reasonable solution
Recently Published Documents


TOTAL DOCUMENTS

98
(FIVE YEARS 30)

H-INDEX

8
(FIVE YEARS 2)

2021 ◽  
Author(s):  
Hongbo Zhao ◽  
Shaokang Luan ◽  
zhan shen ◽  
Alex J.Hanson ◽  
Yuan Gao ◽  
...  

<b>This paper rethinks the basic assumptions often used in analytically modeling parasitic capacitance in inductors. These assumptions are classified in two commonly-used physics-based analysis methods: the lumped capacitor network method and the energy conservation method. The lumped-capacitor network method is not the proper solution for calculating the equivalent parasitic capacitance in inductors at the first resonant frequency, but rather represents the equivalent parasitic capacitance above the last resonant frequency. The energy-conservation based method is shown to be more accurate and a reasonable solution to model the equivalent parasitic capacitance at the first resonant frequency. Multiple case studies of inductors are used for verifying the theory. </b>


2021 ◽  
Author(s):  
Hongbo Zhao ◽  
Shaokang Luan ◽  
zhan shen ◽  
Alex J.Hanson ◽  
Yuan Gao ◽  
...  

<b>This paper rethinks the basic assumptions often used in analytically modeling parasitic capacitance in inductors. These assumptions are classified in two commonly-used physics-based analysis methods: the lumped capacitor network method and the energy conservation method. The lumped-capacitor network method is not the proper solution for calculating the equivalent parasitic capacitance in inductors at the first resonant frequency, but rather represents the equivalent parasitic capacitance above the last resonant frequency. The energy-conservation based method is shown to be more accurate and a reasonable solution to model the equivalent parasitic capacitance at the first resonant frequency. Multiple case studies of inductors are used for verifying the theory. </b>


2021 ◽  
Author(s):  
Anne D. Koelewijn ◽  
Jessica C. Selinger

AbstractRobotic exoskeletons, designed to augment human locomotion, have the potential to restore function in those with mobility impairments and enhance it in able-bodied individuals. However, optimally controlling these devices, to work in concert with complex and diverse human users, is a challenge. Accurate model simulations of the interaction between exoskeletons and walking humans may expedite the design process and improve control. Here, we use predictive gait simulations to investigate the effect of an exoskeleton that alters the energetic consequences of walking. To validate our approach, we re-created an past experimental paradigm where robotic exoskeletons were used to shift people’s energetically optimal step frequency to frequencies higher and lower than normally preferred. To match the experimental controller, we modelled a knee-worn exoskeleton that applied resistive torques that were either proportional or inversely proportional to step frequency—decreasing or increasing the energy optimal step frequency, respectively. We were able to replicate the experiment, finding higher and lower optimal step frequencies than in natural walking under each respective condition. Our simulated resistive torques and objective landscapes resembled the measured experimental resistive torque and energy landscapes. Individual muscle energetics revealed distinct coordination strategies consistent with each exoskeleton controller condition. Predicted step frequency and energetic outcomes were best achieved by increasing the number of virtual participants (varying whole-body anthropometrics), rather than number of muscle parameter sets (varying muscle anthropometrics). In future, our approach can be used to design controllers in advance of human testing, to help identify reasonable solution spaces or tailor design to individual users.


10.6036/10170 ◽  
2021 ◽  
Vol 96 (4) ◽  
pp. 395-400
Author(s):  
DAVID MARIN GARCIA ◽  
STEFANIA PICA

Asbestos has been used massively for multiple applications for a long time. However, once the diseases related to this material were discovered, the European Union decided to intervene in the matter through a complex regulation that the member states had to transpose into their national legal system. In this sense, the regulation of the elimination of waste from architectural constructions and their demolition is of special interest. For this reason, the objective of this study focuses on finding out if this regulation could be improved to advance the permanent elimination, and if possible recycling, of these materials. For this, the case of two countries (Italy and Spain) are analyzed comparatively, belonging to the European Union, and however, they present differences. To achieve this objective, the methodology is developed based on the study and comparative analysis of the regulation in both countries. Finally, the procedures and technologies for permanent elimination are analyzed, such as the conversion into inert material of asbestos, its possible regulation, and the need to undertake a regulation regarding the application of techniques based on the definitive elimination of the problem is confirmed, since the eternal deposit in a landfill is not a reasonable solution. Key Words: Asbestos, prohibition, landfill, disposal and recycling, Italy-Spain, inertization.


Meccanica ◽  
2021 ◽  
Vol 56 (9) ◽  
pp. 2169-2182
Author(s):  
Aizhong Lu ◽  
Yijie Liu ◽  
Hui Cai

2021 ◽  
Author(s):  
Amro A. Sabbagh

BGP is the standard inter-domain routing protocol of the internet. It has proven to be scalable enough to accommodate the exceptional growth of the Internet. However, because of the sheer size of the Internet and the complexity of its topology, the behaviour of BGP can be unpredictable sometimes. Researchers have been proposing various changes and enhancements in the past 10 to 15 years to improve the security, stability and convergence of BGP. Some of the solutions have been adopted, but BGP is still suffering from possible deficiencies when it comes to convergence time and stability at specific situations and scenarios. In this thesis, we focus on providing a reasonable solution for the problem of BGP instability but without causing long convergence, which leads eventually into minimizing BGP churn and path exploration. We, first, analyse the current BGP standard protocol and previous proposed solutions. Then, we study current problems associated with a recently proposed improvement, suggest a new algorithm that avoids path selection problem at the aggregator and the path shortening problem. We also describe its implementation in OPNET. Finally, we show the results from our simulation and compare them to the results of previous work suggested. Our results show a great improvement of the convergence of BGP while preserving reachability and optimality all the time.


2021 ◽  
Author(s):  
Amro A. Sabbagh

BGP is the standard inter-domain routing protocol of the internet. It has proven to be scalable enough to accommodate the exceptional growth of the Internet. However, because of the sheer size of the Internet and the complexity of its topology, the behaviour of BGP can be unpredictable sometimes. Researchers have been proposing various changes and enhancements in the past 10 to 15 years to improve the security, stability and convergence of BGP. Some of the solutions have been adopted, but BGP is still suffering from possible deficiencies when it comes to convergence time and stability at specific situations and scenarios. In this thesis, we focus on providing a reasonable solution for the problem of BGP instability but without causing long convergence, which leads eventually into minimizing BGP churn and path exploration. We, first, analyse the current BGP standard protocol and previous proposed solutions. Then, we study current problems associated with a recently proposed improvement, suggest a new algorithm that avoids path selection problem at the aggregator and the path shortening problem. We also describe its implementation in OPNET. Finally, we show the results from our simulation and compare them to the results of previous work suggested. Our results show a great improvement of the convergence of BGP while preserving reachability and optimality all the time.


2021 ◽  
Vol 7 (2) ◽  
pp. 297-302
Author(s):  
P. Averkovich

The need to write this article is due to the existing problems of adaptation to the order and conditions of serving sentences of women sentenced to imprisonment and the lack of legal regulation in addressing these issues. Since a reasonable solution to these issues negatively affects the implementation of the criminal Executive policy of Russia.


2020 ◽  
pp. 39-60
Author(s):  
Ивана Коматина

У раду се анализирају византијски и западни извори који посредно или непосредно говоре о бици на Морави. Како битка у изворима није датирана, пре свега анализом извора, али и представљајући досадашња мишљења и претпоставке понудили смо хронологију тог догађаја. Он се, наравно, не може одвојити од историјских догађаја који су му претходили и следили, те су и они описани и умногоме су допринели проналажењу изгледног решења. The paper analyses Byzantine and Western sources which directly or indirectly testify to the Battle of Morava. As the Battle is not dated in historical sources, we have offered the chronology of this event, primarily through the analysis of sources, but also by presenting hitherto opinions and assumptions. As, of course, this event cannot be separated from the preceding and subsequent historical events, they have also been described, significantly contributing to finding a reasonable solution.


2020 ◽  
Vol 7 (1) ◽  
pp. 23-29
Author(s):  
Hiten Choudhury ◽  

Mobile networks are becoming a preferred choice for the Internet of Things (IoT), due to its flexibility, broad coverage, increasing bandwidth, low latency and low subscription cost. However, a long-standing security issue in any mobile network across the various generations is identity confidentiality. In a recent technical specification standardised by 3rd Generation Partnership Project (3GPP) for 5G mobile network, a novel scheme called the Elliptic Curve Integrated Encryption Scheme (ECIES) is adopted to tackle the issue of identity confidentiality. While this mechanism seems to provide a reasonable solution for modern resource affluent smart phones, it’s suitability for resource constrained IoT devices needs to be analysed. In this paper, we study the computational overhead of the ECIES on IoT devices.


Sign in / Sign up

Export Citation Format

Share Document