696 resultados para Engineering, Industrial|Engineering, System Science|Operations Research
Resumo:
This paper presents a novel and practical procedure for estimating the mean deck height to assist in automatic landing operations of a Rotorcraft Unmanned Aerial Vehicle (RUAV) in harsh sea environments. A modified Prony Analysis (PA) procedure is outlined to deal with real-time observations of deck displacement, which involves developing an appropriate dynamic model to approach real deck motion with parameters identified through implementing the Forgetting Factor Recursive Least Square (FFRLS) method. The model order is specified using a proper order-selection criterion based on minimizing the summation of accumulated estimation errors. In addition, a feasible threshold criterion is proposed to separate the dominant components of deck displacement, which results in an accurate instantaneous estimation of the mean deck position. Simulation results demonstrate that the proposed recursive procedure exhibits satisfactory estimation performance when applied to real-time deck displacement measurements, making it well suited for integration into ship-RUAV approach and landing guidance systems.
Resumo:
This paper presents an innovative and practical approach to controlling heave motion in the presence of acute stochastic atmospheric disturbances during landing operations of an Unmanned Autonomous Helicopter (UAH). A heave motion model of an UAH is constructed for the purpose of capturing dynamic variations of thrust due to horizontal wind gusts. Additionally, through construction of an effective observer to estimate magnitudes of random gusts, a promising and feasible feedback-feedforward PD controller is developed, based on available measurements from onboard equipment. The controller dynamically and synchronously compensates for aerodynamic variations of heave motion resulting from gust influence, to increase the disturbance-attenuation ability of the UAH in a windy environment. Simulation results justify the reliability and efficiency of the suggested gust observer to estimate gust levels when applied to the heave motion model of a small unmanned helicopter, and verify suitability of the recommended control strategy to realistic environmental conditions.
Resumo:
The Vehicle-to-Grid (V2G) concept is based on the newly developed and marketed technologies of hybrid petrol-electric vehicles, most notably represented by the Toyota Prius, in combination with significant structural changes to the world's energy economy, and the growing strain on electricity networks. The work described in this presentation focuses on the market and economic impacts of grid connected vehicles. We investigate price reduction effects and transmission system expansion cost reduction. We modelled a large numbers of plug-in-hybrid vehicle batteries by aggregating them into a virtual pumped-storage power station at the Australian national electricity market's (NEM) region level. The virtual power station concept models a centralised control for dispatching (operating) the aggregated electricity supply/demand capabilities of a large number of vehicles and their batteries. The actual level of output could be controlled by human or automated agents to either charge or discharge from/into the power grid. As previously mentioned the impacts of widespread deployments of this technology are likely to be economic, environmental and physical.
Resumo:
This study resulted in the development of a decision making tool for engineering consultancies looking to diversify into new markets. It reviewed existing decision tools used by contractor's entering new markets to develop a bespoke tool for engineering consultants to establish more rigor around the decision making process rather than rely purely on the intuition of company executives. The tool can be used for developing medium and long term company strategies or as a quick and efficient way to assess the viability of new market opportunities when they arise. A combination of Delphi and Analytical Hierarchy Process was selected as the basis of the decision theory.
Resumo:
Online dating websites enable a specific form of social networking and their efficiency can be increased by supporting proactive recommendations based on participants' preferences with the use of data mining. This research develops two-way recommendation methods for people-to-people recommendation for large online social networks such as online dating networks. This research discovers the characteristics of the online dating networks and utilises these characteristics in developing efficient people-to-people recommendation methods. Methods developed support improved recommendation accuracy, can handle data sparsity that often comes with large data sets and are scalable for handling online networks with a large number of users.
Resumo:
The aims of this project is to develop demand side response model which assists electricity consumers who are exposed to the market price through aggregator to manage the air-conditioning peak electricity demand. The main contribution of this research is to show how consumers can optimise the energy cost caused by the air-conditioning load considering the electricity market price and network overload. The model is tested with selected characteristics of the room, Queensland electricity market data from Australian Energy Market Operator and data from the Bureau of Statistics on temperatures in Brisbane, during weekdays on hot days from 2011 - 2012.
Resumo:
The IEC 61850 family of standards for substation communication systems were released in the early 2000s, and include IEC 61850-8-1 and IEC 61850-9-2 that enable Ethernet to be used for process-level connections between transmission substation switchyards and control rooms. This paper presents an investigation of process bus protection performance, as the in-service behavior of multi-function process buses is largely unknown. An experimental approach was adopted that used a Real Time Digital Simulator and 'live' substation automation devices. The effect of sampling synchronization error and network traffic on transformer differential protection performance was assessed and compared to conventional hard-wired connections. Ethernet was used for all sampled value measurements, circuit breaker tripping, transformer tap-changer position reports and Precision Time Protocol synchronization of sampled value merging unit sampling. Test results showed that the protection relay under investigation operated correctly with process bus network traffic approaching 100% capacity. The protection system was not adversely affected by synchronizing errors significantly larger than the standards permit, suggesting these requirements may be overly conservative. This 'closed loop' approach, using substation automation hardware, validated the operation of protection relays under extreme conditions. Digital connections using a single shared Ethernet network outperformed conventional hard-wired solutions.
Resumo:
The development of hydrogels tailored for cartilage tissue engineering has been a research and clinical goal for over a decade. Directing cells towards a chondrogenic phenotype and promoting new matrix formation are significant challenges that must be overcome for the successful application of hydrogels in cartilage tissue therapies. Gelatin-methacrylamide (Gel-MA) hydrogels have shown promise for the repair of some tissues, but they have not been extensively investigated for cartilage tissue engineering. We encapsulated human chondrocytes in gel-MA based hydrogels, and show that with the incorporation of small quantities of photo-crosslinkable hyaluronic acid methacrylate (HA-MA), and to a lesser extent chondroitin sulfate methacrylate (CS-MA), chondrogenesis and mechanical properties can be enhanced. The addition of HA-MA to Gel-MA constructs resulted in more rounded cell morphologies, enhanced chondrogenesis as assessed by gene expression and immunofluorescence, and increased quantity and distribution of the newly synthesised ECM throughout the construct. Consequently, while the compressive moduli of control Gel-MA constructs increased by 26 kPa after 8 weeks culture, constructs with HA-MA and CS-MA increased by 96 kPa. The enhanced chondrogenic differentiation, distribution of ECM, and improved mechanical properties make these materials potential candidates for cartilage tissue engineering applications.
Resumo:
This paper presents a review of existing and current developments and the analysis of Hybrid-Electric Propulsion Systems (HEPS) for small fixed-wing Unmanned Aerial Vehicles (UAVs). Efficient energy utilisation on an UAV is essential to its functioning, often to achieve the operational goals of range, endurance and other specific mission requirements. Due to the limitations of the space available and the mass budget on the UAV, it is often a delicate balance between the onboard energy available (i.e. fuel) and achieving the operational goals. One technology with potential in this area is with the use of HEPS. In this paper, information on the state-of-art technology in this field of research is provided. A description and simulation of a parallel HEPS for a small fixed-wing UAV by incorporating an Ideal Operating Line (IOL) control strategy is described. Simulation models of the components in a HEPS were designed in the MATLAB Simulink environment. An IOL analysis of an UAV piston engine was used to determine the most efficient points of operation for this engine. The results show that an UAV equipped with this HEPS configuration is capable of achieving a fuel saving of 6.5%, compared to the engine-only configuration.
Resumo:
The Modicon Communication Bus (Modbus) protocol is one of the most commonly used protocols in industrial control systems. Modbus was not designed to provide security. This paper confirms that the Modbus protocol is vulnerable to flooding attacks. These attacks involve injection of commands that result in disrupting the normal operation of the control system. This paper describes a set of experiments that shows that an anomaly-based change detection algorithm and signature-based Snort threshold module are capable of detecting Modbus flooding attacks. In comparing these intrusion detection techniques, we find that the signature-based detection requires a carefully selected threshold value, and that the anomaly-based change detection algorithm may have a short delay before detecting the attacks depending on the parameters used. In addition, we also generate a network traffic dataset of flooding attacks on the Modbus control system protocol.
Resumo:
This paper presents a system which enhances the capabilities of a light general aviation aircraft to land autonomously in case of an unscheduled event such as engine failure. The proposed system will not only increase the level of autonomy for the general aviation aircraft industry but also increase the level of dependability. Safe autonomous landing in case of an engine failure with a certain level of reliability is the primary focus of our work as both safety and reliability are attributes of dependability. The system is designed for a light general aviation aircraft but can be extended for dependable unmanned aircraft systems. The underlying system components are computationally efficient and provides continuous situation assessment in case of an emergency landing. The proposed system is undergoing an evaluation phase using an experimental platform (Cessna 172R) in real world scenarios.
Resumo:
In many active noise control (ANC) applications, an online secondary path modelling method that uses a white noise as a training signal is required. This paper proposes a new feedback ANC system. Here we modified both the FxLMS and the VSS-LMS algorithms to raised noise attenuation and modelling accuracy for the overall system. The proposed algorithm stops injection of the white noise at the optimum point and reactivate the injection during the operation, if needed, to maintain performance of the system. Preventing continuous injection of the white noise increases the performance of the proposed method significantly and makes it more desirable for practical ANC systems. Computer simulation results shown in this paper indicate effectiveness of the proposed method.
Resumo:
With the ever-increasing penetration level of wind power, the impacts of wind power on the power system are becoming more and more significant. Hence, it is necessary to systematically examine its impacts on the small signal stability and transient stability in order to find out countermeasures. As such, a comprehensive study is carried out to compare the dynamic performances of power system respectively with three widely-used power generators. First, the dynamic models are described for three types of wind power generators, i. e. the squirrel cage induction generator (SCIG), doubly fed induction generator (DFIG) and permanent magnet generator (PMG). Then, the impacts of these wind power generators on the small signal stability and transient stability are compared with that of a substituted synchronous generator (SG) in the WSCC three-machine nine-bus system by the eigenvalue analysis and dynamic time-domain simulations. Simulation results show that the impacts of different wind power generators are different under small and large disturbances.
Resumo:
BACKGROUND Research on engineering design is a core area of concern within engineering education and a fundamental understanding of how engineering students approach and undertake design is necessary in order to develop effective design models and pedagogies. Understanding the factors related to design experiences in education and how they affect student practice can help educators as well as designers to leverage these factors as part of the design process. PURPOSE This study investigated the design practices of first-year engineering students’ and their experiences with a first-year engineering course design project. The research questions that guided the investigation were: 1. From a student perspective, what design parameters or criteria are most important? 2. How does this perspective impact subsequent student design practice throughout the design process? DESIGN/METHOD The authors employed qualitative multi-case study methods (Miles & Huberman, 1994) in order to the answer the research questions. Participant teams were observed and video recorded during team design meetings in which they researched the background for the design problem, brainstormed and sketched possible solutions, as well as built prototypes and final models of their design solutions as part of a course design project. Analysis focused on explanation building (Yin, 2009) and utilized within-case and cross-case analysis (Miles & Huberman, 1994). RESULTS We found that students focused disproportionally on the functional parameter, i.e. the physical implementation of their solution, and the possible/applicable parameter, i.e. a possible and applicable solution that benefited the user, in comparison to other given parameters such as safety and innovativeness. In addition, we found that individual teams focused on the functional and possible/ applicable parameters in early design phases such as brainstorming/ ideation and sketching. When prompted to discuss these non-salient parameters (from the student perspective) in the final design report, student design teams often used a post-hoc justification to support how the final designs fit the parameters that they did not initially consider. CONCLUSIONS This study suggests is that student design teams become fixated on (and consequently prioritize) certain parameters they interpret as important because they feel these parameters were described more explicitly in terms how they were met and assessed. Students fail to consider other parameters, perceived to be less directly assessable, unless prompted to do so. Failure to consider other parameters in the early design phases subsequently affects their approach in design phases as well. Case studies examining students’ study strategies within three Australian Universities illustrate similarities with some student approaches to design.
Resumo:
While social engineering represents a real and ominous threat to many organizations, companies, governments, and individuals, social networking sites (SNSs), have been identified as among the most common means of social engineering attacks. Owing to factors that reduce the ability of users to detect social engineering tricks and increase the ability of attackers to launch them, SNSs seem to be perfect breeding ground for exploiting the vulnerabilities of people, and the weakest link in security. This work will contribute to the knowledge of social engineering by identifying different entities and subentities that affect social engineering based attacks in SNSs. Moreover, this paper includes an intensive and comprehensive overview of different aspects of social engineering threats in SNSs.