222,692 research outputs found
Effective electrothermal analysis of electronic devices and systems with parameterized macromodeling
We propose a parameterized macromodeling methodology to effectively and accurately carry out dynamic electrothermal (ET) simulations of electronic components and systems, while taking into account the influence of key design parameters on the system behavior. In order to improve the accuracy and to reduce the number of computationally expensive thermal simulations needed for the macromodel generation, a decomposition of the frequency-domain data samples of the thermal impedance matrix is proposed. The approach is applied to study the impact of layout variations on the dynamic ET behavior of a state-of-the-art 8-finger AlGaN/GaN high-electron mobility transistor grown on a SiC substrate. The simulation results confirm the high accuracy and computational gain obtained using parameterized macromodels instead of a standard method based on iterative complete numerical analysis
Modeling XV-15 tilt-rotor aircraft dynamics by frequency and time-domain identification techniques
Models of the open-loop hover dynamics of the XV-15 Tilt-Rotor Aircraft are extracted from flight data using two approaches: frequency domain and time-domain identification. Both approaches are reviewed and the identification results are presented and compared in detail. The extracted models are compared favorably, with the differences associated mostly with the inherent weighing of each technique. Step responses are used to show that the predictive capability of the models from both techniques is excellent. Based on the results of this study, the relative strengths and weaknesses of the frequency and time-domain techniques are summarized and a proposal for a coordinated parameter identification approach is presented
State-space model identification and feedback control of unsteady aerodynamic forces
Unsteady aerodynamic models are necessary to accurately simulate forces and
develop feedback controllers for wings in agile motion; however, these models
are often high dimensional or incompatible with modern control techniques.
Recently, reduced-order unsteady aerodynamic models have been developed for a
pitching and plunging airfoil by linearizing the discretized Navier-Stokes
equation with lift-force output. In this work, we extend these reduced-order
models to include multiple inputs (pitch, plunge, and surge) and explicit
parameterization by the pitch-axis location, inspired by Theodorsen's model.
Next, we investigate the na\"{\i}ve application of system identification
techniques to input--output data and the resulting pitfalls, such as unstable
or inaccurate models. Finally, robust feedback controllers are constructed
based on these low-dimensional state-space models for simulations of a rigid
flat plate at Reynolds number 100. Various controllers are implemented for
models linearized at base angles of attack , and . The resulting control laws are
able to track an aggressive reference lift trajectory while attenuating sensor
noise and compensating for strong nonlinearities.Comment: 20 pages, 13 figure
Acoustic and Device Feature Fusion for Load Recognition
Appliance-specific Load Monitoring (LM) provides a possible solution to the problem of energy conservation which is becoming increasingly challenging, due to growing energy demands within offices and residential spaces. It is essential to perform automatic appliance recognition and monitoring for optimal resource utilization. In this paper, we study the use of non-intrusive LM methods that rely on steady-state appliance signatures for classifying most commonly used office appliances, while demonstrating their limitation in terms of accurately discerning the low-power devices due to overlapping load signatures. We propose a multilayer decision architecture that makes use of audio features derived from device sounds and fuse it with load signatures acquired from energy meter. For the recognition of device sounds, we perform feature set selection by evaluating the combination of time-domain and FFT-based audio features on the state of the art machine learning algorithms. The highest recognition performance however is shown by support vector machines, for the device and audio recognition experiments. Further, we demonstrate that our proposed feature set which is a concatenation of device audio feature and load signature significantly improves the device recognition accuracy in comparison to the use of steady-state load signatures only
Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems
Voice Processing Systems (VPSes), now widely deployed, have been made
significantly more accurate through the application of recent advances in
machine learning. However, adversarial machine learning has similarly advanced
and has been used to demonstrate that VPSes are vulnerable to the injection of
hidden commands - audio obscured by noise that is correctly recognized by a VPS
but not by human beings. Such attacks, though, are often highly dependent on
white-box knowledge of a specific machine learning model and limited to
specific microphones and speakers, making their use across different acoustic
hardware platforms (and thus their practicality) limited. In this paper, we
break these dependencies and make hidden command attacks more practical through
model-agnostic (blackbox) attacks, which exploit knowledge of the signal
processing algorithms commonly used by VPSes to generate the data fed into
machine learning systems. Specifically, we exploit the fact that multiple
source audio samples have similar feature vectors when transformed by acoustic
feature extraction algorithms (e.g., FFTs). We develop four classes of
perturbations that create unintelligible audio and test them against 12 machine
learning models, including 7 proprietary models (e.g., Google Speech API, Bing
Speech API, IBM Speech API, Azure Speaker API, etc), and demonstrate successful
attacks against all targets. Moreover, we successfully use our maliciously
generated audio samples in multiple hardware configurations, demonstrating
effectiveness across both models and real systems. In so doing, we demonstrate
that domain-specific knowledge of audio signal processing represents a
practical means of generating successful hidden voice command attacks
- …