12 resultados para Linear time invariant plant


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The last three decades have seen quite dramatic changes the way we modeled time dependent data. Linear processes have been in the center stage in modeling time series. As far as the second order properties are concerned, the theory and the methodology are very adequate.However, there are more and more evidences that linear models are not sufficiently flexible and rich enough for modeling purposes and that failure to account for non-linearities can be very misleading and have undesired consequences.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

A brief introduction to the fractional continuous-time linear systems is presented. It will be done without needing a deep study of the fractional derivatives. We will show that the computation of the impulse and step responses is very similar to the classic. The main difference lies in the substitution of the exponential by the Mittag-Leffler function. We will present also the main formulae defining the fractional derivatives.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

IEEE CIRCUITS AND SYSTEMS MAGAZINE, Third Quarter

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Signal Processing, Vol. 83, nº 11

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Nonlinear Dynamics, Vol. 29

Relevância:

40.00% 40.00%

Publicador:

Resumo:

IEE Proceedings - Vision, Image, and Signal Processing, Vol. 147, nº 1

Relevância:

40.00% 40.00%

Publicador:

Resumo:

IEE Proceedings - Vision, Image, and Signal Processing, Vol. 147, nº 1

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Nonlinear Dynamics, Vol. 38

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Abstract Background: Nanotechnology has the potential to provide agriculture with new tools that may be used in the rapid detection and molecular treatment of diseases and enhancement of plant ability to absorb nutrients, among others. Data on nanoparticle toxicity in plants is largely heterogeneous with a diversity of physicochemical parameters reported, which difficult generalizations. Here a cell biology approach was used to evaluate the impact of Quantum Dots (QDs) nanocrystals on plant cells, including their effect on cell growth, cell viability, oxidative stress and ROS accumulation, besides their cytomobility. Results: A plant cell suspension culture of Medicago sativa was settled for the assessment of the impact of the addition of mercaptopropanoic acid coated CdSe/ZnS QDs. Cell growth was significantly reduced when 100 mM of mercaptopropanoic acid -QDs was added during the exponential growth phase, with less than 50% of the cells viable 72 hours after mercaptopropanoic acid -QDs addition. They were up taken by Medicago sativa cells and accumulated in the cytoplasm and nucleus as revealed by optical thin confocal imaging. As part of the cellular response to internalization, Medicago sativa cells were found to increase the production of Reactive Oxygen Species (ROS) in a dose and time dependent manner. Using the fluorescent dye H2DCFDA it was observable that mercaptopropanoic acid-QDs concentrations between 5-180 nM led to a progressive and linear increase of ROS accumulation. Conclusions: Our results showed that the extent of mercaptopropanoic acid coated CdSe/ZnS QDs cytotoxicity in plant cells is dependent upon a number of factors including QDs properties, dose and the environmental conditions of administration and that, for Medicago sativa cells, a safe range of 1-5 nM should not be exceeded for biological applications.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Dissertação apresentada para obtenção do Grau de Doutor em Ciências do Ambiente pela Universidade Nova de Lisboa, Faculdade de Ciências e Tecn

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Dissertation to obtain the degree of Master in Chemical and Biochemical Engineering

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Mutable state can be useful in certain algorithms, to structure programs, or for efficiency purposes. However, when shared mutable state is used in non-local or nonobvious ways, the interactions that can occur via aliases to that shared memory can be a source of program errors. Undisciplined uses of shared state may unsafely interfere with local reasoning as other aliases may interleave their changes to the shared state in unexpected ways. We propose a novel technique, rely-guarantee protocols, that structures the interactions between aliases and ensures that only safe interference is possible. We present a linear type system outfitted with our novel sharing mechanism that enables controlled interference over shared mutable resources. Each alias is assigned separate, local roles encoded in a protocol abstraction that constrains how an alias can legally use that shared state. By following the spirit of rely-guarantee reasoning, our rely-guarantee protocols ensure that only safe interference can occur but still allow many interesting uses of shared state, such as going beyond invariant and monotonic usages. This thesis describes the three core mechanisms that enable our type-based technique to work: 1) we show how a protocol models an alias’s perspective on how the shared state evolves and constrains that alias’s interactions with the shared state; 2) we show how protocols can be used while enforcing the agreed interference contract; and finally, 3) we show how to check that all local protocols to some shared state can be safely composed to ensure globally safe interference over that shared memory. The interference caused by shared state is rooted at how the uses of di↵erent aliases to that state may be interleaved (perhaps even in non-deterministic ways) at run-time. Therefore, our technique is mostly agnostic as to whether this interference was the result of alias interleaving caused by sequential or concurrent semantics. We show implementations of our technique in both settings, and highlight their di↵erences. Because sharing is “first-class” (and not tied to a module), we show a polymorphic procedure that enables abstract compositions of protocols. Thus, protocols can be specialized or extended without requiring specific knowledge of the interference produce by other protocols to that state. We show that protocol composition can ensure safety even when considering abstracted protocols. We show that this core composition mechanism is sound, decidable (without the need for manual intervention), and provide an algorithm implementation.