999 resultados para Protocol controller


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Proportional, Integral and Derivative (PID) regulators are standard building blocks for industrial automation. The popularity of these regulators comes from their rebust performance in a wide range of operating conditions, and also from their functional simplicity, which makes them suitable for manual tuning.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper we consider the learning problem for a class of multilayer perceptrons which is practically relevant in control systems applications. By reformulating this problem, a new criterion is developed, which reduces the number of iterations required for the learning phase.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper is on the implementation of a dual axis positioning system controller. The system was designed to be used for space-dependent ultrasound signal acquisition problems, such as pressure field mapping. The work developed can be grouped in two main subjects: hardware and software. Each axis includes one stepper motor connected to a driver circuit, which is then connected to a processing unit. The graphical user interface is simple and clear for the user. The system resolution was computed as 127 mu m with an accuracy of 2.44 mu m. Although the target application is ultrasound signal acquisition, the controller can be applied to other devices that has up to four stepper motors. The application was developed as an open source software, thus it can be used or changed to fit different purposes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Dissertação de mestrado, Aquacultura e Pescas, Faculdade de Ciências e Tecnologia, Universidade do Algarve, 2015

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Next generation ATM systems cannot be implemented in a technological vacuum. The further ahead we look, the greater the likely impact of societal factors on such changes, and how they are prioritised and promoted. The equitable sustainability of travel behaviour is rising on the political agenda in Europe in an unprecedented manner. This paper examines pilot and controller attitudes towards Continuous Descent Approaches (CDAs). It aims to promote a better understanding of acceptance of change in ATM. The focus is on the psychosocial context and the relationships between perceived societal and system benefits. Behavioural change appeared more correlated with such benefit perceptions in the case of the pilots. For the first time in the study of ATM implementation, and acceptance of change, this paper incorporates the Seven Stages of Change model, based on the constructs of the Theory of Planned Behaviour. It employs a principal components (factor) analysis, and further explores the intercorrelations of benefit perceptions, known in psychology as the ‘halo effect’. Disbenefit perceptions may break down this effect, it appears. For implementers of change, this evidence suggests an approach in terms of reinforcing the dominant benefit(s) perceived, for sub-groups within which a halo effect is evident. In the absence of such an effect, perceived disbenefits, such as with respect to workload and capacity, should be off-set against specific, perceived benefits of the change, as far as possible. This methodology could be equally applied to other stakeholders, from strategic planners to the public. The set of three case studies will be extended beyond CDA trials. A set of concise guidelines will be published with a strong focus on practical advice, in addition to continued work enabling a better understanding of the expected, increasing psychosocial contributions to successful and unsuccessful efforts at ATM innovation and change.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Introduction: Coronary heart disease (CHD) is one of the leading causes of death in both men and women worldwide. Despite the common misconception that CHD is a ‘man's disease’, it is now well accepted that women endure worse clinical outcomes than men following CHD-related events. A number of studies have explored whether or not gender differences exist in patients presenting with CHD, and specifically whether women delay seeking help for cardiac conditions. UK and overseas studies on help-seeking for emergency cardiac events are contradictory, yet suggest that women often delay help-seeking. In addition, no studies have looked at presumed cardiac symptoms outside an emergency situation. Given the lack of understanding in this area, an explorative qualitative study on the gender differences in help-seeking for a non-emergency cardiac events is needed. Methods and analysis: A purposive sample of 20–30 participants of different ethnic backgrounds and ages attending a rapid access chest pain clinic will be recruited to achieve saturation. Semistructured interviews focusing on help-seeking decision-making for apparent cardiac symptoms will be undertaken. Interview data will be analysed thematically using qualitative software (NVivo) to understand any similarities and differences between the way men and women construct help-seeking. Findings will also be used to inform the preliminary development of a cardiac help-seeking intentions questionnaire. Ethics and dissemination: Ethical approvals were sought and granted. Namely, the University of Westminster (sponsor) and St Georges NHS Trust REC, and the Trust Research and Development Office granted approval to host the study on the Queen Mary's Roehampton site. The study is low risk, with interviews being conducted on hospital premises during working hours. Investigators will disseminate findings via presentations and publications. Participants will receive a written summary of the key findings.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As ameaças à segurança da informação, (INFOSEC) atentam contra a perda da respectiva confidencialidade, integridade e disponibilidade, pelo que as organizações são impelidas a implementar políticas de segurança, quer ao nível físico quer ao nível lógico, utilizando mecanismos específicos de defesa. O projecto Network Air Gap Controller (NAGC) foi concebido no sentido de contribuir para as questões da segurança, designadamente daquelas que se relacionam directamente com a transferência de informação entre redes de classificação de segurança diferenciadas ou de sensibilidades distintas, sem requisitos de comunicação em tempo real, e que mereçam um maior empenho nas condições de robustez, de disponibilidade e de controlo. Os organismos que, em razão das atribuições e competências cometidas, necessitam de fazer fluir informação entre este tipo de redes, são por vezes obrigados a realizar a transferência de dados com recurso a um processo manual, efectuado pelo homem e não pela máquina, que envolve dispositivos amovivéis, como sejam o CD, DVD, PEN, discos externos ou switches manuais. Neste processo, vulgarmente designado por Network Air Gap (NAG), o responsável pela transferência de dados deverá assumir de forma infalível, como atribuições intrínsecas e inalienáveis da função exercida, as garantias do cumprimento de um vasto conjunto de normas regulamentares. As regras estabelecidas desdobram-se em ferramentas e procedimentos que se destinam, por exemplo, à guarda em arquivo de todas as transferências efectuadas; à utilização de ferramentas de segurança (ex: antivírus) antes da colocação da informação na rede de classificação mais elevada; ao não consentimento de transferência de determinados tipos de ficheiro (ex: executáveis) e à garantia de que, em consonância com a autonomia que normalmente é delegada no elemento responsável pela operação das comunicações, apenas se efectuam transferências de informação no sentido da rede de classificação inferior para a rede de classificação mais elevada. Face ao valor da informação e do impacto na imagem deste tipo de organizações, o operador de comunicações que não cumpra escrupulosamente o determinado é inexoravelmente afastado dessas funções, sendo que o processo de apuramento de responsabilidades nem sempre poderá determinar de forma inequívoca se as razões apontam para um acto deliberado ou para factores não intencionais, como a inépcia, o descuido ou a fadiga. Na realidade, as actividades periódicas e rotineiras, tornam o homem propenso à falha e poderão ser incontornavelmente asseguradas, sem qualquer tipo de constrangimentos ou diminuição de garantias, por soluções tecnológicas, desde que devidamente parametrizadas, adaptadas, testadas e amadurecidas, libertando os recursos humanos para tarefas de manutenção, gestão, controlo e inspecção. Acresce que, para este tipo de organizações, onde se multiplicam o número de redes de entrada de informação, com diferentes classificações e actores distintos, e com destinatários específicos, a utilização deste tipo de mecanismos assume uma importância capital. Devido a este factor multiplicativo, impõe-se que o NAGC represente uma opção válida em termos de oferta tecnológica, designadamente para uma gama de produtos de baixíssimo custo e que possa desenvolver-se por camadas de contributo complementar, em função das reais necessidades de cada cenário.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Consider a distributed computer system comprising many computer nodes, each interconnected with a controller area network (CAN) bus. We prove that if priorities to message streams are assigned using rate-monotonic (RM) and if the requested capacity of the CAN bus does not exceed 25% then all deadlines are met.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Database query languages on relations (for example SQL) make it possible to join two relations. This operation is very common in desktop/server database systems but unfortunately query processing systems in networked embedded computer systems currently do not support this operation; specifically, the query processing systems TAG, TinyDB, Cougar do not support this. We show how a prioritized medium access control (MAC) protocol can be used to efficiently execute the database operation join for networked embedded computer systems where all computer nodes are in a single broadcast domain.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The IEEE 802.15.4 is the most widespread used protocol for Wireless Sensor Networks (WSNs) and it is being used as a baseline for several higher layer protocols such as ZigBee, 6LoWPAN or WirelessHART. Its MAC (Medium Access Control) supports both contention-free (CFP, based on the reservation of guaranteed time-slots GTS) and contention based (CAP, ruled by CSMA/CA) access, when operating in beacon-enabled mode. Thus, it enables the differentiation between real-time and best-effort traffic. However, some WSN applications and higher layer protocols may strongly benefit from the possibility of supporting more traffic classes. This happens, for instance, for dense WSNs used in time-sensitive industrial applications. In this context, we propose to differentiate traffic classes within the CAP, enabling lower transmission delays and higher success probability to timecritical messages, such as for event detection, GTS reservation and network management. Building upon a previously proposed methodology (TRADIF), in this paper we outline its implementation and experimental validation over a real-time operating system. Importantly, TRADIF is fully backward compatible with the IEEE 802.15.4 standard, enabling to create different traffic classes just by tuning some MAC parameters.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we address the problem of sharing a wireless channel among a set of sporadic message streams where a message stream issues transmission requests with real-time deadlines. We propose a collision-free wireless medium access control (MAC) protocol which implements static-priority scheduling, supports a large number of priority levels and is fully distributed. It is an adaptation to a wireless channel of the dominance protocol used in the CAN bus. But, unlike that protocol, our protocol does not require a node having the ability to receive an incoming bit from the channel while transmitting to the channel. The evaluation of the protocol with real embedded computing platforms is presented to show that the proposed protocol is in fact collision-free and prioritized. We measure the response times of our implementation and show that the response-time analysis developed for the protocol offers an upper bound on the response times.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The IEEE 802.15.4/ZigBee protocols are gaining increasing interests in both research and industrial communities as candidate technologies for Wireless Sensor Network (WSN) applications. In this paper, we present an open-source implementation of the IEEE 802.15.4/Zigbee protocol stack under the TinyOS operating system for the MICAz motes. This work has been driven by the need for an open-source implementation of the IEEE 802.15.4/ZigBee protocols, filling a gap between some newly released complex C implementations and black-box implementations from different manufacturers. In addition, we share our experience on the challenging problem that we have faced during the implementation of the protocol stack on the MICAz motes. We strongly believe that this open-source implementation will potentiate research works on the IEEE 802.15.4/Zigbee protocols allowing their demonstration and validation through experimentation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Consider a wireless sensor network (WSN) where a broadcast from a sensor node does not reach all sensor nodes in the network; such networks are often called multihop networks. Sensor nodes take sensor readings but individual sensor readings are not very important. It is important however to compute aggregated quantities of these sensor readings. The minimum and maximum of all sensor readings at an instant are often interesting because they indicate abnormal behavior, for example if the maximum temperature is very high then it may be that a fire has broken out. We propose an algorithm for computing the min or max of sensor reading in a multihop network. This algorithm has the particularly interesting property of having a time complexity that does not depend on the number of sensor nodes; only the network diameter and the range of the value domain of sensor readings matter.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Consider a network where all nodes share a single broadcast domain such as a wired broadcast network. Nodes take sensor readings but individual sensor readings are not the most important pieces of data in the system. Instead, we are interested in aggregated quantities of the sensor readings such as minimum and maximum values, the number of nodes and the median among a set of sensor readings on different nodes. In this paper we show that a prioritized medium access control (MAC) protocol may advantageously be exploited to efficiently compute aggregated quantities of sensor readings. In this context, we propose a distributed algorithm that has a very low time and message-complexity for computing certain aggregated quantities. Importantly, we show that if every sensor node knows its geographical location, then sensor data can be interpolated with our novel distributed algorithm, and the message-complexity of the algorithm is independent of the number of nodes. Such an interpolation of sensor data can be used to compute any desired function; for example the temperature gradient in a room (e.g., industrial plant) densely populated with sensor nodes, or the gas concentration gradient within a pipeline or traffic tunnel.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Wireless Sensor Networks (WSNs) have been attracting increasing interests for developing a new generation of embedded systems with great potential for many applications such as surveillance, environment monitoring, emergency medical response and home automation. However, the communication paradigms in WSNs differ from the ones attributed to traditional wireless networks, triggering the need for new communication protocols. In this context, the recently standardised IEEE 802.15.4 protocol presents some potentially interesting features for deployment in wireless sensor network applications, such as power-efficiency, timeliness guarantees and scalability. Nevertheless, when addressing WSN applications with (soft/hard) timing requirements some inherent paradoxes emerge, such as power-efficiency versus timeliness, triggering the need of engineering solutions for an efficient deployment of IEEE 802.15.4 in WSNs. In this technical report, we will explore the most relevant characteristics of the IEEE 802.15.4 protocol for wireless sensor networks and present the most important challenges regarding time-sensitive WSN applications. We also provide some timing performance and analysis of the IEEE 802.15.4 that unveil some directions for resolving the previously mentioned paradoxes.