222,692 research outputs found

    Effective electrothermal analysis of electronic devices and systems with parameterized macromodeling

    Get PDF
    We propose a parameterized macromodeling methodology to effectively and accurately carry out dynamic electrothermal (ET) simulations of electronic components and systems, while taking into account the influence of key design parameters on the system behavior. In order to improve the accuracy and to reduce the number of computationally expensive thermal simulations needed for the macromodel generation, a decomposition of the frequency-domain data samples of the thermal impedance matrix is proposed. The approach is applied to study the impact of layout variations on the dynamic ET behavior of a state-of-the-art 8-finger AlGaN/GaN high-electron mobility transistor grown on a SiC substrate. The simulation results confirm the high accuracy and computational gain obtained using parameterized macromodels instead of a standard method based on iterative complete numerical analysis

    Modeling XV-15 tilt-rotor aircraft dynamics by frequency and time-domain identification techniques

    Get PDF
    Models of the open-loop hover dynamics of the XV-15 Tilt-Rotor Aircraft are extracted from flight data using two approaches: frequency domain and time-domain identification. Both approaches are reviewed and the identification results are presented and compared in detail. The extracted models are compared favorably, with the differences associated mostly with the inherent weighing of each technique. Step responses are used to show that the predictive capability of the models from both techniques is excellent. Based on the results of this study, the relative strengths and weaknesses of the frequency and time-domain techniques are summarized and a proposal for a coordinated parameter identification approach is presented

    State-space model identification and feedback control of unsteady aerodynamic forces

    Full text link
    Unsteady aerodynamic models are necessary to accurately simulate forces and develop feedback controllers for wings in agile motion; however, these models are often high dimensional or incompatible with modern control techniques. Recently, reduced-order unsteady aerodynamic models have been developed for a pitching and plunging airfoil by linearizing the discretized Navier-Stokes equation with lift-force output. In this work, we extend these reduced-order models to include multiple inputs (pitch, plunge, and surge) and explicit parameterization by the pitch-axis location, inspired by Theodorsen's model. Next, we investigate the na\"{\i}ve application of system identification techniques to input--output data and the resulting pitfalls, such as unstable or inaccurate models. Finally, robust feedback controllers are constructed based on these low-dimensional state-space models for simulations of a rigid flat plate at Reynolds number 100. Various controllers are implemented for models linearized at base angles of attack α0=0,α0=10\alpha_0=0^\circ, \alpha_0=10^\circ, and α0=20\alpha_0=20^\circ. The resulting control laws are able to track an aggressive reference lift trajectory while attenuating sensor noise and compensating for strong nonlinearities.Comment: 20 pages, 13 figure

    Acoustic and Device Feature Fusion for Load Recognition

    Get PDF
    Appliance-specific Load Monitoring (LM) provides a possible solution to the problem of energy conservation which is becoming increasingly challenging, due to growing energy demands within offices and residential spaces. It is essential to perform automatic appliance recognition and monitoring for optimal resource utilization. In this paper, we study the use of non-intrusive LM methods that rely on steady-state appliance signatures for classifying most commonly used office appliances, while demonstrating their limitation in terms of accurately discerning the low-power devices due to overlapping load signatures. We propose a multilayer decision architecture that makes use of audio features derived from device sounds and fuse it with load signatures acquired from energy meter. For the recognition of device sounds, we perform feature set selection by evaluating the combination of time-domain and FFT-based audio features on the state of the art machine learning algorithms. The highest recognition performance however is shown by support vector machines, for the device and audio recognition experiments. Further, we demonstrate that our proposed feature set which is a concatenation of device audio feature and load signature significantly improves the device recognition accuracy in comparison to the use of steady-state load signatures only

    Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems

    Full text link
    Voice Processing Systems (VPSes), now widely deployed, have been made significantly more accurate through the application of recent advances in machine learning. However, adversarial machine learning has similarly advanced and has been used to demonstrate that VPSes are vulnerable to the injection of hidden commands - audio obscured by noise that is correctly recognized by a VPS but not by human beings. Such attacks, though, are often highly dependent on white-box knowledge of a specific machine learning model and limited to specific microphones and speakers, making their use across different acoustic hardware platforms (and thus their practicality) limited. In this paper, we break these dependencies and make hidden command attacks more practical through model-agnostic (blackbox) attacks, which exploit knowledge of the signal processing algorithms commonly used by VPSes to generate the data fed into machine learning systems. Specifically, we exploit the fact that multiple source audio samples have similar feature vectors when transformed by acoustic feature extraction algorithms (e.g., FFTs). We develop four classes of perturbations that create unintelligible audio and test them against 12 machine learning models, including 7 proprietary models (e.g., Google Speech API, Bing Speech API, IBM Speech API, Azure Speaker API, etc), and demonstrate successful attacks against all targets. Moreover, we successfully use our maliciously generated audio samples in multiple hardware configurations, demonstrating effectiveness across both models and real systems. In so doing, we demonstrate that domain-specific knowledge of audio signal processing represents a practical means of generating successful hidden voice command attacks
    corecore