WorldWideScience

Sample records for hybrid access control

  1. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks.

    Science.gov (United States)

    Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly

    2014-02-01

    Hybrid mobile applications (apps) combine the features of Web applications and "native" mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources-file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies "bridges" that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources-the ability to read and write contacts list, local files, etc.-to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign-origin Web content

  2. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks

    Science.gov (United States)

    Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly

    2014-01-01

    Hybrid mobile applications (apps) combine the features of Web applications and “native” mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources—file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies “bridges” that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources—the ability to read and write contacts list, local files, etc.—to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign

  3. A hybrid medium access control for convergence of broadband wireless and wireline ATM networks

    DEFF Research Database (Denmark)

    Liu, Hong; Gliese, Ulrik Bo; Dittmann, Lars

    2000-01-01

    of contention, reservation and polling access techniques based on the dynamic TDMA system. Extensive simulation results using realistic data traffic sources, show that the proposed medium access scheme may provide QoS guarantees to different ATM traffic including the realistic MPEG video traces with low cell......In this paper, we propose a hybrid medium access control protocol for supporting broadband integrated services in the wireless ATM networks. The integrated services include CBR, VBR and ABR traffic varying from low bit-rate to very high bit-rate. The proposed protocol is an excellent compromise...

  4. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks

    OpenAIRE

    Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly

    2014-01-01

    Hybrid mobile applications (apps) combine the features of Web applications and “native” mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources—file system, location, camera, contacts, etc.

  5. Hybrid internet access

    Science.gov (United States)

    Arora, Vivek; Baras, John S.; Dillon, Douglas; Falk, Aaron; Suphasindhu, Narin

    1995-01-01

    Access to the Internet is either too slow (dial-up SLIP) or too expensive (switched 56 kbps, frame relay) for the home user or small enterprise. The Center for Satellite and Hybrid Communication Networks and Hughes Network Systems have collaborated using systems integration principles to develop a prototype of a low-cost hybrid (dial-up and satellite) newtork terminal which can deliver data from the Internet to the user at rates up to 160 kbps. An asymmetric TCP/IP connection is used breaking the network link into two physical channels: a terrestrial dial-up for carrying data from the terminal into the Internet and a receive-only satellite link carrying IP packets from the Internet to the user. With a goal of supporting bandwidth hungry Internet applications such as Mosaic, Gopher, and FTP, this system has been designed to support any Intel 80386/486 PC, any commercial TCP/IP package, any unmodified host on the Internet, and any of the routers, etc., within the Internet. The design exploits the following three observations: 1) satellites are able to offer high bandwidth connections to a large geographical area, 2) a receive-only VSAT is cheap to manufacture and easier to install than one which can also transmit, and 3) most computer users, especially those in a home environment, will want to consume much more information than they generate. IP encapsulation, or tunneling, issued to manipulate the TCP/IP protocols to route packets asymmetrically.

  6. Accessibility Considerations for Hybrid Courses

    Science.gov (United States)

    Behling, Kirsten

    2017-01-01

    This chapter explores the central questions and issues that faculty and administrators need to consider when designing and implementing hybrid courses to ensure that all students, including those with disabilities, have equal access. The author offers resources on faculty development programs, accessibility checklists, and online resources on…

  7. Hybrid Solution for Privacy-Preserving Access Control for Healthcare Data

    Directory of Open Access Journals (Sweden)

    SMITHAMOL, M. B.

    2017-05-01

    Full Text Available The booming in cloud and IoT technologies has accelerated the growth of healthcare system. The IoT devices monitor the patient's health, and upload collected data as Electronic Medical Records (EMRs to the cloud for storage and sharing. Outsourcing EMRs to the cloud introduce new security and privacy challenges. In this paper, we proposed a novel architecture ensuring security and privacy for the outsourced health records. The proposed model uses partially ordered set (POSET for constructing the group based access structure and Ciphertext-Policy Attribute-Based Encryption (CP-ABE to provide fine-grained EMR access control. The modified group based CP-ABE (G-CP-ABE minimizes the computational overhead by reducing the number of leaf nodes in the access tree. Also, the proposed G-CP-ABE framework merges symmetric encryption and CP-ABE scheme to minimize the overall encryption time. As a result, G-CP-ABE can be used to monitor health conditions even from a resource constrained IoT device. The performance analysis shows the efficiency of the proposed model, making it suitable for practical use.

  8. Hybrid Lyot Coronagraph for the ACCESS Mission

    Science.gov (United States)

    Trauger, J.; ACCESS Science and Engineering Team

    2010-10-01

    We report the design and fabrication of hybrid focal-plane masks for Lyot coronagraphy, supported this year by NASA's Technology Demonstration for Exoplanet Missions (TDEM) program. These masks are composed of thickness-profiled metallic and dielectric thin films, and manufactured by vacuum deposition on a glass substrate. Hybrid masks are in principle band-limited in both the real and imaginary parts of the complex amplitude characteristics, providing the theoretical basis for mathematically perfect starlight suppression. Together with a deformable mirror for control of wavefront phase, these masks achieve contrast levels of 2e-10 at inner working angles of 3 lambda/D, over spectral bandwidths of 20% or more, and with throughput efficiencies of 60%. We evaluate the science potential of these coronagaph masks in the context of ACCESS, a representative exoplanet mission concept. ACCESS is one of four medium-class concepts studied in 2008-2009 under NASA's Astrophysics Strategic Mission Concepts Study program. In a nutshell, the ACCESS study seeks the most capable medium-class coronagraphic mission that is possible with high-readiness telescope, instrument, and spacecraft technologies available today. The ACCESS study compared the performance of four major coronagraph architectures. It defined a conceptual space observatory platform as the "level playing field" for comparisons among coronagraph types. And it used laboratory validation of the representative coronagraph types as a second "level playing field" for assessing coronagraph hardware readiness. ACCESS identifies a class of scientifically compelling mission concepts built upon mature (TRL6+) subsystem technologies, and evaluates science reach of a medium-class coronagraph mission. Using current high-TRL technologies, the ACCESS minimum science program surveys the nearest 120+ AFGK stars for exoplanet systems, and surveys the majority of those for exozodiacal dust to the level of 1 zodi at 3 AU. Discoveries are

  9. Ontology Based Access Control

    Directory of Open Access Journals (Sweden)

    Özgü CAN

    2010-02-01

    Full Text Available As computer technologies become pervasive, the need for access control mechanisms grow. The purpose of an access control is to limit the operations that a computer system user can perform. Thus, access control ensures to prevent an activity which can lead to a security breach. For the success of Semantic Web, that allows machines to share and reuse the information by using formal semantics for machines to communicate with other machines, access control mechanisms are needed. Access control mechanism indicates certain constraints which must be achieved by the user before performing an operation to provide a secure Semantic Web. In this work, unlike traditional access control mechanisms, an "Ontology Based Access Control" mechanism has been developed by using Semantic Web based policies. In this mechanism, ontologies are used to model the access control knowledge and domain knowledge is used to create policy ontologies.

  10. Android Access Control Extension

    Directory of Open Access Journals (Sweden)

    Anton Baláž

    2015-12-01

    Full Text Available The main objective of this work is to analyze and extend security model of mobile devices running on Android OS. Provided security extension is a Linux kernel security module that allows the system administrator to restrict program's capabilities with per-program profiles. Profiles can allow capabilities like network access, raw socket access, and the permission to read, write, or execute files on matching paths. Module supplements the traditional Android capability access control model by providing mandatory access control (MAC based on path. This extension increases security of access to system objects in a device and allows creating security sandboxes per application.

  11. Access Control Enforcement Testing

    OpenAIRE

    El Kateb, Donia; Elrakaiby, Yehia; Mouelhi, Tejeddine; Le Traon, Yves

    2012-01-01

    A policy-based access control architecture com- prises Policy Enforcement Points (PEPs), which are modules that intercept subjects access requests and enforce the access decision reached by a Policy Decision Point (PDP), the module implementing the access decision logic. In applications, PEPs are generally implemented manually, which can introduce errors in policy enforcement and lead to security vulnerabilities. In this paper, we propose an approach to systematically test and validate the co...

  12. HYBRID VEHICLE CONTROL SYSTEM

    Directory of Open Access Journals (Sweden)

    V. Dvadnenko

    2016-06-01

    Full Text Available The hybrid vehicle control system includes a start–stop system for an internal combustion engine. The system works in a hybrid mode and normal vehicle operation. To simplify the start–stop system, there were user new possibilities of a hybrid car, which appeared after the conversion. Results of the circuit design of the proposed system of basic blocks are analyzed.

  13. Integrated Access to Hybrid Information Resources

    OpenAIRE

    Tamar Sadeh

    2003-01-01

    This paper is entitled "Integrated access to hybrid information resources", but integrated access is just a means to reach an end. Our challenge is to create an integrated environment in a heterogeneous world. Users are not aware, and do not want to be aware, of the differences between the various information resources that their institution provides. All they want is to be able to attain the information they are looking for, in the simplest and most straightforward way possible.

  14. ACCESS Pointing Control System

    Science.gov (United States)

    Brugarolas, Paul; Alexander, James; Trauger, John; Moody, Dwight; Egerman, Robert; Vallone, Phillip; Elias, Jason; Hejal, Reem; Camelo, Vanessa; Bronowicki, Allen; O'Connor, David; Partrick, Richard; Orzechowski, Pawel; Spitter, Connie; Lillie, Chuck

    2010-01-01

    ACCESS (Actively-Corrected Coronograph for Exoplanet System Studies) was one of four medium-class exoplanet concepts selected for the NASA Astrophysics Strategic Mission Concept Study (ASMCS) program in 2008/2009. The ACCESS study evaluated four major coronograph concepts under a common space observatory. This paper describes the high precision pointing control system (PCS) baselined for this observatory.

  15. Analysing Access Control Specifications

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof

    2009-01-01

    . Recent events have revealed intimate knowledge of surveillance and control systems on the side of the attacker, making it often impossible to deduce the identity of an inside attacker from logged data. In this work we present an approach that analyses the access control configuration to identify the set......When prosecuting crimes, the main question to answer is often who had a motive and the possibility to commit the crime. When investigating cyber crimes, the question of possibility is often hard to answer, as in a networked system almost any location can be accessed from almost anywhere. The most...... of credentials needed to reach a certain location in a system. This knowledge allows to identify a set of (inside) actors who have the possibility to commit an insider attack at that location. This has immediate applications in analysing log files, but also nontechnical applications such as identifying possible...

  16. Dynamic Resource Allocation in Hybrid Access Femtocell Network

    Directory of Open Access Journals (Sweden)

    Afaz Uddin Ahmed

    2014-01-01

    Full Text Available Intercell interference is one of the most challenging issues in femtocell deployment under the coverage of existing macrocell. Allocation of resources between femtocell and macrocell is essential to counter the effects of interference in dense femtocell networks. Advances in resource management strategies have improved the control mechanism for interference reduction at lower node density, but most of them are ineffective at higher node density. In this paper, a dynamic resource allocation management algorithm (DRAMA for spectrum shared hybrid access OFDMA femtocell network is proposed. To reduce the macro-femto-tier interference and to improve the quality of service, the proposed algorithm features a dynamic resource allocation scheme by controlling them both centrally and locally. The proposed scheme focuses on Femtocell Access Point (FAP owners’ satisfaction and allows maximum utilization of available resources based on congestion in the network. A simulation environment is developed to study the quantitative performance of DRAMA in hybrid access-control femtocell network and compare it to closed and open access mechanisms. The performance analysis shows that higher number of random users gets connected to the FAP without compromising FAP owners’ satisfaction allowing the macrocell to offload a large number of users in a dense heterogeneous network.

  17. Continuity Controlled Hybrid Automata

    OpenAIRE

    Bergstra, J. A.; Middelburg, C.A.

    2004-01-01

    We investigate the connections between the process algebra for hybrid systems of Bergstra and Middelburg and the formalism of hybrid automata of Henzinger et al. We give interpretations of hybrid automata in the process algebra for hybrid systems and compare them with the standard interpretation of hybrid automata as timed transition systems. We also relate the synchronized product operator on hybrid automata to the parallel composition operator of the process algebra. It turns out that the f...

  18. Continuity Controlled Hybrid Automata

    NARCIS (Netherlands)

    Bergstra, J.A.; Middelburg, C.A.

    2004-01-01

    We investigate the connections between the process algebra for hybrid systems of Bergstra and Middelburg and the formalism of hybrid automata of Henzinger et al. We give interpretations of hybrid automata in the process algebra for hybrid systems and compare them with the standard interpretation of

  19. Continuity controlled Hybrid Automata

    NARCIS (Netherlands)

    Bergstra, J.A.; Middelburg, C.A.

    2008-01-01

    We investigate the connections between the process algebra for hybrid systems of Bergstra and Middelburg and the formalism of hybrid automata of Henzinger et al. We give interpretations of hybrid automata in the process algebra for hybrid systems and compare them with the standard interpretation of

  20. Physical Access Control Database -

    Data.gov (United States)

    Department of Transportation — This data set contains the personnel access card data (photo, name, activation/expiration dates, card number, and access level) as well as data about turnstiles and...

  1. Function-Based Access Control (FBAC): From Access Control Matrix to Access Control Tensor

    OpenAIRE

    Desmedt, Yvo; Shaghaghi, Arash

    2016-01-01

    Security researchers have stated that the core concept behind current implementations of access control predates the Internet. These assertions are made to pinpoint that there is a foundational gap in this field, and one should consider revisiting the concepts from the ground up. Moreover, Insider threats, which are an increasing threat vector against organizations are also associated with the failure of access control. Access control models derived from access control matrix encompass three ...

  2. Multi-channel Hybrid Access Femtocells: A Stochastic Geometric Analysis

    CERN Document Server

    Zhong, Yi

    2011-01-01

    For two-tier networks consisting of macrocells and femtocells, the channel access mechanism can be configured to be open access, closed access, or hybrid access. Hybrid access arises as a compromise between open and closed access mechanisms, in which a fraction of available spectrum resource is shared to nonsubscribers while the remaining reserved for subscribers. This paper focuses on a hybrid access mechanism for multi-channel femtocells which employ orthogonal spectrum access schemes. Considering a randomized channel assignment strategy, we analyze the performance in the downlink. Using stochastic geometry as technical tools, we derive the distributions of signal-to-interference-plus-noise ratios, and mean achievable rates, of both nonsubscribers and subscribers. The established expressions are amenable to numerical evaluation, and shed key insights into the performance tradeoff between subscribers and nonsubscribers. The analytical results are corroborated by numerical simulations.

  3. Energy-efficient hybrid media access control protocol in wireless sensor networks%一种节能混合无线传感器网络MAC协议

    Institute of Scientific and Technical Information of China (English)

    刘一哲; 袁睿翕

    2011-01-01

    针对无线传感器网络的节能和网络性能流量自适应的需求,在Z-MAC协议的基础上,提出了EFHMAC协议.经过分析表明,EHMAC在保持Z-MAC高信道利用率和低延迟的同时,可以减少Z-MAC低功耗侦听机制造成的大量串音能耗以及pream-ble传输所造成的网络开销.此外,EHMAC对Z-MAC在内的TDMA类协议无法应对的非对称隐藏终端问题提出了解决方案,取得了较高的网络吞吐量和较低的端到端延迟.%This paper puts forward an Energy-efficient Hybrid Media Access Control(EHMAC) protocol in WSNs,based on Z-MAC, in order to meet requirement of power consumption and obtain network performance adaptability to burst flow. Through analysis and NS2 simulation,this paper evaluates and verifies EHMAC's low power consumption due to Low Power Listening (LPL) and maintenance of high channel utilization as Z-MAC does.Meanwhile, EHMAC can decrease the long preamble overhead.Besides,EHMAC proposes the solution to asymmetric hidden terminal problem,and gets higher throughput and lower end to end delay than TDMA category protocol,Z-MAC included.

  4. Controlling Access to RDF Graphs

    Science.gov (United States)

    Flouris, Giorgos; Fundulaki, Irini; Michou, Maria; Antoniou, Grigoris

    One of the current barriers towards realizing the huge potential of Future Internet is the protection of sensitive information, i.e., the ability to selectively expose (or hide) information to (from) users depending on their access privileges. Given that RDF has established itself as the de facto standard for data representation over the Web, our work focuses on controlling access to RDF data. We present a high-level access control specification language that allows fine-grained specification of access control permissions (at triple level) and formally define its semantics. We adopt an annotation-based enforcement model, where a user can explicitly associate data items with annotations specifying whether the item is accessible or not. In addition, we discuss the implementation of our framework, propose a set of dimensions that should be considered when defining a benchmark to evaluate the different access control enforcement models and present the results of our experiments conducted on different Semantic Web platforms.

  5. Hybrid spacecraft attitude control system

    Directory of Open Access Journals (Sweden)

    Renuganth Varatharajoo

    2016-02-01

    Full Text Available The hybrid subsystem design could be an attractive approach for futurespacecraft to cope with their demands. The idea of combining theconventional Attitude Control System and the Electrical Power System ispresented in this article. The Combined Energy and Attitude ControlSystem (CEACS consisting of a double counter rotating flywheel assemblyis investigated for small satellites in this article. Another hybrid systemincorporating the conventional Attitude Control System into the ThermalControl System forming the Combined Attitude and Thermal ControlSystem (CATCS consisting of a "fluid wheel" and permanent magnets isalso investigated for small satellites herein. The governing equationsdescribing both these novel hybrid subsystems are presented and theironboard architectures are numerically tested. Both the investigated novelhybrid spacecraft subsystems comply with the reference missionrequirements.The hybrid subsystem design could be an attractive approach for futurespacecraft to cope with their demands. The idea of combining theconventional Attitude Control System and the Electrical Power System ispresented in this article. The Combined Energy and Attitude ControlSystem (CEACS consisting of a double counter rotating flywheel assemblyis investigated for small satellites in this article. Another hybrid systemincorporating the conventional Attitude Control System into the ThermalControl System forming the Combined Attitude and Thermal ControlSystem (CATCS consisting of a "fluid wheel" and permanent magnets isalso investigated for small satellites herein. The governing equationsdescribing both these novel hybrid subsystems are presented and theironboard architectures are numerically tested. Both the investigated novelhybrid spacecraft subsystems comply with the reference missionrequirements.

  6. Optimal control of hybrid vehicles

    CERN Document Server

    Jager, Bram; Kessels, John

    2013-01-01

    Optimal Control of Hybrid Vehicles provides a description of power train control for hybrid vehicles. The background, environmental motivation and control challenges associated with hybrid vehicles are introduced. The text includes mathematical models for all relevant components in the hybrid power train. The power split problem in hybrid power trains is formally described and several numerical solutions detailed, including dynamic programming and a novel solution for state-constrained optimal control problems based on Pontryagin’s maximum principle.   Real-time-implementable strategies that can approximate the optimal solution closely are dealt with in depth. Several approaches are discussed and compared, including a state-of-the-art strategy which is adaptive for vehicle conditions like velocity and mass. Two case studies are included in the book: ·        a control strategy for a micro-hybrid power train; and ·        experimental results obtained with a real-time strategy implemented in...

  7. Network Access Control For Dummies

    CERN Document Server

    Kelley, Jay; Wessels, Denzil

    2009-01-01

    Network access control (NAC) is how you manage network security when your employees, partners, and guests need to access your network using laptops and mobile devices. Network Access Control For Dummies is where you learn how NAC works, how to implement a program, and how to take real-world challenges in stride. You'll learn how to deploy and maintain NAC in your environment, identify and apply NAC standards, and extend NAC for greater network security. Along the way you'll become familiar with what NAC is (and what it isn't) as well as the key business drivers for deploying NAC.Learn the step

  8. Hybrid vehicle control

    Energy Technology Data Exchange (ETDEWEB)

    Shallvari, Iva; Velnati, Sashidhar; DeGroot, Kenneth P.

    2015-07-28

    A method and apparatus for heating a catalytic converter's catalyst to an efficient operating temperature in a hybrid electric vehicle when the vehicle is in a charge limited mode such as e.g., the charge depleting mode or when the vehicle's high voltage battery is otherwise charge limited. The method and apparatus determine whether a high voltage battery of the vehicle is incapable of accepting a first amount of charge associated with a first procedure to warm-up the catalyst. If it is determined that the high voltage battery is incapable of accepting the first amount of charge, a second procedure with an acceptable amount of charge is performed to warm-up the catalyst.

  9. Hybrid vehicle control

    Science.gov (United States)

    Shallvari, Iva; Velnati, Sashidhar; DeGroot, Kenneth P.

    2015-07-28

    A method and apparatus for heating a catalytic converter's catalyst to an efficient operating temperature in a hybrid electric vehicle when the vehicle is in a charge limited mode such as e.g., the charge depleting mode or when the vehicle's high voltage battery is otherwise charge limited. The method and apparatus determine whether a high voltage battery of the vehicle is incapable of accepting a first amount of charge associated with a first procedure to warm-up the catalyst. If it is determined that the high voltage battery is incapable of accepting the first amount of charge, a second procedure with an acceptable amount of charge is performed to warm-up the catalyst.

  10. Hybrid Systems: Computation and Control.

    Science.gov (United States)

    2007-11-02

    elbow) and a pinned first joint (shoul- der) (see Figure 2); it is termed an underactuated system since it is a mechanical system with fewer...Montreal, PQ, Canada, 1998. [10] M. W. Spong. Partial feedback linearization of underactuated mechanical systems . In Proceedings, IROS󈨢, pages 314-321...control mechanism and search for optimal combinations of control variables. Besides the nonlinear and hybrid nature of powertrain systems , hardware

  11. IMPULSE CONTROL HYBRID ELECTRICAL SYSTEM

    Directory of Open Access Journals (Sweden)

    A. A. Lobaty

    2016-01-01

    Full Text Available This paper extends the recently introduced approach for modeling and solving the optimal control problem of fixedswitched mode DC-DC power converter. DCDC converters are a class of electric power circuits that used extensively in regulated DC power supplies, DC motor drives of different types, in Photovoltaic Station energy conversion and other applications due to its advantageous features in terms of size, weight and reliable performance. The main problem in controlling this type converters is in their hybrid nature as the switched circuit topology entails different modes of operation, each of it with its own associated linear continuous-time dynamics.This paper analyses the modeling and controller synthesis of the fixed-frequency buck DC-DC converter, in which the transistor switch is operated by a pulse sequence with constant frequency. In this case the regulation of the DC component of the output voltage is via the duty cycle. The optimization of the control system is based on the formation of the control signal at the output.It is proposed to solve the problem of optimal control of a hybrid system based on the formation of the control signal at the output of the controller, which minimizes a given functional integral quality, which is regarded as a linear quadratic Letov-Kalman functional. Search method of optimal control depends on the type of mathematical model of control object. In this case, we consider a linear deterministic model of the control system, which is common for the majority of hybrid electrical systems. For this formulation of the optimal control problem of search is a problem of analytical design of optimal controller, which has the analytical solution.As an example of the hybrid system is considered a step-down switching DC-DC converter, which is widely used in various electrical systems: as an uninterruptible power supply, battery charger for electric vehicles, the inverter in solar photovoltaic power plants.. A

  12. Growth of hybrid open access, 2009-2016.

    Science.gov (United States)

    Björk, Bo-Christer

    2017-01-01

    Hybrid Open Access is an intermediate form of OA, where authors pay scholarly publishers to make articles freely accessible within journals, in which reading the content otherwise requires a subscription or pay-per-view. Major scholarly publishers have in recent years started providing the hybrid option for the vast majority of their journals. Since the uptake usually has been low per journal and scattered over thousands of journals, it has been very difficult to obtain an overview of how common hybrid articles are. This study, using the results of earlier studies as well as a variety of methods, measures the evolution of hybrid OA over time. The number of journals offering the hybrid option has increased from around 2,000 in 2009 to almost 10,000 in 2016. The number of individual articles has in the same period grown from an estimated 8,000 in 2009 to 45,000 in 2016. The growth in article numbers has clearly increased since 2014, after some major research funders in Europe started to introduce new centralized payment schemes for the article processing charges (APCs).

  13. Flexible access control for dynamic collaborative environments

    NARCIS (Netherlands)

    Dekker, Mari Antonius Cornelis

    2009-01-01

    Access control is used in computer systems to control access to confidential data. In this thesis we focus on access control for dynamic collaborative environments where multiple users and systems access and exchange data in an ad hoc manner. In such environments it is difficult to protect confident

  14. Controlling Access to Suicide Means

    Directory of Open Access Journals (Sweden)

    Miriam Iosue

    2011-12-01

    Full Text Available Background: Restricting access to common means of suicide, such as firearms, toxic gas, pesticides and other, has been shown to be effective in reducing rates of death in suicide. In the present review we aimed to summarize the empirical and clinical literature on controlling the access to means of suicide. Methods: This review made use of both MEDLINE, ISI Web of Science and the Cochrane library databases, identifying all English articles with the keywords “suicide means”, “suicide method”, “suicide prediction” or “suicide prevention” and other relevant keywords. Results: A number of factors may influence an individual’s decision regarding method in a suicide act, but there is substantial support that easy access influences the choice of method. In many countries, restrictions of access to common means of suicide has lead to lower overall suicide rates, particularly regarding suicide by firearms in USA, detoxification of domestic and motor vehicle gas in England and other countries, toxic pesticides in rural areas, barriers at jumping sites and hanging, by introducing “safe rooms” in prisons and hospitals. Moreover, decline in prescription of barbiturates and tricyclic antidepressants (TCAs, as well as limitation of drugs pack size for paracetamol and salicylate has reduced suicides by overdose, while increased prescription of SSRIs seems to have lowered suicidal rates. Conclusions: Restriction to means of suicide may be particularly effective in contexts where the method is popular, highly lethal, widely available, and/or not easily substituted by other similar methods. However, since there is some risk of means substitution, restriction of access should be implemented in conjunction with other suicide prevention strategies.

  15. Stacked-VLAN-Based Modeling of Hybrid ISP Traffic Control Schemes and Service Plans Exploiting Excess Bandwidth in Shared Access Networks

    OpenAIRE

    Kim, Kyeong Soo

    2016-01-01

    The current practice of shaping subscriber traffic using a token bucket filter by Internet service providers may result in a severe waste of network resources in shared access networks; except for a short period of time proportional to the size of a token bucket, it cannot allocate excess bandwidth among active subscribers even when there are only a few active subscribers. To better utilize the network resources in shared access networks, therefore, we recently proposed and analyzed the perfo...

  16. Access Request Trustworthiness in Weighted Access Control Framework

    Institute of Scientific and Technical Information of China (English)

    WANG Lun-wei; LIAO Xiang-ke; WANG Huai-min

    2005-01-01

    Weighted factor is given to access control policies to express the importance of policy and its effect on access control decision. According to this weighted access control framework, a trustworthiness model for access request is also given. In this model, we give the measure of trustworthiness factor to access request, by using some idea of uncertainty reasoning of expert system, present and prove the parallel propagation formula of request trustworthiness factor among multiple policies, and get the final trustworthiness factor to decide whether authorizing. In this model, authorization decision is given according to the calculation of request trustworthiness factor, which is more understandable, more suitable for real requirement and more powerful for security enhancement than traditional methods. Meanwhile the finer access control granularity is another advantage.

  17. Control for a class of hybrid systems

    NARCIS (Netherlands)

    J.H. van Schuppen (Jan)

    1997-01-01

    textabstractA hybrid control system is a control theoretic model for a computer controlled engineering system. A definition of a hybrid control system is formulated that consists of a product of a finite state automaton and of a family of continuous control systems. An example of a transportation

  18. An Efficient Hybrid Algorithm for Mining Web Frequent Access Patterns

    Institute of Scientific and Technical Information of China (English)

    ZHAN Li-qiang; LIU Da-xin

    2004-01-01

    We propose an efficient hybrid algorithm WDHP in this paper for mining frequent access patterns.WDHP adopts the techniques of DHP to optimize its performance, which is using hash table to filter candidate set and trimming database.Whenever the database is trimmed to a size less than a specified threshold, the algorithm puts the database into main memory by constructing a tree, and finds frequent patterns on the tree.The experiment shows that WDHP outperform algorithm DHP and main memory based algorithm WAP in execution efficiency.

  19. An Access Control Framework for Reflective Middleware

    Institute of Scientific and Technical Information of China (English)

    Gang Huang; Lian-Shan Sun

    2008-01-01

    Reflective middleware opens up the implementation details of middleware platform and applications at runtime for improving the adaptability of middleware-based systems. However, such openness brings new challenges to access control of the middleware-based systems.Some users can access the system via reflective entities, which sometimes cannot be protected by access control mechanisms of traditional middleware. To deliver high adaptability securely, reflective middleware should be equipped with proper access control mechanisms for potential access control holes induced by reflection. One reason of integrating these mechanisms in reflective middleware is that one goal of reflective middleware is to equip applications with reflection capabilities as transparent as possible. This paper studies how to design a reflective J2EE middlewarePKUAS with access control in mind. At first, a computation model of reflective system is built to identify all possible access control points induced by reflection. Then a set of access control mechanisms, including the wrapper of MBeans and a hierarchy of Java class loaders, are equipped for controlling the identified access control points. These mechanisms together with J2EE access control mechanism form the access control framework for PKUAS. The paper evaluates the security and the performance overheads of the framework in quality and quantity.

  20. Design & Evaluation of an Accessible Hybrid Violin Platform

    DEFF Research Database (Denmark)

    Overholt, Daniel; Gelineck, Steven

    2014-01-01

    platform accessibility for players and other researchers is approached via a simple ‘do-it-yourself’ design described herein. All hardware and software elements are open- source, and the build process requires minimal electronics skills. Cost has also been kept to a minimum where possible. Our initial...... prototype is based upon a relatively inexpensive electric violin that is widely available online. This instrument serves as the starting point for construction, to which our design adds Digital Signal Processing (DSP), gestural sensing, and local sound output. Real-time DSP algorithms run on a mobile device......We introduce and describe the initial evaluation of a new accessible (easily replicable) augmented violin prototype. Our research is focused on the user experience when playing such hybrid physical- digital instruments, and exploration of novel interactive performance techniques. The goal of wider...

  1. Efficient Access Control in Multimedia Social Networks

    Science.gov (United States)

    Sachan, Amit; Emmanuel, Sabu

    Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.

  2. Access to global health research. Prevalence and cost of gold and hybrid open access

    Energy Technology Data Exchange (ETDEWEB)

    Haustein, S.; Smith, E.; Mongeon, P.; Shu, F.; Lariviere, V.

    2016-07-01

    As it is a priority of global health research (GHR) to achieve equity in health worldwide, there is an increased demand and expectation that knowledge be shared freely and without barriers. Making research findings available for free to readers by publishing open access (OA) is thus central to GHR. Several studies have assessed the extent to which different forms of OA prevail but despite the importance of free access to knowledge in GHR, particular empirical evidence is missing. This paper aims to fill this gap by analyzing the extent to which GHR papers indexed in PubMed are published OA and how much it costs to publish in gold and hybrid OA journals. Findings show that between 2010 and 2014 as few as 18% of papers were published in gold OA journals, 7% published as hybrid OA (i.e., OA papers in subscription journals), while more than 60% were behind paywalls. Costs for gold OA amounted to $990,619 for 404 papers, whereas $722,631 were spent on article processing charges (APCs) of 223 hybrid papers. The majority of APCs were obtained by large commercial publishing houses known for exorbitant profit margins. (Author)

  3. Joint Hybrid Backhaul and Access Links Design in Cloud-Radio Access Networks

    KAUST Repository

    Dhifallah, Oussama Najeeb

    2015-09-06

    The cloud-radio access network (CRAN) is expected to be the core network architecture for next generation mobile radio systems. In this paper, we consider the downlink of a CRAN formed of one central processor (the cloud) and several base station (BS), where each BS is connected to the cloud via either a wireless or capacity-limited wireline backhaul link. The paper addresses the joint design of the hybrid backhaul links (i.e., designing the wireline and wireless backhaul connections from the cloud to the BSs) and the access links (i.e., determining the sparse beamforming solution from the BSs to the users). The paper formulates the hybrid backhaul and access link design problem by minimizing the total network power consumption. The paper solves the problem using a two-stage heuristic algorithm. At one stage, the sparse beamforming solution is found using a weighted mixed 11/12 norm minimization approach; the correlation matrix of the quantization noise of the wireline backhaul links is computed using the classical rate-distortion theory. At the second stage, the transmit powers of the wireless backhaul links are found by solving a power minimization problem subject to quality-of-service constraints, based on the principle of conservation of rate by utilizing the rates found in the first stage. Simulation results suggest that the performance of the proposed algorithm approaches the global optimum solution, especially at high signal-to-interference-plus-noise ratio (SINR).

  4. Managing Delegation in Access Control Models

    CERN Document Server

    Ghorbel-Talbi, Meriam Ben; Cuppens-Boulahia, Nora; Bouhoula, Adel; 10.1109/ADCOM.2007.105

    2010-01-01

    In the field of access control, delegation is an important aspect that is considered as a part of the administration mechanism. Thus, a complete access control must provide a flexible administration model to manage delegation. Unfortunately, to our best knowledge, there is no complete model for describing all delegation requirements for role-based access control. Therefore, proposed models are often extended to consider new delegation characteristics, which is a complex task to manage and necessitate the redefinition of these models. In this paper we describe a new delegation approach for extended role-based access control models. We show that our approach is flexible and is sufficient to manage all delegation requirements.

  5. Intraply Hybrid Composites Would Contain Control Strips

    Science.gov (United States)

    Chamis, Christos C.; Shiao, Chi-Yu

    1996-01-01

    "Smart" structural components with sensors and/or actuators distributed throughout their volumes made of intraply hybrid composite materials, according to proposal. Strips of hybrid control material interspersed with strips of ordinary (passive) composite material in some layers, providing distributed control capability. For example, near and far edges of plate bent upward by commanding bottom control strips to expand and simultaneously commanding upper control strips to contract.

  6. Fault tolerant control design for hybrid systems

    Energy Technology Data Exchange (ETDEWEB)

    Yang, Hao; Jiang, Bin [Nanjing University of Aeronautics and Astronautics, Nanjing (China); Cocquempot, Vincent [Universite des Sciences et Technologies de Lille, Villeneuve d' Ascq (France)

    2010-07-01

    This book intends to provide the readers a good understanding on how to achieve Fault Tolerant Control goal of Hybrid Systems. The book can be used as a reference for the academic research on Fault Tolerant Control and Hybrid Systems or used in Ph.D. study of control theory and engineering. The knowledge background for this monograph would be some undergraduate and graduate courses on Fault Diagnosis and Fault Tolerant Control theory, linear system theory, nonlinear system theory, Hybrid Systems theory and Discrete Event System theory. (orig.)

  7. Proximity Displays for Access Control

    Science.gov (United States)

    Vaniea, Kami

    2012-01-01

    Managing access to shared digital information, such as photographs and documents. is difficult for end users who are accumulating an increasingly large and diverse collection of data that they want to share with others. Current policy-management solutions require a user to proactively seek out and open a separate policy-management interface when…

  8. HYBRID CONTROL APPROACH FOR CONTAINER CRANES

    Institute of Scientific and Technical Information of China (English)

    Wang Xiaojun; Shao Huihe

    2005-01-01

    A hybrid control approach is proposed to achieve the desired performance. Firstly a robust input shaper is designed to reduce the transient vibration and residual vibration of the container efficiently. Then a simple fuzzy logic controller is designed to eliminate the residual vibration completely in order to guarantee the positioning precision. Such a hybrid approach is simple in structure and readily realizable. Simulation results verify the fine performance of this hybrid control approach. It can achieve perfect elimination of residual vibration and concise positioning of the container load, and it is robust to parameter variations (mainly for cable length) and external disturbances.

  9. Lower hybrid accessibility in a large, hot reversed field pinch

    Energy Technology Data Exchange (ETDEWEB)

    Dziubek, R.A.

    1995-02-01

    Recent theoretical and experimental results indicate that driving a current in the outer radius of an RPF suppresses sawtooth activity and increases particle and energy confinement times. One candidate for a form of steady state current drive is the slow wave at the lower hybrid frequency. Here, the accessibility of such a wave in an RFP plasma is investigated theoretically, with focus on the RFX machine of Padua, Italy. To drive current, the slow wave with frequency between 1.0--1.5 GHz is considered where optimal Landau damping is desired at r/a {approximately} 0.7. By numerically determining the values of the wave`s perpendicular index of refraction which satisfy the hot plasma dispersion relation, regions of propagation and evanescence can be found. The path of the wave can then be traced over a contour map of these regions so that accessibility can be clearly seen. The possibility of mode conversion events can be ascertained by plotting the values of the perpendicular index of refraction for the fast and slow wave and observing convergence points. To locate regions of maximum Landau damping, a technique developed by Stix was adapted for use with the slow wave in an RFP plasma. Results show that the slow wave is accessible to the target region without mode conversion so long as the value of the parallel index of refraction is correctly chosen at the edge of the plasma. Landau damping can also be optimized with this method. In an RFP, 2--20% of the electron population consists of fast electrons. Because this species alters the total electron distribution function and raises the effective temperature in the outer regions of the plasma, its presence is expected to shift the location of ideal Landau damping.

  10. 基于TRBAC混合模型的协同设计过程动态访问控制%Dynamic access control of collaborative design process based on TRBAC hybrid model

    Institute of Scientific and Technical Information of China (English)

    郭银章; 曾建潮

    2012-01-01

    Aiming at the access control problem of collaborative design process which included access control lifecycle constraint, access control number constraint and dynamic changes features, the Role-Based Access Control (RBAC) model and Task- Based Access Control (TBAC) model were extended and incorporated. At the same time, a CDACM model for dynamic access control in collaborative design was proposed. To realized context-sensitive subject and object dynamic authorization management, authorization state migration and access control constraint were controlled by introducing the state migration and constraint relation of design unit authorization structure. The problems of access time constraint and transaction integrity constraint were solved by setting the constraints of permission ac- tivating cycle time and permission access times. Moreover, access control policy and activation mechanism for collaborative design were given. The theoretical research was applied in the collaborative design access control system of chain-transportation, which tested the validity of the proposed model.%针对具有周期时间约束、访问次数限制和设计过程动态变化特点的协同设计过程访问控制问题,将基于角色的访问控制模型和基于任务的访问控制模型进行扩展与融合,提出一种适应于协同设计全过程的动态访问控制模型CDACM。通过引入设计单元结构体的状态迁移和约束依赖关系,控制访问授权状态的变化和权限的约束,以实现与上下文相关的主客体动态授权管理;同时通过设定权限激活周期时间约束和权限访问次数限制约束,来解决权限访问时间限制和事务完整性约束问题。给出协同设计的访问控制策略和激活机制。将理论研究应用于链式输送机协同设计访问控制系统中,验证了所提模型的有效性。

  11. Access control and personal identification systems

    CERN Document Server

    Bowers, Dan M

    1988-01-01

    Access Control and Personal Identification Systems provides an education in the field of access control and personal identification systems, which is essential in selecting the appropriate equipment, dealing intelligently with vendors in purchases of the equipment, and integrating the equipment into a total effective system. Access control devices and systems comprise an important part of almost every security system, but are seldom the sole source of security. In order for the goals of the total system to be met, the other portions of the security system must also be well planned and executed

  12. Analysis and design of hybrid control systems

    Energy Technology Data Exchange (ETDEWEB)

    Malmborg, J.

    1998-05-01

    Different aspects of hybrid control systems are treated: analysis, simulation, design and implementation. A systematic methodology using extended Lyapunov theory for design of hybrid systems is developed. The methodology is based on conventional control designs in separate regions together with a switching strategy. Dynamics are not well defined if the control design methods lead to fast mode switching. The dynamics depend on the salient features of the implementation of the mode switches. A theorem for the stability of second order switching together with the resulting dynamics is derived. The dynamics on an intersection of two sliding sets are defined for two relays working on different time scales. The current simulation packages have problems modeling and simulating hybrid systems. It is shown how fast mode switches can be found before or during simulation. The necessary analysis work is a very small overhead for a modern simulation tool. To get some experience from practical problems with hybrid control the switching strategy is implemented in two different software environments. In one of them a time-optimal controller is added to an existing PID controller on a commercial control system. Successful experiments with this hybrid controller shows the practical use of the method 78 refs, 51 figs, 2 tabs

  13. Modular supervisory controller for hybrid power systems

    Energy Technology Data Exchange (ETDEWEB)

    Lemos Pereira, A. de

    2000-06-01

    The power supply of remote places has been commonly provided by thermal power plants, usually diesel generators. Although hybrid power systems may constitute the most economical solution in many applications their widespread application to the electrification schemes of remote areas still depends on improvements in the issues of design and operation control. The main limitations of the present hybrid power systems technology, which are identified in this work, are related to the control and supervision of the power system. Therefore this thesis focuses on the modularity of supervisory controllers in order to design cost-competitive and reliable hybrid power systems. The modular supervisory controller created in this project is considered an important part of a system design approach that aims to overcome the technical difficulties of the current engineering practice and contribute to open the market of hybrid power systems. The term modular refers to a set of design characteristics that allows the use of basically the same supervisory controller in different projects. The modularization and standardisation of the controller include several issues such as interfacing components, communication protocols, modelling, programming and control strategies. The modularity can reduce the highly specialised system engineering related to the integration of components, operation and control. It can also avoid the high costs for installation, service and maintenance. A modular algorithm for supervisory controllers has been developed (a Matlab program called SuperCon) using an object-oriented design and it has been tested through several simulations using different hybrid system configurations and different control strategies. This thesis presents a complete control system design process which can be used as the basis for the development and implementation of intelligent and autonomous supervisory controllers for hybrid power systems with modular characteristics. (au)

  14. Evolved Finite State Controller For Hybrid System

    DEFF Research Database (Denmark)

    Dupuis, Jean-Francois; Fan, Zhun; Goodman, Erik

    2009-01-01

    This paper presents an evolutionary methodology to automatically generate nite state automata (FSA) controllers to control hybrid systems. FSA controllers for a case study of two-tank system have been successfully obtained using the proposed evolutionary approach. Experimental results show...

  15. Access control, security, and trust a logical approach

    CERN Document Server

    Chin, Shiu-Kai

    2010-01-01

    Access Control, Security, Trust, and Logic Deconstructing Access Control Decisions A Logical Approach to Access Control PRELIMINARIES A Language for Access ControlSets and Relations Syntax SemanticsReasoning about Access Control Logical RulesFormal Proofs and Theorems Soundness of Logical RulesBasic Concepts Reference Monitors Access Control Mechanisms: Tickets and Lists Authentication Security PoliciesConfidentiality, Integrity, and Availability Discretionary Security Policies Mandatory Security Policies Military Security Policies Commercial PoliciesDISTRIBUTED ACCESS CONTROL Digital Authenti

  16. Full Gradient Solution to Adaptive Hybrid Control

    Science.gov (United States)

    Bean, Jacob; Schiller, Noah H.; Fuller, Chris

    2017-01-01

    This paper focuses on the adaptation mechanisms in adaptive hybrid controllers. Most adaptive hybrid controllers update two filters individually according to the filtered reference least mean squares (FxLMS) algorithm. Because this algorithm was derived for feedforward control, it does not take into account the presence of a feedback loop in the gradient calculation. This paper provides a derivation of the proper weight vector gradient for hybrid (or feedback) controllers that takes into account the presence of feedback. In this formulation, a single weight vector is updated rather than two individually. An internal model structure is assumed for the feedback part of the controller. The full gradient is equivalent to that used in the standard FxLMS algorithm with the addition of a recursive term that is a function of the modeling error. Some simulations are provided to highlight the advantages of using the full gradient in the weight vector update rather than the approximation.

  17. Hybrid Predictive Control for Dynamic Transport Problems

    CERN Document Server

    Núñez, Alfredo A; Cortés, Cristián E

    2013-01-01

    Hybrid Predictive Control for Dynamic Transport Problems develops methods for the design of predictive control strategies for nonlinear-dynamic hybrid discrete-/continuous-variable systems. The methodology is designed for real-time applications, particularly the study of dynamic transport systems. Operational and service policies are considered, as well as cost reduction. The control structure is based on a sound definition of the key variables and their evolution. A flexible objective function able to capture the predictive behaviour of the system variables is described. Coupled with efficient algorithms, mainly drawn from the area of computational intelligence, this is shown to optimize performance indices for real-time applications. The framework of the proposed predictive control methodology is generic and, being able to solve nonlinear mixed-integer optimization problems dynamically, is readily extendable to other industrial processes. The main topics of this book are: ●hybrid predictive control (HPC) ...

  18. Hybrid dynamical systems observation and control

    CERN Document Server

    Defoort, Michael

    2015-01-01

    This book is a collection of contributions defining the state of current knowledge and new trends in hybrid systems – systems involving both continuous dynamics and discrete events – as described by the work of several well-known groups of researchers. Hybrid Dynamical Systems presents theoretical advances in such areas as diagnosability, observability and stabilization for various classes of system. Continuous and discrete state estimation and self-triggering control of nonlinear systems are advanced. The text employs various methods, among them, high-order sliding modes, Takagi–Sugeno representation and sampled-data switching to achieve its ends. The many applications of hybrid systems from power converters to computer science are not forgotten; studies of flexible-joint robotic arms and – as representative biological systems – the behaviour of the human heart and vasculature, demonstrate the wide-ranging practical significance of control in hybrid systems. The cross-disciplinary origins of study ...

  19. Access Control Based on Trail Inference

    Directory of Open Access Journals (Sweden)

    ALBARELO, P. C.

    2015-06-01

    Full Text Available Professionals are constantly seeking qualification and consequently increasing their knowledge in their area of expertise. Thus, it is interesting to develop a computer system that knows its users and their work history. Using this information, even in the case of professional role change, the system could allow the renewed authorization for activities, based on previously authorized use. This article proposes a model for user access control that is embedded in a context-aware environment. The model applies the concept of trails to manage access control, recording activities usage in contexts and applying this history as a criterion to grant new accesses. Despite the fact that previous related research works consider contexts, none of them uses the concept of trails. Hence, the main contribution of this work is the use of a new access control criterion, namely, the history of previous accesses (trails. A prototype was implemented and applied in an evaluation based on scenarios. The results demonstrate the feasibility of the proposal, allowing for access control systems to use an alternative way to support access rights.

  20. Distributed reservation control protocols for random access broadcasting channels

    Science.gov (United States)

    Greene, E. P.; Ephremides, A.

    1981-05-01

    Attention is given to a communication network consisting of an arbitrary number of nodes which can communicate with each other via a time-division multiple access (TDMA) broadcast channel. The reported investigation is concerned with the development of efficient distributed multiple access protocols for traffic consisting primarily of single packet messages in a datagram mode of operation. The motivation for the design of the protocols came from the consideration of efficient multiple access utilization of moderate to high bandwidth (4-40 Mbit/s capacity) communication satellite channels used for the transmission of short (1000-10,000 bits) fixed length packets. Under these circumstances, the ratio of roundtrip propagation time to packet transmission time is between 100 to 10,000. It is shown how a TDMA channel can be adaptively shared by datagram traffic and constant bandwidth users such as in digital voice applications. The distributed reservation control protocols described are a hybrid between contention and reservation protocols.

  1. A "Hybrid" Approach for Synthesizing Optimal Controllers of Hybrid Systems

    DEFF Research Database (Denmark)

    Zhao, Hengjun; Zhan, Naijun; Kapur, Deepak

    2012-01-01

    We propose an approach to reduce the optimal controller synthesis problem of hybrid systems to quantifier elimination; furthermore, we also show how to combine quantifier elimination with numerical computation in order to make it more scalable but at the same time, keep arising errors due...... to discretization manageable and within bounds. A major advantage of our approach is not only that it avoids errors due to numerical computation, but it also gives a better optimal controller. In order to illustrate our approach, we use the real industrial example of an oil pump provided by the German company HYDAC...

  2. HOWRAN: An Hybrid Optical Wireless Radio Access Network for WiMAX Antennas Backhauling

    Science.gov (United States)

    Gagnaire, Maurice; Youssef, Tony

    In comparison to existing 3G or 3G+ wireless systems, fourth generation (4G), long-term evolution (LTE) or mobile Wimax are characterized by higher bit rates, highly fluctuant traffic matrices and higher antenna’s density. Current backhauling techniques federating radio antennas are not suited to these new characteristics. Several investigations are carried out for the design of new generation radio access networks (NG-RAN) in charge of concentrating radio cellular traffic from the base stations to the core network. In this paper, we propose an original approach based on an Hybrid Optical Wireless Radio Access Network (HOWRAN) exploiting the benefits of radio-over-fiber technologies and of recent advances in the field of optical devices and systems. As an illustration, we apply the HOWRAN concept to the backhauling of fixed or mobile WiMAX base stations. The two main innovative aspects of HOWRAN are depicted: its hardware architecture and its control plane.

  3. Access Agent Improving The Performance Of Access Control Lists

    Directory of Open Access Journals (Sweden)

    Thelis R. S.

    2015-08-01

    Full Text Available The main focus of the proposed research is maintaining the security of a network. Extranet is a popular network among most of the organizations where network access is provided to a selected group of outliers. Limiting access to an extranet can be carried out using Access Control Lists ACLs method. However handling the workload of ACLs is an onerous task for the router. The purpose of the proposed research is to improve the performance and to solidify the security of the ACLs used in a small organization. Using a high performance computer as a dedicated device to share and handle the router workload is suggested in order to increase the performance of the router when handling ACLs. Methods of detecting and directing sensitive data is also discussed in this paper. A framework is provided to help increase the efficiency of the ACLs in an organization network using the above mentioned procedures thus helping the organizations ACLs performance to be improved to be more secure and the system to perform faster. Inbuilt methods of Windows platform or Software for open source platforms can be used to make a computer function as a router. Extended ACL features allow the determining of the type of packets flowing through the router. Combining these mechanisms allows the ACLs to be improved and perform in a more efficient manner.

  4. Locomotion control of hybrid cockroach robots

    Science.gov (United States)

    Sanchez, Carlos J.; Chiu, Chen-Wei; Zhou, Yan; González, Jorge M.; Vinson, S. Bradleigh; Liang, Hong

    2015-01-01

    Natural systems retain significant advantages over engineered systems in many aspects, including size and versatility. In this research, we develop a hybrid robotic system using American (Periplaneta americana) and discoid (Blaberus discoidalis) cockroaches that uses the natural locomotion and robustness of the insect. A tethered control system was firstly characterized using American cockroaches, wherein implanted electrodes were used to apply an electrical stimulus to the prothoracic ganglia. Using this approach, larger discoid cockroaches were engineered into a remotely controlled hybrid robotic system. Locomotion control was achieved through electrical stimulation of the prothoracic ganglia, via a remotely operated backpack system and implanted electrodes. The backpack consisted of a microcontroller with integrated transceiver protocol, and a rechargeable battery. The hybrid discoid roach was able to walk, and turn in response to an electrical stimulus to its nervous system with high repeatability of 60%. PMID:25740855

  5. Cryptographically Enforced Distributed Data Access Control

    NARCIS (Netherlands)

    Ibraimi, L.

    2011-01-01

    Outsourcing data storage reduces the cost of ownership. However, once data is stored on a remote server, users lose control over their sensitive data. There are two approaches to control the access to outsourced data. The first approach assumes that the outsourcee is fully trusted. This approach is

  6. Hybrid Intelligent Control for Submarine Stabilization

    Directory of Open Access Journals (Sweden)

    Minghui Wang

    2013-05-01

    Full Text Available While sailing near the sea surface, submarines will often undergo rolling motion caused by wave disturbance. Fierce rolling motion seriously affects their normal operation and even threatens their security. We propose a new control method for roll stabilization. This paper studies hybrid intelligent control combining a fuzzy control, a neural network and extension control technology. Every control strategy can achieve the ideal control effect within the scope of its effective control. The neuro‐fuzzy control strategy is used to improve the robustness of the controller. The speed control strategy and the course control strategy are conducted to extend the control range. The paper also proposes the design of the controller and carries out the simulation experiment in different sea conditions. The simulation results show that the control method proposed can indeed effectively improve the control performance of submarine stabilization.

  7. Hybrid Intelligent Control for Submarine Stabilization

    Directory of Open Access Journals (Sweden)

    Minghui Wang

    2013-05-01

    Full Text Available Abstract While sailing near the sea surface, submarines will often undergo rolling motion caused by wave disturbance. Fierce rolling motion seriously affects their normal operation and even threatens their security. We propose a new control method for roll stabilization. This paper studies hybrid intelligent control combining a fuzzy control, a neural network and extension control technology. Every control strategy can achieve the ideal control effect within the scope of its effective control. The neuro-fuzzy control strategy is used to improve the robustness of the controller. The speed control strategy and the course control strategy are conducted to extend the control range. The paper also proposes the design of the controller and carries out the simulation experiment in different sea conditions. The simulation results show that the control method proposed can indeed effectively improve the control performance of submarine stabilization.

  8. A secure solution on hierarchical access control

    CERN Document Server

    Wei, Chuan-Sheng; Huang, Tone-Yau; Ong, Yao Lin

    2011-01-01

    Hierarchical access control is an important and traditional problem in information security. In 2001, Wu et.al. proposed an elegant solution for hierarchical access control by the secure-filter. Jeng and Wang presented an improvement of Wu et. al.'s method by the ECC cryptosystem. However, secure-filter method is insecure in dynaminc access control. Lie, Hsu and Tripathy, Paul pointed out some secure leaks on the secure-filter and presented some improvements to eliminate these secure flaws. In this paper, we revise the secure-filter in Jeng-Wang method and propose another secure solutions in hierarchical access control problem. CA is a super security class (user) in our proposed method and the secure-filter of $u_i$ in our solutions is a polynomial of degree $n_i+1$ in $\\mathbb{Z}_p^*$, $f_i(x)=(x-h_i)(x-a_1)...(x-a_{n_i})+L_{l_i}(K_i)$. Although the degree of our secure-filter is larger than others solutions, our solution is secure and efficient in dynamics access control.

  9. The linked medical data access control framework.

    Science.gov (United States)

    Kamateri, Eleni; Kalampokis, Evangelos; Tambouris, Efthimios; Tarabanis, Konstantinos

    2014-08-01

    The integration of medical data coming from multiple sources is important in clinical research. Amongst others, it enables the discovery of appropriate subjects in patient-oriented research and the identification of innovative results in epidemiological studies. At the same time, the integration of medical data faces significant ethical and legal challenges that impose access constraints. Some of these issues can be addressed by making available aggregated instead of raw record-level data. In many cases however, there is still a need for controlling access even to the resulting aggregated data, e.g., due to data provider's policies. In this paper we present the Linked Medical Data Access Control (LiMDAC) framework that capitalizes on Linked Data technologies to enable controlling access to medical data across distributed sources with diverse access constraints. The LiMDAC framework consists of three Linked Data models, namely the LiMDAC metadata model, the LiMDAC user profile model, and the LiMDAC access policy model. It also includes an architecture that exploits these models. Based on the framework, a proof-of-concept platform is developed and its performance and functionality are evaluated by employing two usage scenarios.

  10. Infinite Dimensional Differential Games with Hybrid Controls

    Indian Academy of Sciences (India)

    A J Shaiju; Sheetal Dharmatti

    2007-05-01

    A two-person zero-sum infinite dimensional differential game of infinite duration with discounted payoff involving hybrid controls is studied. The minimizing player is allowed to take continuous, switching and impulse controls whereas the maximizing player is allowed to take continuous and switching controls. By taking strategies in the sense of Elliott–Kalton, we prove the existence of value and characterize it as the unique viscosity solution of the associated system of quasi-variational inequalities.

  11. Access control mechanisms for distributed healthcare environments.

    Science.gov (United States)

    Sergl-Pommerening, Marita

    2004-01-01

    Today's IT-infrastructure provides more and more possibilities to share electronic patient data across several healthcare organizations and hospital departments. A strong requirement is sufficient data protection and security measures complying with the medical confidentiality and the data protection laws of each state or country like the European directive on data protection or the U.S. HIPAA privacy rule. In essence, the access control mechanisms and authorization structures of information systems must be able to realize the Need-To-Access principle. This principle can be understood as a set of context-sensitive access rules, regarding the patient's path across the organizations. The access control mechanisms of today's health information systems do not sufficiently satisfy this requirement, because information about participation of persons or organizations is not available within each system in a distributed environment. This problem could be solved by appropriate security services. The CORBA healthcare domain standard contains such a service for obtaining authorization decisions and administrating access decision policies (RAD). At the university hospital of Mainz we have developed an access control system (MACS), which includes the main functionality of the RAD specification and the access control logic that is needed for such a service. The basic design principles of our approach are role-based authorization, user rights with static and dynamic authorization data, context rules and the separation of three cooperating servers that provide up-to-date knowledge about users, roles and responsibilities. This paper introduces the design principles and the system design and critically evaluates the concepts based on practical experience.

  12. Access Control in Data Management Systems

    CERN Document Server

    Ferrari, Elena

    2010-01-01

    Access control is one of the fundamental services that any Data Management System should provide. Its main goal is to protect data from unauthorized read and write operations. This is particularly crucial in today's open and interconnected world, where each kind of information can be easily made available to a huge user population, and where a damage or misuse of data may have unpredictable consequences that go beyond the boundaries where data reside or have been generated. This book provides an overview of the various developments in access control for data management systems. Discretionary,

  13. Access control mechanism of wireless gateway based on open flow

    Science.gov (United States)

    Peng, Rong; Ding, Lei

    2017-08-01

    In order to realize the access control of wireless gateway and improve the access control of wireless gateway devices, an access control mechanism of SDN architecture which is based on Open vSwitch is proposed. The mechanism utilizes the features of the controller--centralized control and programmable. Controller send access control flow table based on the business logic. Open vSwitch helps achieve a specific access control strategy based on the flow table.

  14. Hybrid Access Femtocells in Overlaid MIMO Cellular Networks with Transmit Selection under Poisson Field Interference

    KAUST Repository

    Abdel Nabi, Amr A

    2017-09-21

    This paper analyzes the performance of hybrid control-access schemes for small cells (such as femtocells) in the context of two-tier overlaid cellular networks. The proposed hybrid access schemes allow for sharing the same downlink resources between the small-cell network and the original macrocell network, and their mode of operations are characterized considering post-processed signal-to-interference-plus-noise ratios (SINRs) or pre-processed interference-aware operation. The work presents a detailed treatment of achieved performance of a desired user that benefits from MIMO arrays configuration through the use of transmit antenna selection (TAS) and maximal ratio combining (MRC) in the presence of Poisson field interference processes on spatial links. Furthermore, based on the interference awareness at the desired user, two TAS approaches are treated, which are the signal-to-noise (SNR)-based selection and SINR-based selection. The analysis is generalized to address the cases of highly-correlated and un-correlated aggregated interference on different transmit channels. In addition, the effect of delayed TAS due to imperfect feedback and the impact of arbitrary TAS processing are investigated. The analytical results are validated by simulations, to clarify some of the main outcomes herein.

  15. MERCURY CONTROL WITH ADVANCED HYBRID PARTICULATE COLLECTOR

    Energy Technology Data Exchange (ETDEWEB)

    Ye Zhuang; Stanley J. Miller

    2005-05-01

    This project was awarded under U.S. Department of Energy (DOE) National Energy Technology Laboratory (NETL) Program Solicitation DE-PS26-00NT40769 and specifically addressed Technical Topical Area 4-Testing Novel and Less Mature Control Technologies on Actual Flue Gas at the Pilot Scale. The project team included the Energy & Environmental Research Center (EERC) as the main contractor; W.L. Gore & Associates, Inc., as a technical and financial partner; and the Big Stone Power Plant operated by Otter Tail Power Company, host for the field-testing portion of the research. Since 1995, DOE has supported development of a new concept in particulate control called the advanced hybrid particulate collector (AHPC). The AHPC has been licensed to W.L. Gore & Associates, Inc., and has been marketed as the Advanced Hybrid{trademark} filter by Gore. The Advanced Hybrid{trademark} filter combines the best features of electrostatic precipitators (ESPs) and baghouses in a unique configuration, providing major synergism between the two collection methods, both in the particulate collection step and in the transfer of dust to the hopper. The Advanced Hybrid{trademark} filter provides ultrahigh collection efficiency, overcoming the problem of excessive fine-particle emissions with conventional ESPs, and it solves the problem of reentrainment and re-collection of dust in conventional baghouses. The Advanced Hybrid{trademark} filter also appears to have unique advantages for mercury control over baghouses or ESPs as an excellent gas--solid contactor. The objective of the project was to demonstrate 90% total mercury control in the Advanced Hybrid{trademark} filter at a lower cost than current mercury control estimates. The approach included bench-scale batch tests, larger-scale pilot testing with real flue gas on a coal-fired combustion system, and field demonstration at the 2.5-MW (9000-acfm) scale at a utility power plant to prove scale-up and demonstrate longer-term mercury control

  16. Control of optics in random access analysers

    OpenAIRE

    Truchaud, A.

    1988-01-01

    The technology behind random access analysers involves flexible optical systems which can measure absorbances for one reaction at different scheduled times, and for several reactions performed simultaneously at different wavelengths. Optics control involves light sources (continuous and flash mode), indexing of monochromatic filters, injection-moulded plastic cuvettes, optical fibres, and polychromatic analysis.

  17. Role-based access control in retrospect

    NARCIS (Netherlands)

    Franqueira, Virginia N.L.; Wieringa, Roel

    2012-01-01

    Role-Based Access Control (RBAC) has been a success in terms of the amount of research that went into it, its uptake in international standards, and its adoption by major software vendors. Yet, RBAC remains complex to implement in user organizations. In this paper we review the state of the art of R

  18. Atom-Role-Based Access Control Model

    Science.gov (United States)

    Cai, Weihong; Huang, Richeng; Hou, Xiaoli; Wei, Gang; Xiao, Shui; Chen, Yindong

    Role-based access control (RBAC) model has been widely recognized as an efficient access control model and becomes a hot research topic of information security at present. However, in the large-scale enterprise application environments, the traditional RBAC model based on the role hierarchy has the following deficiencies: Firstly, it is unable to reflect the role relationships in complicated cases effectively, which does not accord with practical applications. Secondly, the senior role unconditionally inherits all permissions of the junior role, thus if a user is under the supervisor role, he may accumulate all permissions, and this easily causes the abuse of permission and violates the least privilege principle, which is one of the main security principles. To deal with these problems, we, after analyzing permission types and role relationships, proposed the concept of atom role and built an atom-role-based access control model, called ATRBAC, by dividing the permission set of each regular role based on inheritance path relationships. Through the application-specific analysis, this model can well meet the access control requirements.

  19. An electronically controlled automatic security access gate

    Directory of Open Access Journals (Sweden)

    Jonathan A. ENOKELA

    2014-11-01

    Full Text Available The security challenges being encountered in many places require electronic means of controlling access to communities, recreational centres, offices, and homes. The electronically controlled automated security access gate being proposed in this work helps to prevent an unwanted access to controlled environments. This is achieved mainly through the use of a Radio Frequency (RF transmitter-receiver pair. In the design a microcontroller is programmed to decode a given sequence of keys that is entered on a keypad and commands a transmitter module to send out this code as signal at a given radio frequency. Upon reception of this RF signal by the receiver module, another microcontroller activates a driver circuitry to operate the gate automatically. The codes for the microcontrollers were written in C language and were debugged and compiled using the KEIL Micro vision 4 integrated development environment. The resultant Hex files were programmed into the memories of the microcontrollers with the aid of a universal programmer. Software simulation was carried out using the Proteus Virtual System Modeling (VSM version 7.7. A scaled-down prototype of the system was built and tested. The electronically controlled automated security access gate can be useful in providing security for homes, organizations, and automobile terminals. The four-character password required to operate the gate gives the system an increased level of security. Due to its standalone nature of operation the system is cheaper to maintain in comparison with a manually operated type.

  20. Access Control from an Intrusion Detection Perspective

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.

    Access control and intrusion detection are essential components for securing an organization's information assets. In practice, these components are used in isolation, while their fusion would contribute to increase the range and accuracy of both. One approach to accomplish this fusion is the

  1. VHDL IMPLEMENTATION OF TEST ACCESS PORT CONTROLLER

    Directory of Open Access Journals (Sweden)

    MANPREET KAUR

    2012-06-01

    Full Text Available In this paper, an implementation of IEEE 1149.7 standard is used for designing Test Access Port (TAP Controller and testing of interconnects is done using boundary scan. By c-JTAG the pin count gets reduced which increases the performance and simplifies the connection between devices. TAP Controller is a synchronous Moore type finite state machine that is changed when the TMS and TCK signals of the test access port gets change. This controls the sequence operation of the circuitry conveyed by JTAG and c-JTAG. JTAGmainly used four pins with TAP and fifth pin is for optional use in Boundary scan. But c-JTAG uses only two pins with TAP. In this approach TDI and TDO gets multiplexed by using class T4 and T5 of c-JTAG. Various instructions are used for testing interconnects using IEEE 1149.7 standard (std.

  2. Battery control system for hybrid vehicle and method for controlling a hybrid vehicle battery

    Science.gov (United States)

    Bockelmann, Thomas R [Battle Creek, MI; Hope, Mark E [Marshall, MI; Zou, Zhanjiang [Battle Creek, MI; Kang, Xiaosong [Battle Creek, MI

    2009-02-10

    A battery control system for hybrid vehicle includes a hybrid powertrain battery, a vehicle accessory battery, and a prime mover driven generator adapted to charge the vehicle accessory battery. A detecting arrangement is configured to monitor the vehicle accessory battery's state of charge. A controller is configured to activate the prime mover to drive the generator and recharge the vehicle accessory battery in response to the vehicle accessory battery's state of charge falling below a first predetermined level, or transfer electrical power from the hybrid powertrain battery to the vehicle accessory battery in response to the vehicle accessory battery's state of charge falling below a second predetermined level. The invention further includes a method for controlling a hybrid vehicle powertrain system.

  3. Use of the Paid Open Access Option in Hybrid Open Access Journals in Agriculture: A Mixed-Methods Study

    Directory of Open Access Journals (Sweden)

    Megan Kocher

    2016-12-01

    Full Text Available We explore the use and usefulness of the hybrid open access publishing model in agricultural sciences using a combination of quantitative and qualitative methods. To ascertain the level of usage of the paid open access option in hybrid open access journals in agriculture, we studied the agriculture-related journals published by six commercial publishers. These publishers offer authors the option of paying a fee, often close to $3,000 per article, to make their article immediately freely available, usually with a Creative Commons license. We defined agriculture broadly but also assigned each journal to a subspecialty (e.g., animal science in order to see if there were differences based on these subdivisions. For each journal we gathered data for 2014-2015 and noted the total number of research articles and the number of those that were made freely available by authors paying the open access fee. To give context to our results we also surveyed local faculty in agricultural sciences, asking their reasons for considering the paid open access options and the sources of the funds to pay for it. Survey respondents were asked about their academic position and rank to see if there were differences to be noted. We also investigated the findability of the open access articles, noting if each individual publisher offered a way to easily locate all the freely available articles in a particular journal and if there are other avenues to easily locate these articles.

  4. A Hybrid Scheme for Fine-Grained Search and Access Authorization in Fog Computing Environment

    Science.gov (United States)

    Xiao, Min; Zhou, Jing; Liu, Xuejiao; Jiang, Mingda

    2017-01-01

    In the fog computing environment, the encrypted sensitive data may be transferred to multiple fog nodes on the edge of a network for low latency; thus, fog nodes need to implement a search over encrypted data as a cloud server. Since the fog nodes tend to provide service for IoT applications often running on resource-constrained end devices, it is necessary to design lightweight solutions. At present, there is little research on this issue. In this paper, we propose a fine-grained owner-forced data search and access authorization scheme spanning user-fog-cloud for resource constrained end users. Compared to existing schemes only supporting either index encryption with search ability or data encryption with fine-grained access control ability, the proposed hybrid scheme supports both abilities simultaneously, and index ciphertext and data ciphertext are constructed based on a single ciphertext-policy attribute based encryption (CP-ABE) primitive and share the same key pair, thus the data access efficiency is significantly improved and the cost of key management is greatly reduced. Moreover, in the proposed scheme, the resource constrained end devices are allowed to rapidly assemble ciphertexts online and securely outsource most of decryption task to fog nodes, and mediated encryption mechanism is also adopted to achieve instantaneous user revocation instead of re-encrypting ciphertexts with many copies in many fog nodes. The security and the performance analysis show that our scheme is suitable for a fog computing environment. PMID:28629131

  5. Speed control system for an access gate

    Science.gov (United States)

    Bzorgi, Fariborz M.

    2012-03-20

    An access control apparatus for an access gate. The access gate typically has a rotator that is configured to rotate around a rotator axis at a first variable speed in a forward direction. The access control apparatus may include a transmission that typically has an input element that is operatively connected to the rotator. The input element is generally configured to rotate at an input speed that is proportional to the first variable speed. The transmission typically also has an output element that has an output speed that is higher than the input speed. The input element and the output element may rotate around a common transmission axis. A retardation mechanism may be employed. The retardation mechanism is typically configured to rotate around a retardation mechanism axis. Generally the retardation mechanism is operatively connected to the output element of the transmission and is configured to retard motion of the access gate in the forward direction when the first variable speed is above a control-limit speed. In many embodiments the transmission axis and the retardation mechanism axis are substantially co-axial. Some embodiments include a freewheel/catch mechanism that has an input connection that is operatively connected to the rotator. The input connection may be configured to engage an output connection when the rotator is rotated at the first variable speed in a forward direction and configured for substantially unrestricted rotation when the rotator is rotated in a reverse direction opposite the forward direction. The input element of the transmission is typically operatively connected to the output connection of the freewheel/catch mechanism.

  6. Modelling supervisory controller for hybrid power systems

    Energy Technology Data Exchange (ETDEWEB)

    Pereira, A.; Bindner, H.; Lundsager, P. [Risoe National Lab., Roskilde (Denmark); Jannerup, O. [Technical Univ. of Denmark, Dept. of Automation, Lyngby (Denmark)

    1999-03-01

    Supervisory controllers are important to achieve optimal operation of hybrid power systems. The performance and economics of such systems depend mainly on the control strategy for switching on/off components. The modular concept described in this paper is an attempt to design standard supervisory controllers that could be used in different applications, such as village power and telecommunication applications. This paper presents some basic aspects of modelling and design of modular supervisory controllers using the object-oriented modelling technique. The functional abstraction hierarchy technique is used to formulate the control requirements and identify the functions of the control system. The modular algorithm is generic and flexible enough to be used with any system configuration and several goals (different applications). The modularity includes accepting modification of system configuration and goals during operation with minor or no changes in the supervisory controller. (au)

  7. A Theorem on Grid Access Control

    Institute of Scientific and Technical Information of China (English)

    XU ZhiWei(徐志伟); BU GuanYing(卜冠英)

    2003-01-01

    The current grid security research is mainly focused on the authentication of grid systems. A problem to be solved by grid systems is to ensure consistent access control. This problem is complicated because the hosts in a grid computing environment usually span multiple autonomous administrative domains. This paper presents a grid access control model, based on asynchronous automata theory and the classic Bell-LaPadula model. This model is useful to formally study the confidentiality and integrity problems in a grid computing environment. A theorem is proved, which gives the necessary and sufficient conditions to a grid to maintain confidentiality.These conditions are the formalized descriptions of local (node) relations or relationship between grid subjects and node subjects.

  8. Predictive access control for distributed computation

    DEFF Research Database (Denmark)

    Yang, Fan; Hankin, Chris; Nielson, Flemming

    2013-01-01

    We show how to use aspect-oriented programming to separate security and trust issues from the logical design of mobile, distributed systems. The main challenge is how to enforce various types of security policies, in particular predictive access control policies — policies based on the future...... behavior of a program. A novel feature of our approach is that we can define policies concerning secondary use of data....

  9. Distributed medium access control in wireless networks

    CERN Document Server

    Wang, Ping

    2013-01-01

    This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc networks, and wireless mesh networks. For WLANs, an efficient MAC scheme and a call admission control algorithm are presented to provide guaranteed QoS for voice traffic and, at the same time, increase the voice capacity significantly compared with the current WLAN standard. In addition, a novel token-based scheduling scheme is proposed to provide great flexibility and facility to the network servi

  10. Hybrid Genetic Algorithms with Fuzzy Logic Controller

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    In this paper, a new implementation of genetic algorithms (GAs) is developed for the machine scheduling problem, which is abundant among the modern manufacturing systems. The performance measure of early and tardy completion of jobs is very natural as one's aim, which is usually to minimize simultaneously both earliness and tardiness of all jobs. As the problem is NP-hard and no effective algorithms exist, we propose a hybrid genetic algorithms approach to deal with it. We adjust the crossover and mutation probabilities by fuzzy logic controller whereas the hybrid genetic algorithm does not require preliminary experiments to determine probabilities for genetic operators. The experimental results show the effectiveness of the GAs method proposed in the paper.``

  11. Hybrid upconversion nanomaterials for optogenetic neuronal control

    Science.gov (United States)

    Shah, Shreyas; Liu, Jing-Jing; Pasquale, Nicholas; Lai, Jinping; McGowan, Heather; Pang, Zhiping P.; Lee, Ki-Bum

    2015-10-01

    Nanotechnology-based approaches offer the chemical control required to develop precision tools suitable for applications in neuroscience. We report a novel approach employing hybrid upconversion nanomaterials, combined with the photoresponsive ion channel channelrhodopsin-2 (ChR2), to achieve near-infrared light (NIR)-mediated optogenetic control of neuronal activity. Current optogenetic methodologies rely on using visible light (e.g. 470 nm blue light), which tends to exhibit high scattering and low tissue penetration, to activate ChR2. In contrast, our approach enables the use of 980 nm NIR light, which addresses the short-comings of visible light as an excitation source. This was facilitated by embedding upconversion nanomaterials, which can convert NIR light to blue luminescence, into polymeric scaffolds. These hybrid nanomaterial scaffolds allowed for NIR-mediated neuronal stimulation, with comparable efficiency as that of 470 nm blue light. Our platform was optimized for NIR-mediated optogenetic control by balancing multiple physicochemical properties of the nanomaterial (e.g. size, morphology, structure, emission spectra, concentration), thus providing an early demonstration of rationally-designing nanomaterial-based strategies for advanced neural applications.Nanotechnology-based approaches offer the chemical control required to develop precision tools suitable for applications in neuroscience. We report a novel approach employing hybrid upconversion nanomaterials, combined with the photoresponsive ion channel channelrhodopsin-2 (ChR2), to achieve near-infrared light (NIR)-mediated optogenetic control of neuronal activity. Current optogenetic methodologies rely on using visible light (e.g. 470 nm blue light), which tends to exhibit high scattering and low tissue penetration, to activate ChR2. In contrast, our approach enables the use of 980 nm NIR light, which addresses the short-comings of visible light as an excitation source. This was facilitated by

  12. Adaptive Hybrid Mobile Agent Protocol for Wireless Multihop Internet Access

    Directory of Open Access Journals (Sweden)

    A. Velmurugan

    2006-01-01

    Full Text Available Internet-based Mobile Ad Hoc Networking (MANET is an emerging technology that supports self-organizing mobile networking infrastructures. This is expected to be of great use in commercial applications for the next generation Internet users. A number of technical challenges are faced today due to the heterogeneous, dynamic nature of this hybrid MANET. A new hybrid routing scheme AODV_ALMA is proposed, which act simultaneously combining mobile agents to find path to the gateway to establish connection with Internet host and on-demand distance vector approach to find path in local MANET is one of the unique solution. An adaptive gateway discovery mechanism based on mobile agents making use of pheromone value, pheromone decay time and balance index is used to estimate the path and next hop to the gateway. The mobile nodes automatically configure the address using mobile agents first selecting the gateway and then using the gateway prefix address. The mobile agents are also used to track changes in topology enabling high network connectivity with reduced delay in packet transmission to Internet. The performance tradeoffs and limitations with existing solutions for various mobility conditions are evaluated using simulation."

  13. A service-oriented data access control model

    Science.gov (United States)

    Meng, Wei; Li, Fengmin; Pan, Juchen; Song, Song; Bian, Jiali

    2017-01-01

    The development of mobile computing, cloud computing and distributed computing meets the growing individual service needs. Facing with complex application system, it's an urgent problem to ensure real-time, dynamic, and fine-grained data access control. By analyzing common data access control models, on the basis of mandatory access control model, the paper proposes a service-oriented access control model. By regarding system services as subject and data of databases as object, the model defines access levels and access identification of subject and object, and ensures system services securely to access databases.

  14. Perti Net-Based Workflow Access Control Model

    Institute of Scientific and Technical Information of China (English)

    陈卓; 骆婷; 石磊; 洪帆

    2004-01-01

    Access control is an important protection mechanism for information systems. This paper shows how to make access control in workflow system. We give a workflow access control model (WACM) based on several current access control models. The model supports roles assignment and dynamic authorization. The paper defines the workflow using Petri net. It firstly gives the definition and description of the workflow, and then analyzes the architecture of the workflow access control model (WACM). Finally, an example of an e-commerce workflow access control model is discussed in detail.

  15. Hybrid adaptive control of a dragonfly model

    Science.gov (United States)

    Couceiro, Micael S.; Ferreira, Nuno M. F.; Machado, J. A. Tenreiro

    2012-02-01

    Dragonflies show unique and superior flight performances than most of other insect species and birds. They are equipped with two pairs of independently controlled wings granting an unmatchable flying performance and robustness. In this paper, it is presented an adaptive scheme controlling a nonlinear model inspired in a dragonfly-like robot. It is proposed a hybrid adaptive ( HA) law for adjusting the parameters analyzing the tracking error. At the current stage of the project it is considered essential the development of computational simulation models based in the dynamics to test whether strategies or algorithms of control, parts of the system (such as different wing configurations, tail) as well as the complete system. The performance analysis proves the superiority of the HA law over the direct adaptive ( DA) method in terms of faster and improved tracking and parameter convergence.

  16. Research of user access control for networked manufacturing system

    Institute of Scientific and Technical Information of China (English)

    ZHENG Xiao-lin; LEI Yu; CHEN De-ren

    2006-01-01

    An integrated user access control method was proposed to address the issues of security and management in networked manufacturing systems (NMS).Based on the analysis of the security issues in networked manufacturing system,an integrated user access control method composed of role-based access control (RBAC),task-based access control (TBAC),relationship-driven access control (RDAC)and coalition-based access control (CBAC) was proposed,including the hierarchical user relationship model,the reference model and the process model.The elements and their relationships were defined,and the expressions of constraints authorization were given.The extensible access control markup language (XACML) was used to implement this method.This method was used in the networked manufacturing system in the Shaoxing spinning region of China.The results show that the integrated user access control method can reduce the costs of system security maintenance and management.

  17. Integrating Attributes into Role-Based Access Control

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim; Jensen, Christian D.; Krishnan, Ram

    2015-01-01

    Role-based access control (RBAC) and attribute-based access control (ABAC) are currently the most prominent access control models. However, they both suffer from limitations and have features complimentary to each other. Due to this fact, integration of RBAC and ABAC has become a hot area...

  18. Attributes Enhanced Role-Based Access Control Model

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim; Jensen, Christian D.; Krishnan, Ram

    2015-01-01

    as an important area of research. In this paper, we propose an access control model that combines the two models in a novel way in order to unify their benefits. Our approach provides a fine-grained access control mechanism that not only takes contextual information into account while making the access control...

  19. CVT shift control for a hybrid driveline

    Energy Technology Data Exchange (ETDEWEB)

    Mueller, C. [VDI (Germany); Schroeder, D.

    2002-07-01

    In this contribution, chain drive CVTs will be investigated. Pushing belt CVTs are characterized by a different construction, but some basic concepts can be partly transferred. The identification results refer to the drive train of a parallel hybrid passenger car which is discussed as an example for application. It is equipped with a special CVT based gearbox. A set of clutches allows the squaring of the single CVT range of possible gear ratios. A detailed description of the system is given in [2]. CVT models discussed in literature [15],[10] focus primarily on component strain in order to support the design process. These models are usually rather complex and are not well-suited for control purposes. In the following, a short system description will be given. Properties relevant for control will be outlined. (orig.)

  20. Intelligent Control Scheme of Engineering Machinery of Cluster Hybrid System

    Institute of Scientific and Technical Information of China (English)

    GAO Qiang; WANG Hongli

    2005-01-01

    In a hybrid system, the subsystems with discrete dynamics play a central role in a hybrid system. In the course of engineering machinery of cluster construction, the discrete control law is hard to obtain because the construction environment is complex and there exist many affecting factors. In this paper, hierarchically intelligent control, expert control and fuzzy control are introduced into the discrete subsystems of engineering machinery of cluster hybrid system, so as to rebuild the hybrid system and make the discrete control law easily and effectively obtained. The structures, reasoning mechanism and arithmetic of intelligent control are replanted to discrete dynamic, conti-nuous process and the interface of the hybrid system. The structures of three types of intelligent hybrid system are presented and the human experiences summarized from engineering machinery of cluster are taken into account.

  1. Hybrid optimization schemes for quantum control

    Energy Technology Data Exchange (ETDEWEB)

    Goerz, Michael H.; Koch, Christiane P. [Universitaet Kassel, Theoretische Physik, Kassel (Germany); Whaley, K. Birgitta [University of California, Department of Chemistry, Berkeley, CA (United States)

    2015-12-15

    Optimal control theory is a powerful tool for solving control problems in quantum mechanics, ranging from the control of chemical reactions to the implementation of gates in a quantum computer. Gradient-based optimization methods are able to find high fidelity controls, but require considerable numerical effort and often yield highly complex solutions. We propose here to employ a two-stage optimization scheme to significantly speed up convergence and achieve simpler controls. The control is initially parametrized using only a few free parameters, such that optimization in this pruned search space can be performed with a simplex method. The result, considered now simply as an arbitrary function on a time grid, is the starting point for further optimization with a gradient-based method that can quickly converge to high fidelities. We illustrate the success of this hybrid technique by optimizing a geometric phase gate for two superconducting transmon qubits coupled with a shared transmission line resonator, showing that a combination of Nelder-Mead simplex and Krotov's method yields considerably better results than either one of the two methods alone. (orig.)

  2. Break-glass handling exceptional situations in access control

    CERN Document Server

    Petritsch, Helmut

    2014-01-01

    Helmut Petritsch describes the first holistic approach to Break-Glass which covers the whole life-cycle: from access control modeling (pre-access), to logging the security-relevant system state during Break-Glass accesses (at-access), and the automated analysis of Break-Glass accesses (post-access). Break-Glass allows users to override security restrictions in exceptional situations. While several Break-Glass models specific to given access control models have already been discussed in research (e.g., extending RBAC with Break-Glass), the author introduces a generic Break-Glass model. The pres

  3. Hybrid systems, optimal control and hybrid vehicles theory, methods and applications

    CERN Document Server

    Böhme, Thomas J

    2017-01-01

    This book assembles new methods showing the automotive engineer for the first time how hybrid vehicle configurations can be modeled as systems with discrete and continuous controls. These hybrid systems describe naturally and compactly the networks of embedded systems which use elements such as integrators, hysteresis, state-machines and logical rules to describe the evolution of continuous and discrete dynamics and arise inevitably when modeling hybrid electric vehicles. They can throw light on systems which may otherwise be too complex or recondite. Hybrid Systems, Optimal Control and Hybrid Vehicles shows the reader how to formulate and solve control problems which satisfy multiple objectives which may be arbitrary and complex with contradictory influences on fuel consumption, emissions and drivability. The text introduces industrial engineers, postgraduates and researchers to the theory of hybrid optimal control problems. A series of novel algorithmic developments provides tools for solving engineering pr...

  4. Frequency Stability of Hierarchically Controlled Hybrid Photovoltaic-Battery-Hydropower Microgrids

    DEFF Research Database (Denmark)

    Guan, Yajuan; Quintero, Juan Carlos Vasquez; Guerrero, Josep M.;

    2015-01-01

    Hybrid photovoltaic (PV) -battery-hydropower microgrids can be considered to enhance electricity accessibility and availability in remote areas. However, the coexistence of different renewable energy sources with different inertias and control strategies may affect system stability. In this paper......, a hierarchical controller for hybrid PV-battery-hydropower microgrid is proposed in order to achieve the parallel operation of hydropower and PV-battery system with different rates, and to guarantee power sharing performance among PV voltage controlled inverters, while the required power to hydropower...... is derived to analyze the system stability of the hybrid microgrid. The simulation results show system frequency and voltage stability for a hybrid microgrid demonstration which includes 2 MWp PV installations, a 15.2 MWh battery system, and a 12.8 MVA hydropower plant. Experimental results on a small...

  5. Control of aggregation-induced emission by DNA hybridization

    OpenAIRE

    Li, Shaoguang; Langenegger, Simon Matthias; Häner, Robert

    2013-01-01

    Aggregation-induced emission (AIE) was studied by hybridization of dialkynyl-tetraphenylethylene (DATPE) modified DNA strands. Molecular aggregation and fluorescence of DATPEs are controlled by duplex formation.

  6. Context-Based E-Health System Access Control Mechanism

    Science.gov (United States)

    Al-Neyadi, Fahed; Abawajy, Jemal H.

    E-Health systems logically demand a sufficiently fine-grained authorization policy for access control. The access to medical information should not be just role-based but should also include the contextual condition of the role to access data. In this paper, we present a mechanism to extend the standard role-based access control to incorporate contextual information for making access control decisions in e-health application. We present an architecture consisting of authorisation and context infrastructure that work cooperatively to grant access rights based on context-aware authorization policies and context information.

  7. DSP Control of Line Hybrid Active Filter

    DEFF Research Database (Denmark)

    Dan, Stan George; Benjamin, Doniga Daniel; Magureanu, R.;

    2005-01-01

    Active Power Filters have been intensively explored in the past decade. Hybrid active filters inherit the efficiency of passive filters and the improved performance of active filters, and thus constitute a viable improved approach for harmonic compensation. In this paper a parallel hybrid filter ...

  8. Optical Code-Division Multiple-Access and Wavelength Division Multiplexing: Hybrid Scheme Review

    Directory of Open Access Journals (Sweden)

    P. Susthitha Menon

    2012-01-01

    Full Text Available Problem statement: Hybrid Optical Code-Division Multiple-Access (OCDMA and Wavelength-Division Multiplexing (WDM have flourished as successful schemes for expanding the transmission capacity as well as enhancing the security for OCDMA. However, a comprehensive review related to this hybrid system are lacking currently. Approach: The purpose of this paper is to review the literature on OCDMA-WDM overlay systems, including our hybrid approach of one-dimensional coding of SAC OCDMA with WDM signals. In addition, we present an additional review of other categorios of hybrid WDM/OCDMA schemes, where codes of OCDMA can be employed on each WDM wavelength. Furthermore, an essential background of OCDMA, recent coding techniques and security issues are also presented. Results: Our results indicate that the feasibility of transmitting both OCDMA and WDM users on the same spectrum band can be achieved using MQC family code with an acceptable performance as well as good data confidentiality. In addition, the WDM interference signals can be suppressed properly for detection of optical broadband CDMA using notch filters. Conclusion: The paper provides a comprehensive overview of hybrid OCDMA-WDM systems and can be used as a baseline study for other scientists in the similar scope of research.

  9. A hybrid electromechanical solid state switch for ac power control

    Science.gov (United States)

    1972-01-01

    Bidirectional thyristor coupled to a series of actuator driven electromechanical contacts generates hybrid electromechanical solid state switch for ac power control. Device is useful in power control applications where zero crossover switching is required.

  10. Campus Access Control System RFID Based

    Directory of Open Access Journals (Sweden)

    Mr. SANTHOSH S

    2012-06-01

    Full Text Available Radio frequency identification (RFID technology has helped many organizations to reduce cost. Nevertheless, there are challenges and issues associated with RFID adoption. The most common internal challenge for many organizations is justifying the investment and modification of processes. The focus of this project is to show the business value of RFID technology and its applications. The important issue is the security level of the whole campus because it needs to be carefully differentiated. Dormitories and special research laboratories should benefit from higher levels of security than any other campuses. The key to the problem is represented by the new Radio Frequency Identification (RFID which can support contactless cards with memory. The most important feature of the proposed system is the updating of access permission level at any time for the user based on the availability of that user. The data transfer from the reader to the database was done using wireless communication (RF communication. To achieve this here RF transmitter and the RF receiver is used. The data which is read by the reader is sent to the microcontroller. Then from the controller we can transfer the data to the database by using the UART module (serial communication which is inbuilt in the microcontroller through RF transmitter. RF receiver of the same frequency at the receiver end receives and then stores the data in the database. RF transmitter and Receiver – frequency for transmitting and receiving the data depends on the user as per the requirement for the application and it is based on the range of distance. For the data encoding and decoding process HCS-101 protocol is used.

  11. Feedback controlled hybrid fast ferrite tuners

    Energy Technology Data Exchange (ETDEWEB)

    Remsen, D.B.; Phelps, D.A.; deGrassie, J.S.; Cary, W.P.; Pinsker, R.I.; Moeller, C.P. [General Atomics, San Diego, CA (United States); Arnold, W.; Martin, S.; Pivit, E. [ANT-Bosch, Backnang (Germany)

    1993-09-01

    A low power ANT-Bosch fast ferrite tuner (FFT) was successfully tested into (1) the lumped circuit equivalent of an antenna strap with dynamic plasma loading, and (2) a plasma loaded antenna strap in DIII-D. When the FFT accessible mismatch range was phase-shifted to encompass the plasma-induced variation in reflection coefficient, the 50 {Omega} source was matched (to within the desired 1.4 : 1 voltage standing wave ratio). The time required to achieve this match (i.e., the response time) was typically a few hundred milliseconds, mostly due to a relatively slow network analyzer-computer system. The response time for the active components of the FFT was 10 to 20 msec, or much faster than the present state-of-the-art for dynamic stub tuners. Future FFT tests are planned, that will utilize the DIII-D computer (capable of submillisecond feedback control), as well as several upgrades to the active control circuit, to produce a FFT feedback control system with a response time approaching 1 msec.

  12. Controllable hybrid shape of correlation and squeezing

    Science.gov (United States)

    Abdisa, Garuma; Ahmed, Irfan; Wang, Xiuxiu; Liu, Zongchen; Wang, Hongxing; Zhang, Yanpeng

    2016-08-01

    Two- and three-mode correlation and squeezing of spontaneous parametric four-wave mixing (SPFWM) and fourth-order fluorescence (FL) composite signals are investigated theoretically and experimentally in both homonuclear (two-level) and heteronuclearlike (V-type level) molecular systems of P r3 + :YSO. By selecting different time positions, changing the power, and changing the frequency detuning of the laser field, the competition between the composite signals is demonstrated. It is found that as the laser parameters change, the signal evolves from a nonlinear χ(4 ) process resulting in a FL signal to a SPFWM signal (χ(3 ) process). In addition, the competition effect between the signals determines the evolution of the shape of the correlation from a pure sharp to a two-stage (mixed) shape and finally to a pure broad peak amplitude. Furthermore, the signal evolution determines the magnitude of squeezing, which can control the noise level. Such progress may find potential applications in optical hybrid communication and information processing.

  13. Review of hybrid laminar flow control systems

    Science.gov (United States)

    Krishnan, K. S. G.; Bertram, O.; Seibel, O.

    2017-08-01

    The aeronautic community always strived for fuel efficient aircraft and presently, the need for ecofriendly aircraft is even more, especially with the tremendous growth of air traffic and growing environmental concerns. Some of the important drivers for such interests include high fuel prices, less emissions requirements, need for more environment friendly aircraft to lessen the global warming effects. Hybrid laminar flow control (HLFC) technology is promising and offers possibility to achieve these goals. This technology was researched for decades for its application in transport aircraft, and it has achieved a new level of maturity towards integration and safety and maintenance aspects. This paper aims to give an overview of HLFC systems research and associated flight tests in the past years both in the US and in Europe. The review makes it possible to distinguish between the successful approaches and the less successful or outdated approaches in HLFC research. Furthermore, the technology status shall try to produce first estimations regarding the mass, power consumption and performance of HLFC systems as well as estimations regarding maintenance requirements and possible subsystem definitions.

  14. Open versus Controlled-Access Data | Office of Cancer Genomics

    Science.gov (United States)

    OCG employs stringent human subjects’ protection and data access policies to protect the privacy and confidentiality of the research participants. Depending on the risk of patient identification, OCG programs data are available to the scientific community in two tiers: open or controlled access. Both types of data can be accessed through its corresponding OCG program-specific data matrix or portal. Open-access Data

  15. Hybrid Dislocated Control and General Hybrid Projective Dislocated Synchronization for Memristor Chaotic Oscillator System

    Directory of Open Access Journals (Sweden)

    Junwei Sun

    2014-01-01

    Full Text Available Some important dynamical properties of the memristor chaotic oscillator system have been studied in the paper. A novel hybrid dislocated control method and a general hybrid projective dislocated synchronization scheme have been realized for memristor chaotic oscillator system. The paper firstly presents hybrid dislocated control method for stabilizing chaos to the unstable equilibrium point. Based on the Lyapunov stability theorem, general hybrid projective dislocated synchronization has been studied for the drive memristor chaotic oscillator system and the same response memristor chaotic oscillator system. For the different dimensions, the memristor chaotic oscillator system and the other chaotic system have realized general hybrid projective dislocated synchronization. Numerical simulations are given to show the effectiveness of these methods.

  16. Control system for a hybrid powertrain system

    Energy Technology Data Exchange (ETDEWEB)

    Naqvi, Ali K.; Demirovic, Besim; Gupta, Pinaki; Kaminsky, Lawrence A.

    2014-09-09

    A vehicle includes a powertrain with an engine, first and second torque machines, and a hybrid transmission. A method for operating the vehicle includes operating the engine in an unfueled state, releasing an off-going clutch which when engaged effects operation of the hybrid transmission in a first continuously variable mode, and applying a friction braking torque to a wheel of the vehicle to compensate for an increase in an output torque of the hybrid transmission resulting from releasing the off-going clutch. Subsequent to releasing the off-going clutch, an oncoming clutch which when engaged effects operation of the hybrid transmission in a second continuously variable mode is synchronized. Subsequent to synchronization of the oncoming clutch, the oncoming clutch is engaged.

  17. Request Stream Control for the Access to Broadband Multimedia Educational Resources in the Distance Learning System

    Directory of Open Access Journals (Sweden)

    Irina Pavlovna Bolodurina

    2013-10-01

    Full Text Available This article presents a model of queuing system for broadband multimedia educational resources, as well as a model of access to a hybrid cloud system storage. These models are used to enhance the efficiency of computing resources in a distance learning system. An additional OpenStack control module has been developed to achieve the distribution of request streams and balance the load between cloud nodes.

  18. Dopamine-induced silica-polydopamine hybrids with controllable morphology.

    Science.gov (United States)

    Ho, Chia-Che; Ding, Shinn-Jyh

    2014-04-01

    Novel silica-polydopamine hybrids, with controllable morphology, are facilely fabricated in an emulsion system consisting of tetraethyl orthosilicate, dopamine, water, and NaOH under weakly basic conditions (pH 8.5-10). An increase in initial pH favors the formation of nano-structured spherical silica-PDA hybrids from a flocculated structure.

  19. Investigating Transgenic Corn Hybrids as a Method for Mycotoxin Control

    Science.gov (United States)

    Transgenic Bt corn hybrids have been available for more than 10 years and are known to control specific insects. More recently, so-called “stacked-gene” hybrids, have been released with multiple insect resistance genes and genes for herbicide resistance, resulting in up to 6 traits per plant. Beca...

  20. Supermarket Refrigeration System - Benchmark for Hybrid System Control

    DEFF Research Database (Denmark)

    Sloth, Lars Finn; Izadi-Zamanabadi, Roozbeh; Wisniewski, Rafal

    2007-01-01

    This paper presents a supermarket refrigeration system as a benchmark for development of new ideas and a comparison of methods for hybrid systems' modeling and control. The benchmark features switch dynamics and discrete valued input making it a hybrid system, furthermore the outputs are subjected...

  1. Hybrid viscous damper with filtered integral force feedback control

    DEFF Research Database (Denmark)

    Høgsberg, Jan; Brodersen, Mark L.

    2016-01-01

    In hybrid damper systems active control devices are usually introduced to enhance the performance of otherwise passive dampers. In the present paper a hybrid damper concept is comprised of a passive viscous damper placed in series with an active actuator and a force sensor. The actuator motion...

  2. Law-Aware Access Control and its Information Model

    CERN Document Server

    Stieghahn, Michael

    2010-01-01

    Cross-border access to a variety of data such as market information, strategic information, or customer-related information defines the daily business of many global companies, including financial institutions. These companies are obliged by law to keep a data processing legal for all offered services. They need to fulfill different security objectives specified by the legislation. Therefore, they control access to prevent unauthorized users from using data. Those security objectives, for example confidentiality or secrecy, are often defined in the eXtensible Access Control Markup Language that promotes interoperability between different systems. In this paper, we show the necessity of incorporating the requirements of legislation into access control. Based on the work flow in a banking scenario we describe a variety of available contextual information and their interrelations. Different from other access control systems our main focus is on law-compliant cross-border data access. By including legislation dir...

  3. Hybrid Testing of Composite Structures with Single-Axis Control

    DEFF Research Database (Denmark)

    Waldbjørn, Jacob Paamand; Høgh, Jacob Herold; Stang, Henrik

    2013-01-01

    a hybrid testing platform is introduced for single-component hybrid testing. In this case, the boundary between the numerical model and experimental setup is defined by multiple Degrees-Of-Freedoms (DOFs) which highly complicate the transferring of response between the two substructures. Digital Image......Hybrid testing is a substructuring technique where a structure is emulated by modelling a part of it in a numerical model while testing the remainder experimentally. Previous research in hybrid testing has been performed on multi-component structures e.g. damping fixtures, however in this paper...... Correlation (DIC) is therefore implemented for displacement control of the experimental setup. The hybrid testing setup was verified on a multicomponent structure consisting of a beam loaded in three point bending and a numerical structure of a frame. Furthermore, the stability of the hybrid testing loop...

  4. Hybrid Force Motion Synchronization Control of Robot Manipulators

    OpenAIRE

    Fikkan, Kristoffer

    2010-01-01

    The main objective of this thesis was to combine the theory on synchronization of robot manipulators with the concept of hybrid force/motion control; resulting in a controller capable of following both the trajectory of another robot and a desired force trajectory at the same time. This report includes a short introduction to synchronization theory for robot manipulators, and a more thorough summary of existing hybrid control schemes. An intuitive method for describing constraints caused...

  5. High Precision Motion Control of Hybrid Five-Bar Mechanism with an Intelligent Control

    Institute of Scientific and Technical Information of China (English)

    ZHANG Ke; WANG Sheng-ze

    2009-01-01

    Hybrid mechanism is a new type of planar controllable mechanism. Position control accuracy of system determines the output acctracy of the mechanism In order to achieve the desired high accuracy, nonlinear factors as friction must be accurately compensated in the real-time servo control algarithm. In this paper, the model of a hybrid flve-bar mechanism is introduced In terms of the characteristics of the hybrid mechanism, a hybrid intelligent control algorithm based on proportional-integral-derivative(PID) control and cerebellar model articulation control techniques was presented and used to perform control of hybrid five-bar mechanism for the first time. The simulation results show that the hybrid control method can improve the control effect remarkably, compared with the traditional PID control strategy.

  6. Evolutionary design of discrete controllers for hybrid mechatronic systems

    DEFF Research Database (Denmark)

    Dupuis, Jean-Francois; Fan, Zhun; Goodman, Erik

    2015-01-01

    This paper investigates the issue of evolutionary design of controllers for hybrid mechatronic systems. Finite State Automaton (FSA) is selected as the representation for a discrete controller due to its interpretability, fast execution speed and natural extension to a statechart, which is very...... popular in industrial applications. A case study of a two-tank system is used to demonstrate that the proposed evolutionary approach can lead to a successful design of an FSA controller for the hybrid mechatronic system, represented by a hybrid bond graph. Generalisation of the evolved FSA controller...... of the evolutionary design of controllers for hybrid mechatronic systems. Finally, some important future research directions are pointed out, leading to the major work of the succeeding part of the research....

  7. Distributed Role-based Access Control for Coaliagion Application

    Institute of Scientific and Technical Information of China (English)

    HONG Fan; ZHU Xian; XING Guanglin

    2005-01-01

    Access control in multi-domain environments is one of the important questions of building coalition between domains.On the basis of RBAC access control model, the concepts of role delegation and role mapping are proposed, which support the third-party authorization.Then, a distributed RBAC model is presented.Finally the implementation issues are discussed.

  8. 49 CFR 1542.207 - Access control systems.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Access control systems. 1542.207 Section 1542.207..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control systems. (a) Secured area. Except as provided in paragraph (b) of this section, the measures...

  9. Privacy Enhanced Access Control by Means of Policy Blinding

    NARCIS (Netherlands)

    Sedghi, Saeed; Hartel, Pieter; Jonker, Willem; Nikova, Svetla; Bao, Feng; Weng, Jian

    2011-01-01

    Traditional techniques of enforcing an access control policy rely on an honest reference monitor to enforce the policy. However, for applications where the resources are sensitive, the access control policy might also be sensitive. As a result, an honest-but-curious reference monitor would glean som

  10. Dynamic User Role Assignment in Remote Access Control

    NARCIS (Netherlands)

    Saffarian, Mohsen; Tang, Qiang; Jonker, Willem; Hartel, Pieter

    2009-01-01

    The Role-Based Access Control (RBAC) model has been widely applied to a single domain in which users are known to the administrative unit of that domain, beforehand. However, the application of the conventional RBAC model for remote access control scenarios is not straightforward. In such scenarios,

  11. Analysis of Access Control Policies in Operating Systems

    Science.gov (United States)

    Chen, Hong

    2009-01-01

    Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…

  12. Dynamic User Role Assignment in Remote Access Control

    NARCIS (Netherlands)

    Saffarian, M.; Tang, Qiang; Jonker, Willem; Hartel, Pieter H.

    2009-01-01

    The Role-Based Access Control (RBAC) model has been widely applied to a single domain in which users are known to the administrative unit of that domain, beforehand. However, the application of the conventional RBAC model for remote access control scenarios is not straightforward. In such scenarios,

  13. Analysis of Access Control Policies in Operating Systems

    Science.gov (United States)

    Chen, Hong

    2009-01-01

    Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…

  14. Design of Magnetic Flux Feedback Controller in Hybrid Suspension System

    Directory of Open Access Journals (Sweden)

    Wenqing Zhang

    2013-01-01

    Full Text Available Hybrid suspension system with permanent magnet and electromagnet consumes little power consumption and can realize larger suspension gap. But realizing stable suspension of hybrid magnet is a tricky problem in the suspension control sphere. Considering from this point, we take magnetic flux signal as a state variable and put this signal back to suspension control system. So we can get the hybrid suspension mathematical model based on magnetic flux signal feedback. By application of MIMO feedback linearization theory, we can further realize linearization of the hybrid suspension system. And then proportion, integral, differentiation, magnetic flux density B (PIDB controller is designed. Some hybrid suspension experiments have been done on CMS04 magnetic suspension bogie of National University of Defense Technology (NUDT in China. The experiments denote that the new hybrid suspension control algorithm based on magnetic flux signal feedback designed in this paper has more advantages than traditional position-current double cascade control algorithm. Obviously, the robustness and stability of hybrid suspension system have been enhanced.

  15. A Model of Workflow-oriented Attributed Based Access Control

    Directory of Open Access Journals (Sweden)

    Guoping Zhang

    2011-02-01

    Full Text Available the emergence of “Internet of Things” breaks previous traditional thinking, which integrates physical infrastructure and network infrastructure into unified infrastructure. There will be a lot of resources or information in IoT, so computing and processing of information is the core supporting of IoT. In this paper, we introduce “Service-Oriented Computing” to solve the problem where each device can offer its functionality as standard services. Here we mainly discuss the access control issue of service-oriented computing in Internet of Things. This paper puts forward a model of Workflow-oriented Attributed Based Access Control (WABAC, and design an access control framework based on WABAC model. The model grants permissions to subjects according to subject atttribute, resource attribute, environment attribute and current task, meeting access control request of SOC. Using the approach presented can effectively enhance the access control security for SOC applications, and prevent the abuse of subject permissions.

  16. Task Delegation Based Access Control Models for Workflow Systems

    Science.gov (United States)

    Gaaloul, Khaled; Charoy, François

    e-Government organisations are facilitated and conducted using workflow management systems. Role-based access control (RBAC) is recognised as an efficient access control model for large organisations. The application of RBAC in workflow systems cannot, however, grant permissions to users dynamically while business processes are being executed. We currently observe a move away from predefined strict workflow modelling towards approaches supporting flexibility on the organisational level. One specific approach is that of task delegation. Task delegation is a mechanism that supports organisational flexibility, and ensures delegation of authority in access control systems. In this paper, we propose a Task-oriented Access Control (TAC) model based on RBAC to address these requirements. We aim to reason about task from organisational perspectives and resources perspectives to analyse and specify authorisation constraints. Moreover, we present a fine grained access control protocol to support delegation based on the TAC model.

  17. Control approach for comfortable power shifting in hybrid transmissions - ML 450 hybrid

    Energy Technology Data Exchange (ETDEWEB)

    Saenger Zetina, Siegfried; Neiss, Konstantin [Daimler AG, Hybrid Development Center, Troy, MI (United States)

    2008-07-01

    The comfortable shifting control in a luxury class vehicle is extremely important, due to competitive automatic transmissions with torque converters; clutch automated manual transmissions and dual clutch transmissions. Hybrid transmissions play a key role in comfort and performance enhancement while at the same time being fuel efficient with the aid of electric machines and battery packs. Here, the alternative to conventional add-on hybrid power head transmissions: the power split hybrid transmission is studied. As a practical example, the Two Mode of the Hybrid Development Center is used within the ML450 Hybrid. For achieving a smooth shifting, there are model based algorithms needed. As objective measure to evaluate the shifting the VDV (Vibration Dose Value) is used. (orig.)

  18. HYBRID FUZZY CONTROL FOR ELECTRO-HYDRAULIC ACTIVE DAMPING SUSPENSION

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    A new control scheme, the hybrid fuzzy control method, for active damping suspension system is presented. The scheme is the result of effective combination of the statistical optimal control method based on the statistical property of suspension system, with the bang-bang control method based on the real-time characteristics of suspension system. Computer simulations are performed to compare the effectiveness of hybrid fuzzy control scheme with that of optimal damping control, bang-bang control, and passive suspension. It takes the effects of time-variant factors into full account. The superiority of the proposed hybrid fuzzy control scheme for active damping suspension to the passive suspension is verified in the experiment study.

  19. Stochastic Optimal Control for Series Hybrid Electric Vehicles

    Energy Technology Data Exchange (ETDEWEB)

    Malikopoulos, Andreas [ORNL

    2013-01-01

    Increasing demand for improving fuel economy and reducing emissions has stimulated significant research and investment in hybrid propulsion systems. In this paper, we address the problem of optimizing online the supervisory control in a series hybrid configuration by modeling its operation as a controlled Markov chain using the average cost criterion. We treat the stochastic optimal control problem as a dual constrained optimization problem. We show that the control policy that yields higher probability distribution to the states with low cost and lower probability distribution to the states with high cost is an optimal control policy, defined as an equilibrium control policy. We demonstrate the effectiveness of the efficiency of the proposed controller in a series hybrid configuration and compare it with a thermostat-type controller.

  20. Hybrid stabilizing control on a real mobile robot

    NARCIS (Netherlands)

    Oelen, Wilco; Berghuis, Harry; Nijmeijer, Henk; Canudas de Wit, Carlos

    1995-01-01

    To establish empirical verification of a stabilizing controller for nonholonomic systems, the authors implement a hybrid control concept on a 2-DOF mobile robot. Practical issues of velocity control are also addressed through a velocity controller which transforms the mobile robot to a new system wi

  1. Open Access, Library Subscriptions and Article Processing Charges: Hybrid journals models and issues

    OpenAIRE

    Vijayakumar, J. K.; Tamarkin, Molly

    2016-01-01

    Hybrid journals contains articles behind a pay-wall to be subscribed, as well as papers made open access when author pays article processing charge (APC). In such cases, an Institution will end up paying twice and Publishers tend to double-dip. Discussions and pilot models are emerging on pricing options, such as “offset pricing,” [where APCs are adjusted or discounted with subscription costs as vouchers or reductions in next year subscriptions, APCs beyond the subscription costs are modestl...

  2. Control of DNA hybridization by photoswitchable molecular glue.

    Science.gov (United States)

    Dohno, Chikara; Nakatani, Kazuhiko

    2011-12-01

    Hybridization of DNA is one of the most intriguing events in molecular recognition and is essential for living matter to inherit life beyond generations. In addition to the function of DNA as genetic material, DNA hybridization is a key to control the function of DNA-based materials in nanoscience. Since the hybridization of two single stranded DNAs is a thermodynamically favorable process, dissociation of the once formed DNA duplex is normally unattainable under isothermal conditions. As the progress of DNA-based nanoscience, methodology to control the DNA hybridization process has become increasingly important. Besides many reports using the chemically modified DNA for the regulation of hybridization, we focused our attention on the use of a small ligand as the molecular glue for the DNA. In 2001, we reported the first designed molecule that strongly and specifically bound to the mismatched base pairs in double stranded DNA. Further studies on the mismatch binding molecules provided us a key discovery of a novel mode of the binding of a mismatch binding ligand that induced the base flipping. With these findings we proposed the concept of molecular glue for DNA for the unidirectional control of DNA hybridization and, eventually photoswitchable molecular glue for DNA, which enabled the bidirectional control of hybridization under photoirradiation. In this tutorial review, we describe in detail how we integrated the mismatch binding ligand into photoswitchable molecular glue for DNA, and the application and perspective in DNA-based nanoscience.

  3. High-Capacity Hybrid Optical Fiber-Wireless Communications Links in Access Networks

    DEFF Research Database (Denmark)

    Pang, Xiaodan

    techniques with both coherent and incoherent optical sources are studied and demonstrated. Employments of advanced modulation formats including phase-shift keying (PSK), M-quadrature amplitude modulation (QAM) and orthogonal frequency-division multiplexing (OFDM) for high speed photonic-wireless transmission......Integration between fiber-optic and wireless communications systems in the "last mile" access networks is currently considered as a promising solution for both service providers and users, in terms of minimizing deployment cost, shortening upgrading period and increasing mobility and flexibility...... techniques. In conclusion, the results presented in the thesis show the feasibility of employing mm-wave signals, advanced modulation formats and spatial multiplexing technologies in next generation high capacity hybrid optical fiber-wireless access systems....

  4. Predictive cruise control in hybrid electric vehicles

    NARCIS (Netherlands)

    Keulen, T. van; Naus, M.J.G.; Jager, B. de; Molengraft, G.J.L. van de; Steinbuch, M.; Aneke, N.P.I.

    2009-01-01

    Deceleration rates have considerable influence on the fuel economy of hybrid electric vehicles. Given the vehicle characteristics and actual/measured operating conditions, as well as upcoming route information, optimal velocity trajectories can be constructed that maximize energy recovery. To suppor

  5. Novel hybrid adaptive controller for manipulation in complex perturbation environments.

    Directory of Open Access Journals (Sweden)

    Alex M C Smith

    Full Text Available In this paper we present a hybrid control scheme, combining the advantages of task-space and joint-space control. The controller is based on a human-like adaptive design, which minimises both control effort and tracking error. Our novel hybrid adaptive controller has been tested in extensive simulations, in a scenario where a Baxter robot manipulator is affected by external disturbances in the form of interaction with the environment and tool-like end-effector perturbations. The results demonstrated improved performance in the hybrid controller over both of its component parts. In addition, we introduce a novel method for online adaptation of learning parameters, using the fuzzy control formalism to utilise expert knowledge from the experimenter. This mechanism of meta-learning induces further improvement in performance and avoids the need for tuning through trial testing.

  6. Novel Hybrid Adaptive Controller for Manipulation in Complex Perturbation Environments

    Science.gov (United States)

    Smith, Alex M. C.; Yang, Chenguang; Ma, Hongbin; Culverhouse, Phil; Cangelosi, Angelo; Burdet, Etienne

    2015-01-01

    In this paper we present a hybrid control scheme, combining the advantages of task-space and joint-space control. The controller is based on a human-like adaptive design, which minimises both control effort and tracking error. Our novel hybrid adaptive controller has been tested in extensive simulations, in a scenario where a Baxter robot manipulator is affected by external disturbances in the form of interaction with the environment and tool-like end-effector perturbations. The results demonstrated improved performance in the hybrid controller over both of its component parts. In addition, we introduce a novel method for online adaptation of learning parameters, using the fuzzy control formalism to utilise expert knowledge from the experimenter. This mechanism of meta-learning induces further improvement in performance and avoids the need for tuning through trial testing. PMID:26029916

  7. Permission to Speak: A Novel Formal Foundation for Access Control

    Science.gov (United States)

    2016-06-21

    Permission to Speak: A Novel Formal Foundation for Access Control Oleg Sokolsky Nikhil Dinesh, Insup Lee, Aravind Joshi Report Documentation Page...comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE 04 NOV 2009 2. REPORT TYPE 3...DATES COVERED 00-00-2009 to 00-00-2009 4. TITLE AND SUBTITLE Permission to Speak: A Novel Formal Foundation for Access Control 5a. CONTRACT

  8. Analysis of physical layer performance of hybrid optical-wireless access network

    Science.gov (United States)

    Shaddad, R. Q.; Mohammad, A. B.; Al-hetar, A. M.

    2011-09-01

    The hybrid optical-wireless access network (HOWAN) is a favorable architecture for next generation access network. It is an optimal combination of an optical backhaul and a wireless front-end for an efficient access network. In this paper, the HOWAN architecture is designed based on a wavelengths division multiplexing/time division multiplexing passive optical network (WDM/TDM PON) at the optical backhaul and a wireless fidelity (WiFi) technology at the wireless front-end. The HOWAN is proposed that can provide blanket coverage of broadband and flexible connection for end-users. Most of the existing works, based on performance evaluation are concerned on network layer aspects. This paper reports physical layer performance in terms of the bit error rate (BER), eye diagram, and signal-to-noise ratio (SNR) of the communication system. It accommodates 8 wavelength channels with 32 optical network unit/wireless access points (ONU/APs). It is demonstrated that downstream and upstream of 2 Gb/s can be achieved by optical backhaul for each wavelength channel along optical fiber length of 20 km and a data rate of 54 Mb/s per ONU/AP along a 50 m outdoor wireless link.

  9. An Extended Role Based Access Control Method for XML Documents

    Institute of Scientific and Technical Information of China (English)

    MENG Xiao-feng; LUO Dao-feng; OU Jian-bo

    2004-01-01

    As XML has been increasingly important as the Data-change format of Internet and Intranet, access-control-on-XML-properties rises as a new issue.Role-based access control (RBAC) is an access control method that has been widely used in Internet, Operation System and Relation Data Base these 10 years.Though RBAC is already relatively mature in the above fields, new problems occur when it is used in XML properties.This paper proposes an integrated model to resolve these problems, after the fully analysis on the features of XML and RBAC.

  10. A new access control system by fingerprint for radioisotope facilities

    Energy Technology Data Exchange (ETDEWEB)

    Kawamura, Hiroko; Hirata, Yasuki [Kyushu Univ., Fukuoka (Japan). Radioisotope Center; Kondo, Takahiro; Takatsuki, Katsuhiro

    1998-04-01

    We applied a new fingerprint checker for complete access control to the radiation controlled area and to the radioisotope storage room, and prepared softwares for the best use of this checker. This system consists of a personal computer, access controllers, a fingerprint register, fingerprint checkers, a tenkey and mat sensors, permits ten thousand users to register their fingerprints and its hard disk to keep more than a million records of user`s access. Only 1% of users could not register their fingerprints worn-out, registered four numbers for a fingerprint. The softwares automatically provide varieties of reports, caused a large reduction in manual works. (author)

  11. Fitting method for hybrid temperature control in smart home environment

    OpenAIRE

    CHENG, Zhuo; TAN, Yasuo; Lim, Azman Osman

    2014-01-01

    The design of control system is crucial for improving the comfort level of home environment. Cyber-Physical Systems (CPSs) can offer numerous opportunities to design high efficient control systems. In this paper, we focus on the design of temperature control systems. By using the idea of CPS, a hybrid temperature control (HTC) system is proposed. It combines supervisory and proportional-integral-derivative (PID) controllers. Through an energy efficient temperature control (EETC) algorithm, HT...

  12. Access control management for e-Healthcare in cloud environment

    Directory of Open Access Journals (Sweden)

    Lili Sun

    2014-03-01

    Full Text Available Data outsourcing is a major component for cloud computing that allows data owners to distribute resources to external services for users and organizations who can apply the resources. A crucial problem for owners is how to make sure their sensitive information accessed by legitimate users only using the trusted services but not authorized to read the actual information. With the increased development of cloud computing, it brings challenges for data security and access control when outsourcing users’ data and sharing sensitive data in cloud environment since it is not within the same trusted domain as data owners’. Access control policies have become an important issue in the security filed in cloud computing. Semantic web technologies represent much richer forms of relationships among users, resources and actions among different web applications such as clouding computing. However, Semantic web applications pose new requirements for security mechanisms especially in the access control models. This paper addresses existing access control methods and presents a semantic based access control model which considers semantic relations among different entities in cloud computing environment. We have enriched the research for semantic web technology with role-based access control that is able to be applied in the field of medical information system or e-Healthcare system. This work shows how the semantic web technology provides efficient solutions for the management of complex and distributed data in heterogeneous systems, and it can be used in the medical information systems as well.

  13. Urban Studies: A Study of Bibliographic Access and Control.

    Science.gov (United States)

    Anderson, Barbara E.

    This paper analyzes: (1) the bibliographic access to publications in urban studies via printed secondary sources; (2) development and scope of classification systems and of vocabulary control for urban studies; and (3) currently accessible automated collections of bibliographic citations. Urban studies is defined as "an agglomeration of…

  14. Geospacial information utilized under the access control strategy

    Institute of Scientific and Technical Information of China (English)

    TIAN Jie; ZHANG Xin-fang; WANG Tong-yang; XIANG Wei; Cheng Ming

    2007-01-01

    This paper introduces a solution to the secure requirement for digital rights management (DRM) by the way of geospacial access control named geospacial access control (GeoAC) in geospacial field. The issues of authorization for geospacial DRM are concentrated on. To geospacial DRM, one aspect is the declaration and enforcement of access rights, based on geographic aspects. To the approbation of digital geographic content, it is important to adopt online access to geodata through a spacial data infrastructure (SDI). This results in the interoperability requirements on three different levels: data model level, service level and access control level. The interaction between the data model and service level can be obtained by criterions of the open geospacial consortium (OGC), and the interaction of the access control level may be reached by declaring and enforcing access restrictions in GeoAC. Then an archetype enforcement based on GeoAC is elucidated. As one aspect of performing usage rights, the execution of access restrictions as an extension to a regular SDI is illuminated.

  15. ADОPTIVE CONTROL OF THE HYBRID VEHICLE POWER UNIT

    Directory of Open Access Journals (Sweden)

    S. Serikov

    2014-10-01

    Full Text Available The problem of adaptive control of the hybrid vehicle power unit, which makes it possible to minimize the quality criterion under constraints on the state parameters and the control vector is considered. A formal statement of the optimization problem is given. The solution of this problem by the method of neural network control based on the adaptive criticism is considered.

  16. Military Hybrid Vehicle Optimization and Control

    Science.gov (United States)

    2012-08-14

    and energy security, as well as reduce overall energy u ’C the concept of a microgrid has been introduced [7 ]. A microgricl is defined as an...vehicle-to-grid (V2G) technology has been show to have the ability to upport the microgrid ru a source, but also a storage device for excess energy [9...understood. The scope of this proposal includes introducing the concept of regarding a military hybrid vehicle as a microgrid and utilizing battery state

  17. A hybrid adaptive control strategy for a smart prosthetic hand.

    Science.gov (United States)

    Chen, Cheng-Hung; Naidu, D Subbaram; Perez-Gracia, Alba; Schoen, Marco P

    2009-01-01

    This paper presents a hybrid of a soft computing technique of adaptive neuro-fuzzy inference system (ANFIS) and a hard computing technique of adaptive control for a two-dimensional movement of a prosthetic hand with a thumb and index finger. In particular, ANFIS is used for inverse kinematics, and the adaptive control is used for linearized dynamics to minimize tracking error. The simulations of this hybrid controller, when compared with the proportional-integral-derivative (PID) controller showed enhanced performance. Work is in progress to extend this methodology to a five-fingered, three-dimensional prosthetic hand.

  18. Robust spacecraft attitude tracking control using hybrid actuators with uncertainties

    Science.gov (United States)

    Cao, Xibin; Wu, Baolin

    2017-07-01

    The problem of spacecraft attitude tracking using hybrid actuators with uncertainties is addressed in this paper. A hybrid actuators configuration that combines reaction wheels for fine pointing and single gimbal control moment gyros for rapid maneuvering is employed for agile spacecraft. A robust control algorithm for the spacecraft attitude tracking problem when the torque axis direction and/or input scaling of the actuators are uncertain is developed. Furthermore, a torque allocation method is proposed for the hybrid actuator configuration to allow a smooth switch between single gimbal control moment gyros and reaction wheels. With this method, single gimbal control moment gyros are used for the phase of rapid maneuvering, while reaction wheels are used for the phase of fine pointing. Simulation results demonstrate the effectiveness of the proposed control scheme.

  19. Access Control of Web- and Java-Based Applications

    Science.gov (United States)

    Tso, Kam S.; Pajevski, Michael J.

    2013-01-01

    Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browsers

  20. Filtering and control of stochastic jump hybrid systems

    CERN Document Server

    Yao, Xiuming; Zheng, Wei Xing

    2016-01-01

    This book presents recent research work on stochastic jump hybrid systems. Specifically, the considered stochastic jump hybrid systems include Markovian jump Ito stochastic systems, Markovian jump linear-parameter-varying (LPV) systems, Markovian jump singular systems, Markovian jump two-dimensional (2-D) systems, and Markovian jump repeated scalar nonlinear systems. Some sufficient conditions are first established respectively for the stability and performances of those kinds of stochastic jump hybrid systems in terms of solution of linear matrix inequalities (LMIs). Based on the derived analysis conditions, the filtering and control problems are addressed. The book presents up-to-date research developments and novel methodologies on stochastic jump hybrid systems. The contents can be divided into two parts: the first part is focused on robust filter design problem, while the second part is put the emphasis on robust control problem. These methodologies provide a framework for stability and performance analy...

  1. Modeling Access Control Policy of a Social Network

    Directory of Open Access Journals (Sweden)

    Chaimaa Belbergui

    2016-06-01

    Full Text Available Social networks bring together users in a virtual platform and offer them the ability to share -within the Community- personal and professional information’s, photos, etc. which are sometimes sensitive. Although, the majority of these networks provide access control mechanisms to their users (to manage who accesses to which information, privacy settings are limited and do not respond to all users' needs. Hence, the published information remain all vulnerable to illegal access. In this paper, the access control policy of the social network "Facebook" is analyzed in a profound way by starting with its modeling with "Organization Role Based Access Control" model, and moving to the simulation of the policy with an appropriate simulator to test the coherence aspect, and ending with a discussion of analysis results which shows the gap between access control management options offered by Facebook and the real requirements of users in the same context. Extracted conclusions prove the need of developing a new access control model that meets most of these requirements, which will be the subject of a forthcoming work.

  2. Personnel Access Control System Evaluation for National Ignition Facility Operations

    Energy Technology Data Exchange (ETDEWEB)

    Altenbach, T; Brereton, S.; Hermes, G.; Singh, M.

    2001-06-01

    The purpose of this document is to analyze the baseline Access Control System for the National Ignition Facility (NIF), and to assess its effectiveness at controlling access to hazardous locations during full NIF operations. It reviews the various hazards present during a NIF shot sequence, and evaluates the effectiveness of the applicable set of controls at preventing access while the hazards are present. It considers only those hazards that could potentially be lethal. In addition, various types of technologies that might be applicable at NIF are reviewed, as are systems currently in use at other facilities requiring access control for safety reasons. Recommendations on how this system might be modified to reduce risk are made.

  3. Hybrid Control Design for a Wheeled Mobile Robot

    DEFF Research Database (Denmark)

    Bak, Thomas; Bendtsen, Jan Dimon; Ravn, Anders Peter

    2003-01-01

    We present a hybrid systems solution to the problem of trajectory tracking for a four-wheel steered four-wheel driven mobile robot. The robot is modelled as a non-holonomic dynamic system subject to pure rolling, no-slip constraints. Under normal driving conditions, a nonlinear trajectory trackin....... The stability of the hybrid control scheme is finally analyzed using Lyapunov-like arguments....

  4. Experience with ActiveX control for simple channel access

    Energy Technology Data Exchange (ETDEWEB)

    Timossi, C.; Nishimura, H.; McDonald, J.

    2003-05-15

    Accelerator control system applications at Berkeley Lab's Advanced Light Source (ALS) are typically deployed on operator consoles running Microsoft Windows 2000 and utilize EPICS[2]channel access for data access. In an effort to accommodate the wide variety of Windows based development tools and developers with little experience in network programming, ActiveX controls have been deployed on the operator stations. Use of ActiveX controls for use in the accelerator control environment has been presented previously[1]. Here we report on some of our experiences with the use and development of these controls.

  5. Testing Efficiency Improved by Addition of Remote Access Control Room

    Science.gov (United States)

    1996-01-01

    The NASA Lewis Research Center's Remote Access Control Room (RACR) uses off-the-shelf video conferencing software integrated with existing facility data systems to provide access to the test data by networking from virtually anywhere in the country. The system allows research engineers in remote locations to participate in tests and monitor data in real time just as if they were present in the control room.

  6. Dynamically Authorized Role-Based Access Control for Grid Applications

    Institute of Scientific and Technical Information of China (English)

    YAO Hanbing; HU Heping; LU Zhengding; LI Ruixuan

    2006-01-01

    Grid computing is concerned with the sharing and coordinated use of diverse resources in distributed "virtual organizations". The heterogeneous, dynamic and multi-domain nature of these environments makes challenging security issues that demand new technical approaches. Despite the recent advances in access control approaches applicable to Grid computing, there remain issues that impede the development of effective access control models for Grid applications. Among them there are the lack of context-based models for access control, and reliance on identity or capability-based access control schemes. An access control scheme that resolve these issues is presented, and a dynamically authorized role-based access control (D-RBAC) model extending the RBAC with context constraints is proposed. The D-RABC mechanisms dynamically grant permissions to users based on a set of contextual information collected from the system and user's environments, while retaining the advantages of RBAC model. The implementation architecture of D-RBAC for the Grid application is also described.

  7. A mobile console for local access to accelerator control systems.

    CERN Multimedia

    1981-01-01

    Microprocessors were installed as auxiliary crate controllers (ACCs) in the CAMAC interface of control systems for various accelerators. The same ACC was also at the hearth of a stand-alone system in the form of a mobile console. This was also used for local access to the control systems for tests and development work (Annual Report 1981, p. 80, Fig. 10).

  8. Viability of Hybrid Systems A Controllability Operator Approach

    CERN Document Server

    Labinaz, G

    2012-01-01

    The problem of viability of hybrid systems is considered in this work. A model for a hybrid system is developed including a means of including three forms of uncertainty: transition dynamics, structural uncertainty, and parametric uncertainty. A computational basis for viability of hybrid systems is developed and applied to three control law classes. An approach is developed for robust viability based on two extensions of the controllability operator. The three-tank example is examined for both the viability problem and robust viability problem. The theory is applied through simulation to an active magnetic bearing system and to a batch polymerization process showing that viability can be satisfied in practice. The problem of viable attainability is examined based on the controllability operator approach introduced by Nerode and colleagues. Lastly, properties of the controllability operator are presented.

  9. Viewing hybrid systems as products of control systems and automata

    Science.gov (United States)

    Grossman, R. L.; Larson, R. G.

    1992-01-01

    The purpose of this note is to show how hybrid systems may be modeled as products of nonlinear control systems and finite state automata. By a hybrid system, we mean a network of consisting of continuous, nonlinear control system connected to discrete, finite state automata. Our point of view is that the automata switches between the control systems, and that this switching is a function of the discrete input symbols or letters that it receives. We show how a nonlinear control system may be viewed as a pair consisting of a bialgebra of operators coding the dynamics, and an algebra of observations coding the state space. We also show that a finite automata has a similar representation. A hybrid system is then modeled by taking suitable products of the bialgebras coding the dynamics and the observation algebras coding the state spaces.

  10. Energy-Efficient Building HVAC Control Using Hybrid System LBMPC

    CERN Document Server

    Aswani, Anil; Taneja, Jay; Krioukov, Andrew; Culler, David; Tomlin, Claire

    2012-01-01

    Improving the energy-efficiency of heating, ventilation, and air-conditioning (HVAC) systems has the potential to realize large economic and societal benefits. This paper concerns the system identification of a hybrid system model of a building-wide HVAC system and its subsequent control using a hybrid system formulation of learning-based model predictive control (LBMPC). Here, the learning refers to model updates to the hybrid system model that incorporate the heating effects due to occupancy, solar effects, outside air temperature (OAT), and equipment, in addition to integrator dynamics inherently present in low-level control. Though we make significant modeling simplifications, our corresponding controller that uses this model is able to experimentally achieve a large reduction in energy usage without any degradations in occupant comfort. It is in this way that we justify the modeling simplifications that we have made. We conclude by presenting results from experiments on our building HVAC testbed, which s...

  11. Remote device access in the new accelerator controls middleware

    CERN Document Server

    Baggiolini, V; Jensen, S; Kostro, K; Risso, A; Trofimov, N N; SL

    2001-01-01

    This paper presents the Remote Device Access (RDA) package developed at CERN in the framework of the joint PS/SL Controls Middleware project. The package design reflects the Accelerator Device Model in which devices, named entities in the control system, can be controlled via properties. RDA implements this model in a distributed environment with devices residing in servers that can run anywhere in the controls network. It provides a location-independent and reliable access to the devices from control programs. By invoking the device access methods, clients can read, write and subscribe to device property values. We describe the architecture and design of RDA its API, and CORBA-based implementations in Java and C++. First applications of RDA in the CERN accelerator control systems are described as well.

  12. NASA Workshop on Hybrid (Mixed-Actuator) Spacecraft Attitude Control

    Science.gov (United States)

    Dennehy, Cornelius J.; Kunz, Nans

    2014-01-01

    At the request of the Science Mission Directorate Chief Engineer, the NASA Technical Fellow for Guidance, Navigation & Control assembled and facilitated a workshop on Spacecraft Hybrid Attitude Control. This multi-Center, academic, and industry workshop, sponsored by the NASA Engineering and Safety Center (NESC), was held in April 2013 to unite nationwide experts to present and discuss the various innovative solutions, techniques, and lessons learned regarding the development and implementation of the various hybrid attitude control system solutions investigated or implemented. This report attempts to document these key lessons learned with the 16 findings and 9 NESC recommendations.

  13. Hybrid Control Design for a Wheeled Mobile Robot

    DEFF Research Database (Denmark)

    Bak, Thomas; Bendtsen, Jan Dimon; Ravn, Anders Peter

    2003-01-01

    We present a hybrid systems solution to the problem of trajectory tracking for a four-wheel steered four-wheel driven mobile robot. The robot is modelled as a non-holonomic dynamic system subject to pure rolling, no-slip constraints. Under normal driving conditions, a nonlinear trajectory tracking...... feedback control law based on dynamic feedback linearization is sufficient to stabilize the system and ensure asymptotically stable tracking. Transitions to other modes are derived systematically from this model, whenever the configuration space of the controlled system has some fundamental singular points....... The stability of the hybrid control scheme is finally analyzed using Lyapunov-like arguments....

  14. Hybrid-impulsive second order sliding mode control: Lyapunov approach

    NARCIS (Netherlands)

    Shtessel, Y.; Glumineau, A.; Plestan, F.; Weiss, M.

    2013-01-01

    A perturbed nonlinear system of relative degree two controlled by discontinuous-impulsive feedbacks is studied. The hybrid-impulsive terms serve to drive instantaneously the system trajectories to the origin or to its small vicinity. In particular, impulsive-twisting control exhibits an uniform exac

  15. Spontaneous emission control in a tunable hybrid photonic system

    NARCIS (Netherlands)

    Frimmer, M.; Koenderink, A.F.

    2013-01-01

    We experimentally demonstrate control of the rate of spontaneous emission in a tunable hybrid photonic system that consists of two canonical building blocks for spontaneous emission control, an optical antenna and a mirror, each providing a modification of the local density of optical states (LDOS).

  16. Study of optimal control problems for hybrid dynamical systems

    Institute of Scientific and Technical Information of China (English)

    Gao Rui; Wang Lei; Wang Yuzhen

    2006-01-01

    From the viewpoint of continuous systems, optimal control problem is proposed for a class of controlled Hybrid dynamical systems. Then a mathematical method- HDS minimum principle is put forward, which can solve the above problem. The HDS minimum principle is proved by means of Ekeland's variational principle.

  17. Hybrid-impulsive second order sliding mode control: Lyapunov approach

    NARCIS (Netherlands)

    Shtessel, Y.; Glumineau, A.; Plestan, F.; Weiss, M.

    2013-01-01

    A perturbed nonlinear system of relative degree two controlled by discontinuous-impulsive feedbacks is studied. The hybrid-impulsive terms serve to drive instantaneously the system trajectories to the origin or to its small vicinity. In particular, impulsive-twisting control exhibits an uniform

  18. Route-Based Control of Hybrid Electric Vehicles: Preprint

    Energy Technology Data Exchange (ETDEWEB)

    Gonder, J. D.

    2008-01-01

    Today's hybrid electric vehicle controls cannot always provide maximum fuel savings over all drive cycles. Route-based controls could improve HEV fuel efficiency by 2%-4% and help save nearly 6.5 million gallons of fuel annually.

  19. Real Time Energy Management Control Strategies for Hybrid Powertrains

    Science.gov (United States)

    Zaher, Mohamed Hegazi Mohamed

    In order to improve fuel efficiency and reduce emissions of mobile vehicles, various hybrid power-train concepts have been developed over the years. This thesis focuses on embedded control of hybrid powertrain concepts for mobile vehicle applications. Optimal robust control approach is used to develop a real time energy management strategy for continuous operations. The main idea is to store the normally wasted mechanical regenerative energy in energy storage devices for later usage. The regenerative energy recovery opportunity exists in any condition where the speed of motion is in opposite direction to the applied force or torque. This is the case when the vehicle is braking, decelerating, or the motion is driven by gravitational force, or load driven. There are three main concepts for regernerative energy storing devices in hybrid vehicles: electric, hydraulic, and flywheel. The real time control challenge is to balance the system power demand from the engine and the hybrid storage device, without depleting the energy storage device or stalling the engine in any work cycle, while making optimal use of the energy saving opportunities in a given operational, often repetitive cycle. In the worst case scenario, only engine is used and hybrid system completely disabled. A rule based control is developed and tuned for different work cycles and linked to a gain scheduling algorithm. A gain scheduling algorithm identifies the cycle being performed by the machine and its position via GPS, and maps them to the gains.

  20. Developing hybrid near-space technologies for affordable access to suborbital space

    Science.gov (United States)

    Badders, Brian David

    High power rockets and high altitude balloons are two near-space technologies that could be combined in order to provide access to the mesosphere and, eventually, suborbital space. This "rockoon" technology has been used by several large budget space programs before being abandoned in favor of even more expensive, albeit more accurate, ground launch systems. With the increased development of nano-satellites and atmospheric sensors, combined with rising interest in global atmospheric data, there is an increase in desire for affordable access to extreme altitudes that does not necessarily require the precision of ground launches. Development of hybrid near-space technologies for access to over 200k ft. on a small budget brings many challenges within engineering, systems integration, cost analysis, market analysis, and business planning. This research includes the design and simulation testing of all the systems needed for a safe and reusable launch system, the cost analysis for initial production, the development of a business plan, and the development of a marketing plan. This project has both engineering and scientific significance in that it can prove the space readiness of new technologies, raise their technology readiness levels (TRLs), expedite the development process, and also provide new data to the scientific community. It also has the ability to stimulate university involvement in the aerospace industry and help to inspire the next generation of workers in the space sector. Previous development of high altitude balloon/high power rocket hybrid systems have been undertaken by government funded military programs or large aerospace corporations with varying degrees of success. However, there has yet to be a successful flight with this type of system which provides access to the upper mesosphere in a university setting. This project will aim to design and analyze a viable system while testing the engineering process under challenging budgetary constraints. The

  1. Novel hybrid method: pulse CO2 laser-TIG hybrid welding by coordinated control

    Institute of Scientific and Technical Information of China (English)

    Chen Yanbin; Lei Zhenglong; Li Liqun; Wu Lin; Xie Cheng

    2006-01-01

    In continuous wave CO2 laser-TIG hybrid welding process, the laser energy is not fully utilized because of the absorption and defocusing by plasma in the arc space. Therefore, the optimal welding result can only be achieved in a limited energy range. In order to improve the welding performance further, a novel hybrid welding method-pulse CO2 laser-TIG arc hybrid welding by coordinated control is proposed and investigated. The experimental results indicate that, compared with continuous wave CO2 laser-TIG hybrid welding, the absorption and defocusing of laser energy by plasma are decreased further, and at the same time, the availability ratio of laser and arc energy can be increased when a coordinated frequency is controlled. As a result, the weld appearance is also improved as well as the weld depth is deepened. Furthermore, the effect of frequency and phase of pulse laser and TIG arc on the arc images and welding characteristics is also studied. However, the novel hybrid method has great potentials in the application of industrials from views of techniques and economy.

  2. Adaptive powertrain control for plugin hybrid electric vehicles

    Science.gov (United States)

    Kedar-Dongarkar, Gurunath; Weslati, Feisel

    2013-10-15

    A powertrain control system for a plugin hybrid electric vehicle. The system comprises an adaptive charge sustaining controller; at least one internal data source connected to the adaptive charge sustaining controller; and a memory connected to the adaptive charge sustaining controller for storing data generated by the at least one internal data source. The adaptive charge sustaining controller is operable to select an operating mode of the vehicle's powertrain along a given route based on programming generated from data stored in the memory associated with that route. Further described is a method of adaptively controlling operation of a plugin hybrid electric vehicle powertrain comprising identifying a route being traveled, activating stored adaptive charge sustaining mode programming for the identified route and controlling operation of the powertrain along the identified route by selecting from a plurality of operational modes based on the stored adaptive charge sustaining mode programming.

  3. Adaptive powertrain control for plugin hybrid electric vehicles

    Energy Technology Data Exchange (ETDEWEB)

    Kedar-Dongarkar, Gurunath; Weslati, Feisel

    2013-10-15

    A powertrain control system for a plugin hybrid electric vehicle. The system comprises an adaptive charge sustaining controller; at least one internal data source connected to the adaptive charge sustaining controller; and a memory connected to the adaptive charge sustaining controller for storing data generated by the at least one internal data source. The adaptive charge sustaining controller is operable to select an operating mode of the vehicle's powertrain along a given route based on programming generated from data stored in the memory associated with that route. Further described is a method of adaptively controlling operation of a plugin hybrid electric vehicle powertrain comprising identifying a route being traveled, activating stored adaptive charge sustaining mode programming for the identified route and controlling operation of the powertrain along the identified route by selecting from a plurality of operational modes based on the stored adaptive charge sustaining mode programming.

  4. A Security Research on Smart Phone Access Control System Based on QR Code Hybrid Encryption Technology%基于二维码混合型加密技术的智能手机门禁系统安全性研究

    Institute of Scientific and Technical Information of China (English)

    王景中; 王精丰; 王宝成; 齐佳敏

    2015-01-01

    目前使用较为频繁的门禁系统管理不便,且容易被复制,安全性不高。针对目前门禁系统面临的问题,文章提出一种具有更高安全性、同时也更便于使用和管理的基于二维码混合型加密技术的智能手机门禁系统方案。该方案具有如下特点:1)利用注册用户的二维码作为身份标识,利用手机唯一的序列号以及规律更换的密钥作为二维码的源串;2)用户注册过程加密实现,基于用户事件驱动的“一次一码”方式以及混合型加密技术保证了二维码的时效性和安全性;3)通过摄像头扫描手机端生成的二维码,验证用户身份后驱动电控开关打开门锁;4)将访客与业主联系起来,业主自主管理访客进出,在保证安全性的同时也减少了管理的难度。%The access control system that is used frequently at present is difficult to manage and is easy to be copied. To solve these problems, this paper proposes a smart phone access control system scheme based on QR code hybrid encryption technology, which has better security, and is more convenient to use and manage. The scheme has the following characteristics: 1) The scheme uses QR code of the registered user as the identiifcation, and uses unique sequence number of mobile phone and regularly converted key as the source of QR code. 2) The user registration process is implemented in form of encryption. One-time code based on user event driven and hybrid encryption technologies ensure the timeliness and security of the QR code. 3) QR code generated on mobile phone is scanned by camera, and the door is opened after verifying the user identity. 4) The scheme conects the visitor with the owner. Owners autonomously manage visitors in and out, which reduces the difficulty of management at the same time to ensure the security.

  5. Floral Biology and Hybridization Potential of Nine Accessions of Physic Nut Jatropha curcas L. originating from Three Continents

    Directory of Open Access Journals (Sweden)

    Ahoton, LE.

    2012-01-01

    Full Text Available Jatropha curcas is a shrub which has an important economic and medicinal role in tropical and subtropical zones of the world. The oil of its kernels can serve as fuel feedstock to produce diesel, indicating its potential as a renewable source of energy. In an attempt to introduce new variation into cultivated Jatropha curcas, a program of intraspecific hybridization with several ecotypes originating from Africa, Asia and America was undertaken. Field studies were performed over three years 2009, 2010 and 2011. Before achieving hybridization, the floral ratio and the breeding system of physic nut were studied in Southern Benin ecological conditions. Significant differences (P< 0.05 were observed between the analysed ecotypes regarding the number of female flowers. This study has also confirmed that the breeding system of Jatropha curcas is essentially outcrossing and that foraging insects are the main pollination actors of female flowers. New intraspecific hybrid combinations were produced involving nine accessions. Crosses results varied according to the origin and the direction of the hybridization. Crosses between accessions of J. curcas originating from Africa and Asia gave hybrids without difficulty. The data obtained confirm that apomixis might play a major role in J. curcas a reproductive biology. Considering the high number of female flowers per inflorescence produced by the accession from Ecuador, and the large genetic distance existing between this accession and those from Africa and Asia, it should constitute a valuable genetic stock for the development of F1 hybrids with local ecotypes of J. curcas. However, the use of growth regulators might be necessary to improve the hybridization success rate when it is used as female parent.

  6. CSchema: A Downgrading Policy Language for XML Access Control

    Institute of Scientific and Technical Information of China (English)

    Dong-Xi Liu

    2007-01-01

    The problem of regulating access to XML documents has attracted much attention from both academic and industry communities.In existing approaches, the XML elements specified by access policies are either accessible or inac-cessible according to their sensitivity.However, in some cases, the original XML elements are sensitive and inaccessible, but after being processed in some appropriate ways, the results become insensitive and thus accessible.This paper proposes a policy language to accommodate such cases, which can express the downgrading operations on sensitive data in XML documents through explicit calculations on them.The proposed policy language is called calculation-embedded schema (CSchema), which extends the ordinary schema languages with protection type for protecting sensitive data and specifying downgrading operations.CSchema language has a type system to guarantee the type correctness of the embedded calcula-tion expressions and moreover this type system also generates a security view after type checking a CSchema policy.Access policies specified by CSchema are enforced by a validation procedure, which produces the released documents containing only the accessible data by validating the protected documents against CSchema policies.These released documents are then ready tobe accessed by, for instance, XML query engines.By incorporating this validation procedure, other XML processing technologies can use CSchema as the access control module.

  7. Efficient medium access control protocol for geostationary satellite systems

    Institute of Scientific and Technical Information of China (English)

    王丽娜; 顾学迈

    2004-01-01

    This paper proposes an efficient medium access control (MAC) protocol based on multifrequency-time division multiple access (MF-TDMA) for geostationary satellite systems deploying multiple spot-beams and onboard processing,which uses a method of random reservation access with movable boundaries to dynamically request the transmission slots and can transmit different types of traffic. The simulation results have shown that our designed MAC protocol can achieve a high bandwidth utilization, while providing the required quality of service (QoS) for each class of service.

  8. Hybrid dislocated control and general hybrid projective dislocated synchronization for the modified Lue chaotic system

    Energy Technology Data Exchange (ETDEWEB)

    Xu Yuhua [College of Information Science and Technology, Donghua University, Shanghai 201620 (China) and Department of Maths, Yunyang Teacher' s College, Hubei 442000 (China)], E-mail: yuhuaxu2004@163.com; Zhou Wuneng [College of Information Science and Technology, Donghua University, Shanghai 201620 (China)], E-mail: wnzhou@163.com; Fang Jianan [College of Information Science and Technology, Donghua University, Shanghai 201620 (China)

    2009-11-15

    This paper introduces a modified Lue chaotic system, and some basic dynamical properties are studied. Based on these properties, we present hybrid dislocated control method for stabilizing chaos to unstable equilibrium and limit cycle. In addition, based on the Lyapunov stability theorem, general hybrid projective dislocated synchronization (GHPDS) is proposed, which includes complete dislocated synchronization, dislocated anti-synchronization and projective dislocated synchronization as its special item. The drive and response systems discussed in this paper can be strictly different dynamical systems (including different dimensional systems). As examples, the modified Lue chaotic system, Chen chaotic system and hyperchaotic Chen system are discussed. Numerical simulations are given to show the effectiveness of these methods.

  9. A hybrid Jacobian control for uncalibrated robot visual servoing

    Institute of Scientific and Technical Information of China (English)

    ZHANG Qizhi; GE Xinsheng; TEO Chee-Leong; LIM Siak-Piang

    2005-01-01

    This paper focuses on the visual servo control of an uncalibrated robotic arm with an eye-in-hand camera. Without a prior knowledge of the kinematics of the robotic arm or camera calibration, the proposed hybrid Jacobian controller can track a moving object using visual feedback and joint-space velocity feedback. The proposed hybrid control method is a combination of the uncalibrated visual servoing and approximate Jacobian feedback control. First, the Jacobian matrix from joint-space to image-space is estimated by recursive leastsquares (RLS) algorithm, and then the approximate Jacobian feedback controller is designed by using visual feedback and joint-space velocity feedback. The performances of the proposed control methods are illustrated by computer simulations.

  10. Implementing context and team based access control in healthcare intranets.

    Science.gov (United States)

    Georgiadis, Christos K; Mavridis, Ioannis K; Nikolakopoulou, Georgia; Pangalos, George I

    2002-09-01

    The establishment of an efficient access control system in healthcare intranets is a critical security issue directly related to the protection of patients' privacy. Our C-TMAC (Context and Team-based Access Control) model is an active security access control model that layers dynamic access control concepts on top of RBAC (Role-based) and TMAC (Team-based) access control models. It also extends them in the sense that contextual information concerning collaborative activities is associated with teams of users and user permissions are dynamically filtered during runtime. These features of C-TMAC meet the specific security requirements of healthcare applications. In this paper, an experimental implementation of the C-TMAC model is described. More specifically, we present the operational architecture of the system that is used to implement C-TMAC security components in a healthcare intranet. Based on the technological platform of an Oracle Data Base Management System and Application Server, the application logic is coded with stored PL/SQL procedures that include Dynamic SQL routines for runtime value binding purposes. The resulting active security system adapts to current need-to-know requirements of users during runtime and provides fine-grained permission granularity. Apart from identity certificates for authentication, it uses attribute certificates for communicating critical security metadata, such as role membership and team participation of users.

  11. A RAMP CODE FOR FINE-GRAINED ACCESS CONTROL

    Directory of Open Access Journals (Sweden)

    Kannan Karthik

    2013-02-01

    Full Text Available Threshold ramp secret sharing schemes are designed so that (i certain subsets of shares have no information about the secret, (ii some subsets have partial information about the secret and (iii some subsets have complete information to recover the secret. However most of the ramp schemes in present literature do not control the leakage of information in partial access sets, due to which the information acquired by these sets is devoid of structure and not useful for fine-grained access control. Through a non-perfect secret sharing scheme called MIX-SPLIT, an encoding methodology for controlling the leakage in partial access sets is proposed and this is used for fine-grained access to binary strings. The ramp code generated using MIX-SPLIT requires a much smaller share size of O(n, as compared to Shamir's ramp adaptation which incurs a share size of atleast O(n2 for the same multi-access structure. The proposed ramp code is finally applied towards the protection and fine-grained access of industrial design drawings.

  12. Fast Algorithms for Hybrid Control System Design

    Science.gov (United States)

    2007-11-02

    Controls for Petri Nets with Unobservable Transitions", Proceedings of the 1997 American Control Conference, pp. 2354- 2358, Albuquerque, New Mexico , June...Automation Conference, April 20-25, 1997, 1997, Albuquerque New Mexico . - Invited Speaker at special session on "Intelligent Control Systems" at the 3rd...0 (11) Moreover, if either (hence, both) of these statements hold, then one controller that renders iVa (Ji(P, K)) < 7 is ffiven by A + B2J- aYaC2

  13. Hybrid active vibration control of rotorbearing systems using piezoelectric actuators

    Science.gov (United States)

    Palazzolo, A. B.; Jagannathan, S.; Kascak, A. F.; Montague, G. T.; Kiraly, L. J.

    1993-01-01

    The vibrations of a flexible rotor are controlled using piezoelectric actuators. The controller includes active analog components and a hybrid interface with a digital computer. The computer utilizes a grid search algorithm to select feedback gains that minimize a vibration norm at a specific operating speed. These gains are then downloaded as active stillnesses and dampings with a linear fit throughout the operating speed range to obtain a very effective vibration control.

  14. Integration of variable-rate OWC with OFDM-PON for hybrid optical access based on adaptive envelope modulation

    Science.gov (United States)

    Chen, Chen; Zhong, Wen-De; Wu, Dehao

    2016-12-01

    In this paper, we investigate an integrated optical wireless communication (OWC) and orthogonal frequency division multiplexing based passive optical network (OFDM-PON) system for hybrid wired and wireless optical access, based on an adaptive envelope modulation technique. Both the outdoor and indoor wireless communications are considered in the integrated system. The data for wired access is carried by a conventional OFDM signal, while the data for wireless access is carried by an M-ary pulse amplitude modulation (M-PAM) signal which is modulated onto the envelope of a phase-modulated OFDM signal. By adaptively modulating the wireless M-PAM signal onto the envelope of the wired phase-modulated constant envelope OFDM (CE-OFDM) signal, hybrid wired and wireless optical access can be seamlessly integrated and variable-rate optical wireless transmission can also be achieved. Analytical bit-error-rate (BER) expressions are derived for both the CE-OFDM signal with M-PAM overlay and the overlaid unipolar M-PAM signal, which are verified by Monte Carlo simulations. The BER performances of wired access, indoor OWC wireless access and outdoor OWC wireless access are evaluated. Moreover, variable-rate indoor and outdoor optical wireless access based on the adaptive envelope modulation technique is also discussed.

  15. A hybrid approach to space power control

    Science.gov (United States)

    Gholdston, E. W.; Janik, D. F.; Newton, K. A.

    1990-01-01

    Conventional control systems have traditionally been utilized for space-based power designs. However, the use of expert systems is becoming important for NASA applications. Rocketdyne has been pursuing the development of expert systems to aid and enhance control designs of space-based power systems. The need for integrated expert systems is vital for the development of autonomous power systems.

  16. Hybrid Feedforward-Feedback Noise Control Using Virtual Sensors

    Science.gov (United States)

    Bean, Jacob; Fuller, Chris; Schiller, Noah

    2016-01-01

    Several approaches to active noise control using virtual sensors are evaluated for eventual use in an active headrest. Specifically, adaptive feedforward, feedback, and hybrid control structures are compared. Each controller incorporates the traditional filtered-x least mean squares algorithm. The feedback controller is arranged in an internal model configuration to draw comparisons with standard feedforward control theory results. Simulation and experimental results are presented that illustrate each controllers ability to minimize the pressure at both physical and virtual microphone locations. The remote microphone technique is used to obtain pressure estimates at the virtual locations. It is shown that a hybrid controller offers performance benefits over the traditional feedforward and feedback controllers. Stability issues associated with feedback and hybrid controllers are also addressed. Experimental results show that 15-20 dB reduction in broadband disturbances can be achieved by minimizing the measured pressure, whereas 10-15 dB reduction is obtained when minimizing the estimated pressure at a virtual location.

  17. Multigigabit W-Band (75–110 GHz) Bidirectional Hybrid Fiber-Wireless Systems in Access Networks

    DEFF Research Database (Denmark)

    Pang, Xiaodan; Lebedev, Alexander; Vegas Olmos, Juan José

    2014-01-01

    We experimentally demonstrate multigigabit capacity bidirectional hybrid fiber-wireless systems with RF carrier frequencies at the W-band (75-110 GHz) that enables the seamless convergence between wireless and fiber-optic data transmission systems in access networks. In this study, we evaluate...

  18. Synthesis from Design Requirements of a Hybrid System for Transport Aircraft Longitudinal Control. Volume 2

    Science.gov (United States)

    Hynes, Charles S.; Hardy, Gordon H.; Sherry, Lance

    2007-01-01

    Volume I of this report presents a new method for synthesizing hybrid systems directly from desi gn requirements, and applies the method to design of a hybrid system for longitudinal control of transport aircraft. The resulting system satisfies general requirement for safety and effectiveness specified a priori, enabling formal validation to be achieved. Volume II contains seven appendices intended to make the report accessible to readers with backgrounds in human factors, flight dynamics and control, and formal logic. Major design goals are (1) system design integrity based on proof of correctness at the design level, (2) significant simplification and cost reduction in system development and certification, and (3) improved operational efficiency, with significant alleviation of human-factors problems encountered by pilots in current transport aircraft. This report provides for the first time a firm technical basis for criteria governing design and certification of avionic systems for transport aircraft. It should be of primary interest to designers of next-generation avionic systems.

  19. DataBus-based hybrid routing approach for orbit access networks in lunar exploration

    Science.gov (United States)

    Zeng, Hui; Meng, Ke; Deng, Julia

    2012-06-01

    One of the major challenges for lunar exploration missions is how to achieve dynamic and robust routing. To reduce the development cost, it is desirable to leverage existing technologies, such as routing in mobile ad hoc networks (MANETs) and delay tolerant networks (DTN). However, these technologies are developed for the Earth environment and hence need further investigation for the lunar environment. To support robust access and dynamic mission operations, we propose a DataBus-based Hybrid Routing (DBHR) approach that combines MANET reactive routing protocol (such as AODV) and DTN-based bundle delivery. Our DBHR approach is designed for a tiered architecture where remote nodes communicate with upper-tier gateways through data carriers (DataBus) using short-range radio interfaces. Our scheme explores the (non)availability of the end-to-end path between two peers using MANET routing and provides diverse route options based upon different parameters. This interaction between hop-by-hop DTN technologies and end-to-end MANET protocol will result in a reliable and robust routing protocol for orbit access and improve the overall communication capabilities. To evaluate its performance, we implemented our proposed scheme on commercial-off-theshelf (COTS) routers with the custom OpenWRT and tailored IBR-DTN bundle protocol distribution. The on-demand service request and grant mechanisms are also developed in our implementation to allow certain DTN nodes to reserve the future access opportunities. Finally, we demonstrate the achieved capabilities and performance gains through experiments on a hardware test bed that consists of several COTS routers with our implementation.

  20. Hybrid adaptive ascent flight control for a flexible launch vehicle

    Science.gov (United States)

    Lefevre, Brian D.

    For the purpose of maintaining dynamic stability and improving guidance command tracking performance under off-nominal flight conditions, a hybrid adaptive control scheme is selected and modified for use as a launch vehicle flight controller. This architecture merges a model reference adaptive approach, which utilizes both direct and indirect adaptive elements, with a classical dynamic inversion controller. This structure is chosen for a number of reasons: the properties of the reference model can be easily adjusted to tune the desired handling qualities of the spacecraft, the indirect adaptive element (which consists of an online parameter identification algorithm) continually refines the estimates of the evolving characteristic parameters utilized in the dynamic inversion, and the direct adaptive element (which consists of a neural network) augments the linear feedback signal to compensate for any nonlinearities in the vehicle dynamics. The combination of these elements enables the control system to retain the nonlinear capabilities of an adaptive network while relying heavily on the linear portion of the feedback signal to dictate the dynamic response under most operating conditions. To begin the analysis, the ascent dynamics of a launch vehicle with a single 1st stage rocket motor (typical of the Ares 1 spacecraft) are characterized. The dynamics are then linearized with assumptions that are appropriate for a launch vehicle, so that the resulting equations may be inverted by the flight controller in order to compute the control signals necessary to generate the desired response from the vehicle. Next, the development of the hybrid adaptive launch vehicle ascent flight control architecture is discussed in detail. Alterations of the generic hybrid adaptive control architecture include the incorporation of a command conversion operation which transforms guidance input from quaternion form (as provided by NASA) to the body-fixed angular rate commands needed by the

  1. Hybrid systems: a real-time interface to control engineering

    DEFF Research Database (Denmark)

    Eriksen, Thomas Juul; Heilmann, Søren; Holdgaard, Michael

    1996-01-01

    are usually investigated by control engineers that base their work on the theory of dynamic systems. The mathematical tool for this work is thus mathematical analysis, in particular the theory of differential equations. The paper gives an introduction to a general hybrid systems model for definition of system...

  2. Real-Time Energy Management Control for Hybrid Electric Powertrains

    Directory of Open Access Journals (Sweden)

    Mohamed Zaher

    2013-01-01

    Full Text Available This paper focuses on embedded control of a hybrid powertrain concepts for mobile vehicle applications. Optimal robust control approach is used to develop a real-time energy management strategy. The main idea is to store the normally wasted mechanical regenerative energy in energy storage devices for later usage. The regenerative energy recovery opportunity exists in any condition where the speed of motion is in the opposite direction to the applied force or torque. This is the case when the vehicle is braking, decelerating, the motion is driven by gravitational force, or load driven. There are three main concepts for energy storing devices in hybrid vehicles: electric, hydraulic, and mechanical (flywheel. The real-time control challenge is to balance the system power demands from the engine and the hybrid storage device, without depleting the energy storage device or stalling the engine in any work cycle. In the worst-case scenario, only the engine is used and the hybrid system is completely disabled. A rule-based control algorithm is developed and is tuned for different work cycles and could be linked to a gain scheduling algorithm. A gain scheduling algorithm identifies the cycle being performed by the work machine and its position via GPS and maps both of them to the gains.

  3. 7 CFR 201.78 - Pollen control for hybrids.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 3 2010-01-01 2010-01-01 false Pollen control for hybrids. 201.78 Section 201.78... REGULATIONS Additional Requirements for the Certification of Plant Materials of Certain Crops § 201.78 Pollen... branches, or any combination thereof, shedding pollen. (c) Sorghum. Shedders in the seed parent, at any...

  4. Session Types for Access and Information Flow Control

    OpenAIRE

    Capecchi, Sara; Castellani, Ilaria; Dezani-Ciancaglini, Mariangiola; Rezk, Tamara

    2010-01-01

    We consider a calculus for multiparty sessions with delegation, enriched with security levels for session participants and data. We propose a type system that guarantees both session safety and a form of access control. Moreover, this type system ensures secure information flow, including controlled forms of declassification. In particular, it prevents leaks due to the specific control constructs of the calculus, such as session opening, selection, branching and delegation. We illustrate the ...

  5. Controlling user access to electronic resources without password

    Science.gov (United States)

    Smith, Fred Hewitt

    2015-06-16

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.

  6. Access Control with RFID in the Internet of Things

    DEFF Research Database (Denmark)

    Jensen, Steffen Elstrøm Holst; Jacobsen, Rune Hylsberg

    2013-01-01

    , to the Internet is suggested. The solution uses virtual representations of objects by using low-cost, passive RFID tags to give objects identities on the Internet. A prototype that maps an RFID identity into an IPv6 address is constructed. It is illustrated how this approach can be used in access control systems...... based on open network protocols and packet filtering. The solution includes a novel RFID reader architecture that supports the internetworking of components of a future access control system based on network layer technology....

  7. Privacy Preservation in Role-based Access Control Model

    Directory of Open Access Journals (Sweden)

    Zuo Chen

    2011-08-01

    Full Text Available Privacy preservation is a crucial problem in resource sharing and collaborating among multi-domains. Based on this problem, we propose a role-based access control model for privacy preservation. This scheme avoided the privacy leakage of resources while implementing access control, and it has the advantage of lower communication overhead. We demonstrate this scheme meets the IND-CCA2 semantic security by using random oracle. The simulation result shows this scheme has better execution efficiency and application effects.

  8. Impulsive and hybrid dynamical systems stability, dissipativity, and control

    CERN Document Server

    Haddad, Wassim M; Nersesov, Sergey G

    2014-01-01

    This book develops a general analysis and synthesis framework for impulsive and hybrid dynamical systems. Such a framework is imperative for modern complex engineering systems that involve interacting continuous-time and discrete-time dynamics with multiple modes of operation that place stringent demands on controller design and require implementation of increasing complexity--whether advanced high-performance tactical fighter aircraft and space vehicles, variable-cycle gas turbine engines, or air and ground transportation systems. Impulsive and Hybrid Dynamical Systems goes beyond similar

  9. Navy Commercial Access Control System Did Not Effectively Mitigate Access Control Risks

    Science.gov (United States)

    2013-09-16

    the capability to perform NCIC checks to vet contractor employees, and not all Navy installations nave the ability to access NCIC, NCACS is not...Management Corp 10,017 REA to contract N40085-06-D-1260 Goodwill Industries 199,148 Overhead charge to contract N00189-09- C-Z003 DynCorp international

  10. Database design for Physical Access Control System for nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Sathishkumar, T., E-mail: satishkumart@igcar.gov.in; Rao, G. Prabhakara, E-mail: prg@igcar.gov.in; Arumugam, P., E-mail: aarmu@igcar.gov.in

    2016-08-15

    Highlights: • Database design needs to be optimized and highly efficient for real time operation. • It requires a many-to-many mapping between Employee table and Doors table. • This mapping typically contain thousands of records and redundant data. • Proposed novel database design reduces the redundancy and provides abstraction. • This design is incorporated with the access control system developed in-house. - Abstract: A (Radio Frequency IDentification) RFID cum Biometric based two level Access Control System (ACS) was designed and developed for providing access to vital areas of nuclear facilities. The system has got both hardware [Access controller] and software components [server application, the database and the web client software]. The database design proposed, enables grouping of the employees based on the hierarchy of the organization and the grouping of the doors based on Access Zones (AZ). This design also illustrates the mapping between the Employee Groups (EG) and AZ. By following this approach in database design, a higher level view can be presented to the system administrator abstracting the inner details of the individual entities and doors. This paper describes the novel approach carried out in designing the database of the ACS.

  11. Review of Access Control Models for Cloud Computing

    Directory of Open Access Journals (Sweden)

    Natarajan Meghanathan

    2013-05-01

    Full Text Available The relationship between users and resources is dyn amic in the cloud, and service providers and users are typically not in the same security do main. Identity-based security (e.g., discretionary or mandatory access control models c annot be used in an open cloud computing environment, where each resource node may not be fa miliar, or even do not know each other. Users are normally identified by their attributes o r characteristics and not by predefined identities. There is often a need for a dynamic acc ess control mechanism to achieve cross- domain authentication. In this paper, we will focus on the following three broad categories of access control models for cloud computing: (1 Role -based models; (2 Attribute-based encryption models and (3 Multi-tenancy models. We will review the existing literature on each of the above access control models and their varian ts (technical approaches, characteristics, applicability, pros and cons, and identify future research directions for developing access control models for cloud computing environments .

  12. Controllable proximity effect in superconducting hybrid devices

    NARCIS (Netherlands)

    Bakurskiy, Sergey

    2015-01-01

    This thesis is devoted to the study of controllable proximity effects in superconductors, both in terms of fundamental aspects and applications. As a part of this thesis theoretical description was suggested for a number of structures with superconducting electrodes and multiple interlayers. These s

  13. Engagement and Floor Control in Hybrid Meetings

    NARCIS (Netherlands)

    op den Akker, Hendrikus J.A.; Devanthéry, V.; Zwiers, Jakob; Hondorp, G.H.W.; van Dijk, Elisabeth M.A.G.; Kulyk, Olga Anatoliyivna; Hofs, D.H.W.; Nijholt, Antinus; Reidsma, Dennis

    2010-01-01

    The Human Media Interaction group of the University of Twente has developed a User Engagment and Floor Control Demonstrator, a system that uses modules for online speech recognition, real-time visual focus of attention as well as a module that signals who is being addressed by the speaker. A

  14. Regulatory Accessibility and Social Influences on State Self-Control

    OpenAIRE

    vanDellen, Michelle R.; Hoyle, Rick H.

    2009-01-01

    The current work examined how social factors influence self-control. Current conceptions of state self-control treat it largely as a function of regulatory capacity. The authors propose that state self-control might also be influenced by social factors because of regulatory accessibility. Studies 1 through 4 provide evidence that individuals’ state self-control is influenced by the trait and state self-control of salient others such that thinking of others with good trait or state self-contro...

  15. Access Control of Web and Java Based Applications

    Science.gov (United States)

    Tso, Kam S.; Pajevski, Michael J.; Johnson, Bryan

    2011-01-01

    Cyber security has gained national and international attention as a result of near continuous headlines from financial institutions, retail stores, government offices and universities reporting compromised systems and stolen data. Concerns continue to rise as threats of service interruption, and spreading of viruses become ever more prevalent and serious. Controlling access to application layer resources is a critical component in a layered security solution that includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. In this paper we discuss the development of an application-level access control solution, based on an open-source access manager augmented with custom software components, to provide protection to both Web-based and Java-based client and server applications.

  16. Hybrid control of the distributed refrigeration system

    DEFF Research Database (Denmark)

    Chen, L.; Wisniewski, R.

    2010-01-01

    The supermarket refrigeration system typically has a distributed control structure, which neglects interactions between its subsystems. These interactions from time to time lead to a synchronization operation of the display-cases which causes an inferior control performance and increased energy...... or a chaotic behavior, the system is considered away from the synchronization. Therefore, the paper proposes a concept that the system may be de-synchronized by making it chaotic. A de-synchronization scheme is developed. It includes a synchronization-early-monitoring detector by calculating the maximum...... consumption. The paper focuses on synchronization dynamics of the refrigeration system modeled as a piecewise-affine switched system. System behaviors are analyzed using chaos theory. The synchronization phenomenon is interpreted as a stable low-period orbit; if the system has a high-order periodic orbit...

  17. Ubiquitous access control and policy management in personal networks

    DEFF Research Database (Denmark)

    Kyriazanos, Dimitris M.; Stassinopoulos, George I.; Prasad, Neeli R.

    2006-01-01

    In this paper the authors present the challenges for enabling Security Policies Management and subsequent Ubiquitous Access Control on the Personal Network (PN) environment. A solution based on Security Profiles is proposed, supporting both partially distributed architectures-having in this case...

  18. Fine-Grained Access Control for Electronic Health Record Systems

    Science.gov (United States)

    Hue, Pham Thi Bach; Wohlgemuth, Sven; Echizen, Isao; Thuy, Dong Thi Bich; Thuc, Nguyen Dinh

    There needs to be a strategy for securing the privacy of patients when exchanging health records between various entities over the Internet. Despite the fact that health care providers such as Google Health and Microsoft Corp.'s Health Vault comply with the U.S Health Insurance Portability and Accountability Act (HIPAA), the privacy of patients is still at risk. Several encryption schemes and access control mechanisms have been suggested to protect the disclosure of a patient's health record especially from unauthorized entities. However, by implementing these approaches, data owners are not capable of controlling and protecting the disclosure of the individual sensitive attributes of their health records. This raises the need to adopt a secure mechanism to protect personal information against unauthorized disclosure. Therefore, we propose a new Fine-grained Access Control (FGAC) mechanism that is based on subkeys, which would allow a data owner to further control the access to his data at the column-level. We also propose a new mechanism to efficiently reduce the number of keys maintained by a data owner in cases when the users have different access privileges to different columns of the data being shared.

  19. Audit-Based Access Control for Electronic Health Records

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, Sandro

    2006-01-01

    Traditional access control mechanisms aim to prevent illegal actions a-priori occurrence, i.e. before granting a request for a document. There are scenarios however where the security decision can not be made on the fly. For these settings we developed a language and a framework for a-posteriori

  20. Access Control for Agent-based Computing: A Distributed Approach.

    Science.gov (United States)

    Antonopoulos, Nick; Koukoumpetsos, Kyriakos; Shafarenko, Alex

    2001-01-01

    Discusses the mobile software agent paradigm that provides a foundation for the development of high performance distributed applications and presents a simple, distributed access control architecture based on the concept of distributed, active authorization entities (lock cells), any combination of which can be referenced by an agent to provide…

  1. Controlling Chaos of Hybrid Systems by Variable Threshold Values

    Science.gov (United States)

    Ito, Daisuke; Ueta, Tetsushi; Kousaka, Takuji; Imura, Jun'ichi; Aihara, Kazuyuki

    We try to stabilize unstable periodic orbits embedded in a given chaotic hybrid dynamical system by a perturbation of a threshold value. In conventional chaos control methods, a control input is designed by state-feedback, which is proportional to the difference between the target orbit and the current state, and it is applied to a specific system parameter or the state as a small perturbation. During a transition state, the control system consumes a certain control energy given by the integration of such perturbations. In our method, we change the threshold value dynamically to control the chaotic orbit. Unlike the OGY method and the delayed feedback control, no actual control input is added into the system. The state-feedback is utilized only to determine the dynamic threshold value, thus the orbit starting from the current threshold value reaches the next controlled threshold value without any control energy. We obtain the variation of the threshold value from the composite Poincaré map, and the controller is designed by the linear feedback theory with this variation. We demonstrate this method in simple hybrid chaotic systems and show its control performances by evaluating basins of attraction.

  2. Secure Dynamic access control scheme of PHR in cloud computing.

    Science.gov (United States)

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access

  3. Chaotic attractor transforming control of hybrid Lorenz-Chen system

    Institute of Scientific and Technical Information of China (English)

    Qi Dong-Lian; Wang Qiao; Gu Hong

    2008-01-01

    Based on passive theory, this paper studies a hybrid chaotic dynamical system from the mathematics perspective to implement the control of system stabilization.According to the Jacobian matrix of the nonlinear system, the stabilization control region is gotten.The controller is designed to stabilize fast the minimum phase Lorenz-Chen chaotic system after equivalently transforming from chaotic system to passive system. The simulation results show that the system not only can be controlled at the different equilibria, but also can be transformed between the different chaotic attractors.

  4. Nonholonomic Mobile Robot Trajectory Tracking using Hybrid Controller

    Directory of Open Access Journals (Sweden)

    Muhammad Safwan

    2016-04-01

    Full Text Available A control scheme is being presented for the trajectory tracking of a nonholonomic kinematic model of mobile robots. As a kinematic model of mobile robots is nonlinear in nature, therefore, it is controlling is always being a difficult task. Thus, a control hybrid scheme comprises of fuzzy logic and PID (Proportional Integral Derivative is being proposed, in which adaptive gains of PID controller is being tuned by a fuzzy logic controller. Moreover, the effectiveness of this innovative technique is also proved using the simulations by adding model uncertainties and external disturbances in the system. Besides, the fuzzy logic control system is also being compared by the proposed control system. Resultsattained shows that the fuzzy based PID controller drivesimproved results than fuzzy logic controller.

  5. Adaptive Current Control Method for Hybrid Active Power Filter

    Science.gov (United States)

    Chau, Minh Thuyen

    2016-09-01

    This paper proposes an adaptive current control method for Hybrid Active Power Filter (HAPF). It consists of a fuzzy-neural controller, identification and prediction model and cost function. The fuzzy-neural controller parameters are adjusted according to the cost function minimum criteria. For this reason, the proposed control method has a capability on-line control clings to variation of the load harmonic currents. Compared to the single fuzzy logic control method, the proposed control method shows the advantages of better dynamic response, compensation error in steady-state is smaller, able to online control is better and harmonics cancelling is more effective. Simulation and experimental results have demonstrated the effectiveness of the proposed control method.

  6. Backstepping and sliding mode control hybridized for a prosthetic hand.

    Science.gov (United States)

    Engeberg, Erik D; Meek, Sanford G

    2009-02-01

    Open loop and force controllers are compared experimentally with three robust parallel force-velocity controllers that are developed for a prosthetic hand. Robust sliding mode, backstepping, and hybrid sliding mode-backstepping (HSMBS) parallel force-velocity controllers are tested by ten able-bodied subjects. Results obtained with a myoelectrically controlled prosthesis indicate that all three robust controllers offer a statistically significant improvement over linear hand prosthesis control schemes. The robust controllers enable the human operators to more easily manipulate a delicate object. Bench top experiments combined with quantitative and qualitative evaluations from ten test subjects reveal the HSMBS controller to be the best choice to improve control of powered prosthetic hands.

  7. Compulsory licensing, price controls, and access to patented foreign products

    OpenAIRE

    Eric Bond; Kamal Saggi

    2012-01-01

    Motivated by existing multilateral rules regarding intellectual property, we develop a North-South model to highlight the dual roles price controls and compulsory licensing play in determining Southern access to a patented Northern product. The Northern patent-holder chooses whether and how to work its patent in the South (either via entry or voluntarily licensing) while the South determines the price control and whether to issue a compulsory license. The threat of compulsory licensing benefi...

  8. Modemless Multiple Access Communications over Powerlines for DC Microgrid Control

    OpenAIRE

    Angjelichinoski, Marko; Stefanovic, Cedomir; Popovski, Petar

    2016-01-01

    We present a communication solution tailored specifically for DC microgrids (MGs) that exploits: (i) the communication potential residing in power electronic converters interfacing distributed generators to powerlines and (ii) the multiple access nature of the communication channel presented by powerlines. The communication is achieved by modulating the parameters of the primary control loop implemented by the converters, fostering execution of the upper layer control applications. We present...

  9. Photoresponsive lipid-polymer hybrid nanoparticles for controlled doxorubicin release

    Science.gov (United States)

    Yao, Cuiping; Wu, Ming; Zhang, Cecheng; Lin, Xinyi; Wei, Zuwu; Zheng, Youshi; Zhang, Da; Zhang, Zhenxi; Liu, Xiaolong

    2017-06-01

    Currently, photoresponsive nanomaterials are particularly attractive due to their spatial and temporal controlled drug release abilities. In this work, we report a photoresponsive lipid-polymer hybrid nanoparticle for remote controlled delivery of anticancer drugs. This hybrid nanoparticle comprises three distinct functional components: (i) a poly(D,L-lactide-co-glycolide) (PLGA) core to encapsulate doxorubicin; (ii) a soybean lecithin monolayer at the interface of the core and shell to act as a molecular fence to prevent drug leakage; (iii) a photoresponsive polymeric shell with anti-biofouling properties to enhance nanoparticle stability, which could be detached from the nanoparticle to trigger the drug release via a decrease in the nanoparticle’s stability under light irradiation. In vitro results revealed that this core-shell nanoparticle had excellent light-controlled drug release behavior (76% release with light irradiation versus 10% release without light irradiation). The confocal microscopy and flow cytometry results also further demonstrated the light-controlled drug release behavior inside the cancer cells. Furthermore, a CCK8 assay demonstrated that light irradiation could significantly improve the efficiency of killing cancer cells. Meanwhile, whole-animal fluorescence imaging of a tumor-bearing mouse also confirmed that light irradiation could trigger drug release in vivo. Taken together, our data suggested that a hybrid nanoparticle could be a novel light controlled drug delivery system for cancer therapy.

  10. Integrity Based Access Control Model for Multilevel XML Document

    Institute of Scientific and Technical Information of China (English)

    HONG Fan; FENG Xue-bin; HUANO Zhi; ZHENG Ming-hui

    2008-01-01

    XML's increasing popularity highlights the security demand for XML documents. A mandatory access control model for XML document is presented on the basis of investigation of the function dependency of XML documents and discussion of the integrity properties of multilevel XML document. Then, the algorithms for decomposition/recovery multilevel XML document into/from single level document are given, and the manipulation rules for typical operations of XQuery and XUpdate: QUERY, INSERT,UPDATE, and REMOVE, are elaborated. The multilevel XML document access model can meet the requirement of sensitive information processing application.

  11. Controlling user access to electronic resources without password

    Energy Technology Data Exchange (ETDEWEB)

    Smith, Fred Hewitt

    2017-08-22

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes obtaining an image from a communication device of a user. An individual and a landmark are identified within the image. Determinations are made that the individual is the user and that the landmark is a predetermined landmark. Access to a restricted computing resource is granted based on the determining that the individual is the user and that the landmark is the predetermined landmark. Other embodiments are disclosed.

  12. Hybrid sliding mode control of semi-active suspension systems

    Science.gov (United States)

    Assadsangabi, Babak; Eghtesad, Mohammad; Daneshmand, Farhang; Vahdati, Nader

    2009-12-01

    In order to design a controller which can take both ride comfort and road holding into consideration, a hybrid model reference sliding mode controller (HMRSMC) is proposed. The controller includes two separate model reference sliding mode controllers (MRSMC). One of the controllers is designed so as to force the plant to follow the ideal Sky-hook model and the other is to force the plant to follow the ideal Ground-hook model; then the outputs of these two controllers are linearly combined and applied to the plant as the input. Also, since the designed controller requires a knowledge of the terrain input, this input is approximated by the unsprung mass displacement. Finally, in the simulation section of this study, the effect of the relative ratio between the two MRSMCs and the knowledge of the terrain on the performance of the controller is numerically investigated for both steady-state and transient cases.

  13. Event-triggered hybrid control based on multi-Agent systems for Microgrids

    DEFF Research Database (Denmark)

    Dou, Chun-xia; Liu, Bin; Guerrero, Josep M.

    2014-01-01

    of distributed energy resources, thus it is typical hybrid dynamic network. Considering the complex hybrid behaviors, a hierarchical decentralized coordinated control scheme is firstly constructed based on multi-agent sys-tem, then, the hybrid model of the microgrid is built by using differential hybrid Petri...

  14. Active Vibration Control of Plate Partly Treated with ACLD Using Hybrid Control

    Directory of Open Access Journals (Sweden)

    Dongdong Zhang

    2014-01-01

    Full Text Available A finite element model of plate partly treated with ACLD treatments is developed based on the constitutive equations of elastic, piezoelectric, viscoelastic materials and Hamilton’s principle. The Golla-Hughes-Mctavish (GHM method is employed to describe the frequency-dependent characteristics of viscoelastic material (VEM. A model reduction is completed by using iterative dynamic condensation and balance model reduction method to design an effective control system. The emphasis is concerned on hybrid (combined feedback/feedforward control system to attenuate the vibration of plates with ACLD treatments. The optimal linear quadratic Gaussian (LQG controller is considered as a feedback channel and the adaptive filtered-reference LMS (FxLMS controller is used as a feedforward channel. They can be utilized individually or in a hybrid way to suppress the vibration of plate/ACLD system. The results show that the hybrid controller which combines feedback/feedforward together can reduce the displacement amplitude of plate/ACLD system subjected to a complicated disturbance substantially without requiring more control effort. Furthermore, the hybrid controller has more rapid and stable convergence rate than the adaptive feedforward FxLMS controller. Meanwhile, perfect robustness to phase error of the cancellation path in feedforward controller and the weight matrices in feedback LQG controller is demonstrated in proposed hybrid controller. Therefore, its application in structural engineering can be highly appreciated.

  15. Quantum control without access to the controlling interaction

    CERN Document Server

    Janzing, D; Zeier, R; Beth, T; Janzing, Dominik; Armknecht, Frederik; Zeier, Robert; Beth, Thomas

    2001-01-01

    In our model a fixed Hamiltonian acts on the joint Hilbert space of a quantum system and its controller. We show under which conditions measurements, state preparations, and unitary implementations on the system can be performed by quantum operations on the controller only. It turns out that a measurement of the observable A and an implementation of the one-parameter group exp(iAr) can be performed by almost the same sequence of control operations. Furthermore measurement procedures for A+B, for (AB+BA), and for i[A,B] can be constructed from measurements of A and B. This shows that the algebraic structure of the set of observables can be explained by the Lie group structure of the unitary evolutions on the joint Hilbert space of the measuring device and the measured system. A spin chain model with nearest neighborhood coupling shows that the border line between controller and system can be shifted consistently.

  16. Application of Attribute Based Access Control Model for Industrial Control Systems

    Directory of Open Access Journals (Sweden)

    Erkan Yalcinkaya

    2017-02-01

    Full Text Available The number of reported security vulnerabilities and incidents related to the industrial control systems (ICS has increased recent years. As argued by several researchers, authorization issues and poor access control are key incident vectors. The majority of ICS are not designed security in mind and they usually lack strong and granular access control mechanisms. The attribute based access control (ABAC model offers high authorization granularity, central administration of access policies with centrally consolidated and monitored logging properties. This research proposes to harness the ABAC model to address the present and future ICS access control challenges. The proposed solution is also implemented and rigorously tested to demonstrate the feasibility and viability of ABAC model for ICS.

  17. The research of controller area network on hybrid electrical vehicle

    Institute of Scientific and Technical Information of China (English)

    Wu Hongxing; Song Liwei; Kou Baoquan; Cheng Shukang

    2006-01-01

    It is of increasing importance to design and implement vehicle networks for transferring information between electrical control units on Hybrid Electrical Vehicle (HEV). This paper presents a scheme of using Controller Area Network (CAN) technology to realize communication and datasharing between the electrical units on the HEV. The principle and communication protocol of Electrical Control Units (ECU) CAN node are introduced. By considering different sensitivity of the devices to the latency of data transportation, a new design procedure is proposed for the purpose of simplifying network codes and wiring harness, reducing assembly space and weight, improving assembly efficiency, and enhancing fault-diagnose in auto networks.

  18. Robust control of a parallel hybrid drivetrain with a CVT

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, T.; Schroeder, D. [Technical Univ. of Munich (Germany)

    1996-09-01

    In this paper the design of a robust control system for a parallel hybrid drivetrain is presented. The drivetrain is based on a continuously variable transmission (CVT) and is therefore a highly nonlinear multiple-input-multiple-output system (MIMO-System). Input-Output-Linearization offers the possibility of linearizing and of decoupling the system. Since for example the vehicle mass varies with the load and the efficiency of the gearbox depends strongly on the actual working point, an exact linearization of the plant will mostly fail. Therefore a robust control algorithm based on sliding mode is used to control the drivetrain.

  19. Design and control of hybrid active power filters

    CERN Document Server

    Lam, Chi-Seng

    2014-01-01

    Design and Control of Hybrid Active Power Filters presents an overview of the current quality problems and their compensators. To get a balance between the system cost and performance, hybrid active power filters (HAPFs) are valuable. The book presents the coverage of resonance phenomena prevention capability, filtering performance and system robustness analysis of HAPF; nonlinear inverter current slope characteristics and their linear operation region requirement analysis of the hysteresis PWM for the HAPF; minimum inverter capacity design procedure of HAPF, adaptive dc-link voltage controller for the HAPF and the real design example of a 220V 10kVA HAPF, in which the system performance analysis method, minimum dc voltage deduction concept and adaptive dc voltage idea can be further extended into the other active compensators, such as APF, static synchronous compensator STATCOM, etc. This book will benefit researchers, graduate students, and electrical power engineers in the field of power-quality compensati...

  20. Adaptive and Reliable Control Algorithm for Hybrid System Architecture

    Directory of Open Access Journals (Sweden)

    Osama Abdel Hakeem Abdel Sattar

    2012-01-01

    Full Text Available A stand-alone system is defined as an autonomous system that supplies electricity without being connected to the electric grid. Hybrid systems combined renewable energy source, that are never depleted (such solar (photovoltaic (PV, wind, hydroelectric, etc. , With other sources of energy, like Diesel. If these hybrid systems are optimally designed, they can be more cost effective and reliable than single systems. However, the design of hybrid systems is complex because of the uncertain renewable energy supplies, load demands and the non-linear characteristics of some components, so the design problem cannot be solved easily by classical optimisation methods. The use of heuristic techniques, such as the genetic algorithms, can give better results than classical methods. This paper presents to a hybrid system control algorithm and also dispatches strategy design in which wind is the primary energy resource with photovoltaic cells. The dimension of the design (max. load is 2000 kW and the sources is implemented as flow 1500 kw from wind, 500 kw from solar and diesel 2000 kw. The main task of the preposed algorithm is to take full advantage of the wind energy and solar energy when it is available and to minimize diesel fuel consumption.

  1. Hybrid Engine Powered City Car: Fuzzy Controlled Approach

    Science.gov (United States)

    Rahman, Ataur; Mohiuddin, AKM; Hawlader, MNA; Ihsan, Sany

    2017-03-01

    This study describes a fuzzy controlled hybrid engine powered car. The car is powered by the lithium ion battery capacity of 1000 Wh is charged by the 50 cc hybrid engine and power regenerative mode. The engine is operated with lean mixture at 3000 rpm to charge the battery. The regenerative mode that connects with the engine generates electrical power of 500-600 W for the deceleration of car from 90 km/h to 20 km/h. The regenerated electrical power has been used to power the air-conditioning system and to meet the other electrical power. The battery power only used to propel the car. The regenerative power also found charging the battery for longer operation about 40 minutes and more. The design flexibility of this vehicle starts with whole-vehicle integration based on radical light weighting, drag reduction, and accessory efficiency. The energy efficient hybrid engine cut carbon dioxide (CO2) and nitrogen oxides (N2O) emission about 70-80% as the loads on the crankshaft such as cam-follower and its associated rotating components are replaced by electromagnetic systems, and the flywheel, alternator and starter motor are replaced by a motor generator. The vehicle was tested and found that it was able to travel 70 km/litre with the power of hybrid engine.

  2. Hybrid Porous Materials for Controlled Release and Catalysis

    OpenAIRE

    Liu, Rui

    2010-01-01

    First reported in 1992, ordered mesoporous materials exhibit unique features, such as regular pore geometry, high surface area, and large pore volume, and have shown great potential in various applications. This dissertation combines the knowledge from the field of ordered mesoporous materials and several other research areas to design advanced hybrid porous materials for controlled release and catalysis applications.The demand for better treatment of illness has led to ever-increasing effort...

  3. Controllability in hybrid kinetic equations modeling nonequilibrium multicellular systems.

    Science.gov (United States)

    Bianca, Carlo

    2013-01-01

    This paper is concerned with the derivation of hybrid kinetic partial integrodifferential equations that can be proposed for the mathematical modeling of multicellular systems subjected to external force fields and characterized by nonconservative interactions. In order to prevent an uncontrolled time evolution of the moments of the solution, a control operator is introduced which is based on the Gaussian thermostat. Specifically, the analysis shows that the moments are solution of a Riccati-type differential equation.

  4. Caged molecular beacons: controlling nucleic acid hybridization with light.

    Science.gov (United States)

    Wang, Chunming; Zhu, Zhi; Song, Yanling; Lin, Hui; Yang, Chaoyong James; Tan, Weihong

    2011-05-28

    We have constructed a novel class of light-activatable caged molecular beacons (cMBs) that are caged by locking two stems with a photo-labile biomolecular interaction or covalent bond. With the cMBs, the nucleic acid hybridization process can be easily controlled with light, which offers the possibility for a high spatiotemporal resolution study of intracellular mRNAs. © The Royal Society of Chemistry 2011

  5. Hybrid Porous Materials for Controlled Release and Catalysis

    OpenAIRE

    Liu, Rui

    2010-01-01

    First reported in 1992, ordered mesoporous materials exhibit unique features, such as regular pore geometry, high surface area, and large pore volume, and have shown great potential in various applications. This dissertation combines the knowledge from the field of ordered mesoporous materials and several other research areas to design advanced hybrid porous materials for controlled release and catalysis applications.The demand for better treatment of illness has led to ever-increasing effort...

  6. A formal model for access control with supporting spatial context

    Institute of Scientific and Technical Information of China (English)

    ZHANG Hong; HE YePing; SHI ZhiGuo

    2007-01-01

    There is an emerging recognition of the importance of utilizing contextual information in authorization decisions. Controlling access to resources in the field of wireless and mobile networking require the definition of a formal model for access control with supporting spatial context. However, traditional RBAC model does not specify these spatial requirements. In this paper, we extend the existing RBAC model and propose the SC-RBAC model that utilizes spatial and location-based information in security policy definitions. The concept of spatial role is presented,and the role is assigned a logical location domain to specify the spatial boundary.Roles are activated based on the current physical position of the user which obtained from a specific mobile terminal. We then extend SC-RBAC to deal with hierarchies, modeling permission, user and activation inheritance, and prove that the hierarchical spatial roles are capable of constructing a lattice which is a means for articulate multi-level security policy and more suitable to control the information flow security for safety-critical location-aware information systems. Next, constrained SC-RBAC allows express various spatial separations of duty constraints,location-based cardinality and temporal constraints for specify fine-grained spatial semantics that are typical in location-aware systems. Finally, we introduce 9 invariants for the constrained SC-RBAC and its basic security theorem is proven. The constrained SC-RBAC provides the foundation for applications in need of the constrained spatial context aware access control.

  7. An Efficient Hybrid Power Control Algorithm for Capacity Improvement of CDMA-based Fixed Wireless Applications

    CERN Document Server

    Zeeshan, Muhammad; Malik, Muhammad Yasir

    2011-01-01

    In Fixed Wireless Applications (FWA), the Code Division Multiple Access (CDMA) is the most promising candidate for wideband data access. The reason is the soft limit on the number of active mobile devices. Many Fixed Wireless Applications impose an upper bound on the BER performance which restricts the increase in number of mobile users. The number of active mobile users or Capacity is further reduced in Multipath Fading Environment (MFE). This paper presents an effective method of improving the capacity of CDMA based Fixed Wireless Networks by using a hybrid power control algorithm. The proposed scheme improves the capacity two times as compared to the conventional CDMA based networks. Simulation results have been presented to demonstrate the effectiveness of the proposed scheme.

  8. Access Control Design and Implementations in the ATLAS Experiment

    CERN Document Server

    Leahu, M C; Avolio, G

    2008-01-01

    The ATLAS experiment operates with a significant number of hardware and software resources. Their protection against misuse is an essential task to ensure a safe and optimal operation. To achieve this goal, the Role Based Access Control (RBAC) model has been chosen for its scalability, flexibility, ease of administration and usability from the lowest operating system level to the highest software application level. This paper presents the overall design of RBAC implementation in the ATLAS experiment and the enforcement solutions in different areas such as the system administration, control room desktops and the data acquisition software. The users and the roles are centrally managed using a directory service based on Lightweight Directory Access Protocol which is kept in synchronization with the human resources and IT datab

  9. Secure Communication and Access Control for Mobile Web Service Provisioning

    CERN Document Server

    Srirama, Satish Narayana

    2010-01-01

    It is now feasible to host basic web services on a smart phone due to the advances in wireless devices and mobile communication technologies. While the applications are quite welcoming, the ability to provide secure and reliable communication in the vulnerable and volatile mobile ad-hoc topologies is vastly becoming necessary. The paper mainly addresses the details and issues in providing secured communication and access control for the mobile web service provisioning domain. While the basic message-level security can be provided, providing proper access control mechanisms for the Mobile Host still poses a great challenge. This paper discusses details of secure communication and proposes the distributed semantics-based authorization mechanism.

  10. Cascade Control Solution for Traction Motor for Hybrid Electric Vehicles

    Directory of Open Access Journals (Sweden)

    Zsuzsa Preitl

    2007-10-01

    Full Text Available In this paper a hybrid electric vehicle is considered, which contains both aninternal combustion engine and an electric motor (EM. Without focusing on the othercomponents of the vehicle, the EM is treated in detail, both regarding modelling aspectsand control solutions.After a brief modelling of the plant, two cascade speed control solutions are presented: firsta classical PI+PI cascade control solution is presented. The control systems related totraction electric motors (used in vehicle traction must be able to cope with differentrequests, such as variation of the reference signal, load disturbances which depend on thetransport conditions and parametric disturbances regarding changes in the total mass ofthe vehicle. For this purpose, in the design of the speed controller (external loop a specificmethodology based on extension of the symmetrical optimum method is presented. Thecontrollers are developed using the Modulus–Optimum method for the inner loop, and theExtended Symmetrical Optimum Method, corrected based on the 2p-SO-method, for theouter loop (for a more efficient disturbance rejection.In order to force the behaviour of the system regarding the reference input, a correctionterm is introduced as a non-homogenous structured PI controller solution.Simulations were performed using numerical values taken from a real applicationconsisting in a hybrid vehicle prototype, showing satisfactory behaviour.

  11. An approach to access control in electronic health record.

    Science.gov (United States)

    Sucurovic, Snezana

    2010-08-01

    OASIS is a non-for-profit consortium that drives the development convergence and adoption of open standards for the global information society. It involves more than 600 organizations and individuals as well as IT leaders Sun, Microsoft, IBM and Oracle. One of its standards is XACML which appeared a few years ago and now there are about 150,000 hits on Google. XACML (eXtensible Access Control Markup Language) is not technology related. Sun published in 2004 open source Sun XACML which is in compliance with XACML 1.0. specification and now works to make it comply with XACML 2.0. The heart of XACML are attributes values of defined type and name that is to be attached to a subject, a resource, an action and an environment in which a subject request action on resource. In that way XACML is to replace Role Based Access Control which dominated for years. The paper examines performances in CEN 13 606 and ISO 22 600 based healthcare system which uses XACML for access control.

  12. Authorisation and access control for electronic health record systems.

    Science.gov (United States)

    Blobel, Bernd

    2004-03-31

    Enabling the shared care paradigm, centralised or even decentralised electronic health record (EHR) systems increasingly become core applications in hospital information systems and health networks. For realising multipurpose use and reuse as well as inter-operability at knowledge level, EHR have to meet special architectural requirements. The component-oriented and model-based architecture should meet international standards. Especially in extended health networks realising inter-organisational communication and co-operation, authorisation cannot be organised at user level anymore. Therefore, models, methods and tools must be established to allow formal and structured policy definition, policy agreements, role definition, authorisation and access control. Based on the author's international engagement in EHR architecture and security standards referring to the revision of CEN ENV 13606, the GEHR/open EHR approach, HL7 and CORBA, models for health-specific and EHR-related roles, for authorisation management and access control have been developed. The basic concept is the separation of structural roles defining organisational entity-to-entity relationships and enabling specific acts on the one hand, and functional roles bound to specific activities and realising rights and duties on the other hand. Aggregation of organisational, functional, informational and technological components follows specific rules. Using UML and XML, the principles as well as some examples for analysis, design, implementation and maintenance of policy and authorisation management as well as access control have been practically implemented.

  13. Electric and hybrid vehicles environmental control subsystem study

    Science.gov (United States)

    1981-01-01

    An environmental control subsystem (ECS) in the passenger compartment of electric and hybrid vehicles is studied. Various methods of obtaining the desired temperature control for the battery pack is also studied. The functional requirements of ECS equipment is defined. Following categorization by methodology, technology availability and risk, all viable ECS concepts are evaluated. Each is assessed independently for benefits versus risk, as well as for its feasibility to short, intermediate and long term product development. Selection of the preferred concept is made against these requirements, as well as the study's major goal of providing safe, highly efficient and thermally confortable ECS equipment.

  14. Novel hybrid coatings with controlled wettability by composite nanoparticle aggregation

    Science.gov (United States)

    Hritcu, Doina; Dodi, Gianina; Iordache, Mirabela L.; Draganescu, Dan; Sava, Elena; Popa, Marcel I.

    2016-11-01

    The aim of this study is to evaluate novel hybrid materials as potential candidates for producing coatings with hierarchical roughness and controlled wetting behaviour. Magnetite (Fe3O4) nanoparticles obtained by co-precipitation were embedded in matrices synthesized by radical graft co-polymerization of butyl acrylate (BA), butyl methacrylate (BMA), hexyl acrylate (HA) or styrene (ST) with ethylene glycol di-methacrylate (EGDMA) onto previously modified chitosan bearing surface vinyl groups. The resulting composite particles were characterized regarding their average size, composition and magnetic properties. Hybrid thin films containing suspension of composite particles in ethanol and pre-hydrolysed hexadecyltrimethoxysilane (HDTS) as a coupling/crosslinking agent were deposited by spin coating or spraying. The films were cured by heating and subsequently characterized regarding their morphology (scanning electron microscopy), contact angle with water and adhesion to substrate (scratch test). The structure-property relationship is discussed.

  15. A hybrid joint based controller for an upper extremity exoskeleton

    Science.gov (United States)

    Mohd Khairuddin, Ismail; Taha, Zahari; Majeed, Anwar P. P. Abdul; Hakeem Deboucha, Abdel; Azraai Mohd Razman, Mohd; Aziz Jaafar, Abdul; Mohamed, Zulkifli

    2016-02-01

    This paper presents the modelling and control of a two degree of freedom upper extremity exoskeleton. The Euler-Lagrange formulation was used in deriving the dynamic modelling of both the human upper limb as well as the exoskeleton that consists of the upper arm and the forearm. The human model is based on anthropometrical measurements of the upper limb. The proportional-derivative (PD) computed torque control (CTC) architecture is employed in this study to investigate its efficacy performing joint-space control objectives specifically in rehabilitating the elbow and shoulder joints along the sagittal plane. An active force control (AFC) algorithm is also incorporated into the PD-CTC to investigate the effectiveness of this hybrid system in compensating disturbances. It was found that the AFC- PD-CTC performs well against the disturbances introduced into the system whilst achieving acceptable trajectory tracking as compared to the conventional PD-CTC control architecture.

  16. Optimal Control Policies of Pests for Hybrid Dynamical Systems

    Directory of Open Access Journals (Sweden)

    Baolin Kang

    2013-01-01

    Full Text Available We improve the traditional integrated pest management (IPM control strategies and formulate three specific management strategies, which can be described by hybrid dynamical systems. These strategies can not only effectively control pests but also reduce the abuse of pesticides and protect the natural enemies. The aim of this work is to study how the factors, such as natural enemies optimum choice in the two kinds of different pests, timings of natural enemy releases, dosages and timings of insecticide applications, and instantaneous killing rates of pesticides on both pests and natural enemies, can affect the success of IPM control programmes. The results indicate that the pests outbreak period or frequency largely depends on the optimal selective feeding of the natural enemy between one of the pests and the control tactics. Ultimately, we obtain the only pest needs to be controlled below a certain threshold while not supervising pest .

  17. HYBRID CONTROL OF HYDRAULIC PRESS MACHINE BASED ON ROBUST CONTROL

    Institute of Scientific and Technical Information of China (English)

    FANG Yu; YANG Jian; CHAI Xiaodong

    2008-01-01

    A robust control algorithm is proposed to focus on the non-linearity and variables of the hydraulic press machine with the proportional valve. The proposed robust controller does not need to design stable compensator in advance, which is simple in design and has large scope of uncertainty applications. The feedback gains of the proposed robust controller are small, so it is easily implemented in engineering applications. The theoretical and experimental research on the position and speed control of the hydraulic press machine is carried out. The control requirements of the hydraulic press machine during the working process are met in the position and speed at the same time. Experimental results show that the proposed controller has better robustness subject to load variables and adaptability of parameter variations of the hydraulic press machine with the proportional valve.

  18. Control Valve Trajectories for SOFC Hybrid System Startup

    Energy Technology Data Exchange (ETDEWEB)

    Gorrell, Megan; Banta, Larry; Rosen, William; Restrepo, Bernardo; Tucker, David

    2012-07-01

    Control and management of cathode airflow in a solid oxide fuel cell gas turbine hybrid power system was analyzed using the Hybrid Performance (HyPer) hardware simulation at the National Energy Technology (NETL), U.S. Department of Energy. This work delves into previously unexplored operating practices for HyPer, via simultaneous manipulation of bypass valves and the electric load on the generator. The work is preparatory to the development of a Multi-Input, Multi-Output (MIMO) controller for HyPer. A factorial design of experiments was conducted to acquire data for 81 different combinations of the manipulated variables, which consisted of three air flow control valves and the electric load on the turbine generator. From this data the response surface for the cathode airflow with respect to bypass valve positions was analyzed. Of particular interest is the control of airflow through the cathode during system startup and during large load swings. This paper presents an algorithm for controlling air mass flow through the cathode based on a modification of the steepest ascent method.

  19. OJADEAC: An Ontology Based Access Control Model for JADE Platform

    Directory of Open Access Journals (Sweden)

    Ban Sharief Mustafa

    2014-06-01

    Full Text Available Java Agent Development Framework (JADE is a software framework to make easy the development of Multi-Agent applications in compliance with the Foundation for Intelligent Physical Agents (FIPA specifications. JADE propose new infrastructure solutions to support the development of useful and convenient distributed applications. Security is one of the most important issues in implementing and deploying such applications. JADE-S security add-ons are one of the most popular security solutions in JADE platform. It provides several security services including authentication, authorization, signature and encryption services. Authorization service will give authorities to perform an action based on a set of permission objects attached to every authenticated user. This service has several drawbacks when implemented in a scalable distributed context aware applications. In this paper, an ontology-based access control model called (OJADEAC is proposed to be applied in JADE platform by combining Semantic Web technologies with context-aware policy mechanism to overcome the shortcoming of this service. The access control model is represented by a semantic ontology, and a set of two level semantic rules representing platform and application specific policy rules. OJADEAC model is distributed, intelligent, dynamic, context-aware and use reasoning engine to infer access decisions based on ontology knowledge.

  20. A study of multiple access schemes in satellite control network

    Science.gov (United States)

    Mo, Zijian; Wang, Zhonghai; Xiang, Xingyu; Wang, Gang; Chen, Genshe; Nguyen, Tien; Pham, Khanh; Blasch, Erik

    2016-05-01

    Satellite Control Networks (SCN) have provided launch control for space lift vehicles; tracking, telemetry and commanding (TTC) for on-orbit satellites; and, test support for space experiments since the 1960s. Currently, SCNs encounter a new challenge: how to maintain the high reliability of services when sharing the spectrum with emerging commercial services. To achieve this goal, the capability of multiple satellites reception is deserved as an update/modernization of SCN in the future. In this paper, we conducts an investigation of multiple access techniques in SCN scenario, e.g., frequency division multiple access (FDMA) and coded division multiple access (CDMA). First, we introduce two upgrade options of SCN based on FDMA and CDMA techniques. Correspondingly, we also provide their performance analysis, especially the system improvement in spectrum efficiency and interference mitigation. Finally, to determine the optimum upgrade option, this work uses CRISP, i.e., Cost, Risk, Installation, Supportability and Performance, as the baseline approach for a comprehensive trade study of these two options. Extensive numerical and simulation results are presented to illustrate the theoretical development.

  1. A Hybrid Flight Control for a Simulated Raptor-30 V2 Helicopter

    Directory of Open Access Journals (Sweden)

    Arbab Nighat Khizer

    2015-04-01

    Full Text Available This paper presents a hybrid flight control system for a single rotor simulated Raptor-30 V2 helicopter. Hybrid intelligent control system, combination of the conventional and intelligent control methodologies, is applied to small model helicopter. The proposed hybrid control used PID as a traditional control and fuzzy as an intelligent control so as to take the maximum advantage of advanced control theory. The helicopter?s model used; comes from X-Plane flight simulator and their hybrid flight control system was simulated using MATLAB/SIMULINK in a simulation platform. X-Plane is also used to visualize the performance of this proposed autopilot design. Through a series of numerous experiments, the operation of hybrid control system was investigated. Results verified that the proposed hybrid control has an excellent performance at hovering flight mode.

  2. Multihop Medium Access Control for WSNs: An Energy Analysis Model

    Directory of Open Access Journals (Sweden)

    Haapola Jussi

    2005-01-01

    Full Text Available We present an energy analysis technique applicable to medium access control (MAC and multihop communications. Furthermore, the technique's application gives insight on using multihop forwarding instead of single-hop communications. Using the technique, we perform an energy analysis of carrier-sense-multiple-access (CSMA- based MAC protocols with sleeping schemes. Power constraints set by battery operation raise energy efficiency as the prime factor for wireless sensor networks. A detailed energy expenditure analysis of the physical, the link, and the network layers together can provide a basis for developing new energy-efficient wireless sensor networks. The presented technique provides a set of analytical tools for accomplishing this. With those tools, the energy impact of radio, MAC, and topology parameters on the network can be investigated. From the analysis, we extract key parameters of selected MAC protocols and show that some traditional mechanisms, such as binary exponential backoff, have inherent problems.

  3. Access Control Model for Sharing Composite Electronic Health Records

    Science.gov (United States)

    Jin, Jing; Ahn, Gail-Joon; Covington, Michael J.; Zhang, Xinwen

    The adoption of electronically formatted medical records, so called Electronic Health Records (EHRs), has become extremely important in healthcare systems to enable the exchange of medical information among stakeholders. An EHR generally consists of data with different types and sensitivity degrees which must be selectively shared based on the need-to-know principle. Security mechanisms are required to guarantee that only authorized users have access to specific portions of such critical record for legitimate purposes. In this paper, we propose a novel approach for modelling access control scheme for composite EHRs. Our model formulates the semantics and structural composition of an EHR document, from which we introduce a notion of authorized zones of the composite EHR at different granularity levels, taking into consideration of several important criteria such as data types, intended purposes and information sensitivities.

  4. Optimal Control of Engine Warmup in Hybrid Vehicles

    Directory of Open Access Journals (Sweden)

    van Reeven Vital

    2016-01-01

    Full Text Available An Internal Combustion Engine (ICE under cold conditions experiences increased friction losses due to a high viscosity of the lubricant. With the additional control freedom present in hybrid electric vehicles, the losses during warmup can be minimized and fuel can be saved. In this paper, firstly, a control-oriented model of the ICE, describing the warmup behavior, is developed and validated on measured vehicle data. Secondly, the two-state, non-autonomous fuel optimization, for a parallel hybrid electric vehicle with stop-start functionality, is solved using optimal control theory. The principal behavior of the Lagrange multipliers is explicitly derived, including the discontinuities (jumps that are caused by the constraints on the lubricant temperature and the energy in the battery system. The minimization of the Hamiltonian for this two-state problem is also explicitly solved, resulting in a computationally efficient algorithm. The optimal controller shows the fuel benefit, as a function of the initial temperature, for a long-haul truck simulated on the FTP-75.

  5. Combined Optimal Sizing and Control for a Hybrid Tracked Vehicle

    Directory of Open Access Journals (Sweden)

    Huei Peng

    2012-11-01

    Full Text Available The optimal sizing and control of a hybrid tracked vehicle is presented and solved in this paper. A driving schedule obtained from field tests is used to represent typical tracked vehicle operations. Dynamics of the diesel engine-permanent magnetic AC synchronous generator set, the lithium-ion battery pack, and the power split between them are modeled and validated through experiments. Two coupled optimizations, one for the plant parameters, forming the outer optimization loop and one for the control strategy, forming the inner optimization loop, are used to achieve minimum fuel consumption under the selected driving schedule. The dynamic programming technique is applied to find the optimal controller in the inner loop while the component parameters are optimized iteratively in the outer loop. The results are analyzed, and the relationship between the key parameters is observed to keep the optimal sizing and control simultaneously.

  6. Energy control strategy for parallel hydrostatic transmission hybrid vehicles

    Institute of Scientific and Technical Information of China (English)

    SUN Hui; JIANG Ji-hai; WANG Xin

    2009-01-01

    Aimed at the relatively lower energy density and complicated coordinating operation between two power sources, a special energy control strategy is required to maximize the fuel saving potential. Then a new type of configuration for hydrostatic transmission hybrid vehicles (PHHV) and the selection criterion for impor-tant components are proposed. Based on the optimization of planet gear transmission ratio and the analysis of op-timal energy distribution for the proposed PHHV on a representative urban driving cycle, a fuzzy torque control strategy and a braking energy regeneration strategy are designed and developed to realize the real-time control of energy for the proposed PHHV. Simulation results demonstrate that the energy control strategy effectively im-proves the fuel economy of PHHV.

  7. Hybrid Quantum-Classical Approach to Quantum Optimal Control.

    Science.gov (United States)

    Li, Jun; Yang, Xiaodong; Peng, Xinhua; Sun, Chang-Pu

    2017-04-14

    A central challenge in quantum computing is to identify more computational problems for which utilization of quantum resources can offer significant speedup. Here, we propose a hybrid quantum-classical scheme to tackle the quantum optimal control problem. We show that the most computationally demanding part of gradient-based algorithms, namely, computing the fitness function and its gradient for a control input, can be accomplished by the process of evolution and measurement on a quantum simulator. By posing queries to and receiving answers from the quantum simulator, classical computing devices update the control parameters until an optimal control solution is found. To demonstrate the quantum-classical scheme in experiment, we use a seven-qubit nuclear magnetic resonance system, on which we have succeeded in optimizing state preparation without involving classical computation of the large Hilbert space evolution.

  8. Designing hybrid grass genomes to control runoff generation

    Science.gov (United States)

    MacLeod, C.; Binley, A.; Humphreys, M.; King, I. P.; O'Donovan, S.; Papadopoulos, A.; Turner, L. B.; Watts, C.; Whalley, W. R.; Haygarth, P.

    2010-12-01

    Sustainable management of water in landscapes requires balancing demands of agricultural production whilst moderating downstream effects like flooding. Pasture comprises 69% of global agricultural areas and is essential for producing food and fibre alongside environmental goods and services. Thus there is a need to breed forage grasses that deliver multiple benefits through increased levels of productivity whilst moderating fluxes of water. Here we show that a novel grass hybrid that combines the entire genomes of perennial ryegrass (Lolium perenne - the grass of choice for Europe’s forage agriculture) and meadow fescue (Festuca pratensis) has a significant role in flood prevention. Field plot experiments established differences in runoff generation with the hybrid cultivar reducing runoff by 50% compared to perennial ryegrass cultivar, and by 35% compared to a meadow fescue cultivar (34 events over two years, replicated randomized-block design, statistically significant differences). This important research outcome was the result of a project that combined plant genetics, soil physics and plot scale hydrology to identify novel grass genotypes that can reduce runoff from grassland systems. Through a coordinated series of experiments examining effects from the gene to plot scale, we have identified that the rapid growth and then turnover of roots in the L. perenne x F. pratensis hybrid is likely to be a key mechanism in reducing runoff generation. More broadly this is an exciting first step to realizing the potential to design grass genomes to achieve both food production, and to deliver flood control, a key ecosystem service.

  9. Novel hybrid coatings with controlled wettability by composite nanoparticle aggregation

    Energy Technology Data Exchange (ETDEWEB)

    Hritcu, Doina, E-mail: dhritcu@ch.tuiasi.ro; Dodi, Gianina; Iordache, Mirabela L.; Draganescu, Dan; Sava, Elena; Popa, Marcel I.

    2016-11-30

    Highlights: • Magnetite-grafted chitosan composite nanoparticles were synthesized. • The particles are able to assemble under the influence of a silane derivative. • Thin films containing composites, chitosan and hydrolyzed silane were optimized. • The novel hybrid coatings show hierarchical roughness and high wetting angle. - Abstract: The aim of this study is to evaluate novel hybrid materials as potential candidates for producing coatings with hierarchical roughness and controlled wetting behaviour. Magnetite (Fe{sub 3}O{sub 4}) nanoparticles obtained by co-precipitation were embedded in matrices synthesized by radical graft co-polymerization of butyl acrylate (BA), butyl methacrylate (BMA), hexyl acrylate (HA) or styrene (ST) with ethylene glycol di-methacrylate (EGDMA) onto previously modified chitosan bearing surface vinyl groups. The resulting composite particles were characterized regarding their average size, composition and magnetic properties. Hybrid thin films containing suspension of composite particles in ethanol and pre-hydrolysed hexadecyltrimethoxysilane (HDTS) as a coupling/crosslinking agent were deposited by spin coating or spraying. The films were cured by heating and subsequently characterized regarding their morphology (scanning electron microscopy), contact angle with water and adhesion to substrate (scratch test). The structure-property relationship is discussed.

  10. Path Planning and Trajectory Control of Collaborative Mobile Robots Using Hybrid Control Architecture

    Directory of Open Access Journals (Sweden)

    Trevor Davies

    2008-08-01

    Full Text Available This paper presents the development and implementation a hybrid control architecture to direct a collective of three X80 mobile robots to multiple user-defined waypoints. The Genetic Algorithm Path Planner created an optimized, reduction in the time to complete the task, path plan for each robot in the collective such that each waypoint was visited once without colliding with a priori obstacles. The deliberative Genetic Algorithm Path Planner was then coupled with a reactive Potential Field Trajectory Planner and kinematic based controller to create a hybrid control architecture allowing the mobile robot to navigate between multiple user-defined waypoints, while avoiding a priori obstacles and obstacles detected using the robots' range sensors. The success of this hybrid control architecture was proven through simulation and experimentation using three of Dr. Robot's ™ wireless X80 mobile robots.

  11. Hybrid nanostructured drug carrier with tunable and controlled drug release

    Energy Technology Data Exchange (ETDEWEB)

    Depan, D.; Misra, R.D.K., E-mail: dmisra@louisiana.edu

    2012-08-01

    We describe here a transformative approach to synthesize a hybrid nanostructured drug carrier that exhibits the characteristics of controlled drug release. The synthesis of the nanohybrid architecture involved two steps. The first step involved direct crystallization of biocompatible copolymer along the long axis of the carbon nanotubes (CNTs), followed by the second step of attachment of drug molecule to the polymer via hydrogen bonding. The extraordinary inorganic-organic hybrid architecture exhibited high drug loading ability and is physically stable even under extreme conditions of acidic media and ultrasonic irradiation. The temperature and pH sensitive characteristics of the hybrid drug carrier and high drug loading ability merit its consideration as a promising carrier and utilization of the fundamental aspects used for synthesis of other promising drug carriers. The higher drug release response during the application of ultrasonic frequency is ascribed to a cavitation-type process in which the acoustic bubbles nucleate and collapse releasing the drug. Furthermore, the study underscores the potential of uniquely combining CNTs and biopolymers for drug delivery. - Graphical abstract: Block-copolymer crystallized on carbon nanotubes (CNTs). Nanohybrid drug carrier synthesized by attaching doxorubicin (DOX) to polymer crystallized CNTs. Crystallized polymer on CNTs provide mechanical stability. Triggered release of DOX. Highlights: Black-Right-Pointing-Pointer The novel synthesis of a hybrid nanostructured drug carrier is described. Black-Right-Pointing-Pointer The drug carrier exhibits high drug loading ability and is physically stable. Black-Right-Pointing-Pointer The high drug release is ascribed to a cavitation-type process.

  12. Hybrid model predictive control for speed control of permanent magnet synchronous motor with saturation

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    A discrete-time hybrid model of a permanent magnet synchronous motor (PMSM) with saturation in voltage and current is formulated.The controller design with incorporated constraints is achieved in a systematic way from modeling to control synthesis and implementation.The Hybrid System Description Language is used to obtain a mixed-logical dynamical (MLD) model.Based on the MLD model,a model predictive controller is designed for an optimal speed regulation of the motor.For reducing computation complexity and ...

  13. Evaluation of secure capability-based access control in the M2M local cloud platform

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Prasad, Neeli R.; Prasad, Ramjee

    2016-01-01

    of multiple distributed M2M gateways, creating new challenges in the access control. Some existing access control systems lack in scalability and flexibility to manage access from users or entity that belong to different authorization domains, or fails to provide fine grained and flexible access right...... delegation. Recently, the capability based access control has been considered as method to manage access in the Internet of Things (IoT) or M2M domain. In this paper, the implementation and evaluation of a proposed secure capability based access control in the M2M local cloud platform is presented...

  14. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Abdul Razaque

    2014-03-01

    Full Text Available This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC for wireless sensor networks (WSNs, which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN, which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS, which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS, which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi

  15. Energy-efficient boarder node medium access control protocol for wireless sensor networks.

    Science.gov (United States)

    Razaque, Abdul; Elleithy, Khaled M

    2014-03-12

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi

  16. Electric and hybrid vehicle environmental control subsystem study

    Science.gov (United States)

    Heitner, K. L.

    1980-01-01

    An environmental control subsystem (ECS) in electric and hybrid vehicles is studied. A combination of a combustion heater and gasoline engine (Otto cycle) driven vapor compression air conditioner is selected. The combustion heater, the small gasoline engine, and the vapor compression air conditioner are commercially available. These technologies have good cost and performance characteristics. The cost for this ECS is relatively close to the cost of current ECS's. Its effect on the vehicle's propulsion battery is minimal and the ECS size and weight do not have significant impact on the vehicle's range.

  17. A Substractive Clustering Based Fuzzy Hybrid Reference Control Design for Transient Response Improvement of PID Controller

    Directory of Open Access Journals (Sweden)

    Endra Joelianto

    2009-11-01

    Full Text Available The well known PID controller has inherent limitations in fulfilling simultaneously the conflicting control design objectives. Parameters of the tuned PID controller should trade off the requirement of tracking set-point performances, disturbance rejection and stability robustness. Combination of hybrid reference control (HRC with PID controller results in the transient response performances can be independently achieved without deteriorating the disturbance rejection properties and the stability robustness requirement. This paper proposes a fuzzy based HRC where the membership functions of the fuzzy logic system are obtained by using a substractive clustering technique. The proposed method guarantees the transient response performances satisfaction while preserving the stability robustness of the closed loop system controlled by the PID controller with effective and systematic procedures in designing the fuzzy hybrid reference control system.

  18. Hybrid Active Noise Control using Adjoint LMS Algorithms

    Energy Technology Data Exchange (ETDEWEB)

    Nam, Hyun Do; Hong, Sik Ki [Dankook University (Korea, Republic of)

    1998-07-01

    A multi-channel hybrid active noise control(MCHANC) is derived by combining hybrid active noise control techniques and adjoint LMS algorithms, and this algorithm is applied to an active noise control system in a three dimensional enclosure. A MCHANC system uses feed forward and feedback filters simultaneously to cancel noises in an enclosure. The adjoint LMs algorithm, in which the error is filtered through an adjoint filter of the secondary channel, is also used to reduce the computational burden of adaptive filters. The overall attenuation performance and convergence characteristics of MCHANC algorithm is better than both multiple-channel feed forward algorithms and multiple-channel feedback algorithms. In a large enclosure, the acoustic reverberation can be very long, which means a very high order feed forward filter must be used to cancel the reverberation noises. Strong reverberation noises are generally narrow band and low frequency, which can be effectively predicted and canceled by a feedback adaptive filters. So lower order feed forward filter taps can be used in MCHANC algorithm which combines advantages of fast convergence and small excess mean square error. In this paper, computer simulations and real time implementations is carried out on a TMS320C31 processor to evaluate the performance of the MCHANC systems. (author). 11 refs., 11 figs., 1 tab.

  19. Admission Control and Interference Management in Dynamic Spectrum Access Networks

    Directory of Open Access Journals (Sweden)

    Jorge Martinez-Bauset

    2010-01-01

    Full Text Available We study two important aspects to make dynamic spectrum access work in practice: the admission policy of secondary users (SUs to achieve a certain degree of quality of service and the management of the interference caused by SUs to primary users (PUs. In order to limit the forced termination probability of SUs, we evaluate the Fractional Guard Channel reservation scheme to give priority to spectrum handovers over new arrivals. We show that, contrary to what has been proposed, the throughput of SUs cannot be maximized by configuring the reservation parameter. We also study the interference caused by SUs to PUs. We propose and evaluate different mechanisms to reduce the interference, which are based on simple spectrum access algorithms for both PUs and SUs and channel repacking algorithms for SUs. Numerical results show that the reduction can be of one order of magnitude or more with respect to the random access case. Finally, we propose an adaptive admission control scheme that is able to limit simultaneously the forced termination probability of SUs and what we define as the probability of interference. Our scheme does not require any configuration parameters beyond the probability objectives. Besides, it is simple to implement and it can operate with any arrival process and distribution of the session duration.

  20. Directional Medium Access Control (MAC Protocols in Wireless Ad Hoc and Sensor Networks: A Survey

    Directory of Open Access Journals (Sweden)

    David Tung Chong Wong

    2015-06-01

    Full Text Available This survey paper presents the state-of-the-art directional medium access control (MAC protocols in wireless ad hoc and sensor networks (WAHSNs. The key benefits of directional antennas over omni-directional antennas are longer communication range, less multipath interference, more spatial reuse, more secure communications, higher throughput and reduced latency. However, directional antennas lead to single-/multi-channel directional hidden/exposed terminals, deafness and neighborhood, head-of-line blocking, and MAC-layer capture which need to be overcome. Addressing these problems and benefits for directional antennas to MAC protocols leads to many classes of directional MAC protocols in WAHSNs. These classes of directional MAC protocols presented in this survey paper include single-channel, multi-channel, cooperative and cognitive directional MACs. Single-channel directional MAC protocols can be classified as contention-based or non-contention-based or hybrid-based, while multi-channel directional MAC protocols commonly use a common control channel for control packets/tones and one or more data channels for directional data transmissions. Cooperative directional MAC protocols improve throughput in WAHSNs via directional multi-rate/single-relay/multiple-relay/two frequency channels/polarization, while cognitive directional MAC protocols leverage on conventional directional MAC protocols with new twists to address dynamic spectrum access. All of these directional MAC protocols are the pillars for the design of future directional MAC protocols in WAHSNs.

  1. An Access Control Model of Virtual Machine Security

    Directory of Open Access Journals (Sweden)

    QIN Zhong-yuan

    2013-07-01

    Full Text Available Virtualization technology becomes a hot IT technolo gy with the popu-larity of Cloud Computing. However, new security issues arise with it. Specifically, the resources sharing and data communication in virtual machines are most con cerned. In this paper an access control model is proposed which combines the Chinese Wall a nd BLP model. BLP multi-level security model is introduced with corresponding improvement based on PCW (Prioritized Chinese Wall security model. This model can be used to safely co ntrol the resources and event behaviors in virtual machines. Experimental results show its eff ectiveness and safety.

  2. Privacy and Access Control for IHE-Based Systems

    Science.gov (United States)

    Katt, Basel; Breu, Ruth; Hafner, Micahel; Schabetsberger, Thomas; Mair, Richard; Wozak, Florian

    Electronic Health Record (EHR) is the heart element of any e-health system, which aims at improving the quality and efficiency of healthcare through the use of information and communication technologies. The sensitivity of the data contained in the health record poses a great challenge to security. In this paper we propose a security architecture for EHR systems that are conform with IHE profiles. In this architecture we are tackling the problems of access control and privacy. Furthermore, a prototypical implementation of the proposed model is presented.

  3. Efficient identity management and access control in cloud environment

    Science.gov (United States)

    Gloster, Jonathan

    2013-05-01

    As more enterprises are enticed to move data to a cloud environment to enhance data sharing and reduce operating costs by exploiting shared resources, concerns have risen over the ability to secure information within the cloud. This paper examines how a traditional Identity and Access Control (IDAM) architecture can be adapted to address security concerns of a cloud environment. We propose changing the paradigm of IDAM form a pure trust model to a risk based model will enable information to be protected securely in a cloud environment without impacting efficiencies of cloud environments.

  4. Hybrid control and motion planning of dynamical legged locomotion

    CERN Document Server

    2012-01-01

    "This book provides a comprehensive presentation of issues and challenges faced by researchers and practicing engineers in motion planning and hybrid control of dynamical legged locomotion. The major features range from offline and online motion planning algorithms to generate desired feasible periodic walking and running motions and tow-level control schemes, including within-stride feedback laws, continuous time update laws and event-based update laws, to asymptotically stabilize the generated desired periodic orbits. This book describes the current state of the art and future directions across all domains of dynamical legged locomotion so that readers can extend proposed motion planning algorithms and control methodologies to other types of planar and 3D legged robots".

  5. Hybrid intelligent PID control design for PEMFC anode system

    Institute of Scientific and Technical Information of China (English)

    Rui-min WANG; Ying-ying ZHANG; Guang-yi CAO

    2008-01-01

    Control design is important for proton exchange membrane fuel cell (PEMFC) generator. This work researched the anode system of a 60-kW PEMFC generator. Both anode pressure and humidity must he maintained at ideal levels during steady operation. In view of characteristics and requirements of the system, a hybrid intelligent PID controller is designed specifically based on dynamic simulation. A single neuron PI controller is used for anode humidity by adjusting the water injection to the hydrogen cell. Another incremental PID controller, based on the diagonal recurrent neural network (DRNN) dynamic identification, is used to control anode pressure to be more stable and exact by adjusting the hydrogen flow rate. This control strategy can avoid the coupling problem of the PEMFC and achieve a more adaptive ability. Simulation results showed that the control strategy can maintain both anode humidity and pressure at ideal levels regardless of variable load, nonlinear dynamic and coupling characteristics of the system. This work will give some guides for further control design and applications of the total PEMFC generator.

  6. Multi-Agent System based Event-Triggered Hybrid Controls for High-Security Hybrid Energy Generation Systems

    DEFF Research Database (Denmark)

    Dou, Chun-Xia; Yue, Dong; Guerrero, Josep M.

    2017-01-01

    This paper proposes multi-agent system based event- triggered hybrid controls for guaranteeing energy supply of a hybrid energy generation system with high security. First, a mul-ti-agent system is constituted by an upper-level central coordi-nated control agent combined with several lower...... switching control, distributed dynamic regulation and coordinated switching con-trol are designed fully dependent on the hybrid behaviors of all distributed energy resources and the logical relationships be-tween them, and interact with each other by means of the mul-ti-agent system to form hierarchical......-level unit agents. Each lower-level unit agent is responsible for dealing with internal switching control and distributed dynamic regula-tion for its unit system. The upper-level agent implements coor-dinated switching control to guarantee the power supply of over-all system with high security. The internal...

  7. A full-duplex optical access system with hybrid 64/16/4QAM-OFDM downlink

    Science.gov (United States)

    He, Chao; Tan, Ze-fu; Shao, Yu-feng; Cai, Li; Pu, He-sheng; Zhu, Yun-le; Huang, Si-si; Liu, Yu

    2016-09-01

    A full-duplex optical passive access scheme is proposed and verified by simulation, in which hybrid 64/16/4-quadrature amplitude modulation (64/16/4QAM) orthogonal frequency division multiplexing (OFDM) optical signal is for downstream transmission and non-return-to-zero (NRZ) optical signal is for upstream transmission. In view of the transmitting and receiving process for downlink optical signal, in-phase/quadrature-phase (I/Q) modulation based on Mach-Zehnder modulator (MZM) and homodyne coherent detection technology are employed, respectively. The simulation results show that the bit error ratio ( BER) less than hardware decision forward error correction (HD-FEC) threshold is successfully obtained over transmission path with 20-km-long standard single mode fiber (SSMF) for hybrid downlink modulation OFDM optical signal. In addition, by dividing the system bandwidth into several subchannels consisting of some continuous subcarriers, it is convenient for users to select different channels depending on requirements of communication.

  8. Advent of Biometric Sensors in Field of Access Control

    Directory of Open Access Journals (Sweden)

    Ali Anas

    2015-09-01

    Full Text Available Biometrics is the science of measuring and analyzing biological data. It is used to uniquely identify individuals by their physical characteristics or personal behavior traits.The results from scrutiny of various themes including unimodal, multimodal, physiological, behavioural bio-metrics. Bio-metrics, Physiological and behavioural are compared in the review. The article addresses a particular aspect of utilizing biometrics for authentication, identification and access control. The use of systems like fingerprint, face recognition, hand geometry, Palm print, DNA analysis, iris recognition, retina and odour/scent will be dealt with herewith. This study deals with various applications of this technology, like surveillance, employee identification, device access etc with mentions respective of hardware used. The influence of such features is yet to be documented properly, but it is safe to say that it has been a huge step towards better information security and identification control.Over the course of this text, we will try to bring to light our analysis of the subject and provide an in-depth examination of contemporary and futuristic technologies pertaining to this field.

  9. Modeling, analysis and control of fuel cell hybrid power systems

    Science.gov (United States)

    Suh, Kyung Won

    Transient performance is a key characteristic of fuel cells, that is sometimes more critical than efficiency, due to the importance of accepting unpredictable electric loads. To fulfill the transient requirement in vehicle propulsion and portable fuel cell applications, a fuel cell stack is typically coupled with a battery through a DC/DC converter to form a hybrid power system. Although many power management strategies already exist, they all rely on low level controllers that realize the power split. In this dissertation we design controllers that realize various power split strategies by directly manipulating physical actuators (low level commands). We maintain the causality of the electric dynamics (voltage and current) and investigate how the electric architecture affects the hybridization level and the power management. We first establish the performance limitations associated with a stand-alone and power-autonomous fuel cell system that is not supplemented by an additional energy storage and powers all its auxiliary components by itself. Specifically, we examine the transient performance in fuel cell power delivery as it is limited by the air supplied by a compressor driven by the fuel cell itself. The performance limitations arise from the intrinsic coupling in the fluid and electrical domain between the compressor and the fuel cell stack. Feedforward and feedback control strategies are used to demonstrate these limitations analytically and with simulations. Experimental tests on a small commercial fuel cell auxiliary power unit (APU) confirm the dynamics and the identified limitations. The dynamics associated with the integration of a fuel cell system and a DC/DC converter is then investigated. Decentralized and fully centralized (using linear quadratic techniques) controllers are designed to regulate the power system voltage and to prevent fuel cell oxygen starvation. Regulating these two performance variables is a difficult task and requires a compromise

  10. Spontaneous Emission Control in a Tunable Hybrid Photonic System

    CERN Document Server

    Frimmer, Martin

    2013-01-01

    We experimentally demonstrate control of the rate of spontaneous emission in a tunable hybrid photonic system that consists of two canonical building blocks for spontaneous emission control, an optical antenna and a mirror, each providing a modification of the local density of optical states (LDOS).We couple fluorophores to a plasmonic antenna to create a superemitter with an enhanced decay rate. In a superemitter analog of the seminal Drexhage experiment we probe the LDOS of a nanomechanically approached mirror. Due to the electrodynamic interaction of the antenna with its own mirror image the superemitter traces the inverse LDOS of the mirror, in stark contrast to a bare source, whose decay rate is proportional to the mirror LDOS.

  11. Spontaneous emission control in a tunable hybrid photonic system.

    Science.gov (United States)

    Frimmer, Martin; Koenderink, A Femius

    2013-05-24

    We experimentally demonstrate control of the rate of spontaneous emission in a tunable hybrid photonic system that consists of two canonical building blocks for spontaneous emission control, an optical antenna and a mirror, each providing a modification of the local density of optical states (LDOS). We couple fluorophores to a plasmonic antenna to create a superemitter with an enhanced decay rate. In a superemitter analog of the seminal Drexhage experiment we probe the LDOS of a nanomechanically approached mirror. Because of the electrodynamic interaction of the antenna with its own mirror image, the superemitter traces the inverse of the LDOS enhancement provided by the mirror, in stark contrast to a bare source, whose decay rate is proportional to the mirror LDOS.

  12. Flux-weakening control methods for hybrid excitation synchronous motor

    Directory of Open Access Journals (Sweden)

    Mingming Huang

    2015-09-01

    Full Text Available The hybrid excitation synchronous motor (HESM, which aim at combining the advantages of permanent magnet motor and wound excitation motor, have the characteristics of low-speed high-torque hill climbing and wide speed range. Firstly, a new kind of HESM is presented in the paper, and its structure and mathematical model are illustrated. Then, based on a space voltage vector control, a novel flux-weakening method for speed adjustment in the high speed region is presented. The unique feature of the proposed control method is that the HESM driving system keeps the q-axis back-EMF components invariable during the flux-weakening operation process. Moreover, a copper loss minimization algorithm is adopted to reduce the copper loss of the HESM in the high speed region. Lastly, the proposed method is validated by the simulation and the experimental results.

  13. Wireless Network Control with Privacy Using Hybrid ARQ

    CERN Document Server

    Sarikaya, Yunus; Koksal, Emre C

    2012-01-01

    We consider the problem of resource allocation in a wireless cellular network, in which nodes have both open and private information to be transmitted to the base station over block fading uplink channels. We develop a cross-layer solution, based on hybrid ARQ transmission with incremental redundancy. We provide a scheme that combines power control, flow control, and scheduling in order to maximize a global utility function, subject to the stability of the data queues, an average power constraint, and a constraint on the privacy outage probability. Our scheme is based on the assumption that each node has an estimate of its uplink channel gain at each block, while only the distribution of the cross channel gains is available. We prove that our scheme achieves a utility, arbitrarily close to the maximum achievable utility given the available channel state information.

  14. Design and control of hybrid actuation lower limb exoskeleton

    Directory of Open Access Journals (Sweden)

    Hipolito Aguilar-Sierra

    2015-06-01

    Full Text Available In this article, two types of actuators are applied for a lower limb exoskeleton. They are DC motors with the harmonic drive and the pneumatic artificial muscles. This combination takes advantages of both the harmonic drive and the pneumatic artificial muscle. It provides both high accuracy position control and high ratio of strength and weight. The shortcomings of the two actuators are overcome by the hybrid actuation, for example, low control accuracy and modeling difficult of pneumatic artificial muscle, compactness, and structural flexibility of DC motors. The design and modeling processes are discussed to show the proposed exoskeleton can increase the strength of human lower limbs. Experiments and analysis of the exoskeleton are given to evaluate the effectiveness of the design and modeling.

  15. Fuel optimal control of parallel hybrid electric vehicles

    Institute of Scientific and Technical Information of China (English)

    Jinhuan PU; Chenliang YIN; Jianwu ZHANG

    2008-01-01

    A mathematical model for fuel optimal control and its corresponding dynamic programming (DP) recurs-ive equation were established for an existing parallel hybrid electric vehicle (HEV). Two augmented cost func-tions for gear shifting and engine stop-starting were designed to limit their frequency. To overcome the prob-lem of numerical DP dimensionality, an algorithm to restrict the exploring region was proposed. The algorithm significantly reduced the computational complexity. The system model was converted into real-time simulation code by using MATLAB/RTW to improve computation efficiency. Comparison between the results of a chassis dynamometer test, simulation, and DP proves that the proposed method can compute the performance limita-tion of the HEV within an acceptable time period and can be used to evaluate and optimize the control strategy.

  16. Stability of multiple access network control schemes with carrier sensing and exponential backoff

    Science.gov (United States)

    Barany, Ernest; Krupa, Maciej

    2006-05-01

    A new approach to determine the stability of multiple access network control schemes is presented. A “busy” network (the precise meaning of the term “busy” will be presented in the text) is modelled as a switched single-server hybrid dynamical system whose switching laws are stochastic and are based on typical multiple access network control protocols such as ALOHA and ethernet. The techniques are used to compute the critical ratio of traffic production per network node to total available bandwidth that ensures that data packets will not accumulate unboundedly in waiting queues at each node. This is a measure of stability of the network and is an emergent, global, property determined by decentralized, autonomous behavior of each node. The behavior of each individual node is regarded as “microscopic” and the collective behavior of the network as a whole are emergent consequences of such microscopic laws. The results follow from the stationary distribution property of ergodic Markov chains.

  17. Biomimetic Hybrid Feedback Feedforward Neural-Network Learning Control.

    Science.gov (United States)

    Pan, Yongping; Yu, Haoyong

    2017-06-01

    This brief presents a biomimetic hybrid feedback feedforward neural-network learning control (NNLC) strategy inspired by the human motor learning control mechanism for a class of uncertain nonlinear systems. The control structure includes a proportional-derivative controller acting as a feedback servo machine and a radial-basis-function (RBF) NN acting as a feedforward predictive machine. Under the sufficient constraints on control parameters, the closed-loop system achieves semiglobal practical exponential stability, such that an accurate NN approximation is guaranteed in a local region along recurrent reference trajectories. Compared with the existing NNLC methods, the novelties of the proposed method include: 1) the implementation of an adaptive NN control to guarantee plant states being recurrent is not needed, since recurrent reference signals rather than plant states are utilized as NN inputs, which greatly simplifies the analysis and synthesis of the NNLC and 2) the domain of NN approximation can be determined a priori by the given reference signals, which leads to an easy construction of the RBF-NNs. Simulation results have verified the effectiveness of this approach.

  18. Mercury Control With The Advanced Hybrid Paticulate Collector

    Energy Technology Data Exchange (ETDEWEB)

    Stanley J. Miller; Ye Zhuang; Jay Almlie

    2004-09-30

    This project was awarded under U.S. Department of Energy (DOE) National Energy Technology Laboratory (NETL) Program Solicitation DE-PS26-00NT40769 and specifically addresses Technical Topical Area 4 - Testing Novel and Less Mature Control Technologies on Actual Flue Gas at the Pilot Scale. The project team included the Energy & Environmental Research Center (EERC) as the main contractor; W.L. Gore & Associates, Inc., as a technical and financial partner; and the Big Stone Plant operated by Otter Tail Power Company, host for the field-testing portion of the research. Since 1995, DOE has supported development of a new concept in particulate control called the advanced hybrid particulate collector (AHPC). The AHPC has been licensed to W.L. Gore and Associates, Inc., and is marketed as the Advanced Hybrid{trademark} filter by Gore. The AHPC combines the best features of electrostatic precipitators (ESPs) and baghouses in a unique configuration, providing major synergism between the two collection methods, both in the particulate collection step and in the transfer of dust to the hopper. The AHPC provides ultrahigh collection efficiency, overcoming the problem of excessive fine-particle emissions with conventional ESPs, and it solves the problem of reentrainment and re-collection of dust in conventional baghouses. The AHPC also appears to have unique advantages for mercury control over baghouses or ESPs as an excellent gas-solid contactor. The objective of the original 5-task project was to demonstrate 90% total mercury control in the AHPC at a lower cost than current mercury control estimates. The approach included bench-scale batch tests, larger-scale pilot testing with real flue gas on a coal-fired combustion system, and field demonstration at the 2.5-MW scale at a utility power plant to prove scale-up and demonstrate longer-term mercury control. The scope of work was modified to include an additional sixth task, initiated in April 2003. The objective of this task

  19. Autonomous Navigation Motion Control of Mobile Robots using Hybrid System Control Method

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Y.M. [Samsung Electronics Co., Ltd., Seoul (Korea); Lim, M.S. [Kyonggi Institute of Technology, Shihung (Korea); Lim, J.H. [Hanyang University, Seoul (Korea)

    2002-05-01

    This paper presents a framework of hybrid dynamic control systems for the motion control of wheeled mobile robot systems with nonholonomic constraints. The hybrid control system has the 3-layered hierarchical structure: digital automata for the higher process, mobile robot system for the lower process, and the interface as the interaction process between the continuous dynamics and the discrete dynamics. In the hybrid control architecture of mobile robot, the continuous dynamics of mobile robots are modeled by the switched systems. The abstract model and digital automata for the motion control are developed. In high level, the discrete states are defined by using the sensor-based search windows and the reference motions of a mobile robot in low level are specified in the abstracted motions. The mobile robots can perform both the motion planning and autonomous maneuvering with obstacle avoidance in indoor navigation problem. Simulation and experimental results show that hybrid system approach is an effective method for the autonomous maneuvering in indoor environments. (author). 13 refs., 13 figs., 1 tab.

  20. 78 FR 51810 - Twenty-Fourth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-08-21

    ... Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control... RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held...

  1. 76 FR 50811 - Eighth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2011-08-16

    ... Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access Control...

  2. 77 FR 25525 - Thirteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems.

    Science.gov (United States)

    2012-04-30

    ... Access Control Systems. AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems... Committee 224, Airport Security Access Control Systems DATES: The meeting will be held May 30, 2012, from...

  3. A Hybrid-Streaming Method for Cloud Gaming: To Improve the Graphics Quality delivered on Highly Accessible Game Contents

    Directory of Open Access Journals (Sweden)

    Kar Long Chan

    2017-06-01

    Full Text Available The emerging Cloud Gaming Service provides a highly accessible video gaming experience. With Cloud Gaming, potential players without enough local resource can access high-quality gaming using low-spec devices. With advancing technology, we consider that if the processing power at low-spec devices can be well harvested, the quality delivered on Cloud Gaming can be further improved. Therefore, we propose a Hybrid-Streaming System that aimed at improving the graphic quality delivered by Cloud Gaming. By utilizing the available rendering power from both the Cloud Server and client PC, the system distributes rendering operations to both sides to achieve the desired improvement. Quantitative results show the proposed method improves graphics quality, as well as reducing the server’s workload while attaining acceptable network bandwidth consumption levels.

  4. Hybrid internal model control and proportional control of chaotic dynamical systems

    Institute of Scientific and Technical Information of China (English)

    齐冬莲; 姚良宾

    2004-01-01

    A new chaos control method is proposed to take advantage of chaos or avoid it. The hybrid Internal Model Control and Proportional Control learning scheme are introduced. In order to gain the desired robust performance and ensure the system's stability, Adaptive Momentum Algorithms are also developed. Through properly designing the neural network plant model and neural network controller, the chaotic dynamical systems are controlled while the parameters of the BP neural network are modified. Taking the Lorenz chaotic system as example, the results show that chaotic dynamical systems can be stabilized at the desired orbits by this control strategy.

  5. Hybrid internal model control and proportional control of chaotic dynamical systems.

    Science.gov (United States)

    Qi, Dong-lian; Yao, Liang-bin

    2004-01-01

    A new chaos control method is proposed to take advantage of chaos or avoid it. The hybrid Internal Model Control and Proportional Control learning scheme are introduced. In order to gain the desired robust performance and ensure the system's stability, Adaptive Momentum Algorithms are also developed. Through properly designing the neural network plant model and neural network controller, the chaotic dynamical systems are controlled while the parameters of the BP neural network are modified. Taking the Lorenz chaotic system as example, the results show that chaotic dynamical systems can be stabilized at the desired orbits by this control strategy.

  6. MERCURY CONTROL WITH THE ADVANCED HYBRID PARTICULATE COLLECTOR

    Energy Technology Data Exchange (ETDEWEB)

    Ye Zhuang; Stanley J. Miller; Steven A. Benson; Michelle R. Olderbak

    2003-08-01

    This project was awarded under U.S. Department of Energy (DOE) National Energy Technology Laboratory (NETL) Program Solicitation DE-PS26-00NT40769 and specifically addresses Technical Topical Area 4-Testing Novel and Less Mature Control Technologies on Actual Flue Gas at the Pilot Scale. The project team includes the Energy & Environmental Research Center (EERC) as the main contractor; W.L. Gore & Associates, Inc., as a technical and financial partner; and the Big Stone Plant operated by Otter Tail Power Company, host for the field-testing portion of the research. Since 1995, DOE has supported development of a new concept in particulate control called the advanced hybrid particulate collector (AHPC). The AHPC has been licensed to W.L. Gore & Associates, Inc., and is now marketed as the ''Advanced Hybrid''{trademark} filter by Gore. The AHPC combines the best features of electrostatic precipitators (ESPs) and baghouses in a unique configuration, providing major synergism between the two collection methods, both in the particulate collection step and in the transfer of dust to the hopper. The AHPC provides ultra-high collection efficiency, overcoming the problem of excessive fine-particle emissions with conventional ESPs, and it solves the problem of reentrainment and re-collection of dust in conventional baghouses. The AHPC appears to have unique advantages for mercury control over baghouses or ESPs as an excellent gas-solid contactor. The objective of the three-task project is to demonstrate 90% total mercury control in the AHPC at a lower cost than current mercury control estimates. The approach includes bench-scale batch testing that ties the new work to previous results and links results with larger-scale pilot testing with real flue gas on a coal-fired combustion system, pilot-scale testing on a coal-fired combustion system with both a pulse-jet baghouse and an AHPC to prove or disprove the research hypotheses, and field demonstration pilot

  7. Hybrid control of bifurcation and chaos in stroboscopic model of Internet congestion control system

    Institute of Scientific and Technical Information of China (English)

    Ding Da-Wei; Zhu Jie; Luo Xiao-Shu

    2008-01-01

    Interaction between transmission control protocol (TCP) and random early detection (RED) gateway in the Internet congestion control system has been modelled as a discrete-time dynamic system which exhibits complex bifurcating and chaotic behaviours.In this paper,a hybrid control strategy using both state feedback and parameter perturbation is employed to control the bifurcation and stabilize the chaotic orbits embedded in this discrete-time dynamic system of TCP/RED.Theoretical analysis and numerical simulations show that the bifurcation is delayed and the chaotic orbits are stabilized to a fixed point,which reliably achieves a stable average queue size in an extended range of parameters and even completely eliminates the chaotic behaviour in a particular range of parameters.Therefore it is possible to decrease the sensitivity of RED to parameters.By using the hybrid strategy,we may improve the stability and performance of TCP/RED congestion control system significantly.

  8. Task-role-based Access Control Model in Smart Health-care System

    Directory of Open Access Journals (Sweden)

    Wang Peng

    2015-01-01

    Full Text Available As the development of computer science and smart health-care technology, there is a trend for patients to enjoy medical care at home. Taking enormous users in the Smart Health-care System into consideration, access control is an important issue. Traditional access control models, discretionary access control, mandatory access control, and role-based access control, do not properly reflect the characteristics of Smart Health-care System. This paper proposes an advanced access control model for the medical health-care environment, task-role-based access control model, which overcomes the disadvantages of traditional access control models. The task-role-based access control (T-RBAC model introduces a task concept, dividing tasks into four categories. It also supports supervision role hierarchy. T-RBAC is a proper access control model for Smart Health-care System, and it improves the management of access rights. This paper also proposes an implementation of T-RBAC, a binary two-key-lock pair access control scheme using prime factorization.

  9. A Novel Hybrid Safety-control Strategy for a Manipulator

    Directory of Open Access Journals (Sweden)

    Jing Xia

    2014-04-01

    Full Text Available As robots tend to work cooperatively with humans in shared workplaces, safety as regards robot- human interactions has caused a great deal of concern in the robot community, and control strategies have become a hot topic in robotics research. In order to guarantee the robot’s safety and continuous motions, this paper proposes a novel safety-control strategy, which is strictly conservative and which consists of a pre-contact and post-contact safety strategy. We adopt an optimal motion trajectory-planning method, by use of which the jerk, acceleration and velocity of the robot’s motion can be limited and a time-optimal motion can be obtained as a post-contact safety strategy for a position-controlled manipulator. The optimal motion trajectory planning not only reduces the impact forces during the collision period, but also maintains the efficiency of the manipulator and preserves continuous motions. Next, we describe a novel collision detection method as a pre-contact safety strategy to avoid collisions. The method proposed here can compute security warning region to handle the effect of robot motion on collision detection and detect collisions between non-convex polygon soups. Finally, the control strategy is implemented for a 7-DOF humanoid manipulator and the experimental results demonstrate the validity of this novel hybrid safety-control strategy.

  10. Hierarchical modeling and control of hybrid systems with two layers; Hierarchische Modellierung und Regelung hybrider Systeme auf zwei Ebenen

    Energy Technology Data Exchange (ETDEWEB)

    Stursberg, Olaf; Paschedag, Tina; Rungger, Matthias; Ding, Hao [Kassel Univ. (Germany). Fachgebiet Regelungs- und Systemtheorie

    2010-08-15

    While hybrid dynamic models are, to a certain degree, established for modeling systems with heterogeneous dynamics, most approaches for design and analysis of hybrid systems are restricted to monolithic models without hierarchy. This contribution first shows, how modular hybrid systems with two layers of decision, as appropriate for representing manufacturing systems for example, can be modeled systematically. The second part proposes a technique for fixing discrete inputs (for coordinating control) and continuous inputs (for embedded continuous controllers) in combination. The method uses a graph-based search on the upper decision layer, while principles of predictive control are used on the lower layer. The procedure of modeling and control is illustrated for a manufacturing process. (orig.)

  11. Control-relevant modeling and simulation of a SOFC-GT hybrid system

    Directory of Open Access Journals (Sweden)

    Rambabu Kandepu

    2006-07-01

    Full Text Available In this paper, control-relevant models of the most important components in a SOFC-GT hybrid system are described. Dynamic simulations are performed on the overall hybrid system. The model is used to develop a simple control structure, but the simulations show that more elaborate control is needed.

  12. Synthesis from Design Requirements of a Hybrid System for Transport Aircraft Longitudinal Control. Volume 1

    Science.gov (United States)

    Hynes, Charles S.; Hardy, Gordon H.; Sherry, Lance

    2007-01-01

    Volume I of this report presents a new method for synthesizing hybrid systems directly from design requirements, and applies the method to design of a hybrid system for longitudinal control of transport aircraft. The resulting system satisfies general requirement for safety and effectiveness specified a priori, enabling formal validation to be achieved. Volume II contains seven appendices intended to make the report accessible to readers with backgrounds in human factors, fli ght dynamics and control. and formal logic. Major design goals are (1) system desi g n integrity based on proof of correctness at the design level, (2), significant simplification and cost reduction in system development and certification, and (3) improved operational efficiency, with significant alleviation of human-factors problems encountered by pilots in current transport aircraft. This report provides for the first time a firm technical basis for criteria governing design and certification of avionic systems for transport aircraft. It should be of primary interest to designers of next-generation avionic systems.

  13. Adaptive Media Access Control for Energy Harvesting - Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Dragoni, Nicola

    2012-01-01

    ODMAC (On-Demand Media Access Control) is a recently proposed MAC protocol designed to support individual duty cycles for Energy Harvesting — Wireless Sensor Networks (EH-WSNs). Individual duty cycles are vital for EH-WSNs, because they allow nodes to adapt their energy consumption to the ever......-changing environmental energy sources. In this paper, we present an improved and extended version of ODMAC and we analyze it by means of an analytical model that can approximate several performance metrics in an arbitrary network topology. The simulations and the analytical experiments show ODMAC's ability to satisfy...... three key properties of EH-WSNs: adaptability of energy consumption, distributed energy-aware load balancing and support for different application-specific requirements....

  14. Access Control in Decentralised Publish/Subscribe Systems

    Directory of Open Access Journals (Sweden)

    Lauri I.W. Pesonen

    2007-04-01

    Full Text Available Publish/subscribe has emerged as an attractive communication paradigm for building Internet-wide distributed systems by decoupling message senders from receivers. Large scale publish/subscribe systems are likely to employ components of the event transport network owned by cooperating, but independent organisations. As the number of participants in the network increases, security becomes an increasing concern. So far most of the research on publish/subscribe has focused on efficient event routing, event filtering, and composite event detection. Very little research has been published regarding securing publish/subscribe systems. This paper extends our previous work to present and evaluate a secure multi-domain publish/subscribe infrastructure that supports and enforces fine-grained access control over the individual attributes of event types.

  15. Database Security System for Applying Sophisticated Access Control via Database Firewall Server

    OpenAIRE

    Eun-Ae Cho; Chang-Joo Moon; Dae-Ha Park; Kang-Bin Yim

    2014-01-01

    Database security, privacy, access control, database firewall, data break masking Recently, information leakage incidents have occurred due to database security vulnerabilities. The administrators in the traditional database access control methods grant simple permissions to users for accessing database objects. Even though they tried to apply more strict permissions in recent database systems, it was difficult to properly adopt sophisticated access control policies to commercial databases...

  16. Hybrid Terrestrial-Satellite DVB/IP Infrastructure in Overlay Constellations for Triple-Play Services Access in Rural Areas

    Directory of Open Access Journals (Sweden)

    E. Pallis

    2010-01-01

    Full Text Available This paper discusses the convergence of digital broadcasting and Internet technologies, by elaborating on the design, implementation, and performance evaluation of a hybrid terrestrial/satellite networking infrastructure, enabling triple-play services access in rural areas. At local/district level, the paper proposes the exploitation of DVB-T platforms in regenerative configurations for creating terrestrial DVB/IP backhaul between the core backbone (in urban areas and a number of intermediate communication nodes distributed within the DVB-T broadcasting footprint (in rural areas. In this way, triple play services that are available at the core backbone, are transferred via the regenerative DVB-T/IP backhaul to the entire district and can be accessed by rural users via the corresponding intermediate node. On the other hand, at regional/national level, the paper proposes the exploitation of a satellite interactive digital video broadcasting platform (DVB S2/RCS as an overlay network that interconnects the regenerative DVB-T/IP platforms, as well as individual users, and services providers, to each other. Performance of the proposed hybrid terrestrial/satellite networking environment is validated through experimental tests that were conducted under real transmission/reception conditions (for the terrestrial segment and via simulation experiments (for the satellite segment at a prototype network infrastructure.

  17. Hybrid Wall Construction and Quality Control Issues in Wyandotte, Michigan

    Energy Technology Data Exchange (ETDEWEB)

    Lukachko, A. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Grin, A. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Bergey, D. [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2013-12-01

    This report is the second report on the Wyandotte NSP2 project in Wyandotte, MI and documents refinements to the design, construction, and quality control for the High R-value enclosure. The report will be of interest to designers and builders of production housing in Cold Climates. The focus of the second round of research was on using the hybrid insulation approach to develop a reliable methodof achieving consistently low airtightness numbers. There are two primary outcomes from this research. First, the airtightness measurements demonstrate that with a shallow learning curve, even new builders entering the program having little experience with the technology package are able to achieve consistent results that are less than 1.5 ACH50. Second, the process changes implemented to helpsecure these results were straightforward and ended up encouraging better communication between designer, builder, and the City officials supervising the project.

  18. Hybrid Wall Construction and Quality Control Issues in Wyandotte, Michigan

    Energy Technology Data Exchange (ETDEWEB)

    Lukachko, A. [Building Science Corporation, Somerville, MA (United States); Grin, A. [Building Science Corporation, Somerville, MA (United States); Bergey, D. [Building Science Corporation, Somerville, MA (United States)

    2013-12-01

    This report is the second report on the Wyandotte Neighborhood Stabilization Program 2 project in Wyandotte, MI, and documents refinements to the design, construction, and quality control for the high R-value enclosure. The report will be of interest to designers and builders of production housing in Cold Climates. The focus of the second round of research was on using the hybrid insulation approach to develop a reliable method of achieving consistently low airtightness numbers. There are two primary outcomes from this research. First, the airtightness measurements demonstrate that with a shallow learning curve, even new builders entering the program having little experience with the technology package are able to achieve consistent results that are less than 1.5 ACH50. Second, the process changes implemented to help secure these results were straightforward and ended up encouraging better communication between designer, builder, and the city officials supervising the project.

  19. Hybrid Polyaniline Systems under Chiral and Redox Control

    Institute of Scientific and Technical Information of China (English)

    Toshikazu Hirao; Toshiyuki Moriuchi; Xiuliang Shen; Kenji Morita

    2005-01-01

    @@ 1Introduction Polyanilines are one of the promising electrically conducting π-conjugated polymers with chemical stability. In recent year, there has been increased interest in chiral induction of polyanilines because of their potential use in diverse areas. Chiral polyaniline has been reported to be formed only by the chiral acid dopant[1]. In our previous papers, complexation of polyanilines or their oligomers with transition metals modulates the redox properties of the quinonediimine unit, which is related to the catalytic function in the oxidation reaction[2].The controlled complexation with palladium(Ⅱ) compounds has been achieved to afford the cross-linked network conjugated complexes, in which the quinonediimine moieties serve as bridging coordination sites[3].Another hybrid system consisting of π-conjugated polymer and transition metal is also described.

  20. Safety systems and access control in the National Ignition Facility.

    Science.gov (United States)

    Reed, Robert K; Bell, Jayce C

    2013-06-01

    The National Ignition Facility (NIF) is the world's largest and most energetic laser system. The facility has the potential to generate ionizing radiation due to the interaction between the laser beams and target material, with neutrons and gamma rays being produced during deuterium-tritium fusion reactions. To perform these experiments, several types of hazards must be mitigated and controlled to ensure personnel safety. NIF uses a real-time safety system to monitor and mitigate the hazards presented by the facility. The NIF facility Safety Interlock System (SIS) monitors for oxygen deficiency and controls access to the facility preventing exposure to laser light and radiation from the Radiation Generating Devices. It also interfaces to radiation monitoring and other radiological monitoring and alarm systems. The SIS controls permissives to the hazard-generating equipment and annunciates hazard levels in the facility. To do this reliably and safely, the SIS has been designed as a fail-safe system with a proven performance record now spanning over 10 y. This paper discusses the SIS, its design, implementation, operator interfaces, validation/verification, and the hazard mitigation approaches employed in the NIF. A brief discussion of the Failure Modes and Effect Analysis supporting the SIS will also be presented. The paper ends with a general discussion of SIS do's and don'ts and common design flaws that should be avoided in SIS design.

  1. New Intelligent Transmission Concept for Hybrid Mobile Robot Speed Control

    Directory of Open Access Journals (Sweden)

    Nazim Mir-Nasiri

    2005-09-01

    Full Text Available This paper presents a new concept of a mobile robot speed control by using two degree of freedom gear transmission. The developed intelligent speed controller utilizes a gear box which comprises of epicyclic gear train with two inputs, one coupled with the engine shaft and another with the shaft of a variable speed dc motor. The net output speed is a combination of the two input speeds and is governed by the transmission ratio of the planetary gear train. This new approach eliminates the use of a torque converter which is otherwise an indispensable part of all available automatic transmissions, thereby reducing the power loss that occurs in the box during the fluid coupling. By gradually varying the speed of the dc motor a stepless transmission has been achieved. The other advantages of the developed controller are pulling over and reversing the vehicle, implemented by intelligent mixing of the dc motor and engine speeds. This approach eliminates traditional braking system in entire vehicle design. The use of two power sources, IC engine and battery driven DC motor, utilizes the modern idea of hybrid vehicles. The new mobile robot speed controller is capable of driving the vehicle even in extreme case of IC engine failure, for example, due to gas depletion.

  2. New Intelligent Transmission Concept for Hybrid Mobile Robot Speed Control

    Directory of Open Access Journals (Sweden)

    Nazim Mir-Nasiri

    2008-11-01

    Full Text Available This paper presents a new concept of a mobile robot speed control by using two degree of freedom gear transmission. The developed intelligent speed controller utilizes a gear box which comprises of epicyclic gear train with two inputs, one coupled with the engine shaft and another with the shaft of a variable speed dc motor. The net output speed is a combination of the two input speeds and is governed by the transmission ratio of the planetary gear train. This new approach eliminates the use of a torque converter which is otherwise an indispensable part of all available automatic transmissions, thereby reducing the power loss that occurs in the box during the fluid coupling. By gradually varying the speed of the dc motor a stepless transmission has been achieved. The other advantages of the developed controller are pulling over and reversing the vehicle, implemented by intelligent mixing of the dc motor and engine speeds. This approach eliminates traditional braking system in entire vehicle design. The use of two power sources, IC engine and battery driven DC motor, utilizes the modern idea of hybrid vehicles. The new mobile robot speed controller is capable of driving the vehicle even in extreme case of IC engine failure, for example, due to gas depletion..

  3. A Novel Hybrid Statistical Particle Swarm Optimization for Multimodal Functions and Frequency Control of Hybrid Wind-Solar System

    Science.gov (United States)

    Verma, Harish Kumar; Jain, Cheshta

    2016-09-01

    In this article, a hybrid algorithm of particle swarm optimization (PSO) with statistical parameter (HSPSO) is proposed. Basic PSO for shifted multimodal problems have low searching precision due to falling into a number of local minima. The proposed approach uses statistical characteristics to update the velocity of the particle to avoid local minima and help particles to search global optimum with improved convergence. The performance of the newly developed algorithm is verified using various standard multimodal, multivariable, shifted hybrid composition benchmark problems. Further, the comparative analysis of HSPSO with variants of PSO is tested to control frequency of hybrid renewable energy system which comprises solar system, wind system, diesel generator, aqua electrolyzer and ultra capacitor. A significant improvement in convergence characteristic of HSPSO algorithm over other variants of PSO is observed in solving benchmark optimization and renewable hybrid system problems.

  4. A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems.

    Science.gov (United States)

    Choi, Donghee; Kim, Dohoon; Park, Seog

    2015-01-01

    Since the access control environment has changed and the threat of insider information leakage has come to the fore, studies on risk-based access control models that decide access permissions dynamically have been conducted vigorously. Medical information systems should protect sensitive data such as medical information from insider threat and enable dynamic access control depending on the context such as life-threatening emergencies. In this paper, we suggest an approach and framework for context sensitive risk-based access control suitable for medical information systems. This approach categorizes context information, estimating and applying risk through context- and treatment-based permission profiling and specifications by expanding the eXtensible Access Control Markup Language (XACML) to apply risk. The proposed framework supports quick responses to medical situations and prevents unnecessary insider data access through dynamic access authorization decisions in accordance with the severity of the context and treatment.

  5. A Brief Survey of Media Access Control, Data Link Layer, and Protocol Technologies for Lunar Surface Communications

    Science.gov (United States)

    Wallett, Thomas M.

    2009-01-01

    This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptual systems utilizing phased-array technology that will evolve in the next decade. Time Domain Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are standard Media Access Control (MAC) techniques that can be incorporated into lunar surface communications architectures. Another novel hybrid technique that is recently being developed for use with smart antenna technology combines the advantages of CDMA with those of TDMA. The relatively new and sundry wireless LAN data link layer protocols that are continually under development offer distinct advantages for lunar surface applications over the legacy protocols which are not wireless. Also several communication transport and routing protocols can be chosen with characteristics commensurate with smart antenna systems to provide spacecraft communications for links exhibiting high capacity on the surface of the Moon. The proper choices depend on the specific communication requirements.

  6. 78 FR 31627 - Twenty-Second Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-05-24

    ...: RTCA Special Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation... 224, Airport Security Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty-second meeting of the RTCA Special Committee 224, Airport Security Access...

  7. 76 FR 9632 - Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2011-02-18

    ... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this... Access Control Systems (Update to DO-230B): Agenda March 10, 2011 Welcome/Introductions/Administrative... Federal Aviation Administration Fifth Meeting: RTCA Special Committee 224: Airport Security Access...

  8. Hybrid Approach to State Estimation for Bioprocess Control

    Directory of Open Access Journals (Sweden)

    Rimvydas Simutis

    2017-03-01

    Full Text Available An improved state estimation technique for bioprocess control applications is proposed where a hybrid version of the Unscented Kalman Filter (UKF is employed. The underlying dynamic system model is formulated as a conventional system of ordinary differential equations based on the mass balances of the state variables biomass, substrate, and product, while the observation model, describing the less established relationship between the state variables and the measurement quantities, is formulated in a data driven way. The latter is formulated by means of a support vector regression (SVR model. The UKF is applied to a recombinant therapeutic protein production process using Escherichia coli bacteria. Additionally, the state vector was extended by the specific biomass growth rate µ in order to allow for the estimation of this key variable which is crucial for the implementation of innovative control algorithms in recombinant therapeutic protein production processes. The state estimates depict a sufficiently low noise level which goes perfectly with different advanced bioprocess control applications.

  9. Hybrid Approach to State Estimation for Bioprocess Control

    Directory of Open Access Journals (Sweden)

    Rimvydas Simutis

    2017-03-01

    Full Text Available An improved state estimation technique for bioprocess control applications is proposed where a hybrid version of the Unscented Kalman Filter (UKF is employed. The underlying dynamic system model is formulated as a conventional system of ordinary differential equations based on the mass balances of the state variables biomass, substrate, and product, while the observation model, describing the less established relationship between the state variables and the measurement quantities, is formulated in a data driven way. The latter is formulated by means of a support vector regression (SVR model. The UKF is applied to a recombinant therapeutic protein production process using Escherichia coli bacteria. Additionally, the state vector was extended by the specific biomass growth rate µ in order to allow for the estimation of this key variable which is crucial for the implementation of innovative control algorithms in recombinant therapeutic protein production processes. The state estimates depict a sufficiently low noise level which goes perfectly with different advanced bioprocess control applications.

  10. Hybrid Scheduling/Signal-Level Coordination in the Downlink of Multi-Cloud Radio-Access Networks

    KAUST Repository

    Douik, Ahmed

    2016-03-28

    In the context of resource allocation in cloud- radio access networks, recent studies assume either signal-level or scheduling-level coordination. This paper, instead, considers a hybrid level of coordination for the scheduling problem in the downlink of a multi-cloud radio- access network, so as to benefit from both scheduling policies. Consider a multi-cloud radio access network, where each cloud is connected to several base-stations (BSs) via high capacity links, and therefore allows joint signal processing between them. Across the multiple clouds, however, only scheduling-level coordination is permitted, as it requires a lower level of backhaul communication. The frame structure of every BS is composed of various time/frequency blocks, called power- zones (PZs), and kept at fixed power level. The paper addresses the problem of maximizing a network-wide utility by associating users to clouds and scheduling them to the PZs, under the practical constraints that each user is scheduled, at most, to a single cloud, but possibly to many BSs within the cloud, and can be served by one or more distinct PZs within the BSs\\' frame. The paper solves the problem using graph theory techniques by constructing the conflict graph. The scheduling problem is, then, shown to be equivalent to a maximum- weight independent set problem in the constructed graph, in which each vertex symbolizes an association of cloud, user, BS and PZ, with a weight representing the utility of that association. Simulation results suggest that the proposed hybrid scheduling strategy provides appreciable gain as compared to the scheduling-level coordinated networks, with a negligible degradation to signal-level coordination.

  11. Active sway control of a gantry crane using hybrid input shaping and PID control schemes

    Science.gov (United States)

    Mohd Tumari, M. Z.; Shabudin, L.; Zawawi, M. A.; Shah, L. H. Ahmad

    2013-12-01

    This project presents investigations into the development of hybrid input-shaping and PID control schemes for active sway control of a gantry crane system. The application of positive input shaping involves a technique that can reduce the sway by creating a common signal that cancels its own vibration and used as a feed-forward control which is for controlling the sway angle of the pendulum, while the proportional integral derivative (PID) controller is used as a feedback control which is for controlling the crane position. The PID controller was tuned using Ziegler-Nichols method to get the best performance of the system. The hybrid input-shaping and PID control schemes guarantee a fast input tracking capability, precise payload positioning and very minimal sway motion. The modeling of gantry crane is used to simulate the system using MATLAB/SIMULINK software. The results of the response with the controllers are presented in time domains and frequency domains. The performances of control schemes are examined in terms of level of input tracking capability, sway angle reduction and time response specification.

  12. Spacecraft Hybrid (Mixed-Actuator) Attitude Control Experiences on NASA Science Missions

    Science.gov (United States)

    Dennehy, Cornelius J.

    2014-01-01

    There is a heightened interest within NASA for the design, development, and flight implementation of mixed-actuator hybrid attitude control systems for science spacecraft that have less than three functional reaction wheel actuators. This interest is driven by a number of recent reaction wheel failures on aging, but what could be still scientifically productive, NASA spacecraft if a successful hybrid attitude control mode can be implemented. Over the years, hybrid (mixed-actuator) control has been employed for contingency attitude control purposes on several NASA science mission spacecraft. This paper provides a historical perspective of NASA's previous engineering work on spacecraft mixed-actuator hybrid control approaches. An update of the current situation will also be provided emphasizing why NASA is now so interested in hybrid control. The results of the NASA Spacecraft Hybrid Attitude Control Workshop, held in April of 2013, will be highlighted. In particular, the lessons learned captured from that workshop will be shared in this paper. An update on the most recent experiences with hybrid control on the Kepler spacecraft will also be provided. This paper will close with some future considerations for hybrid spacecraft control.

  13. Suction catheter for enhanced control and accuracy of transseptal access.

    Science.gov (United States)

    Sulkin, Matthew S; Berwick, Zachary C; Hermiller, James B; Navia, Jose A; Kassab, Ghassan S

    2016-12-20

    Percutaneous structural heart therapies, such as mitral value repair, require site-specific transseptal access (TSA). This can be challenging for interventional cardiologists. We describe a TSA catheter (TSAC) that utilises suction for enhanced control and puncture accuracy. Here, we aim to evaluate the safety and efficacy of the device. Ex vivo interatrial septum preparations were dissected from swine (n=8) and diseased human hearts (n=6) to quantify TSAC suction and needle puncture force. TSAC suction was 6.5-fold greater than the opposing needle puncture force, and thus provides sufficient stabilisation for punctures. The safety and efficacy of TSAC was evaluated in a chronic mitral regurgitation swine model (n=10) and compared to a conventional TSA device. MR was induced by disrupting one to three mitral chordae tendineae, and the progression of heart disease was followed for three weeks. During device testing, procedure time and fluoroscopy exposure were not statistically different between devices. TSAC reduced septal displacement from 8.7±0.30 mm to 3.60±0.19 mm (p<0.05) and improved puncture accuracy 1.75-fold. TSAC provides controlled TSA and improves puncture accuracy, while maintaining procedure time and workflow. These findings provide a strong rationale for a first-in-man study to demonstrate the clinical utility of the device.

  14. Csub60/Collapsed Carbon Nanotube Hybrids: A Variant of Peapods (Open Access)

    Science.gov (United States)

    2015-01-02

    fullerenes, collapsed carbon nanotubes, silocrystals Hybrid nanostructures are of great interest due to thepotential for engineering new materials with...the duct size. A related observation is that insertion of C60 in large diameter uncollapsed SWCNT is exothermic, 2 while it is strongly endothermic ...supported in part by the Director, Office of Basic Energy Sciences, Materials Sciences and Engineering Division, of the U.S. Department of Energy

  15. Hybrid multiscale simulation of a mixing-controlled reaction

    Energy Technology Data Exchange (ETDEWEB)

    Scheibe, Timothy D.; Schuchardt, Karen L.; Agarwal, Khushbu; Chase, Jared M.; Yang, Xiaofan; Palmer, Bruce J.; Tartakovsky, Alexandre M.; Elsethagen, Todd O.; Redden, George D.

    2015-09-01

    Continuum-scale models have been used to study subsurface flow, transport, and reactions for many years but lack the capability to resolve fine-grained processes. Recently, pore-scale models, which operate at scales of individual soil grains, have been developed to more accurately model and study pore-scale phenomena, such as mineral precipitation and dissolution reactions, microbially-mediated surface reactions, and other complex processes. However, these highly-resolved models are prohibitively expensive for modeling domains of sizes relevant to practical problems. To broaden the utility of pore-scale models for larger domains, we developed a hybrid multiscale model that initially simulates the full domain at the continuum scale and applies a pore-scale model only to areas of high reactivity. Since the location and number of pore-scale model regions in the model varies as the reactions proceed, an adaptive script defines the number and location of pore regions within each continuum iteration and initializes pore-scale simulations from macroscale information. Another script communicates information from the pore-scale simulation results back to the continuum scale. These components provide loose coupling between the pore- and continuum-scale codes into a single hybrid multiscale model implemented within the SWIFT workflow environment. In this paper, we consider an irreversible homogenous bimolecular reaction (two solutes reacting to form a third solute) in a 2D test problem. This paper is focused on the approach used for multiscale coupling between pore- and continuum-scale models, application to a realistic test problem, and implications of the results for predictive simulation of mixing-controlled reactions in porous media. Our results and analysis demonstrate that loose coupling provides a feasible, efficient and scalable approach for multiscale subsurface simulations.

  16. The NCAR Research Data Archive's Hybrid Approach for Data Discovery and Access

    Science.gov (United States)

    Schuster, D.; Worley, S. J.

    2013-12-01

    The NCAR Research Data Archive (RDA http://rda.ucar.edu) maintains a variety of data discovery and access capabilities for it's 600+ dataset collections to support the varying needs of a diverse user community. In-house developed and standards-based community tools offer services to more than 10,000 users annually. By number of users the largest group is external and access the RDA through web based protocols; the internal NCAR HPC users are fewer in number, but typically access more data volume. This paper will detail the data discovery and access services maintained by the RDA to support both user groups, and show metrics that illustrate how the community is using the services. The distributed search capability enabled by standards-based community tools, such as Geoportal and an OAI-PMH access point that serves multiple metadata standards, provide pathways for external users to initially discover RDA holdings. From here, in-house developed web interfaces leverage primary discovery level metadata databases that support keyword and faceted searches. Internal NCAR HPC users, or those familiar with the RDA, may go directly to the dataset collection of interest and refine their search based on rich file collection metadata. Multiple levels of metadata have proven to be invaluable for discovery within terabyte-sized archives composed of many atmospheric or oceanic levels, hundreds of parameters, and often numerous grid and time resolutions. Once users find the data they want, their access needs may vary as well. A THREDDS data server running on targeted dataset collections enables remote file access through OPENDAP and other web based protocols primarily for external users. In-house developed tools give all users the capability to submit data subset extraction and format conversion requests through scalable, HPC based delayed mode batch processing. Users can monitor their RDA-based data processing progress and receive instructions on how to access the data when it is

  17. Portraits of colloidal hybrid nanostructures: controlled synthesis and potential applications.

    Science.gov (United States)

    Nguyen, Thanh-Dinh

    2013-03-01

    Inorganic hybrid nanostructures containing two or more nanocomponents have been emerging in many areas of materials science in recent years. The particle-particle interactions in a hybrid particle system could significantly improve existing local electronic structure and induce tunable physiochemical responses. The current work reviews the diverse inorganic hybrid nanostructures formed by adhesion of the different single components via seed-mediated method. The hybrid nanomaterials have great potentials for real applications in many other fields. The nanohybrids have been used as efficient heterocatalysts for carbon monoxide conversion and photodegradation of organic contaminants. The enhanced catalytic activity of these hybrid nanocatalysts could be attributed the formation of oxygen vacancies and electron transfer across the structural junction in a hybrid system as a result of the interfacial particle-particle interactions. The synergistic combination of up-converting and semiconducting properties in an up-converting semiconducting hybrid particle results in appearance of sub-band-gap photoconductivity. This behavior has a great significance for the design of photovoltaic devices for effective solar energy conversion. The functionalization and subsequent bioconjugation of the hybrid nanostructures to afford the multifunctional nanomedical platforms for simultaneous diagnosis and therapy are reviewed. The conjugated multifunctional hybrid nanostructures exhibit high biocompatibility and highly selective binding with functional groups-fabricated alive organs through delivering them to the tumor sites. The clever combinations of multifunctional features and antibody conjugation within these vehicles make them to generally offer new opportunities for clinical diagnostics and therapeutics.

  18. Output feedback hybrid-impulsive second order sliding mode control: Lyapunov approach

    NARCIS (Netherlands)

    Shtessel, Y.; Glumineau, A.; Plestan, F.; Weiss, M.

    2014-01-01

    A perturbed nonlinear system of relative degree two controlled by output feedbacks discontinuous-hybrid-impulsive control is studied. The output hybrid-impulsive terms serve to drive instantaneously the system's trajectory to the origin or to its small vicinity. The output feedback impulsive action

  19. A hybrid single-end-access MZI and Φ-OTDR vibration sensing system with high frequency response

    Science.gov (United States)

    Zhang, Yixin; Xia, Lan; Cao, Chunqi; Sun, Zhenhong; Li, Yanting; Zhang, Xuping

    2017-01-01

    A hybrid single-end-access Mach-Zehnder interferometer (MZI) and phase sensitive OTDR (Φ-OTDR) vibration sensing system is proposed and demonstrated experimentally. In our system, the narrow optical pulses and the continuous wave are injected into the fiber through the front end of the fiber at the same time. And at the rear end of the fiber, a frequency-shift-mirror (FSM) is designed to back propagate the continuous wave modulated by the external vibration. Thus the Rayleigh backscattering signals (RBS) and the back propagated continuous wave interfere with the reference light at the same end of the sensing fiber and a single-end-access configuration is achieved. The RBS can be successfully separated from the interference signal (IS) through digital signal process due to their different intermediate frequency based on frequency division multiplexing technique. There is no influence between these two schemes. The experimental results show 10 m spatial resolution and up to 1.2 MHz frequency response along a 6.35 km long fiber. This newly designed single-end-access setup can achieve vibration events locating and high frequency events response, which can be widely used in health monitoring for civil infrastructures and transportation.

  20. Data Access, Ownership, and Control: Toward Empirical Studies of Access Practices.

    Science.gov (United States)

    Hilgartner, Stephen; Brandt-Rauf, Sherry I.

    1994-01-01

    Examines how the new sociology of science can approach data access issues. A perspective is developed based on an analysis of the process of scientific production, data streams, and intellectual policy issues. (Contains 55 references.) (JLB)

  1. A Trusted Host's Authentication Access and Control Model Faced on User Action

    Institute of Scientific and Technical Information of China (English)

    ZHANG Miao; XU Guoai; HU Zhengming; YANG Yixian

    2006-01-01

    The conception of trusted network connection (TNC) is introduced, and the weakness of TNC to control user's action is analyzed. After this, the paper brings out a set of secure access and control model based on access, authorization and control, and related authentication protocol. At last the security of this model is analyzed. The model can improve TNC's security of user control and authorization.

  2. Multi-Objective Hybrid Optimal Control for Interplanetary Mission Planning

    Science.gov (United States)

    Englander, Jacob

    2015-01-01

    Preliminary design of low-thrust interplanetary missions is a highly complex process. The mission designer must choose discrete parameters such as the number of flybys, the bodies at which those flybys are performed, and in some cases the final destination. Because low-thrust trajectory design is tightly coupled with systems design, power and propulsion characteristics must be chosen as well. In addition, a time-history of control variables must be chosen which defines the trajectory. There are often many thousands, if not millions, of possible trajectories to be evaluated. The customer who commissions a trajectory design is not usually interested in a point solution, but rather the exploration of the trade space of trajectories between several different objective functions. This can be very expensive process in terms of the number of human analyst hours required. An automated approach is therefore very desirable. This work presents such an approach by posing the mission design problem as a multi-objective hybrid optimal control problem. The methods is demonstrated on hypothetical mission to the main asteroid belt and to Deimos.

  3. Monitoring and remote control of a hybrid photovoltaic microgrid

    Directory of Open Access Journals (Sweden)

    Henrique Tiggemann

    2016-07-01

    Full Text Available The search of new alternatives for energy supply in island communities has always been a challenge in scientific and social context. In order to attend these communities, in January 2013 a photovoltaic hybrid microgrid project had its beginning at Universidade do Vale do Rio dos Sinos (UNISINOS. This paper presents the characterization and the development of such microgrid, monitored remotely via internet, which allows visualizing the electrical measurements, energy production and performing remote control actions. This work also aims increasing the interaction between students of universities to perform laboratory practices. The system consists of two photovoltaic modules technologies, mono and multicrystalline, totaling 570 Wp, connected to an energy storage bank of 200 Ah in 24 V and a pure sinusoidal inverter of 1 kW to supply AC voltage loads of 220 V. All acquisition components of data, conversion and management system are located in a control cabinet. Currently, the microgrid uses the utility grid as an auxiliary generator, simulating an alternative source of energy, which can be further replaced by fuel cell, biodiesel generator, etc.

  4. An Hybrid Multi Level Inverter Based on DSTATCOM Control

    Directory of Open Access Journals (Sweden)

    K. Ramash Kumar

    2011-06-01

    Full Text Available This paper presents an investigation on the Hybrid Seven-Level (HSL H–bridge inverter, which is used in a Distribution Static Compensator (DSTATCOM in Power Systems (PS. Making use of HSLI has the benefits of low harmonics distortion, reduced number of switches required to achieve the seven- level inverter output over the conventional cascaded seven-level inverter, and also reduced switching losses. In order to compensate the reactive power and suppress the total harmonics distortion (THD drawn from a Non-Liner Diode Rectifier Load (NLDRL of DSTATCOM, we propose a Sub-Harmonics Pulse Width Modulation (SHPWM technique to control the switches of HSL H – bridge inverter. The D-Q reference frame theory is used to generate the reference compensating currents for DSTATCOM and proportional and integral (PI control is used for capacitors dc voltage regulation for DSTATCOM. An HSL H–bridge inverter is considered for the shunt compensation of a 4.5 kV distribution system. The results are validated by MatLab/Simulink simulation software.

  5. MERCURY CONTROL WITH THE ADVANCED HYBRID PARTICULATE COLLECTOR

    Energy Technology Data Exchange (ETDEWEB)

    Steven A. Benson; Stanley J. Miller; Charlene R. Crocker; Kevin C. Galbreath; Jason D. Laumb; Jill M. Zola; Ye Zhuang; Michelle R. Olderbak

    2004-08-01

    This project was awarded under U.S. Department of Energy (DOE) National Energy Technology Laboratory (NETL) Program Solicitation DE-PS26-00NT40769 and specifically addresses Technical Topical Area 4-Testing Novel and Less Mature Control Technologies on Actual Flue Gas at the Pilot Scale. The project team includes the Energy & Environmental Research Center (EERC) as the main contractor; W.L. Gore & Associates, Inc., as a technical and financial partner; and the Big Stone Plant operated by Otter Tail Power Company, host for the field-testing portion of the research. Since 1995, DOE has supported development of a new concept in particulate control called the advanced hybrid particulate collector (AHPC). The AHPC has been licensed to W.L. Gore & Associates, Inc., and is now marketed as the Advanced Hybrid{trademark} filter by Gore. The AHPC combines the best features of electrostatic precipitators (ESPs) and baghouses in a unique configuration, providing major synergism between the two collection methods, both in the particulate collection step and in the transfer of dust to the hopper. The AHPC provides ultrahigh collection efficiency, overcoming the problem of excessive fine-particle emissions with conventional ESPs, and it solves the problem of reentrainment and re-collection of dust in conventional baghouses. The AHPC appears to have unique advantages for mercury control over baghouses or ESPs as an excellent gas-solid contactor. The objective of the original 5-task project is to demonstrate 90% total mercury control in the AHPC at a lower cost than current mercury control estimates. The approach includes bench-scale batch testing that ties the new work to previous results and links results with larger-scale pilot testing with real flue gas on a coal-fired combustion system, pilot-scale testing on a coal-fired combustion system with both a pulse-jet baghouse and an AHPC to prove or disprove the research hypotheses, and field demonstration pilot-scale testing at a

  6. Mercury Control With The Advanced Hybrid Particulate Collector

    Energy Technology Data Exchange (ETDEWEB)

    Steven A. Benson; Stanley J. Miller; Charlene R. Crocker; Kevin C. Galbreath; Jason D. Laumb; Jill M. Zola; Ye Zhuang; Michelle R. Olderbak

    2004-03-31

    This project was awarded under U.S. Department of Energy (DOE) National Energy Technology Laboratory (NETL) Program Solicitation DE-PS26-00NT40769 and specifically addresses Technical Topical Area 4 - Testing Novel and Less Mature Control Technologies on Actual Flue Gas at the Pilot Scale. The project team includes the Energy & Environmental Research Center (EERC) as the main contractor; W.L. Gore & Associates, Inc., as a technical and financial partner; and the Big Stone Plant operated by Otter Tail Power Company, host for the field-testing portion of the research. Since 1995, DOE has supported development of a new concept in particulate control called the advanced hybrid particulate collector (AHPC). The AHPC has been licensed to W.L. Gore and Associates, Inc., and is now marketed as the Advanced Hybrid{trademark} filter by Gore. The AHPC combines the best features of electrostatic precipitators (ESPs) and baghouses in a unique configuration, providing major synergism between the two collection methods, both in the particulate collection step and in the transfer of dust to the hopper. The AHPC provides ultrahigh collection efficiency, overcoming the problem of excessive fine-particle emissions with conventional ESPs, and it solves the problem of reentrainment and re-collection of dust in conventional baghouses. The AHPC appears to have unique advantages for mercury control over baghouses or ESPs as an excellent gas-solid contactor. The objective of the original 5-task project is to demonstrate 90% total mercury control in the AHPC at a lower cost than current mercury control estimates. The approach includes benchscale batch testing that ties the new work to previous results and links results with larger-scale pilot testing with real flue gas on a coal-fired combustion system, pilot-scale testing on a coal fired combustion system with both a pulse-jet baghouse and an AHPC to prove or disprove the research hypotheses, and field demonstration pilot-scale testing at

  7. MERCURY CONTROL WITH THE ADVANCED HYBRID PARTICULATE COLLECTOR

    Energy Technology Data Exchange (ETDEWEB)

    Charlene R. Crocker; Steven A. Benson; Stanley J. Miller

    2003-11-01

    This project was awarded under U.S. Department of Energy (DOE) National Energy Technology Laboratory (NETL) Program Solicitation DE-PS26-00NT40769 and specifically addresses Technical Topical Area 4--Testing Novel and Less Mature Control Technologies on Actual Flue Gas at the Pilot Scale. The project team includes the Energy & Environmental Research Center (EERC) as the main contractor; W.L. Gore & Associates, Inc., as a technical and financial partner; and the Big Stone Plant operated by Otter Tail Power Company, host for the field-testing portion of the research. Since 1995, DOE has supported development of a new concept in particulate control called the advanced hybrid particulate collector (AHPC). The AHPC has been licensed to W.L. Gore & Associates, Inc., and is now marketed as the Advanced Hybrid{trademark} filter by Gore. The AHPC combines the best features of electrostatic precipitators (ESPs) and baghouses in a unique configuration, providing major synergism between the two collection methods, both in the particulate collection step and in the transfer of dust to the hopper. The AHPC provides ultra-high collection efficiency, overcoming the problem of excessive fine-particle emissions with conventional ESPs, and it solves the problem of reentrainment and re-collection of dust in conventional baghouses. The AHPC appears to have unique advantages for mercury control over baghouses or ESPs as an excellent gas-solid contactor. The objective of the original 5-task project is to demonstrate 90% total mercury control in the AHPC at a lower cost than current mercury control estimates. The approach includes bench-scale batch testing that ties the new work to previous results and links results with larger-scale pilot testing with real flue gas on a coal-fired combustion system, pilot-scale testing on a coal-fired combustion system with both a pulse-jet baghouse and an AHPC to prove or disprove the research hypotheses, and field demonstration pilot-scale testing at a

  8. Mercury Control With The Advanced Hybrid Particulate Collector

    Energy Technology Data Exchange (ETDEWEB)

    Steven A. Benson; Stanley J. Miller; Charlene R. Crocker; Kevin C. Galbreath; Jason D. Laumb; Jill M. Zola; Ye Zhuang; Michelle R. Olderbak

    2003-12-31

    This project was awarded under U.S. Department of Energy (DOE) National Energy Technology Laboratory (NETL) Program Solicitation DE-PS26-00NT40769 and specifically addresses Technical Topical Area 4 - Testing Novel and Less Mature Control Technologies on Actual Flue Gas at the Pilot Scale. The project team includes the Energy & Environmental Research Center (EERC) as the main contractor; W.L. Gore & Associates, Inc., as a technical and financial partner; and the Big Stone Plant operated by Otter Tail Power Company, host for the field-testing portion of the research. Since 1995, DOE has supported development of a new concept in particulate control called the advanced hybrid particulate collector (AHPC). The AHPC has been licensed to W.L. Gore and Associates, Inc., and is now marketed as the Advanced Hybrid{trademark} filter by Gore. The AHPC combines the best features of electrostatic precipitators (ESPs) and baghouses in a unique configuration, providing major synergism between the two collection methods, both in the particulate collection step and in the transfer of dust to the hopper. The AHPC provides ultrahigh collection efficiency, overcoming the problem of excessive fine-particle emissions with conventional ESPs, and it solves the problem of reentrainment and re-collection of dust in conventional baghouses. The AHPC appears to have unique advantages for mercury control over baghouses or ESPs as an excellent gas-solid contactor. The objective of the original 5-task project is to demonstrate 90% total mercury control in the AHPC at a lower cost than current mercury control estimates. The approach includes benchscale batch testing that ties the new work to previous results and links results with larger-scale pilot testing with real flue gas on a coal-fired combustion system, pilot-scale testing on a coal fired combustion system with both a pulse-jet baghouse and an AHPC to prove or disprove the research hypotheses, and field demonstration pilot-scale testing at

  9. The new biometric access control system resembles a big electronic eye. It will be used to control access to the LHC from 2007 onwards.

    CERN Multimedia

    Maximilien Brice

    2006-01-01

    The new LHC access control systems will soon be using the latest technology: optical recognition based on iris image data. In order to gain access to the tunnel it will be your eye, not your credentials that you'll be required to show! As of September, the entrance point at Point 8 should be the first to be fitted out with iris recognition equipment. The other access shafts will then gradually be equipped one by one.

  10. How Drug Control Policy and Practice Undermine Access to Controlled Medicines

    Science.gov (United States)

    Csete, Joanne; Wilson, Duncan; Fox, Edward; Wolfe, Daniel; Rasanathan, Jennifer J. K.

    2017-01-01

    Abstract Drug conventions serve as the cornerstone for domestic drug laws and impose a dual obligation upon states to prevent the misuse of controlled substances while ensuring their adequate availability for medical and scientific purposes. Despite the mandate that these obligations be enforced equally, the dominant paradigm enshrined in the drug conventions is an enforcement-heavy criminal justice response to controlled substances that prohibits and penalizes their misuse. Prioritizing restrictive control is to the detriment of ensuring adequate availability of and access to controlled medicines, thereby violating the rights of people who need them. This paper argues that the drug conventions’ prioritization of criminal justice measures—including efforts to prevent non-medical use of controlled substances—undermines access to medicines and infringes upon the right to health and the right to enjoy the benefits of scientific progress. While the effects of criminalization under drug policy limit the right to health in multiple ways, we draw on research and documented examples to highlight the impact of drug control and criminalization on access to medicines. The prioritization and protection of human rights—specifically the right to health and the right to enjoy the benefits of scientific progress—are critical to rebalancing drug policy. PMID:28630556

  11. Double Motor Coordinated Control Based on Hybrid Genetic Algorithm and CMAC

    Science.gov (United States)

    Cao, Shaozhong; Tu, Ji

    A novel hybrid cerebellar model articulation controller (CMAC) and online adaptive genetic algorithm (GA) controller is introduced to control two Brushless DC motor (BLDCM) which applied in a biped robot. Genetic Algorithm simulates the random learning among the individuals of a group, and CMAC simulates the self-learning of an individual. To validate the ability and superiority of the novel algorithm, experiments have been done in MATLAB/SIMULINK. Analysis among GA, hybrid GA-CMAC and CMAC feed-forward control is also given. The results prove that the torque ripple of the coordinated control system is eliminated by using the hybrid GA-CMAC algorithm.

  12. Dynamic simulation and optimal control strategy for a parallel hybrid hydraulic excavator

    Institute of Scientific and Technical Information of China (English)

    Xiao LIN; Shuang-xia PAN; Dong-yun WANG

    2008-01-01

    The primary focus of this study is to investigate the control strategies of a hybrid system used in hydraulic excavators. First, the structure and evaluation target of hybrid hydraulic excavators are analyzed. Then the dynamic system model including batteries, motor and engine is built as the simulation environment to obtain control results. A so-called multi-work-point dynamic control strategy, which has both closed-loop speed PI (proportion integral) control and direct torque control, is proposed and studied in the simulation model. Simulation results indicate that the hybrid system with this strategy can meet the power demand and achieve better system stability and higher fuel efficiency.

  13. Optimal traffic light control method for a single intersection based on hybrid systems

    Institute of Scientific and Technical Information of China (English)

    赵晓华; 陈阳舟; 崔平远

    2003-01-01

    A single intersection of two phases is selected as a model to put forward a new optimal time-planning scheme for traffic light based on the model of hybrid automata for single intersection. A method of optimization is proposed for hybrid systems, and the average queue length over all queues is used as an objective function to find an optimal switching scheme for traffic light. It is illustrated that traffic light control for single intersection is a typical hybrid system, and the optimal planning-time scheme can be obtained using the optimal hybrid systems control based on the two stages method.

  14. Hybrid InP-SiGe photoreceiver for the access network

    NARCIS (Netherlands)

    Urban, P.J.; Leijtens, X.J.M.; Smalbrugge, E.; Vries, T. de; Noetzel, R.; Oei, Y.S.; Xu, L.; Heijningen, M. van; Bent, G. van der; Waardt, H. de; Smit, M.K.

    2008-01-01

    In this paper, we present a low cost and polarization independent photoreceiver which is part of the optical network unit (ONU) for the fiber access network. It consists of one InPphotodetector and a low cost SiGe amplifier. It operates error free with 223 − 1 PRBS word length at 1.25 Gbit/s with -1

  15. Hybrid InP-SiGe photoreceiver for the access network

    NARCIS (Netherlands)

    Urban, P.J.; Leijtens, X.J.M.; Smalbrugge, E.; Vries, T. de; Noetzel, R.; Oei, Y.S.; Xu, L.; Heijningen, M. van; Bent, G. van der; Waardt, H. de; Smit, M.K.

    2008-01-01

    In this paper, we present a low cost and polarization independent photoreceiver which is part of the optical network unit (ONU) for the fiber access network. It consists of one InPphotodetector and a low cost SiGe amplifier. It operates error free with 223 − 1 PRBS word length at 1.25 Gbit/s with -1

  16. Hybrid InP-SiGe photoreceiver for the access network

    NARCIS (Netherlands)

    Urban, P.J.; Leijtens, X.J.M.; Smalbrugge, E.; Vries, T. de; Noetzel, R.; Oei, Y.S.; Xu, L.; Heijningen, M. van; Bent, G. van der; Waardt, H. de; Smit, M.K.

    2008-01-01

    In this paper, we present a low cost and polarization independent photoreceiver which is part of the optical network unit (ONU) for the fiber access network. It consists of one InPphotodetector and a low cost SiGe amplifier. It operates error free with 223 − 1 PRBS word length at 1.25 Gbit/s with

  17. A TDMA based media access control protocol for wireless ad hoc networks

    Science.gov (United States)

    Yang, Qi; Tang, Biyu

    2013-03-01

    This paper presents a novel Time Division Multiplex Access (TDMA) based Media Access Control (MAC) protocol of wireless Ad Hoc network. To achieve collision free transmission, time slots in a MAC frame are cataloged into three types, that is access slot, control slot and traffic slot. Nodes in the network access to the network in the access slot, and an exclusive control is allocated subsequently. Data packets are transmission by dynamic schedule the traffic slots. Throughput and transmission delay are also analyzed by simulation experiment. The proposed protocol is capable of providing collision free transmission and achieves high throughput.

  18. Principles of Eliminating Access Control Lists within a Domain

    Directory of Open Access Journals (Sweden)

    Vic Grout

    2012-04-01

    Full Text Available The infrastructure of large networks is broken down into areas that have a common security policy called a domain. Security within a domain is commonly implemented at all nodes. However this can have a negative effect on performance since it introduces a delay associated with packet filtering. When Access Control Lists (ACLs are used within a router for this purpose then a significant overhead is introduced associated with this process. It is likely that identical checks are made at multiple points within a domain prior to a packet reaching its destination. Therefore by eliminating ACLs within a domain by modifying the ingress/egress points with equivalent functionality an improvement in the overall performance can be obtained. This paper considers the effect of the delays when using router operating systems offering different levels of functionality. It considers factors which contribute to the delay particularly due to ACLs and by using theoretical principles modified by practical calculation a model is created. Additionally this paper provides an example of an optimized solution which reduces the delay through network routers by distributing the security rules to the ingress/egress points of the domain without affecting the security policy.

  19. Supporting Engagement and Floor Control in Hybrid Meetings

    NARCIS (Netherlands)

    op den Akker, Hendrikus J.A.; Hofs, D.H.W.; Hondorp, G.H.W.; op den Akker, Harm; Zwiers, Jakob; Nijholt, Antinus; Esposito, Anna; Vich, Robert

    2009-01-01

    Remote participants in hybrid meetings often have problems to follow what is going on in the (physical) meeting room they are connected with. This paper describes a videoconferencing system for participation in hybrid meetings. The system has been developed as a research vehicle to see how

  20. Test and numerical simulation of a new type of hybrid control technique

    Institute of Scientific and Technical Information of China (English)

    Meng Qingli; Zhang Minzheng; Cheng Dong

    2005-01-01

    In this paper, a new hybrid control technique, based on a combination of base-isolation and semi-active variable stiffness/damping in a superstructure, is presented. To illustrate the efficiency of the proposed control system, model tests on a mini-electromagnetic shaking table and a numerical simulation were performed. The test and numerical calculation results indicate that this new hybrid control mode with additional damping and smaller additional stiffness can achieve a better control efficiency.

  1. Two Beam Energy Exchange in Hybrid Liquid Crystal Cells with Photorefractive Field Controlled Boundary Conditions (Postprint)

    Science.gov (United States)

    2016-09-12

    AFRL-RX-WP-JA-2017-0209 TWO BEAM ENERGY EXCHANGE IN HYBRID LIQUID CRYSTAL CELLS WITH PHOTOREFRACTIVE FIELD CONTROLLED BOUNDARY...DATES COVERED (From - To) 29 August 2016 Interim 26 October 2015 – 29 July 2016 4. TITLE AND SUBTITLE TWO BEAM ENERGY EXCHANGE IN HYBRID LIQUID... energy gain when two light beams intersect in a hybrid nematic liquid crystal (LC) cell with photorefractive crystalline substrates. A periodic space

  2. Empirical Estimation of Hybrid Model: A Controlled Case Study

    Directory of Open Access Journals (Sweden)

    Sadaf Un Nisa

    2012-07-01

    Full Text Available Scrum and Extreme Programming (XP are frequently used models among all agile models whereas Rational Unified Process (RUP is one of the widely used conventional plan driven software development models. The agile and plan driven approaches both have their own strengths and weaknesses. Although RUP model has certain drawbacks, such as tendency to be over budgeted, slow in adaptation to rapidly changing requirements and reputation of being impractical for small and fast paced projects. XP model has certain drawbacks such as weak documentation and poor performance for medium and large development projects. XP has a concrete set of engineering practices that emphasizes on team work where managers, customers and developers are all equal partners in collaborative teams. Scrum is more concerned with the project management. It has seven practices namely Scrum Master, Scrum teams, Product Backlog, Sprint, Sprint Planning Meeting, Daily Scrum Meeting and Sprint Review. Keeping above mentioned context in view, this paper intends to propose a hybrid model naming SPRUP model by combining strengths of Scrum, XP and RUP by eliminating their weaknesses to produce high quality software. The proposed SPRUP model is validated through a controlled case study.

  3. Nucleic Acid-Peptide Complex Phase Controlled by DNA Hybridization

    Science.gov (United States)

    Vieregg, Jeffrey; Lueckheide, Michael; Leon, Lorraine; Marciel, Amanda; Tirrell, Matthew

    When polyanions and polycations are mixed, counterion release drives formation of polymer-rich complexes that can either be solid (precipitates) or liquid (coacervates) depending on the properties of the polyelectrolytes. These complexes are important in many fields, from encapsulation of industrial polymers to membrane-free segregation of biomolecules such as nucleic acids and proteins. Condensation of long double-stranded DNA has been studied for several decades, but comparatively little attention has been paid to the polyelectrolyte behavior of oligonucleotides. We report here studies of DNA oligonucleotides (10 - 88 nt) complexed with polylysine (10 - 100 aa). Unexpectedly, we find that the phase of the resulting complexes is controlled by the hybridization state of the nucleic acid, with double-stranded DNA forming precipitates and single-stranded DNA forming coacervates. Stability increases with polyelectrolyte length and decreases with solution salt concentration, with complexes of the longer double-stranded polymers undergoing precipitate/coacervate/soluble transitions as ionic strength is increased. Mixing coacervates formed by complementary single-stranded oligonucleotides results in precipitate formation, raising the possibility of stimulus-responsive material design.

  4. Hybrid genetic algorithm approach for selective harmonic control

    Energy Technology Data Exchange (ETDEWEB)

    Dahidah, Mohamed S.A. [Faculty of Engineering, Multimedia University, 63100, Jalan Multimedia-Cyberjaya, Selangor (Malaysia); Agelidis, Vassilios G. [School of Electrical and Information Engineering, The University of Sydney, NSW (Australia); Rao, Machavaram V. [Faculty of Engineering and Technology, Multimedia University, 75450, Jalan Ayer Keroh Lama-Melaka (Malaysia)

    2008-02-15

    The paper presents an optimal solution for a selective harmonic elimination pulse width modulated (SHE-PWM) technique suitable for a high power inverter used in constant frequency utility applications. The main challenge of solving the associated non-linear equations, which are transcendental in nature and, therefore, have multiple solutions, is the convergence, and therefore, an initial point selected considerably close to the exact solution is required. The paper discusses an efficient hybrid real coded genetic algorithm (HRCGA) that reduces significantly the computational burden, resulting in fast convergence. An objective function describing a measure of the effectiveness of eliminating selected orders of harmonics while controlling the fundamental, namely a weighted total harmonic distortion (WTHD) is derived, and a comparison of different operating points is reported. It is observed that the method was able to find the optimal solution for a modulation index that is higher than unity. The theoretical considerations reported in this paper are verified through simulation and experimentally on a low power laboratory prototype. (author)

  5. A study on the control of a hybrid MTDC system supplying a passive network

    DEFF Research Database (Denmark)

    Kotb, Omar; Ghandhari, Mehrdad; Eriksson, Robert

    2014-01-01

    A hybrid Multi-Terminal DC (MTDC) system can combine the benefits of both Line Commutated Converter (LCC) and Voltage Source Converter (VSC) technologies in the form of reduced losses and flexibility to connect to weak and passive grids. In this paper, an analysis of control strategies used...... in a hybrid MTDC system is presented. A case study of a four terminal hybrid MTDC system supplying a passive AC network was considered for simulation study. A control scheme based on voltage margin was developed to cope with the condition of main DC voltage controlling station tripping. Two various control...... scenarios for controlling the VSCs connected to the passive network were presented and compared. The system performance was studied through EMTP-RV simulations under different disturbances. The results show the ability of selected converter control modes and proposed control schemes to operate the hybrid...

  6. An Efficient Role and Object Based Access Control Model Implemented in a PDM System

    Institute of Scientific and Technical Information of China (English)

    HUANG Xiaowen; TAN Jian; HUANG Xiangguo

    2006-01-01

    An effective and reliable access control is crucial to a PDM system. This article has discussed the commonly used access control models, analyzed their advantages and disadvantages, and proposed a new Role and Object based access control model that suits the particular needs of a PDM system. The new model has been implemented in a commercial PDM system, which has demonstrated enhanced flexibility and convenience.

  7. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    OpenAIRE

    Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew

    2007-01-01

    This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an active mobile device to enforce centralized ACL-based access control policies. Selective RFID Jamming also solves a Differential Signal Analysis attack to which the RFID Blocker Tag is susceptible.

  8. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    OpenAIRE

    Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew

    2007-01-01

    This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an active mobile device to enforce centralized ACL-based access control policies. Selective RFID Jamming also solves a Differential Signal Analysis attack to which the RFID Blocker Tag is susceptible.

  9. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Requirements for establishing logical access... Prescriptions § 1311.125 Requirements for establishing logical access control—Individual practitioner. (a) At... his two-factor authentication credential to satisfy the logical access controls. The second...

  10. 21 CFR 1311.130 - Requirements for establishing logical access control-Institutional practitioner.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Requirements for establishing logical access...) Electronic Prescriptions § 1311.130 Requirements for establishing logical access control—Institutional... practitioner that enters permissions for logical access controls into the application. The...

  11. 78 FR 16757 - Twentieth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-03-18

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held April 4, 2013 from...

  12. 76 FR 59481 - Ninth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2011-09-26

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access Control...

  13. 78 FR 43963 - Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-07-22

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held on June 20,...

  14. 77 FR 71474 - Seventeenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-11-30

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held December 13,...

  15. 77 FR 15448 - Twelfth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-03-15

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Notice of meeting RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... 224, Airport Security Access Control Systems DATES: The meeting will be held April 5, 2012, from 10...

  16. 78 FR 22025 - Twenty First Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-04-12

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held April 9-10,...

  17. 77 FR 55894 - Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-09-11

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems DATES: The meeting will be held September 27-28,...

  18. 76 FR 38742 - Seventh Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2011-07-01

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is... Access Control Systems. DATES: The meeting will be held July 15, 2011, from 10 a.m. to 1 p.m....

  19. 77 FR 64838 - Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-10-23

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held November 15,...

  20. 78 FR 7850 - Nineteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-02-04

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held February 21,...

  1. 76 FR 3931 - Fourth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2011-01-21

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 Meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is... Access Control Systems. DATES: The meeting will be held February 8, 2011, from 10 a.m. to 5...

  2. 75 FR 71790 - Second Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2010-11-24

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is... Access Control Systems. DATES: The meeting will be held December 9, 2010, from 10 a.m. to 5...

  3. 77 FR 2343 - Eleventh Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-01-17

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY: The FAA..., Airport Security Access Control Systems. DATES: The meeting will be held February 9, 2012, from 10...

  4. Wi-Fi Networks Security and Accessing Control

    Directory of Open Access Journals (Sweden)

    Tarek S. Sobh

    2013-06-01

    Full Text Available As wireless networks access gains popularity in corporate, private and personal networks, the nature of wireless networks opens up new possibilities for network attacks. This paper negotiating Wi-Fi security against scanning of rogue Wi-Fi networks and other related activities and considers the monitoring of Wi-Fi traffic effects. The unauthorized access point (AP problem has raised more attention and resulted in obtaining wireless access without subscriber permission.This work assumes Wi-Fi AP under attack specially rogue AP and/or ad-hoc client. It provides a solution for detecting and preventing this attack. In addition, it provides the required user permissions to allow/block access of the files on the user of ad-hoc client. The experiments include the rogue AP attack are maintained and the effectiveness of the proposed solution are tested.

  5. Optical label-controlled transparent metro-access network interface

    DEFF Research Database (Denmark)

    Osadchiy, Alexey Vladimirovich

    This thesis presents results obtained during the course of my PhD research on optical signal routing and interfacing between the metropolitan and access segments of optical networks. Due to both increasing capacity demands and variety of emerging services types, new technological challenges...... are arising for seamlessly interfacing metropolitan and access networks. Therefore, in this PhD project, I have analyzed those technological challenges and identified the key aspects to be addressed. I have also proposed and experimentally verified a number of solutions to metropolitan and access networks...... interfacing and signal routing. Equipment and infrastructure simplification was recognized as the path towards more efficient metropolitan and access networks providing a spectrum of high-bandwidth services to large number of users. Several approaches have been proposed and developed in order to enable...

  6. Role-based access control through on-demand classification of electronic health record.

    Science.gov (United States)

    Tiwari, Basant; Kumar, Abhay

    2015-01-01

    Electronic health records (EHR) provides convenient method to exchange medical information of patients between different healthcare providers. Access control mechanism in healthcare services characterises authorising users to access EHR records. Role Based Access Control helps to restrict EHRs to users in a certain role. Significant works have been carried out for access control since last one decade but little emphasis has been given to on-demand role based access control. Presented work achieved access control through physical data isolation which is more robust and secure. We propose an algorithm in which selective combination of policies for each user of the EHR database has been defined. We extend well known data mining technique 'classification' to group EHRs with respect to the given role. Algorithm works by taking various roles as class and defined their features as a vector. Here, features are used as a Feature Vector for classification to describe user authority.

  7. A Hybrid Networking Model for the Access Layer of the Communication Network for Distribution in Smart Grid

    Directory of Open Access Journals (Sweden)

    Wang Hao

    2016-01-01

    Full Text Available The access layer in the communication network for distribution is an important link in the automation of smart distribution power grid. In current access layer of communication network for distribution in Chinese power grid systems, several communication methods like optical fiber, mediumvoltage carrier communication, 1.8GHz TD-LTE power private wireless network, 230MHz TD-LTE power private wireless network, public wireless network are constructed concurrently and running simultaneously in an identical power supply area. This traditional networking model will cause repeated construction and operation and maintenance difficulties in the communication network of power grid. On the basis of giving a detailed analysis of the radio link budget of TD-LTE power private wireless network in two frequencies, this paper present a multi-communication methods hybrid networking model, which gives a clear boundary for different communication methods based on the isoline with equal signal strength of the TD-LTE power private wireless network and accomplish the optimization of communication resources for distribution.

  8. Fuzzy logic controller versus classical logic controller for residential hybrid solar-wind-storage energy system

    Energy Technology Data Exchange (ETDEWEB)

    Derrouazin, A., E-mail: derrsid@gmail.com [University Hassiba BenBouali of Chlef, LGEER,Chlef (Algeria); Université de Lorraine, LMOPS, EA 4423, 57070 Metz (France); CentraleSupélec, LMOPS, 57070 Metz (France); Aillerie, M., E-mail: aillerie@metz.supelec.fr; Charles, J. P. [Université de Lorraine, LMOPS, EA 4423, 57070 Metz (France); CentraleSupélec, LMOPS, 57070 Metz (France); Mekkakia-Maaza, N. [Université des sciences et de la Technologie d’Oran, Mohamed Boudiaf-USTO MB,LMSE, Oran Algérie (Algeria)

    2016-07-25

    Several researches for management of diverse hybrid energy systems and many techniques have been proposed for robustness, savings and environmental purpose. In this work we aim to make a comparative study between two supervision and control techniques: fuzzy and classic logics to manage the hybrid energy system applied for typical housing fed by solar and wind power, with rack of batteries for storage. The system is assisted by the electric grid during energy drop moments. A hydrogen production device is integrated into the system to retrieve surplus energy production from renewable sources for the household purposes, intending the maximum exploitation of these sources over years. The models have been achieved and generated signals for electronic switches command of proposed both techniques are presented and discussed in this paper.

  9. Fuzzy logic controller versus classical logic controller for residential hybrid solar-wind-storage energy system

    Science.gov (United States)

    Derrouazin, A.; Aillerie, M.; Mekkakia-Maaza, N.; Charles, J. P.

    2016-07-01

    Several researches for management of diverse hybrid energy systems and many techniques have been proposed for robustness, savings and environmental purpose. In this work we aim to make a comparative study between two supervision and control techniques: fuzzy and classic logics to manage the hybrid energy system applied for typical housing fed by solar and wind power, with rack of batteries for storage. The system is assisted by the electric grid during energy drop moments. A hydrogen production device is integrated into the system to retrieve surplus energy production from renewable sources for the household purposes, intending the maximum exploitation of these sources over years. The models have been achieved and generated signals for electronic switches command of proposed both techniques are presented and discussed in this paper.

  10. Hybrid architecture active wavefront sensing and control system, and method

    Science.gov (United States)

    Feinberg, Lee D. (Inventor); Dean, Bruce H. (Inventor); Hyde, Tristram T. (Inventor)

    2011-01-01

    According to various embodiments, provided herein is an optical system and method that can be configured to perform image analysis. The optical system can comprise a telescope assembly and one or more hybrid instruments. The one or more hybrid instruments can be configured to receive image data from the telescope assembly and perform a fine guidance operation and a wavefront sensing operation, simultaneously, on the image data received from the telescope assembly.

  11. Control and verification of industrial hybrid systems using models specified with the formalism $ chi $

    NARCIS (Netherlands)

    J.J.H. Fey

    1996-01-01

    textabstractControl and verification of hybrid systems is studied using two industrial examples. The hybrid models of a conveyor-belt and of a biochemical plant for the production of ethanol are specified in the formalism $chi .$ A verification of the closed-loop systems for those examples,

  12. Task-and-role-based access-control model for computational grid

    Institute of Scientific and Technical Information of China (English)

    LONG Tao; HONG Fan; WU Chi; SUN Ling-li

    2007-01-01

    Access control in a grid environment is a challenging issue because the heterogeneous nature and independent administration of geographically dispersed resources in grid require access control to use fine-grained policies. We established a task-and-role-based access-control model for computational grid (CG-TRBAC model), integrating the concepts of role-based access control (RBAC) and task-based access control (TBAC). In this model, condition restrictions are defined and concepts specifically tailored to Workflow Management System are simplified or omitted so that role assignment and security administration fit computational grid better than traditional models; permissions are mutable with the task status and system variables, and can be dynamically controlled. The CG-TRBAC model is proved flexible and extendible. It can implement different control policies. It embodies the security principle of least privilege and executes active dynamic authorization. A task attribute can be extended to satisfy different requirements in a real grid system.

  13. Hybrid Electric Vehicle Experimental Model with CAN Network Real Time Control

    Directory of Open Access Journals (Sweden)

    RATOI, M.

    2010-05-01

    Full Text Available In this paper an experimental model with a distributed control system of a hybrid electrical vehicle is presented. A communication CAN network of high speed (1 Mbps assures a distributed control of the all components. The modeling and the control of different operating regimes are realized on an experimental test-bench of a hybrid electrical vehicle. The experimental results concerning the variations of the mains variables (currents, torques, speeds are presented.

  14. Control of hybrid AC/DC microgrid under islanding operational conditions

    DEFF Research Database (Denmark)

    Ding, G.; Gao, F.; Zhang, S.

    2014-01-01

    This paper presents control methods for hybrid AC/DC microgrid under islanding operation condition. The control schemes for AC sub-microgrid and DC sub-microgrid are investigated according to the power sharing requirement and operational reliability. In addition, the key control schemes......, the whole hybrid AC/DC microgrid can manage the power flow transferred between sub-microgrids for improving on the operational quality and efficiency....

  15. CONSTANT WORK-POINT CONTROL FOR PARALLEL HYBRID SYSTEM WITH CAPACITOR ACCUMULATOR IN HYDRAULIC EXCAVATOR

    Institute of Scientific and Technical Information of China (English)

    ZHANG Yanting; WANG Qingfeng; XIAO Qing; FU Qiang

    2006-01-01

    Limitations of various accumulators in hybrid hydraulic excavator are analyzed. A program using capacitor as the accumulator based on constant work-point control is put forward. A simulating experimental system of hybrid construction machinery is established, and experimental study on constant work-point control for parallel hybrid system with capacitor accumulator is carried out using the pressure and flow rate derived from boom cylinder of hydraulic excavator in actual work as the simulating loads. A program of double work-point control is proposed and proved by further experiments.

  16. The Model and Control Methods of Access to Information and Technology Resources of Automated Control Systems in Water Supply Industry

    Science.gov (United States)

    Rytov, M. Yu; Spichyack, S. A.; Fedorov, V. P.; Petreshin, D. I.

    2017-01-01

    The paper describes a formalized control model of access to information and technological resources of automated control systems at water supply enterprises. The given model considers the availability of various communication links with information systems and technological equipment. There are also studied control methods of access to information and technological resources of automated control systems at water supply enterprises. On the basis of the formalized control model and appropriate methods there was developed a software-hardware complex for rapid access to information and technological resources of automated control systems, which contains an administrator’s automated workplace and ultimate users.

  17. Implementing Discretionary Access Control with Time Character in Linux and Performance Analysis

    Institute of Scientific and Technical Information of China (English)

    TAN Liang; ZHOU Ming-Tian

    2006-01-01

    DAC (Discretionary Access Control Policy) is access control based on ownership relations between subject and object, the subject can discretionarily decide on that who, by what methods, can access his owns object. In this paper, the system time is looked as a basic secure element. The DAC_T (Discretionary Access Control Policy with Time Character) is presented and formalized. The DAC_T resolves that the subject can discretionarily decide that who, on when, can access his owns objects. And then the DAC_T is implemented on Linux based on GFAC (General Framework for Access Control), and the algorithm is put forward. Finally, the performance analysis for the DAC_T_Linux is carried out. It is proved that the DAC_T_Linux not only can realize time constraints between subject and object but also can still be accepted by us though its performance have been decreased.

  18. Remote toehold: a mechanism for flexible control of DNA hybridization kinetics.

    Science.gov (United States)

    Genot, Anthony J; Zhang, David Yu; Bath, Jonathan; Turberfield, Andrew J

    2011-02-23

    Hybridization of DNA strands can be used to build molecular devices, and control of the kinetics of DNA hybridization is a crucial element in the design and construction of functional and autonomous devices. Toehold-mediated strand displacement has proved to be a powerful mechanism that allows programmable control of DNA hybridization. So far, attempts to control hybridization kinetics have mainly focused on the length and binding strength of toehold sequences. Here we show that insertion of a spacer between the toehold and displacement domains provides additional control: modulation of the nature and length of the spacer can be used to control strand-displacement rates over at least 3 orders of magnitude. We apply this mechanism to operate displacement reactions in potentially useful kinetic regimes: the kinetic proofreading and concentration-robust regimes.

  19. A Generic Role Based Access Control Model for Wind Power Systems

    DEFF Research Database (Denmark)

    Nagarajan, Anand; Jensen, Christian D.

    2010-01-01

    infrastructure in a software domain in a manufacturer independent manner as well as establishing secure communication and authenticating the other parties in electrical power infrastructures, but they do not address the problem of access control. We therefore propose a generic model for access control in wind...... power systems, which is based on the widely used role-based access control model. The proposed model is tested using a prototype designed in conformance with the standards that are in use in modern wind power infrastructure and the results are presented to determine the overhead in communication caused...... while adhering to the proposed access model....

  20. An effective access control approach to support mobility in IPv6 networks

    Science.gov (United States)

    Peng, Xue-hai; Lin, Chuang

    2005-11-01

    Access control is an important method to improve network security and prevent protected resources from being used by some nodes without authority. Moreover, mobility is an important trend of internet. In this paper, based on the architecture of hierarchical mobile IPv6, we proposed an effective access control approach to support mobility in IPv6 networks, which can ensure the operation of access control when a mobile node roams in these domains with different polices, with decreased delay of access negotiation and cost of delivering messages.

  1. Identity driven Capability based Access Control (ICAC) Scheme for the Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2012-01-01

    Internet of Things (IoT) becomes discretionary part of everyday life. Scalability and manageability is daunting due to unbounded number of devices and services. Access control and authorization in IoT with least privilege is equally important to establish secure communication between multiple...... devices and services. In this paper, the concept of capability for access control is introduced where the identities of the involved devices are entrenched in the access capabilities. Identity driven capability based access control (ICAC) scheme presented in this paper helps to alleviate issues related...

  2. A New Key-lock Method for User Authentication and Access Control

    Institute of Scientific and Technical Information of China (English)

    JI Dongyao; ZHANG Futai; WANG Yumin

    2001-01-01

    We propose a new key-lock methodfor user authentication and access control based onChinese remainder theorem, the concepts of the ac-cess control matrix, key-lock-pair, time stamp, and the NS public key protocol. Our method is dynamicand needs a minimum amount of computation in thesense that it only updates at most one key/lock foreach access request. We also demonstrate how an au-thentication protocol can be integrated into the ac-cess control method. By applying a time stamp, themethod can not only withstand replay attack, butalso strengthen the authenticating mechanism, whichcould not be achieved simultaneously in previous key-lock methods.

  3. Hybrid mathematical and rule-based system for transmission network planning in open access schemes

    Energy Technology Data Exchange (ETDEWEB)

    Kandil, M. S. [Electrical Department, Mansura University, (Egypt); EI-Debeiky, S. M. [Electrical Department, Ain Shams University, (Egypt); Hasanien, N. E. [Egyptian Electricity Authority, Studies and Researches Department, (Egypt)

    2001-09-01

    The paper presents a planning methodology using an application of a mathematical and a rule-based expert system (ES) to expand the transmission network in open access schemes. In this methodology, the ES suggests a realistic set of generation additions with proper economic signals to the participants, before proceeding with the transmission expansion. A feasible list of transmission alternatives is then assumed to accommodate the proposals for generation. A mathematical method is performed based on marginal cost allocation to optimise the location for the new generation and its transmission expansion scheme simultaneously for each alternative. The optimum alternative, which minimises the overall system's cost function and satisfies the future demand under different operating conditions, is obtained. The ES interacts with the power system planning tools to produce the optimum expansion plan. A practical application is given to demonstrate the effectiveness of the developed prototype system. (Author)

  4. Hybrid Connections: An Immigrant Researcher Maneuvering' Access to a Refugee Community

    Directory of Open Access Journals (Sweden)

    Eleni Oikonomidoy

    2009-03-01

    Full Text Available Reflecting on the journey of a novice immigrant researcher trying to negotiate access to members of a refugee community, this essay proposes the undeniable value of exploratory stages in cross-cultural research. Drawing insights from the researcher's field notes, it describes snapshots of the multiple ethical and practical dilemmas, which shaped the route of the researcher's journey. It proposes that interactions in extra-research spaces provide fertile ground for identification through flexible forms of belonging, which in turn endorse intercultural understanding. Nonetheless, nothing is decisive. The novice international cross-cultural researcher juggles continually between the roles of a pirate and a fellow traveler. URN: urn:nbn:de:0114-fqs090277

  5. Selective nitrogen capture by porous hybrid materials containing accessible transition metal ion sites

    Science.gov (United States)

    Yoon, Ji Woong; Chang, Hyunju; Lee, Seung-Joon; Hwang, Young Kyu; Hong, Do-Young; Lee, Su-Kyung; Lee, Ji Sun; Jang, Seunghun; Yoon, Tae-Ung; Kwac, Kijeong; Jung, Yousung; Pillai, Renjith S.; Faucher, Florian; Vimont, Alexandre; Daturi, Marco; Férey, Gérard; Serre, Christian; Maurin, Guillaume; Bae, Youn-Sang; Chang, Jong-San

    2017-05-01

    Selective dinitrogen binding to transition metal ions mainly covers two strategic domains: biological nitrogen fixation catalysed by metalloenzyme nitrogenases, and adsorptive purification of natural gas and air. Many transition metal-dinitrogen complexes have been envisaged for biomimetic nitrogen fixation to produce ammonia. Inspired by this concept, here we report mesoporous metal-organic framework materials containing accessible Cr(III) sites, able to thermodynamically capture N2 over CH4 and O2. This fundamental study integrating advanced experimental and computational tools confirmed that the separation mechanism for both N2/CH4 and N2/O2 gas mixtures is driven by the presence of these unsaturated Cr(III) sites that allows a much stronger binding of N2 over the two other gases. Besides the potential breakthrough in adsorption-based technologies, this proof of concept could open new horizons to address several challenges in chemistry, including the design of heterogeneous biomimetic catalysts through nitrogen fixation.

  6. Requirements for Control Room Computer-Based Procedures for use in Hybrid Control Rooms

    Energy Technology Data Exchange (ETDEWEB)

    Le Blanc, Katya Lee [Idaho National Lab. (INL), Idaho Falls, ID (United States); Oxstrand, Johanna Helene [Idaho National Lab. (INL), Idaho Falls, ID (United States); Joe, Jeffrey Clark [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2015-05-01

    Many plants in the U.S. are currently undergoing control room modernization. The main drivers for modernization are the aging and obsolescence of existing equipment, which typically results in a like-for-like replacement of analogue equipment with digital systems. However, the modernization efforts present an opportunity to employ advanced technology that would not only extend the life, but enhance the efficiency and cost competitiveness of nuclear power. Computer-based procedures (CBPs) are one example of near-term advanced technology that may provide enhanced efficiencies above and beyond like for like replacements of analog systems. Researchers in the LWRS program are investigating the benefits of advanced technologies such as CBPs, with the goal of assisting utilities in decision making during modernization projects. This report will describe the existing research on CBPs, discuss the unique issues related to using CBPs in hybrid control rooms (i.e., partially modernized analog control rooms), and define the requirements of CBPs for hybrid control rooms.

  7. Giant barocaloric effect in the ferroic organic-inorganic hybrid [TPrA][Mn(dca)3] perovskite under easily accessible pressures

    Science.gov (United States)

    Bermúdez-García, Juan M.; Sánchez-Andújar, Manuel; Castro-García, Socorro; López-Beceiro, Jorge; Artiaga, Ramón; Señarís-Rodríguez, María A.

    2017-06-01

    The fast growing family of organic-inorganic hybrid compounds has recently been attracting increased attention owing to the remarkable functional properties (magnetic, multiferroic, optoelectronic, photovoltaic) displayed by some of its members. Here we show that these compounds can also have great potential in the until now unexplored field of solid-state cooling by presenting giant barocaloric effects near room temperature already under easily accessible pressures in the hybrid perovskite [TPrA][Mn(dca)3] (TPrA: tetrapropylammonium, dca: dicyanamide). Moreover, we propose that this will not be an isolated example for such an extraordinary behaviour as many other organic-inorganic hybrids (metal-organic frameworks and coordination polymers) exhibit the basic ingredients to display large caloric effects which can be very sensitive to pressure and other external stimuli. These findings open up new horizons and great opportunities for both organic-inorganic hybrids and for solid-state cooling technologies.

  8. Giant barocaloric effect in the ferroic organic-inorganic hybrid [TPrA][Mn(dca)3] perovskite under easily accessible pressures.

    Science.gov (United States)

    Bermúdez-García, Juan M; Sánchez-Andújar, Manuel; Castro-García, Socorro; López-Beceiro, Jorge; Artiaga, Ramón; Señarís-Rodríguez, María A

    2017-06-01

    The fast growing family of organic-inorganic hybrid compounds has recently been attracting increased attention owing to the remarkable functional properties (magnetic, multiferroic, optoelectronic, photovoltaic) displayed by some of its members. Here we show that these compounds can also have great potential in the until now unexplored field of solid-state cooling by presenting giant barocaloric effects near room temperature already under easily accessible pressures in the hybrid perovskite [TPrA][Mn(dca)3] (TPrA: tetrapropylammonium, dca: dicyanamide). Moreover, we propose that this will not be an isolated example for such an extraordinary behaviour as many other organic-inorganic hybrids (metal-organic frameworks and coordination polymers) exhibit the basic ingredients to display large caloric effects which can be very sensitive to pressure and other external stimuli. These findings open up new horizons and great opportunities for both organic-inorganic hybrids and for solid-state cooling technologies.

  9. Massive Access Control Aided by Knowledge-Extraction for Co-Existing Periodic and Random Services over Wireless Clinical Networks.

    Science.gov (United States)

    Du, Qinghe; Zhao, Weidong; Li, Weimin; Zhang, Xuelin; Sun, Bo; Song, Houbing; Ren, Pinyi; Sun, Li; Wang, Yichen

    2016-07-01

    The prosperity of e-health is boosted by fast development of medical devices with wireless communications capability such as wearable devices, tiny sensors, monitoring equipments, etc., which are randomly distributed in clinic environments. The drastically-increasing population of such devices imposes new challenges on the limited wireless resources. To relieve this problem, key knowledge needs to be extracted from massive connection attempts dispersed in the air towards efficient access control. In this paper, a hybrid periodic-random massive access (HPRMA) scheme for wireless clinical networks employing ultra-narrow band (UNB) techniques is proposed. In particular, the proposed scheme towards accommodating a large population of devices include the following new features. On one hand, it can dynamically adjust the resource allocated for coexisting periodic and random services based on the traffic load learned from signal collision status. On the other hand, the resource allocation within periodic services is thoroughly designed to simultaneously align with the timing requests of differentiated services. Abundant simulation results are also presented to demonstrate the superiority of the proposed HPRMA scheme over baseline schemes including time-division multiple access (TDMA) and random access approach, in terms of channel utilization efficiency, packet drop ratio, etc., for the support of massive devices' services.

  10. Open access, readership, citations: a randomized controlled trial of scientific journal publishing.

    Science.gov (United States)

    Davis, Philip M

    2011-07-01

    Does free access to journal articles result in greater diffusion of scientific knowledge? Using a randomized controlled trial of open access publishing, involving 36 participating journals in the sciences, social sciences, and humanities, we report on the effects of free access on article downloads and citations. Articles placed in the open access condition (n=712) received significantly more downloads and reached a broader audience within the first year, yet were cited no more frequently, nor earlier, than subscription-access control articles (n=2533) within 3 yr. These results may be explained by social stratification, a process that concentrates scientific authors at a small number of elite research universities with excellent access to the scientific literature. The real beneficiaries of open access publishing may not be the research community but communities of practice that consume, but rarely contribute to, the corpus of literature.

  11. H-RBAC: A Hierarchical Access Control Model for SaaS Systems

    Directory of Open Access Journals (Sweden)

    Dancheng Li

    2011-08-01

    Full Text Available SaaS is a new way to deploy software as a hosted service and accessed over the Internet which means the customers don’t need to maintain the software code and data on their own servers. So it’s more important for SaaS systems to take security issues into account. Access control is a security mechanism that enables an authority to access to certain restricted areas and resources according to the permissions assigned to a user. Several access models have been proposed to realize the access control of single instance systems. However, most of the existing models couldn’t address the following SaaS system problems: (1 role name conflicts (2 cross-level management (3 the isomerism of tenants' access control (4 temporal delegation constraints. This paper describes a hierarchical RBAC model called H-RBAC solves all the four problems of SaaS systems mentioned above. This model addresses the SaaS system access control in both system level and tenant level. It combines the advantages of RBDM and ARBAC97 model and introduces temporal constraints to SaaS access control model. In addition, a practical approach to implement the access control module for SaaS systems based on H-RBAC model is also proposed in this paper.

  12. Access control and privilege management in electronic health record: a systematic literature review.

    Science.gov (United States)

    Jayabalan, Manoj; O'Daniel, Thomas

    2016-12-01

    This study presents a systematic literature review of access control for electronic health record systems to protect patient's privacy. Articles from 2006 to 2016 were extracted from the ACM Digital Library, IEEE Xplore Digital Library, Science Direct, MEDLINE, and MetaPress using broad eligibility criteria, and chosen for inclusion based on analysis of ISO22600. Cryptographic standards and methods were left outside the scope of this review. Three broad classes of models are being actively investigated and developed: access control for electronic health records, access control for interoperability, and access control for risk analysis. Traditional role-based access control models are extended with spatial, temporal, probabilistic, dynamic, and semantic aspects to capture contextual information and provide granular access control. Maintenance of audit trails and facilities for overriding normal roles to allow full access in emergency cases are common features. Access privilege frameworks utilizing ontology-based knowledge representation for defining the rules have attracted considerable interest, due to the higher level of abstraction that makes it possible to model domain knowledge and validate access requests efficiently.

  13. 75 FR 47464 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    Science.gov (United States)

    2010-08-06

    ... circumvention of copyright protection systems for access control technologies which was published July 27, 2010... Copyright Office 37 CFR Part 201 Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies AGENCY: Copyright Office, Library of Congress. ACTION: Final...

  14. 75 FR 61819 - First Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2010-10-06

    ... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this... Control Systems (Update to DO-230B): November 2, 2010 Welcome/Introductions/Administrative Remarks Agenda... Federal Aviation Administration First Meeting: RTCA Special Committee 224: Airport Security Access...

  15. 76 FR 16470 - Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2011-03-23

    ... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this... Control Systems (Update to DO-230B): Agenda April 13, 2011 Welcome/Introductions/Administrative Remarks... Federal Aviation Administration Sixth Meeting: RTCA Special Committee 224: Airport Security Access...

  16. 75 FR 80886 - Third Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2010-12-23

    ... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this... Control Systems (Update to DO-230B): Agenda January 13, 2011 Welcome/Introductions/Administrative Remarks... Federal Aviation Administration Third Meeting: RTCA Special Committee 224: Airport Security Access...

  17. Owner-Based Role-Based Access Control OB-RBAC

    NARCIS (Netherlands)

    Saffarian, Mohsen; Sadighi, Babak

    2010-01-01

    Administration of an access control model deals with the question of who is authorized to update policies defined on the basis of that model. One of the models whose administration has absorbed relatively large research is the Role-Based Access Control (RBAC) model. All the existing role-based admin

  18. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    NARCIS (Netherlands)

    Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew

    2007-01-01

    This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an a

  19. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    NARCIS (Netherlands)

    Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew

    2007-01-01

    This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an a

  20. A novel decentralized hierarchical access control scheme for the medical scenario

    DEFF Research Database (Denmark)

    Eskeland, Sigurd; Prasad, Neeli R.

    2006-01-01

    to be the property of the corresponding patient, it is justified that patients should have the opportunity to exert control over their own data. In this paper, we propose a cryptographic access control scheme allowing patients to grant medical teams authorizations to access their medical data. Moreover...

  1. Enhancing Security and Privacy in Video Surveillance through Role-Oriented Access Control Mechanism

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim

    the explicitly stated ones due to the hierarchical relations between the attributes of different entities. We implement a prototype of the proposed mechanism and demonstrate that the access control policies using our approach may be specified via eXtensible Access Control Markup Language (XACML)....

  2. Modelling and Analysing Access Control Policies in XACML 3.0

    DEFF Research Database (Denmark)

    Ramli, Carroline Dewi Puspa Kencana

    XACML (eXtensible Access Control Markup Language) is a prominent access control language that is widely adopted both in industry and academia. XACML is an international standard in the field of information security. The problem with XACML is that its specification is described in natural language...

  3. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    NARCIS (Netherlands)

    Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew

    2007-01-01

    This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an

  4. On the performance of shared access control strategy for femtocells

    KAUST Repository

    Magableh, Amer M.

    2013-02-18

    Femtocells can be employed in cellular systems to enhance the indoor coverage, especially in the areas with high capacity growing demands and high traffic rates. In this paper, we propose an efficient resource utilization protocol, named as shared access protocol (SAP), to enable the unauthorized macrocell user equipment to communicate with partially closed-access femtocell base station to improve and enhance the system performance. The system model considers a femtocell that is equipped with a total of N separated antennas or channels to multiplex independent traffic. Then, a set of N1 channels is used for closed access only by the authorized users, and the remaining set of channel resources can be used for open access by either authorized or unauthorized users upon their demands and spatial locations. For this system model, we obtain the signal-to-interference ratio characteristics, such as the distribution and the moment generating function, in closed forms for two fading models of indoor and outdoor environments. The signal-tointerference ratio statistics are then used to derive some important performance measures of the proposed SAP in closed form, such as the average bit error rate, outage probability, and average channel capacity for the two fading models under consideration. Numerical results for the obtained expressions are provided and supported by Monte Carlo simulations to validate the analytical development and study the effectiveness of the proposed SAP under different conditions. Copyright © 2012 John Wiley and Sons, Ltd.

  5. Quantum Control in Qutrit Systems Using Hybrid Rabi-STIRAP Pulses

    Directory of Open Access Journals (Sweden)

    Antti Vepsäläinen

    2016-11-01

    Full Text Available We introduce and analyze theoretically a procedure that combines slow adiabatic stimulated Raman adiabatic passage (STIRAP manipulation with short nonadiabatic Rabi pulses to produce any desired three-level state in a qutrit system. In this protocol, the fast pulses create superpositions between the ground state and the first excited state, while the slow pulses transfer an arbitrary population to the second excited state via STIRAP. We demonstrate high-fidelity quantum control of the level populations and phases and we characterize the errors incurred under the breakdown of adiabaticity. In a configuration where an ancillary state is available, we show how to realize a nondemolition monitoring of the relative phases. These methods are general and can be implemented on any experimental platform where a quantum system with at least three accessible energy levels is available. We discuss here in detail experimental implementations in circuit quantum electrodynamics (QED based on the results obtained with a transmon, where the control of population using the hybrid Rabi-STIRAP sequence has been achieved.

  6. Active vibration and noise control by hybrid active acoustic panels

    Energy Technology Data Exchange (ETDEWEB)

    Stoebener, U.; Gaul, L. [Stuttgart Univ. (Germany). Inst. A fuer Mechanik

    2001-07-01

    In the present paper a hybrid passive and active treatment for vibration and noise reduction of plate type structures is proposed. The treatment is manufactured as sandwich structure and is called hybrid active acoustic panel. The passive component is used to reduce the vibration and sound radiation for high frequencies whereas the active part of the system is designed for the low frequency range. By selecting the thickness of the passive damping layer a certain frequency limit is defined, which divides the high and low frequency range. The actuator and sensor layout of the active component is evaluated by using the mode shapes of the low frequency range. According to the evaluated layout a hybrid active acoustic panel is manufactured and experimentally tested. The experimental results validate the proposed concept. (orig.)

  7. Hybrid Asymmetric Space Vector Modulation for inverter based direct torque control induction motor drive

    Directory of Open Access Journals (Sweden)

    Nandakumar Sundararaju

    2014-05-01

    Full Text Available This paper proposes novel hybrid asymmetric space vector modulation technique for inverter operated direct torque control induction motor drive. The hybridization process is performed by the combination of continuous asymmetric space vector modulation pulse width technique (ASVPWM and fuzzy operated discontinuous ASVPWM technique. Combination process is based on pulse mismatching technique. Pulse mismatching technique helps to reduce the active region of the switch. Finally, optimal pulses are applied to control the inverter. The optimal hybrid pulse condense switching losses of the inverter and also improves the operating performance of the direct torque control (DTC based drive system like smooth dynamic response in speed reversal, minimum torque error, settling time of speed. Simulation results of proposed hybrid asymmetric space vector pulse width modulation technique to direct torque control (HASVPWM-DTC approach has been carried out by using Matlab-Simulink environment.

  8. NEURAL NETWORKS CONTROL OF THE HYBRID POWER UNIT BASED ON THE METHOD OF ADAPTIVE CRITICS

    Directory of Open Access Journals (Sweden)

    S. Serikov

    2012-01-01

    Full Text Available The formal statement of the optimization problem of hybrid vehicle power unit control is given. Its solving by neural networks method application on the basis of adaptive critic is considered.

  9. Modeling, control, and simulation of grid connected intelligent hybrid battery/photovoltaic system using new hybrid fuzzy-neural method.

    Science.gov (United States)

    Rezvani, Alireza; Khalili, Abbas; Mazareie, Alireza; Gandomkar, Majid

    2016-07-01

    Nowadays, photovoltaic (PV) generation is growing increasingly fast as a renewable energy source. Nevertheless, the drawback of the PV system is its dependence on weather conditions. Therefore, battery energy storage (BES) can be considered to assist for a stable and reliable output from PV generation system for loads and improve the dynamic performance of the whole generation system in grid connected mode. In this paper, a novel topology of intelligent hybrid generation systems with PV and BES in a DC-coupled structure is presented. Each photovoltaic cell has a specific point named maximum power point on its operational curve (i.e. current-voltage or power-voltage curve) in which it can generate maximum power. Irradiance and temperature changes affect these operational curves. Therefore, the nonlinear characteristic of maximum power point to environment has caused to development of different maximum power point tracking techniques. In order to capture the maximum power point (MPP), a hybrid fuzzy-neural maximum power point tracking (MPPT) method is applied in the PV system. Obtained results represent the effectiveness and superiority of the proposed method, and the average tracking efficiency of the hybrid fuzzy-neural is incremented by approximately two percentage points in comparison to the conventional methods. It has the advantages of robustness, fast response and good performance. A detailed mathematical model and a control approach of a three-phase grid-connected intelligent hybrid system have been proposed using Matlab/Simulink.

  10. Hybrid Control of a Two-Wheeled Automatic-Balancing Robot with Backlash Feature

    DEFF Research Database (Denmark)

    Løhndorf, Petar Durdevic; Yang, Zhenyu

    2013-01-01

    This paper investigates the application of hybrid control for an automatic balancing robot system subject to backlash effect. The developed controller is a type of sliding mode controller, refereed to as a switching controller, with respect to different situations i.e., whether the backlash...

  11. A dynamic access control method based on QoS requirement

    Science.gov (United States)

    Li, Chunquan; Wang, Yanwei; Yang, Baoye; Hu, Chunyang

    2013-03-01

    A dynamic access control method is put forward to ensure the security of the sharing service in Cloud Manufacturing, according to the application characteristics of cloud manufacturing collaborative task. The role-based access control (RBAC) model is extended according to the characteristics of cloud manufacturing in this method. The constraints are considered, which are from QoS requirement of the task context to access control, based on the traditional static authorization. The fuzzy policy rules are established about the weighted interval value of permissions. The access control authorities of executable service by users are dynamically adjusted through the fuzzy reasoning based on the QoS requirement of task. The main elements of the model are described. The fuzzy reasoning algorithm of weighted interval value based QoS requirement is studied. An effective method is provided to resolve the access control of cloud manufacturing.

  12. The Study of Access Control for Service-Oriented Computing in Internet of Things

    Directory of Open Access Journals (Sweden)

    Guoping Zhang

    2012-06-01

    Full Text Available In Internet of Things, computing and processing of information is the core supporting. In this paper, we introduce “Service-Oriented Computing” to solve the computing and processing of information in IoT. However, a key challenge in service-oriented environment is the design of effective access control schemas.We put forward a model of Workflow -oriented Attributed Based Access Control (WABAC, and an access control framework based on WABAC model. WABAC model grants and adapts permissions to subjects according to subject atttribute, resource attribute, environment attribute and current task, meeting access control request of SOC. Using the approach presented can effectively enhance the access control security for SOC applications, and prevent the abuse of subject permissions.

  13. Capability-based Access Control Delegation Model on the Federated IoT Network

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.

    2012-01-01

    Flexibility is an important property for general access control system and especially in the Internet of Things (IoT), which can be achieved by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has...... no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. To this end, this paper presents an access delegation method with security considerations based on Capability-based Context Aware Access Control (CCAAC) model intended for federated...... machine-to-machine communication or IoT networks. The main idea of our proposed model is that the access delegation is realized by means of a capability propagation mechanism, and incorporating the context information as well as secure capability propagation under federated IoT environments. By using...

  14. A Hybrid System for Acquisition of and Access to the Data from Foundry Technical Standards

    Directory of Open Access Journals (Sweden)

    A. Macioł

    2007-07-01

    Full Text Available The growing importance of automatized systems for interchange of commercial and technical information prompts searching for new forms of knowledge modelling. One of the possible solutions presented in this article is the use of relational databases for acquisition of information comprised in technical standards and of a rule-based reasoning system providing access to these bases. The study describes the structure of a database created under the assumption that concepts describing knowledge will be recorded in data collecting system and not in relational schema. The user is free to define by himself the structure of the knowledge without the need of introducing any changes to the relational schema. At the same time, the reasoning system enables very efficient knowledge searching. At present, tests are carried out on a software operating on a MS SQL Server. The project work and test performance of the system confirm that the adopted assumptions have been right and correct. The development of a new interface is anticipated using internet techniques. As a next step, the information resources collected in the system will be successively expanded using also information sources other than the technical standards.

  15. Multi-agent system-based event-triggered hybrid control scheme for energy internet

    DEFF Research Database (Denmark)

    Dou, Chunxia; Yue, Dong; Han, Qing Long

    2017-01-01

    This paper is concerned with an event-triggered hybrid control for the energy Internet based on a multi-agent system approach with which renewable energy resources can be fully utilized to meet load demand with high security and well dynamical quality. In the design of control, a multi-agent system...... framework is first constructed. Then, to describe fully the hybrid behaviors of all distributed energy resources and logical relationships between them, a differential hybrid Petri-net model is established, which is an original work. The most important contributions based on this model propose four types...

  16. Intelligent controller of a flexible hybrid robot machine for ITER assembly and maintenance

    Energy Technology Data Exchange (ETDEWEB)

    Al-saedi, Mazin I., E-mail: mazin.al-saedi@lut.fi; Wu, Huapeng; Handroos, Heikki

    2014-10-15

    Highlights: • Studying flexible multibody dynamic of hybrid parallel robot. • Investigating fuzzy-PD controller to control a hybrid flexible hydraulically driven robot. • Investigating ANFIS-PD controller to control a hybrid flexible robot. Compare to traditional PID this method gives better performance. • Using the equilibrium of reaction forces between the parallel and serial parts of hybrid robot to control the serial part hydraulically driven. - Abstract: The assembly and maintenance of International Thermonuclear Experimental Reactor (ITER) vacuum vessel (VV) is highly challenging since the tasks performed by the robot involve welding, material handling, and machine cutting from inside the VV. To fulfill the tasks in ITER application, this paper presents a hybrid redundant manipulator with four DOFs provided by serial kinematic axes and six DOFs by parallel mechanism. Thus, in machining, to achieve greater end-effector trajectory tracking accuracy for surface quality, a robust control of the actuators for the flexible link has to be deduced. In this paper, the intelligent control of a hydraulically driven parallel robot part based on the dynamic model and two control schemes have been investigated: (1) fuzzy-PID self tuning controller composed of the conventional PID control and with fuzzy logic; (2) adaptive neuro-fuzzy inference system-PID (ANFIS-PID) self tuning of the gains of the PID controller, which are implemented independently to control each hydraulic cylinder of the parallel robot based on rod position predictions. The obtained results of the fuzzy-PID and ANFIS-PID self tuning controller can reduce more tracking errors than the conventional PID controller. Subsequently, the serial component of the hybrid robot can be analyzed using the equilibrium of reaction forces at the universal joint connections of the hexa-element. To achieve precise positional control of the end effector for maximum precision machining, the hydraulic cylinder should

  17. Control and fault diagnosis based sliding mode observer of a multicellular converter: Hybrid approach

    KAUST Repository

    Benzineb, Omar

    2013-01-01

    In this article, the diagnosis of a three cell converter is developed. The hybrid nature of the system represented by the presence of continuous and discrete dynamics is taken into account in the control design. The idea is based on using a hybrid control and an observer-type sliding mode to generate residuals from the observation errors of the system. The simulation results are presented at the end to illustrate the performance of the proposed approach. © 2013 FEI STU.

  18. An effective and secure key-management scheme for hierarchical access control in E-medicine system.

    Science.gov (United States)

    Odelu, Vanga; Das, Ashok Kumar; Goswami, Adrijit

    2013-04-01

    Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against 'man-in-the-middle attack' or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.'s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu-Chen's scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu-Chen's scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu-Chen's scheme, Nikooghadam-Zakerolhosseini's scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems.

  19. A non-axial superconducting magnet design for optimized patient access and minimal SAD for use in a Linac-MR hybrid: proof of concept

    Science.gov (United States)

    Yaghoobpour Tari, Shima; Wachowicz, Keith; Fallone, B. Gino

    2017-04-01

    A prototype rotating hybrid magnetic resonance imaging system and linac has been developed to allow for simultaneous imaging and radiation delivery parallel to B 0. However, the design of a compact magnet capable of rotation in a small vault with sufficient patient access and a typical clinical source-to-axis distance (SAD) is challenging. This work presents a novel superconducting magnet design as a proof of concept that allows for a reduced SAD and ample patient access by moving the superconducting coils to the side of the yoke. The yoke and pole-plate structures are shaped to direct the magnetic flux appropriately. The outer surface of the pole plate is optimized subject to the minimization of a cost function, which evaluates the uniformity of the magnetic field over an ellipsoid. The magnetic field calculations required in this work are performed with the 3D finite element method software package Opera-3D. Each tentative design strategy is virtually modeled in this software package, which is externally controlled by MATLAB, with its key geometries defined as variables. The optimization variables are the thickness of the pole plate at control points distributed over the pole plate surface. A novel design concept as a superconducting non-axial magnet is introduced, which could create a large uniform B 0 magnetic field with fewer geometric restriction. This non-axial 0.5 T superconducting magnet has a moderately reduced SAD of 123 cm and a vertical patient opening of 68 cm. This work is presented as a proof of principle to investigate the feasibility of a non-axial magnet with the coils located around the yoke, and the results encourage future design optimizations to maximize the benefits of this non-axial design.

  20. A non-axial superconducting magnet design for optimized patient access and minimal SAD for use in a Linac-MR hybrid: proof of concept.

    Science.gov (United States)

    Yaghoobpour Tari, Shima; Wachowicz, Keith; Gino Fallone, B

    2017-04-21

    A prototype rotating hybrid magnetic resonance imaging system and linac has been developed to allow for simultaneous imaging and radiation delivery parallel to B 0. However, the design of a compact magnet capable of rotation in a small vault with sufficient patient access and a typical clinical source-to-axis distance (SAD) is challenging. This work presents a novel superconducting magnet design as a proof of concept that allows for a reduced SAD and ample patient access by moving the superconducting coils to the side of the yoke. The yoke and pole-plate structures are shaped to direct the magnetic flux appropriately. The outer surface of the pole plate is optimized subject to the minimization of a cost function, which evaluates the uniformity of the magnetic field over an ellipsoid. The magnetic field calculations required in this work are performed with the 3D finite element method software package Opera-3D. Each tentative design strategy is virtually modeled in this software package, which is externally controlled by MATLAB, with its key geometries defined as variables. The optimization variables are the thickness of the pole plate at control points distributed over the pole plate surface. A novel design concept as a superconducting non-axial magnet is introduced, which could create a large uniform B 0 magnetic field with fewer geometric restriction. This non-axial 0.5 T superconducting magnet has a moderately reduced SAD of 123 cm and a vertical patient opening of 68 cm. This work is presented as a proof of principle to investigate the feasibility of a non-axial magnet with the coils located around the yoke, and the results encourage future design optimizations to maximize the benefits of this non-axial design.

  1. Frequency Stability of Hierarchically Controlled Hybrid Photovoltaic-Battery-Hydropower Microgrids

    DEFF Research Database (Denmark)

    Guan, Yajuan; Vasquez, Juan Carlos; Guerrero, Josep M.;

    2014-01-01

    analysis is presented based on small signal models of the hybrid PV-HP microgrid, including 2 MWp PV station, 15.2 MWh battery storage system, and 12.8 MVA hydropower plant. Simulation results of the microgrid and experimental results on a scaled-down laboratory prototype verify the effectiveness......Hybrid photovolvaic battery-hydropower microgrids can increase electricity accessibility and availability in remote areas. In those microgrids with grid-connected and islanded modes capabilities, seamless transition between both modes is needed as well. However, the different resources...

  2. Hybrid Control Design for a Wheeled Mobile Robot

    DEFF Research Database (Denmark)

    Bak, Thomas; Bendtsen, Jan Dimon; Ravn, Anders Peter

    We present a hybrid systems solution to the problem of trajectory tracking for a four-wheel steered four-wheel driven mobile robot. The robot is modelled as a non-holonomic dynamic system subject to pure rolling, no-slip constraints. Under normal driving conditions, a nonlinear trajectory tracking...

  3. Secure Remote Access Issues in a Control Center Environment

    Science.gov (United States)

    Pitts, Lee; McNair, Ann R. (Technical Monitor)

    2002-01-01

    The ISS finally reached an operational state and exists for local and remote users. Onboard payload systems are managed by the Huntsville Operations Support Center (HOSC). Users access HOSC systems by internet protocols in support of daily operations, preflight simulation, and test. In support of this diverse user community, a modem security architecture has been implemented. The architecture has evolved over time from an isolated but open system to a system which supports local and remote access to the ISS over broad geographic regions. This has been accomplished through the use of an evolved security strategy, PKI, and custom design. Through this paper, descriptions of the migration process and the lessons learned are presented. This will include product decision criteria, rationale, and the use of commodity products in the end architecture. This paper will also stress the need for interoperability of various products and the effects of seemingly insignificant details.

  4. Predictive control strategy for power management in parallel hybrid-electric vehicle

    DEFF Research Database (Denmark)

    Nodeh, Mohammad Taqi; Gholizade, Hossein; Hajizadeh, Amin

    2016-01-01

    In this paper, a hybrid model-based nonlinear optimal control method is used to compute the optimal power distribution and power management in parallel hybrid electric vehicles. In the power management strategy, for optimal power distribution between the internal combustion engine, electrical...... system and the other subsystems, nonlinear predictive control is applied. In order to achieve this goal, a hierarchical control structure is utilized. This type of control structure consists of three levels of monitoring, coordinating and local controllers. Nonlinear modeling and performance index...... in the proposed method should be formulated at the regulatory level of the controller. Discrete dynamic mode of operation (motor-generator) in hybrid electric vehicle requires to use a dual-mode switch model and to define an alternative expression of performance index for the optimal control problem...

  5. Predictive control strategies for energy saving of hybrid electric vehicles based on traffic light information

    Directory of Open Access Journals (Sweden)

    Kaijiang YU

    2015-10-01

    Full Text Available As the conventional control method for hybrid electric vehicle doesn’t consider the effect of known traffic light information on the vehicle energy management, this paper proposes a model predictive control intelligent optimization strategies based on traffic light information for hybrid electric vehicles. By building the simplified model of the hybrid electric vehicle and adopting the continuation/generalized minimum residual method, the model prediction problem is solved. The simulation is conducted by using MATLAB/Simulink platform. The simulation results show the effectiveness of the proposed model of the traffic light information, and that the proposed model predictive control method can improve fuel economy and the real-time control performance significantly. The research conclusions show that the proposed control strategy can achieve optimal control of the vehicle trajectory, significantly improving fuel economy of the vehicle, and meet the system requirements for the real-time optimal control.

  6. Controls Over the Contractor Common Access Card Life Cycle

    Science.gov (United States)

    2008-10-10

    Identification System SES Senior Executive Service SPOC Service Point of Contact TASM Trusted Agent Security Manager USD (AT&L) Under...the final report by October 31, 2008. 53 Finding D. Oversight of Common Access Card Sponsors DoD CVS Service Points of Contact ( SPOCs ...authorization to approve contractor CACs. Organization of CAC Application Sites Each Service agency has an SPOC who is responsible for coordinating with

  7. Evolutionary Games for Multiple Access Control: From Egoism to Altruism

    OpenAIRE

    Gaiech, Houssem; El-Azouzi, Rachid; Haddad, Majed; Altman, Eitan; Mabrouki, Issam

    2014-01-01

    International audience; This paper studies multiple access games within a large population of mobiles decomposed into several groups. Mobiles interfere with each other through many local interactions. We assume that each mobile (or player) cooperates with its group by taking into account the performance of its group. We parameterize the degree of cooperation which allows to cover the fully non-cooperative behavior, the fully cooperative behavior, and even more, the fully altruistic behavior, ...

  8. Characterization of accessibility for affine connection control systems at some points with nonzero velocity

    CERN Document Server

    Barbero-Liñán, María

    2011-01-01

    Affine connection control systems are mechanical control systems that model a wide range of real systems such as robotic legs, hovercrafts, planar rigid bodies, rolling pennies, snakeboards and so on. In 1997 the accessibility and a particular notion of controllability was intrinsically described by A. D. Lewis and R. Murray at points of zero velocity. Here, we present a novel generalization of the description of accessibility algebra for those systems at some points with nonzero velocity as long as the affine connection restricts to the distribution given by the symmetric closure. The results are used to describe the accessibility algebra of different mechanical control systems.

  9. Requirements and Challenges of Location-Based Access Control in Healthcare Emergency Response

    DEFF Research Database (Denmark)

    Vicente, Carmen Ruiz; Kirkpatrick, Michael; Ghinita, Gabriel

    2009-01-01

    Recent advances in positioning and tracking technologies have led to the emergence of novel location-based applications that allow participants to access information relevant to their spatio-temporal context. Traditional access control models, such as role-based access control (RBAC), are not suf......Recent advances in positioning and tracking technologies have led to the emergence of novel location-based applications that allow participants to access information relevant to their spatio-temporal context. Traditional access control models, such as role-based access control (RBAC......), are not sufficient to address the new challenges introduced by these location-based applications. Several recent research efforts have enhanced RBAC with spatio-temporal features. Nevertheless, the state-of-the-art does not deal with mobility of both subjects and objects and does not support the utilization...... of complex access control decisions based on spatio-temporal relationships among subjects and objects. Furthermore, such relationships change frequently in dynamic environments, requiring efficient mechanisms to monitor and re-evaluate access control decisions. In this position paper, we present a healthcare...

  10. An application-layer based centralized information access control for VPN

    Institute of Scientific and Technical Information of China (English)

    OUYANG Kai; ZHOU Jing-li; XIA Tao; YU Sheng-sheng

    2006-01-01

    With the rapid development of Virtual Private Network (VPN), many companies and organizations use VPN to implement their private communication. Traditionally, VPN uses security protocols to protect the confidentiality of data, the message integrity and the endpoint authentication. One core technique of VPN is tunneling, by which clients can access the internal servers traversing VPN. However, the tunneling technique also introduces a concealed security hole. It is possible that ifone vicious user can establish tunneling by the VPN server, he can compromise the internal servers behind the VPN server. So this paper presents a novel Application-layer based Centralized Information Access Control (ACIAC) for VPN to solve this problem.To implement an efficient, flexible and multi-decision access control model, we present two key techniques to ACIAC-the centralized management mechanism and the stream-based access control. Firstly, we implement the information center and the constraints/events center for ACIAC. By the two centers, we can provide an abstract access control mechanism, and the material access control can be decided dynamically by the ACIAC's constraint/event mechanism. Then we logically classify the VPN communication traffic into the access stream and the data stream so that we can tightly couple the features of VPN communication with the access control model. We also provide the design of our ACIAC prototype in this paper.

  11. Hybrid PID and PSO-based control for electric power assist steering system for electric vehicle

    Science.gov (United States)

    Hanifah, R. A.; Toha, S. F.; Ahmad, S.

    2013-12-01

    Electric power assist steering (EPAS) system provides an important significance in enhancing the driving performance of a vehicle with its energy-conserving features. This paper presents a hybrid PID (Proportional-Integral-Derivative) and particle swarm optimization (PSO) based control scheme to minimize energy consumption for EPAS. This single objective optimization scheme is realized using the PSO technique in searching for best gain parameters of the PID controller. The fast tuning feature of this optimum PID controller produced high-quality solutions. Simulation results show the performance and effectiveness of the hybrid PSO-PID based controller as opposed to the conventional PID controller.

  12. Hybrid Active and Passive Control of Vibratory Power Flow in Flexible Isolation System

    Directory of Open Access Journals (Sweden)

    Y.P. Xiong

    2000-01-01

    Full Text Available A hybrid active and passive vibration control strategy is developed to reduce the total power flows from machines, subject to multiple excitations, to supporting flexible structures. The dynamic interactions between machines, controllers, and receiving structures are studied. A force feedback control process governed by a proportional control law is adopted to produce active control forces to cancel the transmitted forces in the mounts. Computational simulations of a simple and a multiple dimensional hybrid vibration isolation system are performed to study the force transmissibility and the total power flows from vibration sources through active and passive isolators to the supporting structures. The investigation focuses on the effects of a hybrid control approach to the reduction of power flow transmissions and the influence of the dynamic characteristics of the control on power flow spectra. The hybrid control mechanism is synthesised from the power flow analysis. Conclusions and control strategies, well supported by numerical simulations, are deduced providing very useful guidelines for hybrid vibration isolation design.

  13. A General Attribute and Rule Based Role-Based Access Control Model

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Growing numbers of users and many access control policies which involve many different resource attributes in service-oriented environments bring various problems in protecting resource. This paper analyzes the relationships of resource attributes to user attributes in all policies, and propose a general attribute and rule based role-based access control(GAR-RBAC) model to meet the security needs. The model can dynamically assign users to roles via rules to meet the need of growing numbers of users. These rules use different attribute expression and permission as a part of authorization constraints, and are defined by analyzing relations of resource attributes to user attributes in many access policies that are defined by the enterprise. The model is a general access control model, and can support many access control policies, and also can be used to wider application for service. The paper also describes how to use the GAR-RBAC model in Web service environments.

  14. A Fault-Tolerant Emergency-Aware Access Control Scheme for Cyber-Physical Systems

    CERN Document Server

    Wu, Guowei; Xia, Feng; Yao, Lin

    2012-01-01

    Access control is an issue of paramount importance in cyber-physical systems (CPS). In this paper, an access control scheme, namely FEAC, is presented for CPS. FEAC can not only provide the ability to control access to data in normal situations, but also adaptively assign emergency-role and permissions to specific subjects and inform subjects without explicit access requests to handle emergency situations in a proactive manner. In FEAC, emergency-group and emergency-dependency are introduced. Emergencies are processed in sequence within the group and in parallel among groups. A priority and dependency model called PD-AGM is used to select optimal response-action execution path aiming to eliminate all emergencies that occurred within the system. Fault-tolerant access control polices are used to address failure in emergency management. A case study of the hospital medical care application shows the effectiveness of FEAC.

  15. Control and design of volumetric composition in pultruded hybrid fibre composites

    DEFF Research Database (Denmark)

    Madsen, Bo; Hashemi, Fariborz; Tahir, Paridah

    2016-01-01

    Hybrid composites consist of two of more fibre phases in a common matrix phase. This is a challenge for the control and design of the volumetric composition and microstructural uniformity of such composites. In the present study, a model is presented for the prediction of the complete volumetric...... composition (i.e. volume fractions of fibres, matrix and porosity) in hybrid fibre composites. The model is based on a constant local fibre volume fraction criterion. Good agreement is found between model predictions and experimental data of pultruded hybrid kenaf/glass fibre composites with variable hybrid...... fibre weight mixing ratios. To demonstrate the suitability of the model, simulations are performed for four different cases of volumetric composition in hybrid kenaf/glass composites....

  16. Controlled isotropic or anisotropic nanoscale growth of coordination polymers: formation of hybrid coordination polymer particles.

    Science.gov (United States)

    Lee, Hee Jung; Cho, Yea Jin; Cho, Won; Oh, Moonhyun

    2013-01-22

    The ability to fabricate multicompositional hybrid materials in a precise and controlled manner is one of the primary goals of modern materials science research. In addition, an understanding of the phenomena associated with the systematic growth of one material on another can facilitate the evolution of multifunctional hybrid materials. Here, we demonstrate precise manipulation of the isotropic and/or anisotropic nanoscale growth of various coordination polymers (CPs) to obtain heterocompositional hybrid coordination polymer particles. Chemical composition analyses conducted at every growth step reveal the formation of accurately assembled hybrid nanoscale CPs, and microscopy images are used to examine the morphology of the particles and visualize the hybrid structures. The dissimilar growth behavior, that is, growth in an isotropic or anisotropic fashion, is found to be dependent on the size of the metal ions involved within the CPs.

  17. Performance and robustness of hybrid model predictive control for controllable dampers in building models

    Science.gov (United States)

    Johnson, Erik A.; Elhaddad, Wael M.; Wojtkiewicz, Steven F.

    2016-04-01

    A variety of strategies have been developed over the past few decades to determine controllable damping device forces to mitigate the response of structures and mechanical systems to natural hazards and other excitations. These "smart" damping devices produce forces through passive means but have properties that can be controlled in real time, based on sensor measurements of response across the structure, to dramatically reduce structural motion by exploiting more than the local "information" that is available to purely passive devices. A common strategy is to design optimal damping forces using active control approaches and then try to reproduce those forces with the smart damper. However, these design forces, for some structures and performance objectives, may achieve high performance by selectively adding energy, which cannot be replicated by a controllable damping device, causing the smart damper performance to fall far short of what an active system would provide. The authors have recently demonstrated that a model predictive control strategy using hybrid system models, which utilize both continuous and binary states (the latter to capture the switching behavior between dissipative and non-dissipative forces), can provide reductions in structural response on the order of 50% relative to the conventional clipped-optimal design strategy. This paper explores the robustness of this newly proposed control strategy through evaluating controllable damper performance when the structure model differs from the nominal one used to design the damping strategy. Results from the application to a two-degree-of-freedom structure model confirms the robustness of the proposed strategy.

  18. Controlling chemical dosing for sulfide mitigation in sewer networks using a hybrid automata control strategy.

    Science.gov (United States)

    Liu, Yiqi; Ganigué, Ramon; Sharma, Keshab; Yuan, Zhiguo

    2013-01-01

    Chemicals such as magnesium hydroxide (Mg(OH)2) and iron salts are widely used to control sulfide-induced corrosion in sewer networks composed of interconnected sewer pipe lines and pumping stations. Chemical dosing control is usually non-automatic and based on experience, thus often resulting in sewage reaching the discharge point receiving inadequate or even no chemical dosing. Moreover, intermittent operation of pumping stations makes traditional control theory inadequate. A hybrid automata-based (HA-based) control method is proposed in this paper to coordinate sewage pumping station operations by considering their states, thereby ensuring suitable chemical concentrations in the network discharge. The performance of the proposed control method was validated through a simulation study of a real sewer network using real sewage flow data. The physical, chemical and biological processes were simulated using the well-established SeweX model. The results suggested that the HA-based control strategy significantly improved chemical dosing control performance and sulfide mitigation in sewer networks, compared to the current common practice.

  19. Single axis controlled hybrid magnetic bearing for left ventricular assist device: hybrid core and closed magnetic circuit.

    Science.gov (United States)

    da Silva, Isaias; Horikawa, Oswaldo; Cardoso, Jose R; Camargo, Fernando A; Andrade, Aron J P; Bock, Eduardo G P

    2011-05-01

    In previous studies, we presented main strategies for suspending the rotor of a mixed-flow type (centrifugal and axial) ventricular assist device (VAD), originally presented by the Institute Dante Pazzanese of Cardiology (IDPC), Brazil. Magnetic suspension is achieved by the use of a magnetic bearing architecture in which the active control is executed in only one degree of freedom, in the axial direction of the rotor. Remaining degrees of freedom, excepting the rotation, are restricted only by the attraction force between pairs of permanent magnets. This study is part of a joint project in development by IDPC and Escola Politecnica of São Paulo University, Brazil. This article shows advances in that project, presenting two promising solutions for magnetic bearings. One solution uses hybrid cores as electromagnetic actuators, that is, cores that combine iron and permanent magnets. The other solution uses actuators, also of hybrid type, but with the magnetic circuit closed by an iron core. After preliminary analysis, a pump prototype has been developed for each solution and has been tested. For each prototype, a brushless DC motor has been developed as the rotor driver. Each solution was evaluated by in vitro experiments and guidelines are extracted for future improvements. Tests have shown good results and demonstrated that one solution is not isolated from the other. One complements the other for the development of a single-axis-controlled, hybrid-type magnetic bearing for a mixed-flow type VAD.

  20. Proximity-based access control for context-sensitive information provision in SOA-based systems

    Science.gov (United States)

    Rajappan, Gowri; Wang, Xiaofei; Grant, Robert; Paulini, Matthew

    2014-06-01

    Service Oriented Architecture (SOA) has enabled open-architecture integration of applications within an enterprise. For net-centric Command and Control (C2), this elucidates information sharing between applications and users, a critical requirement for mission success. The Information Technology (IT) access control schemes, which arbitrate who gets access to what information, do not yet have the contextual knowledge to dynamically allow this information sharing to happen dynamically. The access control might prevent legitimate users from accessing information relevant to the current mission context, since this context may be very different from the context for which the access privileges were configured. We evaluate a pair of data relevance measures - proximity and risk - and use these as the basis of dynamic access control. Proximity is a measure of the strength of connection between the user and the resource. However, proximity is not sufficient, since some data might have a negative impact, if leaked, which far outweighs importance to the subject's mission. For this, we use a risk measure to quantify the downside of data compromise. Given these contextual measures of proximity and risk, we investigate extending Attribute-Based Access Control (ABAC), which is used by the Department of Defense, and Role-Based Access Control (RBAC), which is widely used in the civilian market, so that these standards-based access control models are given contextual knowledge to enable dynamic information sharing. Furthermore, we consider the use of such a contextual access control scheme in a SOA-based environment, in particular for net-centric C2.

  1. Hybrid model predictive control applied to switching control of burner load for a compact marine boiler design

    DEFF Research Database (Denmark)

    Solberg, Brian; Andersen, Palle; Maciejowski, Jan

    2008-01-01

    This paper discusses the application of hybrid model predictive control to control switching between different burner modes in a novel compact marine boiler design. A further purpose of the present work is to point out problems with finite horizon model predictive control applied to systems for w...

  2. For a VHF radio access network hybrid channel access scheme%一种针对超短波电台接入网的混合信道接入方案

    Institute of Scientific and Technical Information of China (English)

    黄伟强; 谢映海

    2016-01-01

    For the VHF radio access network provides a hybrid channel access scheme,the method uses the civilian access technology of some advanced concepts,combined with military frequency hopping radio network of the special requirements of business applications, using a static TDMA,dynamic TDMA and frequency division multiple access FDMA hybrid channel access strategy, realize the multi-user and multi service transmission QoS guarantee,to meet the special transmission requirement of military operations.%为超短波电台接入网提供了一种混合信道接入方案,方案借鉴了民用接入技术的一些先进理念,并结合军用跳频电台网络的特殊业务应用需求,采用了一种静态TDMA、动态TDMA和频分多址FDMA的混合信道接入策略,实现了多用户多业务传输的QOS保障,满足了军用业务的特殊传输需求。

  3. H∞ Controller Design for Asynchronous Hybrid Systems with Multiple Delays

    Directory of Open Access Journals (Sweden)

    Xiaoqiang Sun

    2016-01-01

    Full Text Available Solutions for the H∞ synthesis problems of asynchronous hybrid systems with input-output delays are proposed. The continuous-time lifting approach of sampled-data systems is extended to a hybrid system with multiple delays, and some feasible formulas to calculate the operators of the equivalent discrete-time (DT system are given. Different from the existing methods derived from symplectic pair theory or by state augmentation, a Lyapunov-Krasovskii functional to solve the synthesis problem is explicitly constructed. The delay-dependent stability conditions we obtained can be described in terms of nonstrict linear matrix inequalities (LMIs, which are much more convenient to be solved by LMI tools.

  4. Evolved finite state controller for hybrid system in reduced search space

    DEFF Research Database (Denmark)

    Dupuis, Jean-Francois; Fan, Zhun

    2009-01-01

    This paper presents an evolutionary methodology to automatically generate finite state automata (FSA) controllers to control hybrid systems. The proposed approach reduces the search space using an invariant analysis of the system. FSA controllers for a case study of two-tank system have been...

  5. Backstepping fuzzy-neural-network control design for hybrid maglev transportation system.

    Science.gov (United States)

    Wai, Rong-Jong; Yao, Jing-Xiang; Lee, Jeng-Dao

    2015-02-01

    This paper focuses on the design of a backstepping fuzzy-neural-network control (BFNNC) for the online levitated balancing and propulsive positioning of a hybrid magnetic levitation (maglev) transportation system. The dynamic model of the hybrid maglev transportation system including levitated hybrid electromagnets to reduce the suspension power loss and the friction force during linear movement and a propulsive linear induction motor based on the concepts of mechanical geometry and motion dynamics is first constructed. The ultimate goal is to design an online fuzzy neural network (FNN) control methodology to cope with the problem of the complicated control transformation and the chattering control effort in backstepping control (BSC) design, and to directly ensure the stability of the controlled system without the requirement of strict constraints, detailed system information, and auxiliary compensated controllers despite the existence of uncertainties. In the proposed BFNNC scheme, an FNN control is utilized to be the major control role by imitating the BSC strategy, and adaptation laws for network parameters are derived in the sense of projection algorithm and Lyapunov stability theorem to ensure the network convergence as well as stable control performance. The effectiveness of the proposed control strategy for the hybrid maglev transportation system is verified by experimental results, and the superiority of the BFNNC scheme is indicated in comparison with the BSC strategy and the backstepping particle-swarm-optimization control system in previous research.

  6. Comparing an evolved finite state controller for hybrid system to a lookahead design

    DEFF Research Database (Denmark)

    Dupuis, Jean-Francois; Fan, Zhun

    2010-01-01

    This paper presents a comparison of an evolutionary methodology for evolving finite state controller to the lookahead controller for hybrid system. To illustrate the advantages and disadvantages of both controllers two case studies, namely a two-tanks system and a single-input double-output DC...

  7. Design, implementation, and experimental validation of optimal power split control for hybrid electric trucks

    NARCIS (Netherlands)

    Keulen, T. van; Mullem, D. van; Jager, B. van; Kessels, J.T.B.A.; Steinbuch, M.

    2012-01-01

    Hybrid electric vehicles require an algorithm that controls the power split between the internal combustion engine and electric machine(s), and the opening and closing of the clutch. Optimal control theory is applied to derive a methodology for a real-time optimal-control-based power split

  8. Dynamical control of quantum state transfer within hybrid open systems

    CERN Document Server

    Escher, B M; Clausen, J; Kurizki, G; Davidovich, L

    2010-01-01

    We analyze quantum state-transfer optimization within hybrid open systems, from a "noisy" (write-in) qubit to its "quiet" counterpart (storage qubit). Intriguing interplay is revealed between our ability to avoid bath-induced errors that profoundly depend on the bath-memory time and the limitations imposed by leakage out of the operational subspace. Counterintuitively, under no circumstances is the fastest transfer optimal (for a given transfer energy).

  9. Ciprofloxacin-nitroxide hybrids with potential for biofilm control.

    Science.gov (United States)

    Verderosa, Anthony D; de la Fuente-Núñez, César; Mansour, Sarah C; Cao, Jicong; Lu, Timothy K; Hancock, Robert E W; Fairfull-Smith, Kathryn E

    2017-09-29

    As bacterial biofilms display extreme tolerance to conventional antibiotic treatments, it has become imperative to develop new antibacterial strategies with alternative mechanisms of action. Herein, we report the synthesis of a series of ciprofloxacin-nitroxide conjugates and their corresponding methoxyamine derivatives in high yield. This was achieved by linking various nitroxides or methoxyamines to the secondary amine of the piperazine ring of ciprofloxacin using amide bond coupling. Biological evaluation of the prepared compounds on preformed P. aeruginosa biofilms in flow cells revealed substantial dispersal with ciprofloxacin-nitroxide hybrid 25, and virtually complete killing and removal (94%) of established biofilms in the presence of ciprofloxacin-nitroxide hybrid 27. Compounds 25-28 were shown to be non-toxic in both human embryonic kidney 293 (HEK 293) cells and human muscle rhabdomyosarcoma (RD) cells at concentrations up to 40 μM. Significantly, these hybrids demonstrate the potential of antimicrobial-nitroxide agents to overcome the resistance of biofilms to antimicrobials via stimulation of biofilm dispersal or through direct cell killing. Crown Copyright © 2017. Published by Elsevier Masson SAS. All rights reserved.

  10. Non-fragile hybrid guaranteed cost control for a class of uncertain switched linear systems

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    This paper focuses on the problem of non-fragile hybrid guaranteed cost control for a class of uncertain switched linear systems. The controller gain to be designed is assumed to have additive gain variations. Based on multiple-Lyapunov function technique, the design of non-fragile hybrid guaranteed cost controllers is derived to make the corresponding closed-loop system asymptotically stable for all admissible uncertainties. Furthermore, a convex optimization approach with LMIs constraints is introduced to select the optimal non-fragile guaranteed cost controllers. Finally, a simulation example illustrates the effectiveness of the proposed approach.

  11. Fertility effects of abortion and birth control pill access for minors.

    Science.gov (United States)

    Guldi, Melanie

    2008-11-01

    This article empirically assesses whether age-restricted access to abortion and the birth control pill influence minors' fertility in the United States. There is not a strong consensus in previous literature regarding the relationship between laws restricting minors' access to abortion and minors' birth rates. This is the first study to recognize that state laws in place prior to the 1973 Roe v. Wade decision enabled minors to legally consent to surgical treatment-including abortion-in some states but not in others, and to construct abortion access variables reflecting this. In this article, age-specific policy variables measure either a minor's legal ability to obtain an abortion or to obtain the birth control pill without parental involvement. I find fairly strong evidence that young women's birth rates dropped as a result of abortion access as well as evidence that birth control pill access led to a drop in birth rates among whites.

  12. Approximate dynamic programming recurrence relations for a hybrid optimal control problem

    Science.gov (United States)

    Lu, W.; Ferrari, S.; Fierro, R.; Wettergren, T. A.

    2012-06-01

    This paper presents a hybrid approximate dynamic programming (ADP) method for a hybrid dynamic system (HDS) optimal control problem, that occurs in many complex unmanned systems which are implemented via a hybrid architecture, regarding robot modes or the complex environment. The HDS considered in this paper is characterized by a well-known three-layer hybrid framework, which includes a discrete event controller layer, a discrete-continuous interface layer, and a continuous state layer. The hybrid optimal control problem (HOCP) is to nd the optimal discrete event decisions and the optimal continuous controls subject to a deterministic minimization of a scalar function regarding the system state and control over time. Due to the uncertainty of environment and complexity of the HOCP, the cost-to-go cannot be evaluated before the HDS explores the entire system state space; as a result, the optimal control, neither continuous nor discrete, is not available ahead of time. Therefore, ADP is adopted to learn the optimal control while the HDS is exploring the environment, because of the online advantage of ADP method. Furthermore, ADP can break the curses of dimensionality which other optimizing methods, such as dynamic programming (DP) and Markov decision process (MDP), are facing due to the high dimensions of HOCP.

  13. Vehicle height and posture control of the electronic air suspension system using the hybrid system approach

    Science.gov (United States)

    Sun, Xiaoqiang; Cai, Yingfeng; Chen, Long; Liu, Yanling; Wang, Shaohua

    2016-03-01

    The electronic air suspension (EAS) system can improve ride comfort, fuel economy and handling safety of vehicles by adjusting vehicle height. This paper describes the development of a novel controller using the hybrid system approach to adjust the vehicle height (height control) and to regulate the roll and pitch angles of the vehicle body during the height adjustment process (posture control). The vehicle height adjustment system of EAS poses challenging hybrid control problems, since it features different discrete modes of operation, where each mode has an associated linear continuous-time dynamic. In this paper, we propose a novel approach to the modelling and controller design problem for the vehicle height adjustment system of EAS. The system model is described firstly in the hybrid system description language (HYSDEL) to obtain a mixed logical dynamical (MLD) hybrid model. For the resulting model, a hybrid model predictive controller is tuned to improve the vehicle height and posture tracking accuracy and to achieve the on-off statuses direct control of solenoid valves. The effectiveness and performance of the proposed approach are demonstrated by simulations and actual vehicle tests.

  14. Assessment of current practices in creating and using passwords as a control mechanism for information access

    Directory of Open Access Journals (Sweden)

    P. L. Wessels

    2007-11-01

    Full Text Available One of the critical issues in managing information within an organization is to ensure that proper controls exist and are applied in allowing people access to information. Passwords are used extensively as the main control mechanism to identify users wanting access to systems, applications, data files, network servers or personal information. In this article, the issues involved in selecting and using passwords are discussed and the current practices employed by users in creating and storing passwords to gain access to sensitive information are assessed. The results of this survey conclude that information managers cannot rely only on users to employ proper password control in order to protect sensitive information.

  15. A Distributed Architecture for Sharing Ecological Data Sets with Access and Usage Control Guarantees

    DEFF Research Database (Denmark)

    Bonnet, Philippe; Gonzalez, Javier; Granados, Joel Andres

    2014-01-01

    and usage control is necessary to enforce existing open data policies. We have proposed the vision of trusted cells: A decentralized infrastructure, based on secure hardware running on devices equipped with trusted execution environments at the edges of the Internet. We originally described the utilization...... new insights, there are signicant barriers to the realization of this vision. One of the key challenge is to allow scientists to share their data widely while retaining some form of control over who accesses this data (access control) and more importantly how it is used (usage control). Access...... data sets with access and usage control guarantees. We rely on examples from terrestrial research and monitoring in the arctic in the context of the INTERACT project....

  16. Autonomous Control of Interlinking Converter With Energy Storage in Hybrid AC–DC Microgrid

    DEFF Research Database (Denmark)

    Loh, Poh Chiang; Li, Ding; Chai, Yi Kang

    2013-01-01

    The coexistence of ac and dc subgrids in a hybrid microgrid is likely given that modern distributed sources can either be ac or dc. Linking these subgrids is a power converter, whose topology should preferably be not too unconventional. This is to avoid unnecessary compromises to reliability......, simplicity, and industry relevance of the converter. The desired operating features of the hybrid microgrid can then be added through this interlinking converter. To demonstrate, an appropriate control scheme is now developed for controlling the interlinking converter. The objective is to keep the hybrid...... microgrid in autonomous operation with active power proportionally shared among its distributed sources. Power sharing here should depend only on the source ratings and not their placements within the hybrid microgrid. The proposed scheme can also be extended to include energy storage within...

  17. Computer Program Development Specification Terminal Access Controller. Appendix B. Access Line Modes.

    Science.gov (United States)

    1979-04-06

    CG-510262 Part 1 of 2 6 April 1979 Page B17 iS U £ 44 0 o a, U, 00 0 ,.- C 2 50 St -: 2-, CG-510262 Part 1 of 2 6 April 1979 Page B18 00 0 0 0 4 4 0...receipt of RM as the response to a block and acknowledged wit , receive control character ACK2. CAN is never transmitted wit’iin t-ne text portion of a

  18. In vitro spine testing using a robot-based testing system: comparison of displacement control and "hybrid control".

    Science.gov (United States)

    Bell, Kevin M; Hartman, Robert A; Gilbertson, Lars G; Kang, James D

    2013-06-21

    The two leading control algorithms for in-vitro spine biomechanical testing-"load control" and "displacement control"-are limited in their lack of adaptation to changes in the load-displacement response of a spine specimen-pointing to the need for sufficiently sophisticated control algorithms that are able to govern the application of loads/motions to a spine specimen in a more realistic, adaptive manner. A robotics-based spine testing system was programmed with a novel hybrid control algorithm combining "load control" and "displacement control" into a single, robust algorithm. Prior to in-vitro cadaveric testing, preliminary testing of the new algorithm was performed using a rigid-body-spring model with known structural properties. The present study also offers a direct comparison between "hybrid control" and "displacement control". The hybrid control algorithm enabled the robotics-based spine testing system to apply pure moments to an FSU (in flexion/extension, lateral bending, or axial rotation) in an unconstrained manner through active control of secondary translational/rotational degrees-of-freedom-successfully minimizing coupled forces/moments. The characteristic nonlinear S-shaped curves of the primary moment-rotation responses were consistent with previous reports of the FSU having a region of low stiffness (neutral zone) bounded by regions of increasing stiffness (elastic zone). Direct comparison of "displacement control" and "hybrid control" showed that hybrid control was able to actively minimize off-axis forces and resulted in larger neutral zone and range of motion. Copyright © 2013 Elsevier Ltd. All rights reserved.

  19. Sliding Mode Controller for Three-Phase Hybrid Active Power Filter with Photovoltaic Application

    OpenAIRE

    Blorfan, Ayman; Merckle, Jean; Flieller, Damien; Wira, Patrice; Sturtzer, Guy

    2012-01-01

    International audience; This paper presents a new three-phase hybrid active power filter configuration that interconnects a passive high-pass filter in parallel with an active power filter and a photovoltaic system. The proposed configuration can improves the filtering performance of the conventional active power filter, as well as simultaneously supply the power from the photovoltaic arrays to the load and utility. This paper will describe the proposed hybrid active power filter control usin...

  20. Periodically-Scheduled Controller Analysis using Hybrid Systems Reachability and Continuization

    Science.gov (United States)

    2015-12-01

    algorithm is run, and actuator outputs are set. The physical world , on the other hand, evolves continuously. Models of the physical world may be given...An extra clock variable, c, is added to the hybrid automaton that ticks at rate one (ċ = 1). When the clock reaches the period, a transition is...Preliminary Reachability Analysis Although hybrid automata can model real-time scheduled controllers and plants as shown above, an important factor is

  1. The Development of an Optimal Control Strategy for a Series Hydraulic Hybrid Vehicle

    Directory of Open Access Journals (Sweden)

    Chih-Wei Hung

    2016-03-01

    Full Text Available In this work, a Truck Class II series hydraulic hybrid model is established. Dynamic Programming (DP methodology is applied to derive the optimal power-splitting factor for the hybrid system for preselected driving schedules. Implementable rules are derived by extracting the optimal trajectory features from a DP scheme. The system behaviors illustrate that the improved control strategy gives a highly effective operation region for the engine and high power density characteristics for the hydraulic components.

  2. Enhancing Subject Access to OPACs: Controlled Vocabulary vs. Natural Language.

    Science.gov (United States)

    Cousins, Shirley Anne

    1992-01-01

    Investigation of retrieval performance of controlled vocabulary derived from natural language terms in tables of contents and book indexes assumed that controlled vocabulary representative of users' queries should adequately represent documents' contents. Queries were indexed using Library of Congress Subject Headings (LSCH), Dewey Decimal…

  3. Guaranteed Cost Control for Exponential Synchronization of Cellular Neural Networks with Mixed Time-Varying Delays via Hybrid Feedback Control

    Directory of Open Access Journals (Sweden)

    T. Botmart

    2013-01-01

    Full Text Available The problem of guaranteed cost control for exponential synchronization of cellular neural networks with interval nondifferentiable and distributed time-varying delays via hybrid feedback control is considered. The interval time-varying delay function is not necessary to be differentiable. Based on the construction of improved Lyapunov-Krasovskii functionals is combined with Leibniz-Newton's formula and the technique of dealing with some integral terms. New delay-dependent sufficient conditions for the exponential synchronization of the error systems with memoryless hybrid feedback control are first established in terms of LMIs without introducing any free-weighting matrices. The optimal guaranteed cost control with linear error hybrid feedback is turned into the solvable problem of a set of LMIs. A numerical example is also given to illustrate the effectiveness of the proposed method.

  4. Species origin of genomic factors in Nicotiana nudicaulis Watson controlling hybrid lethality in interspecific hybrids between N. nudicaulis Watson and N. tabacum L.

    Directory of Open Access Journals (Sweden)

    Hongshuo Liu

    Full Text Available Hybrid lethality is expressed at 28°C in the cross Nicotiana nudicaulis × N. tabacum. The S subgenome of N. tabacum has been identified as controlling this hybrid lethality. To clarify the responsible genomic factor(s of N. nudicaulis, we crossed N. trigonophylla (paternal progenitor of N. nudicaulis with N. tabacum, because hybrids between N. sylvestris (maternal progenitor of N. nudicaulis and N. tabacum are viable when grown in a greenhouse. In the cross N. trigonophylla×N. tabacum, approximately 50% of hybrids were vitrified, 20% were viable, and 20% were nonviable at 28°C. To reveal which subgenome of N. tabacum was responsible for these phenotypes, we crossed N. trigonophylla with two progenitors of N. tabacum, N. sylvestris (SS and N. tomentosiformis (TT. In the cross N. sylvestris × N. trigonophylla, we confirmed that over half of hybrids of N. sylvestris × N. trigonophylla were vitrified, and none of the hybrids of N. trigonophylla × N. tomentosiformis were. The results imply that the S subgenome, encoding a gene or genes inducing hybrid lethality in the cross between N. nudicaulis and N. tabacum, has one or more genomic factors that induce vitrification. Furthermore, in vitrified hybrids of N. trigonophylla × N. tabacum and N. sylvestris × N. trigonophylla, we found that nuclear fragmentation, which progresses during expression of hybrid lethality, was accompanied by vitrification. This observation suggests that vitrification has a relationship to hybrid lethality. Based on these results, we speculate that when N. nudicaulis was formed approximately 5 million years ago, several causative genomic factors determining phenotypes of hybrid seedlings were inherited from N. trigonophylla. Subsequently, genome downsizing and various recombination-based processes took place. Some of the causative genomic factors were lost and some became genomic factor(s controlling hybrid lethality in extant N. nudicaulis.

  5. Species origin of genomic factors in Nicotiana nudicaulis Watson controlling hybrid lethality in interspecific hybrids between N. nudicaulis Watson and N. tabacum L.

    Science.gov (United States)

    Liu, Hongshuo; Marubashi, Wataru

    2014-01-01

    Hybrid lethality is expressed at 28°C in the cross Nicotiana nudicaulis × N. tabacum. The S subgenome of N. tabacum has been identified as controlling this hybrid lethality. To clarify the responsible genomic factor(s) of N. nudicaulis, we crossed N. trigonophylla (paternal progenitor of N. nudicaulis) with N. tabacum, because hybrids between N. sylvestris (maternal progenitor of N. nudicaulis) and N. tabacum are viable when grown in a greenhouse. In the cross N. trigonophylla×N. tabacum, approximately 50% of hybrids were vitrified, 20% were viable, and 20% were nonviable at 28°C. To reveal which subgenome of N. tabacum was responsible for these phenotypes, we crossed N. trigonophylla with two progenitors of N. tabacum, N. sylvestris (SS) and N. tomentosiformis (TT). In the cross N. sylvestris × N. trigonophylla, we confirmed that over half of hybrids of N. sylvestris × N. trigonophylla were vitrified, and none of the hybrids of N. trigonophylla × N. tomentosiformis were. The results imply that the S subgenome, encoding a gene or genes inducing hybrid lethality in the cross between N. nudicaulis and N. tabacum, has one or more genomic factors that induce vitrification. Furthermore, in vitrified hybrids of N. trigonophylla × N. tabacum and N. sylvestris × N. trigonophylla, we found that nuclear fragmentation, which progresses during expression of hybrid lethality, was accompanied by vitrification. This observation suggests that vitrification has a relationship to hybrid lethality. Based on these results, we speculate that when N. nudicaulis was formed approximately 5 million years ago, several causative genomic factors determining phenotypes of hybrid seedlings were inherited from N. trigonophylla. Subsequently, genome downsizing and various recombination-based processes took place. Some of the causative genomic factors were lost and some became genomic factor(s) controlling hybrid lethality in extant N. nudicaulis.

  6. 77 FR 26789 - Certain Semiconductor Chips Having Synchronous Dynamic Random Access Memory Controllers and...

    Science.gov (United States)

    2012-05-07

    ... From the Federal Register Online via the Government Publishing Office ] INTERNATIONAL TRADE COMMISSION Certain Semiconductor Chips Having Synchronous Dynamic Random Access Memory Controllers and Products Containing Same; Determination Rescinding the Exclusion Order and Cease and Desist Orders...

  7. Role-Based Access Control for the Large Hadron Collider at CERN

    CERN Document Server

    Yastrebov, I

    2010-01-01

    Large Hadron Collider (LHC) is the largest scientific instrument ever created. It was built with the intention of testing the most extreme conditions of the matter. Taking into account the significant dangers of LHC operations, European Organization for Nuclear Research (CERN) has developed multi-pronged approach for machine safety, including access control system. This system is based on role-based access control (RBAC) concept. It was designed to protect from accidental and unauthorized access to the LHC and injector equipment. This paper introduces the new model of the role-based access control developed at CERN and gives detailed mathematical description of it. We propose a new technique called dynamic authorization that allows deploying RBAC gradually in the large systems. Moreover, we show how the protection for the very large distributed equipment control system may be implemented in efficient way. This paper also describes motivation of the project, requirements and overview of the main components: au...

  8. The Design of the M-B-Quadro Optical Switch and Its Access Control Strategies

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    This paper proposes a new simple contention resolution switching architecture, M-B-Quadro, and its underlying access control strategies. By incorporating delay and buffer lines, the switching node can effectively obtain very low packet deflection probability.

  9. Automated Controller Synthesis for non-Deterministic Piecewise-Affine Hybrid Systems

    DEFF Research Database (Denmark)

    Grunnet, Jacob Deleuran

    a computational tree logic formula and refining the resulting solution to a catalogue of piecewise-affine controllers. The method has been implemented as aMatlab toolbox, PAHSCTRL , using linear matrix inequality feasibility computations for finding the discrete abstraction, UppAal Tiga for solving the discrete...... formations. This thesis uses a hybrid systems model of a satellite formation with possible actuator faults as a motivating example for developing an automated control synthesis method for non-deterministic piecewise-affine hybrid systems (PAHS). The method does not only open an avenue for further research...... in fault tolerant satellite formation control, but can be used to synthesise controllers for a wide range of systems where external events can alter the system dynamics. The synthesis method relies on abstracting the hybrid system into a discrete game, finding a winning strategy for the game meeting...

  10. Adaptive control using a hybrid-neural model: application to a polymerisation reactor

    Directory of Open Access Journals (Sweden)

    Cubillos F.

    2001-01-01

    Full Text Available This work presents the use of a hybrid-neural model for predictive control of a plug flow polymerisation reactor. The hybrid-neural model (HNM is based on fundamental conservation laws associated with a neural network (NN used to model the uncertain parameters. By simulations, the performance of this approach was studied for a peroxide-initiated styrene tubular reactor. The HNM was synthesised for a CSTR reactor with a radial basis function neural net (RBFN used to estimate the reaction rates recursively. The adaptive HNM was incorporated in two model predictive control strategies, a direct synthesis scheme and an optimum steady state scheme. Tests for servo and regulator control showed excellent behaviour following different setpoint variations, and rejecting perturbations. The good generalisation and training capacities of hybrid models, associated with the simplicity and robustness characteristics of the MPC formulations, make an attractive combination for the control of a polymerisation reactor.

  11. Optimal Control for a Parallel Hybrid Hydraulic Excavator Using Particle Swarm Optimization

    Directory of Open Access Journals (Sweden)

    Dong-yun Wang

    2013-01-01

    Full Text Available Optimal control using particle swarm optimization (PSO is put forward in a parallel hybrid hydraulic excavator (PHHE. A power-train mathematical model of PHHE is illustrated along with the analysis of components’ parameters. Then, the optimal control problem is addressed, and PSO algorithm is introduced to deal with this nonlinear optimal problem which contains lots of inequality/equality constraints. Then, the comparisons between the optimal control and rule-based one are made, and the results show that hybrids with the optimal control would increase fuel economy. Although PSO algorithm is off-line optimization, still it would bring performance benchmark for PHHE and also help have a deep insight into hybrid excavators.

  12. Fuzzy-Based Hybrid Control Algorithm for the Stabilization of a Tri-Rotor UAV

    Directory of Open Access Journals (Sweden)

    Zain Anwar Ali

    2016-05-01

    Full Text Available In this paper, a new and novel mathematical fuzzy hybrid scheme is proposed for the stabilization of a tri-rotor unmanned aerial vehicle (UAV. The fuzzy hybrid scheme consists of a fuzzy logic controller, regulation pole-placement tracking (RST controller with model reference adaptive control (MRAC, in which adaptive gains of the RST controller are being fine-tuned by a fuzzy logic controller. Brushless direct current (BLDC motors are installed in the triangular frame of the tri-rotor UAV, which helps maintain control on its motion and different altitude and attitude changes, similar to rotorcrafts. MRAC-based MIT rule is proposed for system stability. Moreover, the proposed hybrid controller with nonlinear flight dynamics is shown in the presence of translational and rotational velocity components. The performance of the proposed algorithm is demonstrated via MATLAB simulations, in which the proposed fuzzy hybrid controller is compared with the existing adaptive RST controller. It shows that our proposed algorithm has better transient performance with zero steady-state error, and fast convergence towards stability.

  13. Fuzzy-Based Hybrid Control Algorithm for the Stabilization of a Tri-Rotor UAV.

    Science.gov (United States)

    Ali, Zain Anwar; Wang, Daobo; Aamir, Muhammad

    2016-05-09

    In this paper, a new and novel mathematical fuzzy hybrid scheme is proposed for the stabilization of a tri-rotor unmanned aerial vehicle (UAV). The fuzzy hybrid scheme consists of a fuzzy logic controller, regulation pole-placement tracking (RST) controller with model reference adaptive control (MRAC), in which adaptive gains of the RST controller are being fine-tuned by a fuzzy logic controller. Brushless direct current (BLDC) motors are installed in the triangular frame of the tri-rotor UAV, which helps maintain control on its motion and different altitude and attitude changes, similar to rotorcrafts. MRAC-based MIT rule is proposed for system stability. Moreover, the proposed hybrid controller with nonlinear flight dynamics is shown in the presence of translational and rotational velocity components. The performance of the proposed algorithm is demonstrated via MATLAB simulations, in which the proposed fuzzy hybrid controller is compared with the existing adaptive RST controller. It shows that our proposed algorithm has better transient performance with zero steady-state error, and fast convergence towards stability.

  14. Fuzzy-Based Hybrid Control Algorithm for the Stabilization of a Tri-Rotor UAV

    Science.gov (United States)

    Ali, Zain Anwar; Wang, Daobo; Aamir, Muhammad

    2016-01-01

    In this paper, a new and novel mathematical fuzzy hybrid scheme is proposed for the stabilization of a tri-rotor unmanned aerial vehicle (UAV). The fuzzy hybrid scheme consists of a fuzzy logic controller, regulation pole-placement tracking (RST) controller with model reference adaptive control (MRAC), in which adaptive gains of the RST controller are being fine-tuned by a fuzzy logic controller. Brushless direct current (BLDC) motors are installed in the triangular frame of the tri-rotor UAV, which helps maintain control on its motion and different altitude and attitude changes, similar to rotorcrafts. MRAC-based MIT rule is proposed for system stability. Moreover, the proposed hybrid controller with nonlinear flight dynamics is shown in the presence of translational and rotational velocity components. The performance of the proposed algorithm is demonstrated via MATLAB simulations, in which the proposed fuzzy hybrid controller is compared with the existing adaptive RST controller. It shows that our proposed algorithm has better transient performance with zero steady-state error, and fast convergence towards stability. PMID:27171084

  15. Research on Hybrid Seismic Response Control System for Motion Control of Two Span Bridge

    Science.gov (United States)

    Heo, G.; Kim, C.; Jeon, S.; Seo, S.; Jeon, J.

    2016-09-01

    In this paper, a hybrid seismic response control (HSRC) system was developed to control bridge motion caused by seismic load. It was aimed at optimum vibration control, composed of a rubber bearing of passive type and a MR-damper of semi-active type. The bridge model was built for experiment, a two-span bridge of 8.3 meters in length with the HSRC system put up on it. Then, inflicting El-centro seismic load on it, shaking table tests were carried out to confirm the system's validity. The experiments were conducted under the basic structure state (without an MR-damper applied) first, and then under the state with an MR-damper applied. It was also done under the basic structure state with a reinforced rubber bearing applied, then the passive on/off state of the HSRC system, and finally the semi-active state where the control algorithm was applied to the system. From the experiments, it was observed that collision rather increased when the MR-damper alone was applied, and also that the application of the HSRC system effectively prevented it from occurring. As a result, the HSRC system was proven to be effective in mitigating responses of the two-span bridge under seismic load.

  16. Hybrid control and acquisition system for remote control systems for environmental monitoring

    Science.gov (United States)

    Garufi, Fabio; Acernese, Fausto; Boiano, Alfonso; De Rosa, Rosario; Romano, Rocco; Barone, Fabrizio

    2008-10-01

    In this paper we describe the architecture and the performances of a hybrid modular acquisition and control system prototype for environmental monitoring and geophysics. The system, an alternative to a VME-UDP/IP based system, is based on a dual-channel 18-bit low noise ADC and a 16-bit DAC module at 1 MHz. The module can be configured as stand-alone or mounted on a motherboard as mezzanine. Both the modules and the motherboard can send/receive the configuration and the acquired/correction data for control through a standard EPP parallel port to a standard PC for the real-time computation. The tests have demonstrated that a distributed control systems based on this architecture exhibits a delay time of less than 25 us on a single channel, i.e a sustained sampling frequency of more than 40 kHz (and up to 80 kHz). The system is now under extensive test in the remote controls of seismic sensors (to simulate a geophysics networks of sensors) of a large baseline suspended Michelson interferometer.

  17. Grid-connected Photovoltaic Micro-inverter with New Hybrid Control LLC Resonant Converter

    DEFF Research Database (Denmark)

    Xingkui, Mao; Qisheng, Huang; Qingbo, Ke;

    2016-01-01

    A high-efficiency photovoltaic (PV) micro-inverter consisting of two power stages i.e. a LLC resonant converter with a new hybrid control scheme and a dc-ac inverter is proposed, studied and designed in this paper. In the first power stage, the new hybrid control combining pulse...... power of 250W and output voltage of 220VAC/50Hz. The experiment shows that the peak efficiency of the PVMI is 95.5%, where efficiency of LLC converter is up to 97.7%, and the MPPT accuracy is more than 99%. Thus the validity of the proposed system structure, design and control method is verified....

  18. A New Method for Modeling and Control of Hybrid Stepper Motors

    Directory of Open Access Journals (Sweden)

    George Mihalache

    2014-09-01

    Full Text Available Over time the mathematical models of the hybrid stepper motors (HSM have been developed in various forms. In this paper we propose to use for HSM a model of a two-phase synchronous machine with permanent magnet in which the number of pole pairs is equal to the number of rotor teeth of the HSM. It analyzes the behavior of hybrid stepper motor controlled in open loop. Control signals are obtained by implementing the control sequences:one-phase-on, two-phases-on, half step.

  19. Fuel cell-gas turbine hybrid system design part II: Dynamics and control

    Science.gov (United States)

    McLarty, Dustin; Brouwer, Jack; Samuelsen, Scott

    2014-05-01

    Fuel cell gas turbine hybrid systems have achieved ultra-high efficiency and ultra-low emissions at small scales, but have yet to demonstrate effective dynamic responsiveness or base-load cost savings. Fuel cell systems and hybrid prototypes have not utilized controls to address thermal cycling during load following operation, and have thus been relegated to the less valuable base-load and peak shaving power market. Additionally, pressurized hybrid topping cycles have exhibited increased stall/surge characteristics particularly during off-design operation. This paper evaluates additional control actuators with simple control methods capable of mitigating spatial temperature variation and stall/surge risk during load following operation of hybrid fuel cell systems. The novel use of detailed, spatially resolved, physical fuel cell and turbine models in an integrated system simulation enables the development and evaluation of these additional control methods. It is shown that the hybrid system can achieve greater dynamic response over a larger operating envelope than either individual sub-system; the fuel cell or gas turbine. Results indicate that a combined feed-forward, P-I and cascade control strategy is capable of handling moderate perturbations and achieving a 2:1 (MCFC) or 4:1 (SOFC) turndown ratio while retaining >65% fuel-to-electricity efficiency, while maintaining an acceptable stack temperature profile and stall/surge margin.

  20. OPERATION & CONTROL OF SMART GRID CONNECTED PV- FC HYBRID POWER SYSTEMD.

    Directory of Open Access Journals (Sweden)

    Saritha(M tech

    2014-08-01

    Full Text Available This paper presents a method to operate and control a grid connected hybrid power system. The hybrid system composed of a Photovoltaic (PV array and a Proton exchange membrane fuel cell (PEMFC is considered. The PV array normally uses a maximum power point tracking (MPPT technique to continuously deliver the highest power to the load when variations in irradiation and temperature occur, which make it become an uncontrollable source. In coordination with PEMFC, the hybrid system output power becomes controllable. Two operation modes, the unit-power control (UPC mode and the feeder-flow control (FFC mode, can be applied to the hybrid system. The coordination of two control modes, the coordination of the PV array and the PEMFC in the hybrid system, and the determination of reference parameters are presented. The proposed operating strategy with a flexible operation mode change always operates the PV array at maximum output power and the PEMFC in its high efficiency performance band, thus improving the performance of system operation, enhancing system stability, and decreasing the number of operating mode changes