3,861 research outputs found

    Automating control system design via a multiobjective evolutionary algorithm

    Get PDF
    This chapter presents a performance-prioritized computer aided control system design (CACSD) methodology using a multi-objective evolutionary algorithm. The evolutionary CACSD approach unifies different control laws in both the time and frequency domains based upon performance satisfactions, without the need of aggregating different design criteria into a compromise function. It is shown that control engineers' expertise as well as settings on goal or priority for different preference on each performance requirement can be easily included and modified on-line according to the evolving trade-offs, which makes the controller design interactive, transparent and simple for real-time implementation. Advantages of the evolutionary CACSD methodology are illustrated upon a non-minimal phase plant control system, which offer a set of low-order Pareto optimal controllers satisfying all the conflicting performance requirements in the face of system constraints

    The NASA SBIR product catalog

    Get PDF
    The purpose of this catalog is to assist small business firms in making the community aware of products emerging from their efforts in the Small Business Innovation Research (SBIR) program. It contains descriptions of some products that have advanced into Phase 3 and others that are identified as prospective products. Both lists of products in this catalog are based on information supplied by NASA SBIR contractors in responding to an invitation to be represented in this document. Generally, all products suggested by the small firms were included in order to meet the goals of information exchange for SBIR results. Of the 444 SBIR contractors NASA queried, 137 provided information on 219 products. The catalog presents the product information in the technology areas listed in the table of contents. Within each area, the products are listed in alphabetical order by product name and are given identifying numbers. Also included is an alphabetical listing of the companies that have products described. This listing cross-references the product list and provides information on the business activity of each firm. In addition, there are three indexes: one a list of firms by states, one that lists the products according to NASA Centers that managed the SBIR projects, and one that lists the products by the relevant Technical Topics utilized in NASA's annual program solicitation under which each SBIR project was selected

    Experimental Approaches to the Composition of Interactive Video Game Music

    Get PDF
    This project explores experimental approaches and strategies to the composition of interactive music for the medium of video games. Whilst music in video games has not enjoyed the technological progress that other aspects of the software have received, budgets expand and incomes from releases grow. Music is now arguably less interactive than it was in the 1990’s, and whilst graphics occupy large amounts of resources and development time, audio does not garner the same attention. This portfolio develops strategies and audio engines, creating music using the techniques of aleatoric composition, real-time remixing of existing work, and generative synthesisers. The project created music for three ‘open-form’ games : an example of the racing genre (Kart Racing Pro); an arena-based first-person shooter (Counter-Strike : Source); and a real-time strategy title (0 A.D.). These games represent a cross-section of ‘sandbox’- type games on the market, as well as all being examples of games with open-ended or open-source code

    Physics at BES-III

    Get PDF
    This physics book provides detailed discussions on important topics in τ\tau-charm physics that will be explored during the next few years at \bes3 . Both theoretical and experimental issues are covered, including extensive reviews of recent theoretical developments and experimental techniques. Among the subjects covered are: innovations in Partial Wave Analysis (PWA), theoretical and experimental techniques for Dalitz-plot analyses, analysis tools to extract absolute branching fractions and measurements of decay constants, form factors, and CP-violation and \DzDzb-oscillation parameters. Programs of QCD studies and near-threshold tau-lepton physics measurements are also discussed.Comment: Edited by Kuang-Ta Chao and Yi-Fang Wan

    Systems and methods for monitoring solids using mechanical resonator

    Get PDF
    Multi-phase system monitoringmethods, systems and apparatus aredisclosed. Preferred embodiments comprise one or more mechanical resonator sensing elements. In preferred embodiments a sensor or a sensor subassembly is ported to a fluidized bed vessel such as a fluidized bed polymerization reactor

    A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing

    Get PDF
    The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.The concept of cloud computing offers measurable computational or information resources as a service over the Internet. The major motivation behind the cloud setup is economic benefits, because it assures the reduction in expenditure for operational and infrastructural purposes. To transform it into a reality there are some impediments and hurdles which are required to be tackled, most profound of which are security, privacy and reliability issues. As the user data is revealed to the cloud, it departs the protection-sphere of the data owner. However, this brings partly new security and privacy concerns. This work focuses on these issues related to various cloud services and deployment models by spotlighting their major challenges. While the classical cryptography is an ancient discipline, modern cryptography, which has been mostly developed in the last few decades, is the subject of study which needs to be implemented so as to ensure strong security and privacy mechanisms in today’s real-world scenarios. The technological solutions, short and long term research goals of the cloud security will be described and addressed using various classical cryptographic mechanisms as well as modern ones. This work explores the new directions in cloud computing security, while highlighting the correct selection of these fundamental technologies from cryptographic point of view
    corecore