116 resultados para Object-Z
Resumo:
This paper presents the design of a dual Z-source inverter that can be used with either a single dc source or two isolated dc sources. Unlike traditional inverters, the integration of a properly designed Z-source network and semiconductor switches to the proposed dual inverter allows buck-boost power conversion to be performed over a wide modulation range, with three-level output waveforms generated. The connection of an additional transformer to the inverter ac output also allows all generic wye-or delta-connected loads with three-wire or four-wire configuration to be supplied by the inverter. Modulationwise, the dual inverter can be controlled using a carefully designed carrier-based pulsewidth-modulation (PWM) scheme that will always ensure balanced voltage boosting of the Z-source network while simultaneously achieving reduced common-mode switching. Because of the omission of dead-time delays in the dual-inverter PWM scheme, its switched common-mode voltage can be completely eliminated, unlike in traditional inverters, where narrow common-mode spikes are still generated. Under semiconductor failure conditions, the presented PWM schemes can easily be modified to allow the inverter to operate without interruption, and for cases where two isolated sources are used, zero common-mode voltage can still be ensured. These theoretical findings, together with the inverter practicality, have been confirmed in simulations both using PSIM with Matlab/Simulink coupler and experimentally using a laboratory-implemented inverter prototype.
Resumo:
To prevent unauthorized access to protected trusted platform module (TPM) objects, authorization protocols, such as the object-specific authorization protocol (OSAP), have been introduced by the trusted computing group (TCG). By using OSAP, processes trying to gain access to the protected TPM objects need to prove their knowledge of relevant authorization data before access to the objects can be granted. Chen and Ryan’s 2009 analysis has demonstrated OSAP’s authentication vulnerability in sessions with shared authorization data. They also proposed the Session Key Authorization Protocol (SKAP) with fewer stages as an alternative to OSAP. Chen and Ryan’s analysis of SKAP using ProVerif proves the authentication property. The purpose of this paper was to examine the usefulness of Colored Petri Nets (CPN) and CPN Tools for security analysis. Using OSAP and SKAP as case studies, we construct intruder and authentication property models in CPN. CPN Tools is used to verify the authentication property using a Dolev–Yao-based model. Verification of the authentication property in both models using the state space tool produces results consistent with those of Chen and Ryan.
Resumo:
Throughout a lifetime of operation, a mobile service robot needs to acquire, store and update its knowledge of a working environment. This includes the ability to identify and track objects in different places, as well as using this information for interaction with humans. This paper introduces a long-term updating mechanism, inspired by the modal model of human memory, to enable a mobile robot to maintain its knowledge of a changing environment. The memory model is integrated with a hybrid map that represents the global topology and local geometry of the environment, as well as the respective 3D location of objects. We aim to enable the robot to use this knowledge to help humans by suggesting the most likely locations of specific objects in its map. An experiment using omni-directional vision demonstrates the ability to track the movements of several objects in a dynamic environment over an extended period of time.
Resumo:
Increased awareness of environmental concerns has caused greater interest in developing power sources based on renewable technologies, such as wind. Due to the intermittent nature of the wind speed, output voltage and frequency of the direct driven permanent magnet synchronous generators (PMSG) are normally unsteady. Recently proposed Z-source inverter has been considered as a potential solution for grid interfacing wind power generators, thanks to buck-boost function that the single stage Z-source inverter can offer. Two control methodologies, namely unified controller for isolated operation and a multi-loop controller for grid interfaced operation are investigated in this paper. Theoretical analysis of these two control schemes is presented and experimental results to verify the effectiveness of the control method are also included.
Resumo:
A Z-source inverter based grid-interface for a variable-speed wind turbine connected to a permanent magnet synchronous generator is proposed. A control system is designed to harvest maximum wind energy under varied wind conditions with the use of the permanent magnet synchronous generator, diode-rectifier and Z-source inverter. Control systems for speed regulation of the generator and for DC- and AC- sides of the Z-source inverter are investigated using computer simulations and laboratory experiments. Simulation and experimental results verify the efficacy of the proposed approach.
Resumo:
This paper addresses the question: what is the relationship between the term ADHD, and the object it purports to represent? While the most familiar linguistic position—Referential Theory— suggests that the term constitute an etymological peg corresponding to a particular part of nature, there are other, arguably more sophisticated, philosophical approaches that point to an altogether more complex relationship. These approaches do not assume that ‘behaviour disorders’, such as ADHD, are objective facts of nature, facts to which words can simply be adhered. Using the work of Wittgenstein, the intention here is to use the philosophy of language to destabilise, not just the relationship between the term ADHD and the idea to which it applies, but also the coherence of the notion of ADHD itself.
Resumo:
Computational neuroscience aims to elucidate the mechanisms of neural information processing and population dynamics, through a methodology of incorporating biological data into complex mathematical models. Existing simulation environments model at a particular level of detail; none allow a multi-level approach to neural modelling. Moreover, most are not engineered to produce compute-efficient solutions, an important issue because sufficient processing power is a major impediment in the field. This project aims to apply modern software engineering techniques to create a flexible high performance neural modelling environment, which will allow rigorous exploration of model parameter effects, and modelling at multiple levels of abstraction.
Resumo:
Neu-Model, an ongoing project aimed at developing a neural simulation environment that is extremely computationally powerful and flexible, is described. It is shown that the use of good Software Engineering techniques in Neu-Model’s design and implementation is resulting in a high performance system that is powerful and flexible enough to allow rigorous exploration of brain function at a variety of conceptual levels.
Resumo:
We propose a method for learning specific object representations that can be applied (and reused) in visual detection and identification tasks. A machine learning technique called Cartesian Genetic Programming (CGP) is used to create these models based on a series of images. Our research investigates how manipulation actions might allow for the development of better visual models and therefore better robot vision. This paper describes how visual object representations can be learned and improved by performing object manipulation actions, such as, poke, push and pick-up with a humanoid robot. The improvement can be measured and allows for the robot to select and perform the `right' action, i.e. the action with the best possible improvement of the detector.
Resumo:
Aims: We assessed the diagnostic performance of z-scores to define a significant delta cardiac troponin (cTn) in a cohort of patients with well-defined clinical outcomes. Methods: We calculated z-scores, which are dependent on the analytical precision and biological variation, to report changes in cTn. We compared the diagnostic performances of a relative delta (%Δ), actual delta (Δ), and z-scores in 762 emergency department patients with symptoms of suspected acute coronary syndrome. cTn was measured with sensitive cTnI (Beckman Coulter), highly sensitive cTnI (Abbott), and highly sensitive cTnT (Roche) assays. Results: Receiver operating characteristic analysis showed no statistically significant differences in the areas under the curve (AUC) of z-scores and Δ with both superior compared to %Δ for all three assays (p<0.001). The AUCs of z-scores measured with the Abbott hs-cTnI (0.955) and Roche hs-cTnT (0.922) assays were comparable to Beckman Coulter cTnI (0.933) (p=0.272 and 0.640, respectively). The individualized Δ cut-off values that were required to emulate a z-score of 1.96 were: Beckman Coulter cTnI 30 ng/l, Abbott hs-cTnI 20 ng/l, and Roche hs-cTnT 7 ng/l. Conclusions: z-scores allow the use of a single cut-off value at all cTn levels, for both cTnI and cTnT and for sensitive and highly sensitive assays, with comparable diagnostic performances. This strategy of reporting significant changes as z-scores may obviate the need for the empirical development of assay-specific cut-off rules to define significant troponin changes.