Memristive Element Functional Model for Computer Based Analysis and Hardware Emulation of Pulsed Neurons Adaptive Networks

Author(s):  
Alexander Alyushin ◽  
Sergey Alyushin ◽  
Vasilii Arkhangelsky
10.5772/5676 ◽  
2007 ◽  
Vol 4 (3) ◽  
pp. 41 ◽  
Author(s):  
Mostafa Nayyerloo ◽  
Seyyed Mohammad Mehdi Yeganehparast ◽  
Alireza Barati ◽  
Mahmud Saadat Foumani

This paper describes the first phase in development of a mobile robot that can navigate aerial power transmission lines completely unattended by human operator. Its ultimate purpose is to automate inspection of power transmission lines and their equipments. The authors have developed a scaled functional model of such a mobile robot with a preliminary simple computer based on-off controller. MoboLab (Mobile Laboratory) navigates a power transmission line between two strain towers. It can maneuver over obstructions created by line equipments such as insulators, warning spheres, dampers, and spacer dampers. It can also easily negotiate the towers by its three flexible arms. MoboLab has an internal main screw which enables the robot to move itself or its two front and rear arms independently through changing gripped points. When the front arm gets close to an obstacle, the arm detaches from the line and goes down, the robot moves forward, the arm passes the obstacle and grippes the line again. In a same way another arms pass the obstacle.


2021 ◽  
Vol 1 (45) ◽  
Author(s):  
Iryna Vakulenko ◽  
Myroslav Zhaldak

The paper is devoted to the issue of managing independent work of students of pedagogical universities under the conditions of educational informatization. The conducted analysis of the literature identifies such key aspects of students’ independent work as independence (self-regulation) of students and its orientation by the teacher. This requires finding effective ways to manage educational and cognitive activities of students based on widespread use of information and communication technologies, especially under the current conditions of blended and distance learning, i.e., the transition to computer-based management of students’ independent work. There is a review of the main approaches to the defining of “independent work of students” and “management of students’ learning activities”. The functional model of management of students’ independent work is presented. Following the defined model, it is noted about the importance of achieving an effective combination of management of students’ cognitive activity by the teacher as well as their own self-management. The authors emphasize the importance of increasing the independence level at the end of learning disciplines and studying at the university. It is focused on need to use a specially designed learning environment of the university for the effective implementation of computer-based management of students’ independent work. Besides, there is a focus on necessity in preparing both academic staff and students for managing students’ independent work and using information and communication technologies. The main components of the computer-based learning environment for managing students' independent work of the National Pedagogical Dragomanov University are reviewed. The authors have analyzed the findings of the survey on the use of computer-based tools for managing students’ independent work by the academic staff. The main advantages of their use have been also clearly determined.Keywords: pre-service teachers; independent work of students; management of students' independent work; computer-based management; computer-based learning environment.


Author(s):  
Benjamin Kruse ◽  
Clemens Münzer ◽  
Stefan Wölkl ◽  
Arquimedes Canedo ◽  
Kristina Shea

Even though the concept development phase in product development is arguably the most important phase in mechanical and mechatronics design, the available computer-based support for this stage is marginal. This paper presents a new computational model-based method to improve the early phases of mechatronic product design and to facilitate the application from early designs to detailed designs. The paper focuses on model-based Function-Behavior-Structure (FBS) libraries in SysML to support both the manual and computational generation of standard and innovative concepts. In this paper, an approach to re-usable functional models in SysML is presented. The method uses an operator-flow formulation of functions, based on the NIST functional basis, and is validated against a model of an electric car. The generated functional models are validated with respect to the consistency of the flows and tested by associating the functional model directly to the target product component structure. The results of the research are a new modeling approach for function and component libraries in SysML, an associated workflow for modeling of mechatronic systems, and the necessary extensions of the NIST functional basis. The modeling approach provides means for formal functional decomposition followed by an allocation of the functions to structural components that form the target structure.


Dependability ◽  
2018 ◽  
Vol 18 (4) ◽  
pp. 36-44
Author(s):  
S. M. Klimov ◽  
Yu. V. Sosnovsky

The aim of this paper is to develop models that would enable a standardized representation of the structure, functions of computer-based control systems (CBCS) and quantification of the risk (fault tolerance) of automated control systems and their primary components, i.e. CBCS, under information technology interference (ITI). The paper shows the relevance and importance of CBCS models and estimation of the risk of operation of automated process control systems (APCS) under various ITI (computer attacks). Intruder ITI under consideration includes hardware, firmware and software-based interference able of blocking communication channels, disrupting information availability and integrity, as well as targeted and lasting information technology interference with an automated system, namely with the use of malware. The structural and functional model of a computer-based control system as the primary component of a higher-level system (APCS) developed in this paper is composed of a set of diagrams and descriptions of functions. The structural and functional model includes the following: channel structure of the control system’s main cycle (reading, processing of data, recording of output values, as well as communication subsystem operations), structural and functional diagram of CBCS of various types depending on the availability and utilization of a communication channel within the structure of the control cycles, standard vulnerability certificate. The diagrams detail the standard functions, operating procedures and information interaction of CBCS modules with the environment via communication channels. The ITI-specific risk model of APCS and CBCS as its part is described by indicators that characterize the conditional harm and condition of the control system, in which it is able to recover its operability, or whether external intervention is required that would affect not only the control system itself, but the controlled process as well. The following indicators were examined: characteristic points and parameters of risk function based on the Weibull-Gnedenko distribution, statistical estimation of CBCS protection, risk function, dynamic estimation of the risk of successful implementation of ITI against CBCS. It is assumed that the values of the parameters required for the calculation of the risk parameters and CBCS protection were obtained: - empirically based on structural and parametric analysis of the design features, functional dynamics and vulnerabilities of CBCS - as part of testbed simulation of CBCS as computer network users under ITI - experimentally based on the frequency of successful ITI threats,and the protection indicators are also extrapolated to the whole CBCS lifecycle by means of a dynamic risk function-based correction using the Weibull-Gnedenko distribution. In the conclusion it is noted that the developed method of assessment of CBCS protection under ITI allows evaluating the risks of successful implementation by an intruder of malicious actions against CBCS and APCS in general, which predetermines the requirement for timely elimination of CBCS vulnerabilities and adoption of additional organizational and technical measures aimed at improving information security of automated control systems.


Author(s):  
M. Marko ◽  
A. Leith ◽  
D. Parsons

The use of serial sections and computer-based 3-D reconstruction techniques affords an opportunity not only to visualize the shape and distribution of the structures being studied, but also to determine their volumes and surface areas. Up until now, this has been done using serial ultrathin sections.The serial-section approach differs from the stereo logical methods of Weibel in that it is based on the Information from a set of single, complete cells (or organelles) rather than on a random 2-dimensional sampling of a population of cells. Because of this, it can more easily provide absolute values of volume and surface area, especially for highly-complex structures. It also allows study of individual variation among the cells, and study of structures which occur only infrequently.We have developed a system for 3-D reconstruction of objects from stereo-pair electron micrographs of thick specimens.


Author(s):  
Nestor J. Zaluzec

The Information SuperHighway, Email, The Internet, FTP, BBS, Modems, : all buzz words which are becoming more and more routine in our daily life. Confusing terminology? Hopefully it won't be in a few minutes, all you need is to have a handle on a few basic concepts and terms and you will be on-line with the rest of the "telecommunication experts". These terms all refer to some type or aspect of tools associated with a range of computer-based communication software and hardware. They are in fact far less complex than the instruments we use on a day to day basis as microscopist's and microanalyst's. The key is for each of us to know what each is and how to make use of the wealth of information which they can make available to us for the asking. Basically all of these items relate to mechanisms and protocols by which we as scientists can easily exchange information rapidly and efficiently to colleagues in the office down the hall, or half-way around the world using computers and various communications media. The purpose of this tutorial/paper is to outline and demonstrate the basic ideas of some of the major information systems available to all of us today. For the sake of simplicity we will break this presentation down into two distinct (but as we shall see later connected) areas: telecommunications over conventional phone lines, and telecommunications by computer networks. Live tutorial/demonstrations of both procedures will be presented in the Computer Workshop/Software Exchange during the course of the meeting.


1973 ◽  
Vol 37 (8) ◽  
pp. 27-31
Author(s):  
HA Brody ◽  
LF Lucaccini ◽  
M Kamp ◽  
R Rozen

2020 ◽  
Vol 63 (4) ◽  
pp. 1270-1281
Author(s):  
Leah Fostick ◽  
Riki Taitelbaum-Swead ◽  
Shulamith Kreitler ◽  
Shelly Zokraut ◽  
Miriam Billig

Purpose Difficulty in understanding spoken speech is a common complaint among aging adults, even when hearing impairment is absent. Correlational studies point to a relationship between age, auditory temporal processing (ATP), and speech perception but cannot demonstrate causality unlike training studies. In the current study, we test (a) the causal relationship between a spatial–temporal ATP task (temporal order judgment [TOJ]) and speech perception among aging adults using a training design and (b) whether improvement in aging adult speech perception is accompanied by improved self-efficacy. Method Eighty-two participants aged 60–83 years were randomly assigned to a group receiving (a) ATP training (TOJ) over 14 days, (b) non-ATP training (intensity discrimination) over 14 days, or (c) no training. Results The data showed that TOJ training elicited improvement in all speech perception tests, which was accompanied by increased self-efficacy. Neither improvement in speech perception nor self-efficacy was evident following non-ATP training or no training. Conclusions There was no generalization of the improvement resulting from TOJ training to intensity discrimination or generalization of improvement resulting from intensity discrimination training to speech perception. These findings imply that the effect of TOJ training on speech perception is specific and such improvement is not simply the product of generally improved auditory perception. It provides support for the idea that temporal properties of speech are indeed crucial for speech perception. Clinically, the findings suggest that aging adults can be trained to improve their speech perception, specifically through computer-based auditory training, and this may improve perceived self-efficacy.


Sign in / Sign up

Export Citation Format

Share Document