948 resultados para control error
Resumo:
Prior to the development of a production standard control system for ML Aviation's plan-symmetric remotely piloted helicopter system, SPRITE, optimum solutions to technical requirements had yet to be found for some aspects of the work. This thesis describes an industrial project where solutions to real problems have been provided within strict timescale constraints. Use has been made of published material wherever appropriate, new solutions have been contributed where none existed previously. A lack of clearly defined user requirements from potential Remotely Piloted Air Vehicle (RPAV) system users is identified, A simulation package is defined to enable the RPAV designer to progress with air vehicle and control system design, development and evaluation studies and to assist the user to investigate his applications. The theoretical basis of this simulation package is developed including Co-axial Contra-rotating Twin Rotor (CCTR), six degrees of freedom motion, fuselage aerodynamics and sensor and control system models. A compatible system of equations is derived for modelling a miniature plan-symmetric helicopter. Rigorous searches revealed a lack of CCTR models, based on closed form expressions to obviate integration along the rotor blade, for stabilisation and navigation studies through simulation. An economic CCTR simulation model is developed and validated by comparison with published work and practical tests. Confusion in published work between attitude and Euler angles is clarified. The implementation of package is discussed. dynamic adjustment of assessment. the theory into a high integrity software Use is made of a novel technique basing the integration time step size on error Simulation output for control system stability verification, cross coupling of motion between control channels and air vehicle response to demands and horizontal wind gusts studies are presented. Contra-Rotating Twin Rotor Flight Control System Remotely Piloted Plan-Symmetric Helicopter Simulation Six Degrees of Freedom Motion ( i i)
Resumo:
Congestion control is critical for the provisioning of quality of services (QoS) over dedicated short range communications (DSRC) vehicle networks for road safety applications. In this paper we propose a congestion control method for DSRC vehicle networks at road intersection, with the aims of providing high availability and low latency channels for high priority emergency safety applications while maximizing channel utilization for low priority routine safety applications. In this method a offline simulation based approach is used to find out the best possible configurations of message rate and MAC layer backoff exponent (BE) for a given number of vehicles equipped with DSRC radios. The identified best configurations are then used online by an roadside access point (AP) for system operation. Simulation results demonstrated that this adaptive method significantly outperforms the fixed control method under varying number of vehicles. The impact of estimation error on the number of vehicles in the network on system level performance is also investigated.
Resumo:
Given evidence of effects of mobile phone use on driving, and also legislation, many careful drivers refrain from answering their phones when driving. However, the distracting influence of a call on driving, even in the context of not answering, has not been examined. Furthermore, given that not answering may be contrary to an individual’s normal habits, this study examined whether distraction caused by the ignored call varies according to normal intention to answer whilst driving. That is, determining whether the effect is more than a simple matter of noise distraction. Participants were 27 young drivers (18-29 years), all regular mobile users. A Theory of Planned Behaviour questionnaire examined predictors of intention to refrain from answering calls whilst driving. Participants provided their mobile phone number and were instructed not to answer their phone if it were to ring during a driving simulation. The simulation scenario had seven hazards (e.g. car pulling out, pedestrian crossing) with three being immediately preceded by a call. Infractions (e.g. pedestrian collisions, vehicle collisions, speed exceedances) were significantly greater when distracted by call tones than with no distraction. Lower intention to ignore calls whilst driving correlated with a larger effect of distraction, as was feeling unable to control whether one answered whilst driving (Perceived Behavioural Control). The study suggests that even an ignored call can cause significantly increased infractions in simulator driving, with pedestrian collisions and speed exceedances being striking examples. Results are discussed in relation to cognitive demands of inhibiting normal behaviour and to drivers being advised to switch phones off whilst driving.
Resumo:
Purpose: To compare vision-related quality-of-life measures between children wearing orthokeratology (OK) contact lenses and distance single-vision (SV) spectacles. Methods: Subjects 6 to 12 years of age and with myopia of -0.75 to -4.00 diopters and astigmatism less than or equal to 1.00 diopters were prospectively assigned OK contact lens or SV spectacle correction. A pediatric refractive error profile questionnaire was administered at 12- and 24-month intervals to evaluate children's perceptions in terms of overall vision, near vision, far distance vision, symptoms, appearance, satisfaction, activities, academic performance, handling, and peer perceptions. The mean score of all items was calculated as the overall score. Additionally, parents/guardians were asked to rate their child's mode of visual correction and their intention to continue treatment after study completion. Results: Thirty-one children were fitted with OK contact lenses and 30 with SV spectacles. Children wearing OK contact lenses rated overall vision, far distance vision, symptoms, appearance, satisfaction, activities, academic performance, handling, peer perceptions, and the overall score significantly better than children wearing SV spectacles (all P<0.05). Near vision and handling were, respectively, rated better (P<0.001) and similar (P=0.44) for SV spectacles in comparison to OK contact lenses. No significant differences were found between 12 and 24 months for any of the subjective ratings assessed (all P>0.05). Parents/guardians of children wearing OK contact lenses rated visual correction method and intention to continue treatment higher than parents of children wearing SV spectacles (P=0.01). Conclusion: The results indicate that the significant improvement in vision-related quality of life and acceptability with OK contact lenses is an incentive to engage in its use for the control of myopia in children.
Resumo:
We find the probability distribution of the fluctuating parameters of a soliton propagating through a medium with additive noise. Our method is a modification of the instanton formalism (method of optimal fluctuation) based on a saddle-point approximation in the path integral. We first solve consistently a fundamental problem of soliton propagation within the framework of noisy nonlinear Schrödinger equation. We then consider model modifications due to in-line (filtering, amplitude and phase modulation) control. It is examined how control elements change the error probability in optical soliton transmission. Even though a weak noise is considered, we are interested here in probabilities of error-causing large fluctuations which are beyond perturbation theory. We describe in detail a new phenomenon of soliton collapse that occurs under the combined action of noise, filtering and amplitude modulation. © 2004 Elsevier B.V. All rights reserved.
Resumo:
This paper is concerned with synchronization of complex stochastic dynamical networks in the presence of noise and functional uncertainty. A probabilistic control method for adaptive synchronization is presented. All required probabilistic models of the network are assumed to be unknown therefore estimated to be dependent on the connectivity strength, the state and control values. Robustness of the probabilistic controller is proved via the Liapunov method. Furthermore, based on the residual error of the network states we introduce the definition of stochastic pinning controllability. A coupled map lattice with spatiotemporal chaos is taken as an example to illustrate all theoretical developments. The theoretical derivation is complemented by its validation on two representative examples.
Resumo:
A probabilistic indirect adaptive controller is proposed for the general nonlinear multivariate class of discrete time system. The proposed probabilistic framework incorporates input–dependent noise prediction parameters in the derivation of the optimal control law. Moreover, because noise can be nonstationary in practice, the proposed adaptive control algorithm provides an elegant method for estimating and tracking the noise. For illustration purposes, the developed method is applied to the affine class of nonlinear multivariate discrete time systems and the desired result is obtained: the optimal control law is determined by solving a cubic equation and the distribution of the tracking error is shown to be Gaussian with zero mean. The efficiency of the proposed scheme is demonstrated numerically through the simulation of an affine nonlinear system.
Resumo:
Access control (AC) is a necessary defense against a large variety of security attacks on the resources of distributed enterprise applications. However, to be effective, AC in some application domains has to be fine-grain, support the use of application-specific factors in authorization decisions, as well as consistently and reliably enforce organization-wide authorization policies across enterprise applications. Because the existing middleware technologies do not provide a complete solution, application developers resort to embedding AC functionality in application systems. This coupling of AC functionality with application logic causes significant problems including tremendously difficult, costly and error prone development, integration, and overall ownership of application software. The way AC for application systems is engineered needs to be changed. ^ In this dissertation, we propose an architectural approach for engineering AC mechanisms to address the above problems. First, we develop a framework for implementing the role-based access control (RBAC) model using AC mechanisms provided by CORBA Security. For those application domains where the granularity of CORBA controls and the expressiveness of RBAC model suffice, our framework addresses the stated problem. ^ In the second and main part of our approach, we propose an architecture for an authorization service, RAD, to address the problem of controlling access to distributed application resources, when the granularity and support for complex policies by middleware AC mechanisms are inadequate. Applying this architecture, we developed a CORBA-based application authorization service (CAAS). Using CAAS, we studied the main properties of the architecture and showed how they can be substantiated by employing CORBA and Java technologies. Our approach enables a wide-ranging solution for controlling the resources of distributed enterprise applications. ^
Resumo:
Access control (AC) is a necessary defense against a large variety of security attacks on the resources of distributed enterprise applications. However, to be effective, AC in some application domains has to be fine-grain, support the use of application-specific factors in authorization decisions, as well as consistently and reliably enforce organization-wide authorization policies across enterprise applications. Because the existing middleware technologies do not provide a complete solution, application developers resort to embedding AC functionality in application systems. This coupling of AC functionality with application logic causes significant problems including tremendously difficult, costly and error prone development, integration, and overall ownership of application software. The way AC for application systems is engineered needs to be changed. In this dissertation, we propose an architectural approach for engineering AC mechanisms to address the above problems. First, we develop a framework for implementing the role-based access control (RBAC) model using AC mechanisms provided by CORBA Security. For those application domains where the granularity of CORBA controls and the expressiveness of RBAC model suffice, our framework addresses the stated problem. In the second and main part of our approach, we propose an architecture for an authorization service, RAD, to address the problem of controlling access to distributed application resources, when the granularity and support for complex policies by middleware AC mechanisms are inadequate. Applying this architecture, we developed a CORBA-based application authorization service (CAAS). Using CAAS, we studied the main properties of the architecture and showed how they can be substantiated by employing CORBA and Java technologies. Our approach enables a wide-ranging solution for controlling the resources of distributed enterprise applications.
Resumo:
The world's oceans are slowly becoming more acidic. In the last 150 yr, the pH of the oceans has dropped by ~0.1 units, which is equivalent to a 25% increase in acidity. Modelling predicts the pH of the oceans to fall by 0.2 to 0.4 units by the year 2100. These changes will have significant effects on marine organisms, especially those with calcareous skeletons such as echinoderms. Little is known about the possible long-term impact of predicted pH changes on marine invertebrate larval development. Here we predict the consequences of increased CO2 (corresponding to pH drops of 0.2 and 0.4 units) on the larval development of the brittlestar Ophiothrix fragilis, which is a keystone species occurring in high densities and stable populations throughout the shelf seas of northwestern Europe (eastern Atlantic). Acidification by 0.2 units induced 100% larval mortality within 8 d while control larvae showed 70% survival over the same period. Exposure to low pH also resulted in a temporal decrease in larval size as well as abnormal development and skeletogenesis (abnormalities, asymmetry, altered skeletal proportions). If oceans continue to acidify as expected, ecosystems of the Atlantic dominated by this keystone species will be seriously threatened with major changes in many key benthic and pelagic ecosystems. Thus, it may be useful to monitor O. fragilis populations and initiate conservation if needed.
Resumo:
Short-term changes in sea surface conditions controlling the thermohaline circulation in the northern North Atlantic are expected to be especially efficient in perturbing global climate stability. Here we assess past variability of sea surface temperature (SST) in the northeast Atlantic and Norwegian Sea during Marine Isotope Stage (MIS) 2 and, in particular, during the Last Glacial Maximum (LGM). Five high-resolution SST records were established on a meridional transect (53°N-72°N) to trace centennial-scale oscillations in SST and sea-ice cover. We used three independent computational techniques (SIMMAX modern analogue technique, Artificial Neural Networks (ANN), and Revised Analog Method (RAM)) to reconstruct SST from planktonic foraminifer census counts. SIMMAX and ANN reproduced short-term SST oscillations of similar magnitude and absolute levels, while RAM, owing to a restrictive analog selection, appears less suitable for reconstructing "cold end" SST. The SIMMAX and ANN SST reconstructions support the existence of a weak paleo-Norwegian Current during Dansgaard-Oeschger (DO) interstadials number 4, 3, 2, and 1. During the LGM, two warm incursions of 7°C water to occurred in the northern North Atlantic but ended north of the Iceland Faroe Ridge. A rough numerical estimate shows that the near-surface poleward heat transfer from 53° across the Iceland-Faroe Ridge up to to 72° N dropped to less than 60% of the modern value during DO interstadials and to almost zero during DO stadials. Summer sea ice was generally confined to the area north of 70°N and only rarely expanded southward along the margins of continental ice sheets. Internal LGM variability of North Atlantic (>40°N) SST in the GLAMAP 2000 compilation (Sarnthein et al., 2003, doi:10.1029/2002PA000771; Pflaumann et al., 2003, doi:10.1029/2002PA000774) indicates maximum instability in the glacial subpolar gyre and at the Iberian Margin, while in the Nordic Seas, SST was continuously low.
Resumo:
BACKGROUND: Although most gastrointestinal stromal tumours (GIST) carry oncogenic mutations in KIT exons 9, 11, 13 and 17, or in platelet-derived growth factor receptor alpha (PDGFRA) exons 12, 14 and 18, around 10% of GIST are free of these mutations. Genotyping and accurate detection of KIT/PDGFRA mutations in GIST are becoming increasingly useful for clinicians in the management of the disease. METHOD: To evaluate and improve laboratory practice in GIST mutation detection, we developed a mutational screening quality control program. Eleven laboratories were enrolled in this program and 50 DNA samples were analysed, each of them by four different laboratories, giving 200 mutational reports. RESULTS: In total, eight mutations were not detected by at least one laboratory. One false positive result was reported in one sample. Thus, the mean global rate of error with clinical implication based on 200 reports was 4.5%. Concerning specific polymorphisms detection, the rate varied from 0 to 100%, depending on the laboratory. The way mutations were reported was very heterogeneous, and some errors were detected. CONCLUSION: This study demonstrated that such a program was necessary for laboratories to improve the quality of the analysis, because an error rate of 4.5% may have clinical consequences for the patient.
Resumo:
We consider the a posteriori error analysis and hp-adaptation strategies for hp-version interior penalty discontinuous Galerkin methods for second-order partial differential equations with nonnegative characteristic form on anisotropically refined computational meshes with anisotropically enriched elemental polynomial degrees. In particular, we exploit duality based hp-error estimates for linear target functionals of the solution and design and implement the corresponding adaptive algorithms to ensure reliable and efficient control of the error in the prescribed functional to within a given tolerance. This involves exploiting both local isotropic and anisotropic mesh refinement and isotropic and anisotropic polynomial degree enrichment. The superiority of the proposed algorithm in comparison with standard hp-isotropic mesh refinement algorithms and an h-anisotropic/p-isotropic adaptive procedure is illustrated by a series of numerical experiments.