954 resultados para current-mode design
Resumo:
A synchrotron is designed for tumour therapy with C6+ ions or proton. Its injector is a cyclotron, which delivers C5+ or H-2(+) ions to the synchrotron. After comparing the methods of the single-turn injection, the multi-turn injection and the stripping injection, this paper chooses the stripping injection method. In addition, the concept design of the injection system is presented, in which the synchrotron lattice is optimized.
Resumo:
A high detection efficiency calorimeter which is used to detect gamma-rays with energies from 1 MeV up to 10 MeV as well as light charged particles has been proposed. Design of the geometry, results of the crystal tests and Monte Carlo simulations are presented in this paper. The simulation results confirm that the calorimeter can obtain high detection efficiency and good energy resolution with the current designed geometry. And the calorimeter is competent for the future External Target Facility (ETIF) experiments.
Resumo:
A new SSC (Separated Sector Cyclotron)-Linac is being designed to serve as an injector for the SSC at the HIRFL (Heavy Ion Research Facility Lanzhou). The beam intensity at the LEBT (Low Energy Beam Transport) for the heavy ions after the selection is typically low and the space charge effects are inconspicuous. The space charge effects become obvious when the beam current increases to a few hundred microamperes. The emittance growth deriving from the space charge effects may be particularly troublesome for the following linac and cyclotron. An optical system containing three solenoids has been designed for the LEBT to limit the beam emittance and to avoid the unnecessary beam loss in the cyclotron, as well as for the purpose of immunizing the LEBT emittance growth due to the space charge effects. The results of the PIG (Particle-In-Cell) mode simulation illustrate that this channel could limit the beam emittance growth and increase the beam brightness.
Resumo:
In a laser ion source, plasma drift distance is one of the most important design parameters. Ion current density and beam pulse width are defined by plasma drift distance between a laser target and beam extraction position. In direct plasma injection scheme, which uses a laser ion source and a radio frequency quadrupole linac, we can apply relatively higher electric field at beam extraction due to the unique shape of a positively biased electrode. However, when we aim at very high current acceleration such as several tens of milliamperes, we observed mismatched beam extraction conditions. We tested three different ion current at ion extraction region by changing plasma drift distance to study better extraction condition. In this experiment, C6+ beam was accelerated. We confirmed that matching condition can be improved by controlling plasma drift distance.
Resumo:
In order to realize the common-emitter characteristics of the tris(8-hydroxyquinoline) aluminium (Alq(3))-based organic transistors, we used Au/Al double metal layer as the base, thus the vertical metal-base transistors with structure of Al/n-Si/Au/Al/Alq(3)/LiF/Al were constructed. It was found that the contact properties between the base and the organic semiconductors play an important role in the device performance. The utilization of Au/Al double layer metal base allows the devices to operate at high gain in the common-emitter and common-base mode at low operational voltage.
Resumo:
Through years of practice, reservoir management has already become the basic mode of foreign oil companies to realize the high-efficient development of the oil field. From the view of reservoir development and technological economy, reservoir management regards the study of the reservoir engineering, designs of reservoir projects and the dynamic analysis of the reservoir's performance as a system. In the fields of reservoir description, the establishment of the geological models and development models, the dynamic simulations of reservoir exploitation and the design of the oil engineering, reservoir management emphasizes the cooperation of the geology and the engineering, the combination of the engineering technology and the economic evaluation. In order to provide the means and basis for the reservoir geology study, reservoir evaluation, reserves calculation, numerical simulation, development plan and risk analysis, it adopts the reservoir management activities(team work) to make and implement the optimized oil field development management strategies so that secientific and democratic decision making can be achieved. Under the planned economic system for a long time, the purpose of Chinese reservoir development has been to fulfill the" mandatory" production task. With the deepening of the reform, the management organization of Chinese petroleum enterprises has been gradually going through the transition and reforms to the operational entity and the establishment of the mode of oil companies under the socialist market economy system. This research aims at introducing the advanced reservoir management technique from foreign countries to further improve the reservoir development results and wholly raise the economic benefits of Chinese mature land facieses sandstone reservoirs in the later stage of the water flooding. We are going to set up a set of modern reservoir management modes according to the reservoir features, current situation and existing problems of GangXi oil field of DaGang oil company. Through the study and implementation of the reservoir description and numerical simulation technology effectively, we plan to work out integrated adjustment projects, to study the related technology of oil recovery; to set up the effective confirmable data procedure and data management system of the reservoir management, to establish the coordinated model and workbench related to geology, engineering and economy in order to realize the real time supervision and evaluation on the process of reservoir development. We hope to stipulate modernization management tools for GangXi oil fields to rationally utilize various kinds of existing technological methods and to realize the economic exploitation and achieve the maximum benefits from the reservoir. The project of the modem reservoir management will be carried out on the GangXi oil field of DaGang oil company for this oil field is typical and has integrated foundamental materials and perfect networks. Besides, it is located in the good geographical position enjoying very convenient traffic. Implementing modern reservoir management will raise the recovery ratio, reduce the production cost and improve the working efficiency. Moreover, the popularization of modern reservoir management will improve the comprehensive benefits of DaGang oil company and even the whole Petro China. Through the reserch of this project, the following technical indicators can be reached: Establishing the concept of modern reservoir management. Establishing a set of integrated data information management system adapt to the features of GangXi reservoir. 3. Forming technical research modes of modern reservoir management suitable for mature reservoirs in the later developing stage. 4. Advancing projects of GangXi reservoir which are maxium optimized in engineering technique and economic benefits of oil exploitation. Besides, this set of technology, research principle and method can guide the mature reservoir of DaGang oil field and even the whole PetroChina to develop the further research of reservoir adjustment and improve the reservoir recovery factor and developing level constantly.
Resumo:
This thesis introduces elements of a theory of design activity and a computational framework for developing design systems. The theory stresses the opportunistic nature of designing and the complementary roles of focus and distraction, the interdependence of evaluation and generation, the multiplicity of ways of seeing over the history of a design session versus the exclusivity of a given way of seeing over an arbitrarily short period, and the incommensurability of criteria used to evaluate a design. The thesis argues for a principle based rather than rule based approach to designing documents. The Discursive Generator is presented as a computational framework for implementing specific design systems, and a simple system for arranging blocks according to a set of formal principles is developed by way of illustration. Both shape grammars and constraint based systems are used to contrast current trends in design automation with the discursive approach advocated in the thesis. The Discursive Generator is shown to have some important properties lacking in other types of systems, such as dynamism, robustness and the ability to deal with partial designs. When studied in terms of a search metaphor, the Discursive Generator is shown to exhibit behavior which is radically different from some traditional search techniques, and to avoid some of the well-known difficulties associated with them.
Resumo:
This thesis presents a new approach to building a design for testability (DFT) system. The system takes a digital circuit description, finds out the problems in testing it, and suggests circuit modifications to correct those problems. The key contributions of the thesis research are (1) setting design for testability in the context of test generation (TG), (2) using failures during FG to focus on testability problems, and (3) relating circuit modifications directly to the failures. A natural functionality set is used to represent the maximum functionalities that a component can have. The current implementation has only primitive domain knowledge and needs other work as well. However, armed with the knowledge of TG, it has already demonstrated its ability and produced some interesting results on a simple microprocessor.
Resumo:
Malicious software (malware) have significantly increased in terms of number and effectiveness during the past years. Until 2006, such software were mostly used to disrupt network infrastructures or to show coders’ skills. Nowadays, malware constitute a very important source of economical profit, and are very difficult to detect. Thousands of novel variants are released every day, and modern obfuscation techniques are used to ensure that signature-based anti-malware systems are not able to detect such threats. This tendency has also appeared on mobile devices, with Android being the most targeted platform. To counteract this phenomenon, a lot of approaches have been developed by the scientific community that attempt to increase the resilience of anti-malware systems. Most of these approaches rely on machine learning, and have become very popular also in commercial applications. However, attackers are now knowledgeable about these systems, and have started preparing their countermeasures. This has lead to an arms race between attackers and developers. Novel systems are progressively built to tackle the attacks that get more and more sophisticated. For this reason, a necessity grows for the developers to anticipate the attackers’ moves. This means that defense systems should be built proactively, i.e., by introducing some security design principles in their development. The main goal of this work is showing that such proactive approach can be employed on a number of case studies. To do so, I adopted a global methodology that can be divided in two steps. First, understanding what are the vulnerabilities of current state-of-the-art systems (this anticipates the attacker’s moves). Then, developing novel systems that are robust to these attacks, or suggesting research guidelines with which current systems can be improved. This work presents two main case studies, concerning the detection of PDF and Android malware. The idea is showing that a proactive approach can be applied both on the X86 and mobile world. The contributions provided on this two case studies are multifolded. With respect to PDF files, I first develop novel attacks that can empirically and optimally evade current state-of-the-art detectors. Then, I propose possible solutions with which it is possible to increase the robustness of such detectors against known and novel attacks. With respect to the Android case study, I first show how current signature-based tools and academically developed systems are weak against empirical obfuscation attacks, which can be easily employed without particular knowledge of the targeted systems. Then, I examine a possible strategy to build a machine learning detector that is robust against both empirical obfuscation and optimal attacks. Finally, I will show how proactive approaches can be also employed to develop systems that are not aimed at detecting malware, such as mobile fingerprinting systems. In particular, I propose a methodology to build a powerful mobile fingerprinting system, and examine possible attacks with which users might be able to evade it, thus preserving their privacy. To provide the aforementioned contributions, I co-developed (with the cooperation of the researchers at PRALab and Ruhr-Universität Bochum) various systems: a library to perform optimal attacks against machine learning systems (AdversariaLib), a framework for automatically obfuscating Android applications, a system to the robust detection of Javascript malware inside PDF files (LuxOR), a robust machine learning system to the detection of Android malware, and a system to fingerprint mobile devices. I also contributed to develop Android PRAGuard, a dataset containing a lot of empirical obfuscation attacks against the Android platform. Finally, I entirely developed Slayer NEO, an evolution of a previous system to the detection of PDF malware. The results attained by using the aforementioned tools show that it is possible to proactively build systems that predict possible evasion attacks. This suggests that a proactive approach is crucial to build systems that provide concrete security against general and evasion attacks.
Resumo:
To evaluate the effects of chronic lead exposure on the nervous system in adults, a set of neurobehavioural and electrophysiological tests was administered to 99 lead exposed foundry employees and 61 unexposed workers. Current and past blood lead concentrations were used to estimate the degree of lead absorption; all previous blood lead concentrations had been less than or equal to 90 micrograms/100 ml. Characteristic signs (such as wrist extensor weakness) or symptoms (such as colic) of lead poisoning were not seen. Sensory conduction in the sural nerve was not affected. By contrast, various neurobehavioural functions deteriorated with increasing lead burden. Workers with blood lead concentrations between 40 and 60 micrograms/100 ml showed impaired performance on tests of verbal concept formation, visual/motor performance, memory, and mood. Thus impairment in central nervous system function in lead exposed adults occurred in the absence of peripheral nervous system derangement and increased in severity with increasing lead dose.
Resumo:
Statistical Rate Monotonic Scheduling (SRMS) is a generalization of the classical RMS results of Liu and Layland [LL73] for periodic tasks with highly variable execution times and statistical QoS requirements. The main tenet of SRMS is that the variability in task resource requirements could be smoothed through aggregation to yield guaranteed QoS. This aggregation is done over time for a given task and across multiple tasks for a given period of time. Similar to RMS, SRMS has two components: a feasibility test and a scheduling algorithm. SRMS feasibility test ensures that it is possible for a given periodic task set to share a given resource without violating any of the statistical QoS constraints imposed on each task in the set. The SRMS scheduling algorithm consists of two parts: a job admission controller and a scheduler. The SRMS scheduler is a simple, preemptive, fixed-priority scheduler. The SRMS job admission controller manages the QoS delivered to the various tasks through admit/reject and priority assignment decisions. In particular, it ensures the important property of task isolation, whereby tasks do not infringe on each other. In this paper we present the design and implementation of SRMS within the KURT Linux Operating System [HSPN98, SPH 98, Sri98]. KURT Linux supports conventional tasks as well as real-time tasks. It provides a mechanism for transitioning from normal Linux scheduling to a mixed scheduling of conventional and real-time tasks, and to a focused mode where only real-time tasks are scheduled. We overview the technical issues that we had to overcome in order to integrate SRMS into KURT Linux and present the API we have developed for scheduling periodic real-time tasks using SRMS.
Resumo:
A method called "SymbolDesign" is proposed that can be used to design user-centered interfaces for pen-based input devices. It can also extend the functionality of pointer input devices such as the traditional computer mouse or the Camera Mouse, a camera-based computer interface. Users can create their own interfaces by choosing single-stroke movement patterns that are convenient to draw with the selected input device and by mapping them to a desired set of commands. A pattern could be the trace of a moving finger detected with the Camera Mouse or a symbol drawn with an optical pen. The core of the SymbolDesign system is a dynamically created classifier, in the current implementation an artificial neural network. The architecture of the neural network automatically adjusts according to the complexity of the classification task. In experiments, subjects used the SymbolDesign method to design and test the interfaces they created, for example, to browse the web. The experiments demonstrated good recognition accuracy and responsiveness of the user interfaces. The method provided an easily-designed and easily-used computer input mechanism for people without physical limitations, and, with some modifications, has the potential to become a computer access tool for people with severe paralysis.
Resumo:
Two complementary wireless sensor nodes for building two-tiered heterogeneous networks are presented. A larger node with a 25 mm by 25 mm size acts as the backbone of the network, and can handle complex data processing. A smaller, cheaper node with a 10 mm by 10 mm size can perform simpler sensor-interfacing tasks. The 25mm node is based on previous work that has been done in the Tyndall National Institute that created a modular wireless sensor node. In this work, a new 25mm module is developed operating in the 433/868 MHz frequency bands, with a range of 3.8 km. The 10mm node is highly miniaturised, while retaining a high level of modularity. It has been designed to support very energy efficient operation for applications with low duty cycles, with a sleep current of 3.3 μA. Both nodes use commercially available components and have low manufacturing costs to allow the construction of large networks. In addition, interface boards for communicating with nodes have been developed for both the 25mm and 10mm nodes. These interface boards provide a USB connection, and support recharging of a Li-ion battery from the USB power supply. This paper discusses the design goals, the design methods, and the resulting implementation.
Resumo:
This thesis is focused on the design and development of an integrated magnetic (IM) structure for use in high-power high-current power converters employed in renewable energy applications. These applications require low-cost, high efficiency and high-power density magnetic components and the use of IM structures can help achieve this goal. A novel CCTT-core split-winding integrated magnetic (CCTT IM) is presented in this thesis. This IM is optimized for use in high-power dc-dc converters. The CCTT IM design is an evolution of the traditional EE-core integrated magnetic (EE IM). The CCTT IM structure uses a split-winding configuration allowing for the reduction of external leakage inductance, which is a problem for many traditional IM designs, such as the EE IM. Magnetic poles are incorporated to help shape and contain the leakage flux within the core window. These magnetic poles have the added benefit of minimizing the winding power loss due to the airgap fringing flux as they shape the fringing flux away from the split-windings. A CCTT IM reluctance model is developed which uses fringing equations to accurately predict the most probable regions of fringing flux around the pole and winding sections of the device. This helps in the development of a more accurate model as it predicts the dc and ac inductance of the component. A CCTT IM design algorithm is developed which relies heavily on the reluctance model of the CCTT IM. The design algorithm is implemented using the mathematical software tool Mathematica. This algorithm is modular in structure and allows for the quick and easy design and prototyping of the CCTT IM. The algorithm allows for the investigation of the CCTT IM boxed volume with the variation of input current ripple, for different power ranges, magnetic materials and frequencies. A high-power 72 kW CCTT IM prototype is designed and developed for use in an automotive fuelcell-based drivetrain. The CCTT IM design algorithm is initially used to design the component while 3D and 2D finite element analysis (FEA) software is used to optimize the design. Low-cost and low-power loss ferrite 3C92 is used for its construction, and when combined with a low number of turns results in a very efficient design. A paper analysis is undertaken which compares the performance of the high-power CCTT IM design with that of two discrete inductors used in a two-phase (2L) interleaved converter. The 2L option consists of two discrete inductors constructed from high dc-bias material. Both topologies are designed for the same worst-case phase current ripple conditions and this ensures a like-for-like comparison. The comparison indicates that the total magnetic component boxed volume of both converters is similar while the CCTT IM has significantly lower power loss. Experimental results for the 72 kW, (155 V dc, 465 A dc input, 420 V dc output) prototype validate the CCTT IM concept where the component is shown to be 99.7 % efficient. The high-power experimental testing was conducted at General Motors advanced technology center in Torrence, Los Angeles. Calorific testing was used to determine the power loss in the CCTT IM component. Experimental 3.8 kW results and a 3.8 kW prototype compare and contrast the ferrite CCTT IM and high dc-bias 2L concepts over the typical operating range of a fuelcell under like-for-like conditions. The CCTT IM is shown to perform better than the 2L option over the entire power range. An 8 kW ferrite CCTT IM prototype is developed for use in photovoltaic (PV) applications. The CCTT IM is used in a boost pre-regulator as part of the PV power stage. The CCTT IM is compared with an industry standard 2L converter consisting of two discrete ferrite toroidal inductors. The magnetic components are compared for the same worst-case phase current ripple and the experimental testing is conducted over the operation of a PV panel. The prototype CCTT IM allows for a 50 % reduction in total boxed volume and mass in comparison to the baseline 2L option, while showing increased efficiency.
Resumo:
A model for understanding the formation and propagation of modes in curved optical waveguides is developed. A numerical method for the calculation of curved waveguide mode profiles and propagation constants in two dimensional waveguides is developed, implemented and tested. A numerical method for the analysis of propagation of modes in three dimensional curved optical waveguides is developed, implemented and tested. A technique for the design of curved waveguides with reduced transition loss is presented. A scheme for drawing these new waveguides and ensuring that they have constant width is also provided. Claims about the waveguide design technique are substantiated through numerical simulations.