems with sensor faults are modeled as a discrete-time system with uncertain parameters. And the model of networked control systems is related to the boundary values of the sensor faults. Moreover, using
APA, Harvard, Vancouver, ISO, and other styles
7

Luo, Pu. "DLL-Based Receiver for High Speed Data Transmission." Advanced Materials Research 753-755 (August 2013): 2471–74. http://dx.doi.org/10.4028/www.scientific.net/amr.753-755.2471.

Full text
Abstract:
For modern high speed DAC, receiving data reliably from FPGA is a big challenge, data-independent skew is the major problem. usually system employ data clock while transmitting LVDS data from FPGA. then LVDS data is latched by delayed data clock which generated by DLL in chip. Because DLL has a negative feedback loop, system suffer small effect of PVT variations, robustness is guaranteed. The receiving circuits were implemented in a all-digital 0.18μm CMOS technology ,occupies 0.7 mm2 of area. It operates in the frequency range of 20 MHz~600 MHz.
APA, Harvard, Vancouver, ISO, and other styles
8

Shi, Zhiguang, Zongyu Zuo, and Hao Liu. "Backstepping control for gear transmission servo systems with unknown partially nonsymmetric deadzone nonlinearity." Proceedings of the Institution of Mechanical Engineers, Part C: Journal of Mechanical Engineering Science 231, no. 14 (2016): 2580–89. http://dx.doi.org/10.1177/0954406216639343.

Full text
Abstract:
This paper deals with the output tracking control of gear transmission servo (GTS) systems in the presence of deadzone nonlinearity with nonsymmetric beak points and unknown parameters. A novel differentiable deadzone model with nonsymmetric break points is put forward, which greatly facilitates the control design for a class of mechanical systems in the presence of deadzone nonlinearity. A new smooth backstepping controller, based on the newly-developed model, is proposed for the nominal system. Then, guaranteed robust steady-state performance of the closed-loop system with parametric uncerta
APA, Harvard, Vancouver, ISO, and other styles
9

Ayyappan, Sonal, C. Lakshmi, and Varun Menon. "A Secure Reversible Data Hiding and Encryption System for Embedding EPR in Medical Images." Current Signal Transduction Therapy 15, no. 2 (2020): 124–35. http://dx.doi.org/10.2174/1574362414666190304162411.

Full text
Abstract:
Background: Recent advances in medical associated technologies have drastically increased the amount of electronic medical records collected, stored and transferred through the network. Considering the significance and level of sensitivity of the collected medical data, the security of the transmitted data has become a very vital and challenging task for researchers. The protection of these medical images with embedded data is usually guaranteed using encryption or data hiding techniques. Conventional techniques that employ encryption or data hiding are often insecure and also time-consuming d
APA, Harvard, Vancouver, ISO, and other styles
10

Denisenko, V. V. "Analysis of the queue buffer transmitting device through the channel multiple access with guaranteed delivery of packets." Proceedings of the Voronezh State University of Engineering Technologies 80, no. 3 (2018): 70–73. http://dx.doi.org/10.20914/2310-1202-2018-3-70-73.

Full text
Abstract:
The article deals with the modeling of the process of data transmission from sensors in the industrial production of vinyl acetate. The data packets are transferred from the sensors to the control system and the control effect is directed to the temperature regulators of the gas-vapor mixture, the vapor pressure of the refrigerant. oxygen consumption and return acetic acid consumption by industrial Ethernet protocols over a multiple access channel with carrier control and detection of CSMA / CD collisions (Carrier Sense Multiple Access with Collision Detection). The main bottleneck of the syst
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Guaranteed Transmission System"

1

Marañón, Cano Cristina Milagros, and Sánchez Dante Martín Puicón. "Propuestas para agilizar los procesos de promoción de la inversión privada de los proyectos del sistema garantizado de transmisión de los proyectos vinculantes del plan de transmisión." Master's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2021. http://hdl.handle.net/10757/655802.

Full text
Abstract:
El presente trabajo tiene por finalidad identificar las causas que ralentizan las adjudicaciones de los proyectos del Sistema Garantizado de Transmisión del Plan de Transmisión cuya entrega en concesión al sector privado le es encargada a la Agencia de Promoción de la Inversión Privada (PROINVERSIÓN) por parte del Ministerio de Energía y Minas (MINEM). De la revisión de la normativa para el desarrollo de las Asociaciones Público Privadas (APP) que rige el actuar de PROINVERSIÓN, aunada a la investigación realizada respecto de los procesos de promoción de la inversión privada de los proyectos t
APA, Harvard, Vancouver, ISO, and other styles
2

Zhang, Zhongju. "Data network pricing under quality of service (QoS) guarantee : single class and multiple classes /." Thesis, Connect to this title online; UW restricted, 2003. http://hdl.handle.net/1773/8842.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

"Providing quality of service guarantees in cross-path packet switch." 2000. http://library.cuhk.edu.hk/record=b6073259.

Full text
Abstract:
by Chan Man Chi.<br>"June 2000."<br>Thesis (Ph.D.)--Chinese University of Hong Kong, 2000.<br>Includes bibliographical references (p. 150-[160]).<br>Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web.<br>Mode of access: World Wide Web.<br>Abstracts in English and Chinese.
APA, Harvard, Vancouver, ISO, and other styles
4

Moodliar, Suvania. "Cross-layer design for support of delay bound quality of service guarantees over fading channels." Thesis, 2011. http://hdl.handle.net/10413/9868.

Full text
Abstract:
Quality-of-service (QoS) guarantees have become critically important for the transmission of real-time multimedia traffic in next generation mobile wireless networks. The aim of this dissertation is to investigate the cross-layer design for support of delay bound QoS guarantees over fading channels. Providing diverse QoS guarantees presents a challenge due to the time-varying fading nature of wireless channels. Existing physical layer modelling is inadequate in supporting real time QoS metrics such as delay, hence adaptive techniques need to be extended to the upper-protocol layers. The first
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Guaranteed Transmission System"

1

Kordlar, M., G. Ekbatanifard, A. Jahangiry, and R. Ahmadi. "A Transmission Method to Guarantee QoS Parameters in Wireless Sensor Network." In Advances in Network-Based Information Systems. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-65521-5_72.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Li, Hui, and Xin Yang. "Key Technologies of Sovereignty Network." In Co-governed Sovereignty Network. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-2670-8_4.

Full text
Abstract:
AbstractIn order to realize all functions of the sovereignty network while guarantee the security at the same time, what key technologies should be used in the architecture? This chapter will elaborate on the key technologies of the sovereignty network. Firstly, on application layer, we proposed a large-scale multilateral managed consortium blockchain technology named as Proof of Vote to construct the multi-identifier system (MIS) for all nations in the world to jointly and equally co-manage the top-level identifiers, which assures the intercommunication between different nations. Meanwhile, each nation owns autonomy on low-level identifiers of its corresponding top-level identifiers, which reflects independent of cyberspace sovereignty. Then, we proposed some efficient algorithms to support inter-translating and addressing for multi-identifier and huge size of hundred billion identifiers, together with the hyperbolic routing scheme forming the core technologies of network layer in MIN Architecture. Technologies for guaranteeing privacy, security, and transmission control, etc. were also presented.
APA, Harvard, Vancouver, ISO, and other styles
3

Zorba, Nizar, and Christos V. Verikoukis. "Quality of Service in Heterogeneous Traffic Wireless Systems." In Wireless Network Traffic and Quality of Service Support. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-61520-771-8.ch004.

Full text
Abstract:
The use of real-time delay-sensitive applications in wireless systems has significantly increased during the last years. Consequently, the demand to guarantee certain Quality of Service (QoS) is a challenging issue for the system’s designers. On the other hand, the use of multiple antennas has already been included in several commercial standards, where the multibeam opportunistic transmission beamforming strategies have been proposed to improve the performance of the wireless systems. A cross-layer based dynamically tuned queue length scheduler is presented in this chapter, for the Downlink of multiuser and multiantenna WLAN systems with heterogeneous traffic requirements. An opportunistic scheduling algorithm is applied, while users from higher priority traffic classes are prioritized. A trade-off between the throughput maximization of the system and the guarantee of the QoS requirements is obtained. Therefore the length of the queue is dynamically adjusted to select the appropriate conditions based on the operator requirements.
APA, Harvard, Vancouver, ISO, and other styles
4

Giallanza, Antonio, Ferdinando Morace, and Giuseppe Marannano. "Design of a Close Power Loop Test Bench for Contra-Rotating Propellers." In Progress in Marine Science and Technology. IOS Press, 2020. http://dx.doi.org/10.3233/pmst200042.

Full text
Abstract:
The aim of the research is to develop an azimuthing contra-rotating propeller for commercial applications with a power of 2000 kW. The thruster system is designed especially to be installed on high speed crafts (HSCs) for passenger transport with a cruising speed of about 35–40 knots. The topic is very useful because the azimuth thruster solutions currently do not find commercial applications in naval units for passenger transport. The latter are heavy, not very efficient from a hydrodynamic point of view and suitable for maximum cruising speed of about 18–20 knots. The study is interesting because among the advantages that these solutions provide are the possibility of transmitting very high torques and to guarantee a much longer life cycle. In more detail, the propulsion is realized by using a C-drive configuration, with a first mechanical transmission realized by using bevel gears mounted in a frame inside the hull, and a second transmission realized by bevel gears housed in a profiled hull at the lower end of a support structure. In the profiled hull will be installed the shafts of the propellers, in a contra-rotating configuration. In order to optimize the system before its industrial use, a close power loop test bench has been studied and designed to test high power transmissions. The test configuration allows to implement a back-to-back connection between two identical azimuthing contra-rotating propellers. Moreover, the particular test bench allows to size the electric motor simply based on the dissipated power by the kinematic mechanisms. Since the efficiency of these systems are very high, it is not necessary to use large electric motors, thus managing to contain the operating costs of the testing phase. The most significant disadvantage is the need to have two identical transmissions with consequent increase in installation costs. Through the back-to-back test bench it was possible to study the increase in efficiency compared to traditional systems.
APA, Harvard, Vancouver, ISO, and other styles
5

Murugan, Suriya, and Anandakumar H. "Study of Efficient Hybrid Wireless Networks Using QoS-Oriented Distributed Routing Protocol." In Advances in Social Networking and Online Communities. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7522-1.ch011.

Full text
Abstract:
Hybrid networks are next generation of wireless networks that are increasingly used in wireless communications that highly support real time transmission with a limited quality of service. The study proves that existing systems use QoS-oriented distributed routing protocols to enhance the QoS support capability of hybrid networks and it transforms the packet routing problem to a resource scheduling problem which has five algorithms. They are (1) QoS-guaranteed neighbor election algorithm, (2) distributed packet scheduling algorithm, (3) mobility-based segment resizing algorithm, (4) traffic redundant elimination algorithm, and (5) data redundancy elimination-based transmission algorithm. To increase the performance of hybrid networks in a real mobility model, this chapter analyses and devises a method to authenticate data streams for transmission. Data transparent authentication without communication overhead is an approach which reduces breakdown of original data or sends out-of-band authentication information.
APA, Harvard, Vancouver, ISO, and other styles
6

Alexiou, A. "Adaptive Transmission of Multimedia Data over UMTS." In Encyclopedia of Mobile Computing and Commerce. IGI Global, 2007. http://dx.doi.org/10.4018/978-1-59904-002-8.ch004.

Full text
Abstract:
As communications technology is being developed, users’ demand for multimedia services raises. Meanwhile, the Internet has enjoyed tremendous growth in recent years. Consequently, there is a great interest in using the IP-based networks to provide multimedia services. One of the most important areas in which the issues are being debated is the development of standards for the universal mobile telecommunications system (UMTS). UMTS constitutes the third generation of cellular wireless networks which aims to provide high-speed data access along with real-time voice calls. Wireless data is one of the major boosters of wireless communications and one of the main motivations of the next-generation standards. Bandwidth is a valuable and limited resource for UMTS and every wireless network in general. Therefore, it is of extreme importance to exploit this resource in the most efficient way. Consequently, when a user experiences a streaming video, there should be enough bandwidth available at any time for any other application that the mobile user might need. In addition, when two different applications run together, the network should guarantee that there is no possibility for any of the above-mentioned applications to prevail against the other by taking all the available channel bandwidth. Since Internet applications adopt mainly TCP as the transport protocol, while streaming applications mainly use RTP, the network should guarantee that RTP does not prevail against the TCP traffic. This means that there should be enough bandwidth available in the wireless channel for the Internet applications to run properly.
APA, Harvard, Vancouver, ISO, and other styles
7

Anbar, Mohammad, and Deo P. Vidyarthi. "Maximizing the Flow Reliability in Cellular IP Network Using PSO." In Advancements and Innovations in Wireless Communications and Network Technologies. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2154-1.ch001.

Full text
Abstract:
A Cellular IP (CIP) network involves a bulk of data transmission. It is highly reliable and guarantees the safe delivery of the packets required in such systems. Reliable traffic performance leads to efficient and reliable connectivity in Cellular IP network. CIP network, which consists of mobile hosts, base stations, and links, are often vulnerable and prone to failure. During the routing operation in the network, the base station, which works as router for the transmitted packets, may fail to perform. Reliable transmission is desirable, in terms of services of the base stations in the network, reliable routing, and processing the data. In this paper, the authors design a reliability model to increase the reliability of a flow, consisting of packets, passing through routers in a Cellular IP network. Particle Swarm Optimization (PSO) is able to solve a class of complex optimization problems. PSO is used to improve the reliability of the flow in CIP network. The proposed model studies the effects of packet processing rate (), packet arrival rate (), and the number of packets per flow on the reliability of the system. A simulation experiment is conducted and results reveal the effectiveness of the model.
APA, Harvard, Vancouver, ISO, and other styles
8

Ezirim, Kenneth, Shamik Sengupta, and Ping Ji. "Distributed Mechanisms for Multiple Channel Acquisition in a System of Uncoordinated Cognitive Radio Networks." In Advances in Wireless Technologies and Telecommunication. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-6571-2.ch014.

Full text
Abstract:
Due to the constraint imposed by the Dynamic Spectrum Access paradigm, Cognitive Radio (CR) networks are entangled in persistent competition for opportunistic access to underutilized spectrum resources. In order to maintain quality of service, each network faces the challenge of acquiring dynamic enough channels to meet channel size requirement. The main goal of every CR network is to minimize the amount of contention experienced during channel acquisition and to maximize the utility derived from acquired channels. This is a major challenge, especially without a global communication protocol that can facilitate communication between the networks. This chapter discusses self-coexistence of CR networks in a decentralized system with no support for coordinated radio transmission activities. Channel acquisition mechanisms that can help networks minimize contention and maximize utility are also discussed. The mechanisms guarantee fast convergence of the system leading to an equilibrium state whereby networks are able to operate on acquired channel with minimal or zero contention.
APA, Harvard, Vancouver, ISO, and other styles
9

Bose, Indranil, and Fong Man Chun. "Voice Over Internet Protocol." In Encyclopedia of Internet Technologies and Applications. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59140-993-9.ch093.

Full text
Abstract:
One of the hottest technologies these days is voice communication over packet-switched data networks. This is known as voice over Internet protocol (VoIP). Hardy (2003) defines VoIP as “the interactive voice exchange capability carried over packet switched transport employing the Internet protocol.” With VoIP, voice signal from the sender is digitized into packets that are transmitted to the receiver through a network,which often includes the Internet. As the Internet is a free resource, the communication cost of VoIP is much lower than that of traditional telephone systems. This is a major advantage of VoIP. VoIP system also increases the efficiency and service quality of businesses. As a result of VoIP, many advanced applications can be built and these include unified messaging, video conferencing, and ring list. But VoIP is not without its limitations. Its main drawback is low reliability. It also suffers from uncertain quality of voice transmission. In addition, it cannot guarantee security because it uses public networks. Although the idea of VoIP was known from the 1970s, it did not become commercially viable until 1995, when Vocaltec became the first company to produce the first commercially available VoIP product (Varshney et al., 2002).
APA, Harvard, Vancouver, ISO, and other styles
10

Kalloniatis, Christos, Argyri Pattakou, Evangelia Kavakli, and Stefanos Gritzalis. "Designing Secure and Privacy-Aware Information Systems." In Censorship, Surveillance, and Privacy. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7113-1.ch022.

Full text
Abstract:
Pervasiveness of information systems is well underway, redefining our social and economic relationships. This technological revolution has generated enormous capabilities, but also enabled the creation of new vulnerabilities and threats. A major challenge in the field of information systems is therefore, to ensure the trustworthiness of the underlying technologies that make possible the generation, collection, storage, processing and transmission of user data at rates more intensive than ever before. Trust in information systems depends on different aspects, one of which is the security of user's data. Data security is referred as the protection of user's data from corruption and unauthorized access. Another important aspect of trust is the protection of user's privacy. Protecting privacy is about complying with user's desires when it comes to handling personal information. Without security to guarantee data protection, appropriate uses of that data cannot be realized. This implies that security and privacy issues are inherently intertwined and should be viewed synergistically. The aim of this paper is to elevate modern practices for ensuring security and privacy during software systems analysis and design. To this end, the basic security and privacy requirements that should be considered are introduced. Additionally, a number of well known methods in the research area of requirements engineering which focus on eliciting and modeling security and privacy requirements are described. Finally, a comparative analysis between these methods is presented.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Guaranteed Transmission System"

1

Chen Peng and Wu Wei-ling. "QoS-guaranteed downlink transmission optimization for multi-service distributed antenna system." In GLOBECOM '05. IEEE Global Telecommunications Conference, 2005. IEEE, 2005. http://dx.doi.org/10.1109/glocom.2005.1578486.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kieu, Phuc, and Shinichi Miyamoto. "Proposal of Multi-Hop Wireless LAN System for QOS Guaranteed Transmission." In 2006 IEEE 17th International Symposium on Personal, Indoor and Mobile Radio Communications. IEEE, 2006. http://dx.doi.org/10.1109/pimrc.2006.254143.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mei, Jingxian, and Kah-seng Chung. "Adaptive Power Control on Transmission Rate Guaranteed Data Services in a WCDMA System." In 2006 Asia-Pacific Conference on Communications. IEEE, 2006. http://dx.doi.org/10.1109/apcc.2006.255803.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Filin, S. A., S. N. Moiseev, M. S. Kondakov, et al. "QoS-guaranteed cross-layer adaptive transmission algorithms for the IEEE 802.16 OFDMA system." In IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006. IEEE, 2006. http://dx.doi.org/10.1109/wcnc.2006.1683600.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Filin, Stanislav, Sergey Moiseev, Mikhail Kondakov, et al. "QoS-Guaranteed Cross-Layer Adaptive Transmission Algorithms with Selective ARQ for the IEEE 802.16 OFDMA System." In IEEE Vehicular Technology Conference. IEEE, 2006. http://dx.doi.org/10.1109/vtcf.2006.265.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Filin, Stanislav, Sergey Moiseev, Mikhail Kondakov, et al. "QoS-Guaranteed Cross-Layer Transmission Algorithms with Adaptive Frequency Subchannels Allocation in the IEEE 802.16 OFDMA System." In 2006 IEEE International Conference on Communications. IEEE, 2006. http://dx.doi.org/10.1109/icc.2006.255476.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chen, Zhetao, and Zhimin Xi. "Reliability-Based Optimal Design of a Micro-Grid System Under Natural Disasters." In ASME 2018 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/imece2018-88139.

Full text
Abstract:
This paper proposes reliability-based optimal design of a micro-grid system under service disruptions due to natural disasters. The objective is to determine the minimum number of generators and their distributions in the micro-grid so that the system’s recoverability (or resilience) and operation efficiency can be guaranteed under random failure scenarios of the power transmission lines. Power flow analysis combing with the Monte Carlo simulation (MCS) are used for uncertainty propagation analysis to quantify the system’s recoverability distribution and the transmission efficiency distributio
APA, Harvard, Vancouver, ISO, and other styles
8

Berbyuk, Viktor. "Towards Pareto Optimization of Performance of a Generic Synchronizer of Transmission Systems." In ASME 2015 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2015. http://dx.doi.org/10.1115/detc2015-46773.

Full text
Abstract:
Manual transmissions for passenger cars and trucks are equipped with synchronizer mechanisms. A synchronizer mechanism as a key component of a transmission system must be able to prevent transmission gears from shocking, reduce the noise and it has a great impact on driving comfort and transmission efficiency. Gear shifting improvement with respect to smooth, quick and energy efficient synchronizer’s performance is still an important issue for automotive industry. A synchronization process comprises several phases within which presynchronization, main synchronization, pre-engagement and engage
APA, Harvard, Vancouver, ISO, and other styles
9

Quaglia, Giuseppe, Matteo Nisi, and Walter Franco. "Wheelchair.q05 Final Design: An Innovative Stair-Climbing Wheelchair." In ASME 2017 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/imece2017-70750.

Full text
Abstract:
The presence of architectural barriers in public or private buildings represents an important limit for the mobility of wheelchair users. Although norms promote barriers removal, often a complete accessibility cannot be guaranteed due to economic or technical reasons. In such cases, it is necessary to provide disable people with devices able to autonomously climb architectural barriers or obstacles. Referring to user needs, some requirements for the wheelchair can be defined. Firstly, the user must use it autonomously. Secondly, it should be easy to use, simple in the mechanical and control sy
APA, Harvard, Vancouver, ISO, and other styles
10

Borboni, Alberto, Rodolfo Faglia, and Maurizio Mor. "Compliant Device for Hand Rehabilitation of Stroke Patient." In ASME 2014 12th Biennial Conference on Engineering Systems Design and Analysis. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/esda2014-20081.

Full text
Abstract:
A new device for hand rehabilitation of stroke patient is presented. Its main innovative features are: lightness, real safety guaranteed by its structural elasticity, smoothness and easiness of movements. The kinematic behavior of the system hand-plus-rehabilitation-device is analyzed. The device applicability is confirmed by positive testing. Cerebrovascular diseases are the third cause of mortality and the second cause of long term disability in Western countries. The 60% of survived individuals shows a sensitive/motor deficit of one or both hands and must be subjected to a rehabilitative tr
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!