116,718 research outputs found

    An Updating Method for Finite Element Models of Flexible-Link Mechanisms Based on an Equivalent Rigid-Link System

    Get PDF
    This paper proposes a comprehensive methodology to update dynamic models of flexible-link mechanisms (FLMs) modeled through ordinary differential equations. The aim is to correct mass, stiffness, and damping matrices of dynamic models, usually based on nominal and uncertain parameters, to accurately represent the main vibrational modes within the bandwidth of interest. Indeed, the availability of accurate models is a fundamental step for the synthesis of effective controllers, state observers, and optimized motion profiles, as those employed in modern control schemes. The method takes advantage of the system dynamic model formulated through finite elements and through the representation of the total motion as the sum of a large rigid-body motion and the elastic deformation. Model updating is not straightforward since the resulting model is nonlinear and its coordinates cannot be directly measured. Hence, the nonlinear model is linearized about an equilibrium point to compute the eigenstructure and to compare it with the results of experimental modal analysis. Once consistency between the model coordinates and the experimental data is obtained through a suitable transformation, model updating has been performed solving a constrained convex optimization problem. Constraints also include results from static tests. Some tools to improve the problem conditioning are also proposed in the formulation adopted, to handle large dimensional models and achieve reliable results. The method has been experimentally applied to a challenging system: a planar six-bar linkage manipulator. The results prove their capability to improve the model accuracy in terms of eigenfrequencies and mode shapes

    State-of-the-art on evolution and reactivity

    Get PDF
    This report starts by, in Chapter 1, outlining aspects of querying and updating resources on the Web and on the Semantic Web, including the development of query and update languages to be carried out within the Rewerse project. From this outline, it becomes clear that several existing research areas and topics are of interest for this work in Rewerse. In the remainder of this report we further present state of the art surveys in a selection of such areas and topics. More precisely: in Chapter 2 we give an overview of logics for reasoning about state change and updates; Chapter 3 is devoted to briefly describing existing update languages for the Web, and also for updating logic programs; in Chapter 4 event-condition-action rules, both in the context of active database systems and in the context of semistructured data, are surveyed; in Chapter 5 we give an overview of some relevant rule-based agents frameworks

    Integrated process of images and acceleration measurements for damage detection

    Get PDF
    The use of mobile robots and UAV to catch unthinkable images together with on-site global automated acceleration measurements easy achievable by wireless sensors, able of remote data transfer, have strongly enhanced the capability of defect and damage evaluation in bridges. A sequential procedure is, here, proposed for damage monitoring and bridge condition assessment based on both: digital image processing for survey and defect evaluation and structural identification based on acceleration measurements. A steel bridge has been simultaneously inspected by UAV to acquire images using visible light, or infrared radiation, and monitored through a wireless sensor network (WSN) measuring structural vibrations. First, image processing has been used to construct a geometrical model and to quantify corrosion extension. Then, the consistent structural model has been updated based on the modal quantities identified using the acceleration measurements acquired by the deployed WSN. © 2017 The Authors. Published by Elsevier Ltd

    Calibration of the dynamic behaviour of incomplete structures in archeological sites: The case of Villa Diomede portico in Pompeii

    Get PDF
    This paper reports the research activities carried out on Villa Diomede in Pompeii, built during the "Pre-Roman period" (i.e. the 3rd century BC) and discovered between 1771 and 1774 during the archaeological excavations. It is one of the greatest private buildings of Pompeii and it is located on the western corner of the modern archeological site. Three levels compose the building: the ground floor, the lower quadriportico with a square plan and a series of colonnades on the four sides around the inner garden and the cryptoportico. Villa Diomede was damaged by the strong earthquake occurred in AD 63 that caused the collapse of the western pillars of the quadriportico and later damaged after the big eruption of Vesuvius in AD 79. In June 2015 a series of nondestructive tests (NDT) were carried out by the authors in order to obtain information on the state of conservation of the building and to assess its structural behavior. Direct and tomographic sonic pulse velocity tests, ground penetrating radar, endoscopies and operational modal analysis were performed on the remaining structural elements on the two levels of the Villa. The present paper reports the main outcomes and findings of ambient vibration tests implemented to extract the modal parameters in terms of eigenfrequencies, mode shapes and damping ratios. Operational modal analysis and output-only identification techniques were applied to single stone pillars of the quadriportico structure and then to the entire square colonnade of Villa Diomede. Results are then used to study the soil-structure interaction at a local level and extend the gained information for the numerical calibration of the whole structure. Thanks to this methodology a detailed model updating procedure of the quadriportico was performed to develop reliable numerical models for the implementation of advance structural and seismic analysis of this "incomplete" archaeological structure

    A secure over-the-air programming scheme in wireless sensor networks

    Get PDF
    Over-The-Air dissemination of code updates in Wireless Sensor Networks (WSNs) have been researchers’ point of interest in past a few years and more importantly security challenges toward remote propagation of code update have taken the majority of efforts in this context. Many security models have been proposed to establish a balance between the energy consumption and security strengthen with having their concentration on constraint nature of WSN nodes. For authentication purposes most of them have used Merkle-Hash-Tree to avoid using multiple public cryptography operations. These models mostly have assumed an environment in which security has to be in a standard level and therefore they have not investigated the tree structure for mission-critical situations in which security has to be in maximum possible extent (e.g. military zones). Two major problems have been identified in Merkle Tree structure which is used in Seluge scheme, including: 1) an exponential growth in number of overhead packets when block size of hash algorithm used in design is increased. 2) Limitation of using hash algorithms with larger block size of 11 bytes when payload size is set to 72 bytes. Then several existing security models are investigated for possible vulnerabilities and a set of countermeasures correspondingly named Security Model Requirements (SMR) is provided. After concentrating on Seluge’s design, a new secure Over-The-Air Programming (OTAP) scheme named Seluge++ is proposed that complies with SMR and replaces the use of inefficient Merkle Tree with a novel method

    A Review of integrity constraint maintenance and view updating techniques

    Get PDF
    Two interrelated problems may arise when updating a database. On one hand, when an update is applied to the database, integrity constraints may become violated. In such case, the integrity constraint maintenance approach tries to obtain additional updates to keep integrity constraints satisfied. On the other hand, when updates of derived or view facts are requested, a view updating mechanism must be applied to translate the update request into correct updates of the underlying base facts. This survey reviews the research performed on integrity constraint maintenance and view updating. It is proposed a general framework to classify and to compare methods that tackle integrity constraint maintenance and/or view updating. Then, we analyze some of these methods in more detail to identify their actual contribution and the main limitations they may present.Postprint (published version
    • …
    corecore