1,212 research outputs found

    A physical RC network model for electro-thermal analysis of a multichip SiC power module

    Get PDF
    This paper is concerned with the thermal models which can physically reflect the heat-flow paths in a lightweight three-phase half bridge, two-level SiC power module with 6 MOSFETs and can be used for coupled electro-thermal simulation. The finite element (FE) model was first evaluated and calibrated to provide the raw data for establishing the physical RC network model. It was experimentally verified that the cooling condition of the module mounted on a water cooler can be satisfactorily described by assuming the water cooler as a heat exchange boundary in the FE model. The compact RC network consisting of 115 R and C parameters to predict the transient junction temperatures of the 6 MOSFETS was constructed, where cross-heating effects between the MOSFETs are represented with lateral thermal resistors. A three-step curve fitting method was especially developed to overcome the challenge for extracting the R and C values of the RC network from the selected FE simulation results. The established compact RC network model can physically be correlated with the structure and heat-flow paths in the power module, and was evaluated using the FE simulation results from the power module under realistic switching conditions. It was also integrated into the LTspice model to perform the coupled electro-thermal simulation to predict the power losses and junction temperatures of the 6 MOSFETs under switching frequencies from 5 kHz to 100 kHz which demonstrate the good electro-thermal performance of the designed power module

    Procedural Generation and Rendering of Realistic, Navigable Forest Environments: An Open-Source Tool

    Full text link
    Simulation of forest environments has applications from entertainment and art creation to commercial and scientific modelling. Due to the unique features and lighting in forests, a forest-specific simulator is desirable, however many current forest simulators are proprietary or highly tailored to a particular application. Here we review several areas of procedural generation and rendering specific to forest generation, and utilise this to create a generalised, open-source tool for generating and rendering interactive, realistic forest scenes. The system uses specialised L-systems to generate trees which are distributed using an ecosystem simulation algorithm. The resulting scene is rendered using a deferred rendering pipeline, a Blinn-Phong lighting model with real-time leaf transparency and post-processing lighting effects. The result is a system that achieves a balance between high natural realism and visual appeal, suitable for tasks including training computer vision algorithms for autonomous robots and visual media generation.Comment: 14 pages, 11 figures. Submitted to Computer Graphics Forum (CGF). The application and supporting configuration files can be found at https://github.com/callumnewlands/ForestGenerato

    Assessment of applications of optimisation to building design and energy modelling

    Get PDF
    Buildings account for around 35% of the world’s carbon emissions and strategies to reduce carbon emissions have made much use of building energy modelling. Optimisation techniques promise new ways of achieving the most cost effective and efficient solutions more quickly and with less input from engineers and building physicists. However, there is limited research into the practical applications of these techniques to building design practice. This thesis presents the results of case-based research into the practical application of design stage optimisation and calibration methods to energy efficient building fabric and services design using building energy modelling. The application during early stage design of a Non-dominating Sorting Genetic Algorithm 2 (NSGA2) to a building energy model EnergyPlusTM. The exercise was used to determine if the application of NSGA2 yielded a significant improvement in the selection of building services technology and building fabric elements. The use of NSGA2 enabled significant (£400,000) capital cost savings without degrading the comfort or energy performance. The potential capital cost savings significantly outweighed the cost of the engineering time required to carry out the additional analysis. Three optimisation techniques were applied to three case study buildings to select appropriate model parameters to minimise the difference between modelled and measured parameters and hence calibrate the model. An heuristic approach was applied to the Institute for Life Sciences Building 1 (ILS1) at Swansea University. Latin Hypercube Monte Carlo (LHMC) was applied to the Arup building at 8 Fitzroy St London and compared directly with the results from an approach using Self Adaptive Differential Evolution (SADE). Poor Building Management System data quality was found to significantly limit the potential to calibrate models. Where robust data was available it was however found to be possible to calibrate EnergyPlus simulations of complex real world buildings using LHMC and SADE methods at levels close to that required by professional bodies

    Defense in Depth of Resource-Constrained Devices

    Get PDF
    The emergent next generation of computing, the so-called Internet of Things (IoT), presents significant challenges to security, privacy, and trust. The devices commonly used in IoT scenarios are often resource-constrained with reduced computational strength, limited power consumption, and stringent availability requirements. Additionally, at least in the consumer arena, time-to-market is often prioritized at the expense of quality assurance and security. An initial lack of standards has compounded the problems arising from this rapid development. However, the explosive growth in the number and types of IoT devices has now created a multitude of competing standards and technology silos resulting in a highly fragmented threat model. Tens of billions of these devices have been deployed in consumers\u27 homes and industrial settings. From smart toasters and personal health monitors to industrial controls in energy delivery networks, these devices wield significant influence on our daily lives. They are privy to highly sensitive, often personal data and responsible for real-world, security-critical, physical processes. As such, these internet-connected things are highly valuable and vulnerable targets for exploitation. Current security measures, such as reactionary policies and ad hoc patching, are not adequate at this scale. This thesis presents a multi-layered, defense in depth, approach to preventing and mitigating a myriad of vulnerabilities associated with the above challenges. To secure the pre-boot environment, we demonstrate a hardware-based secure boot process for devices lacking secure memory. We introduce a novel implementation of remote attestation backed by blockchain technologies to address hardware and software integrity concerns for the long-running, unsupervised, and rarely patched systems found in industrial IoT settings. Moving into the software layer, we present a unique method of intraprocess memory isolation as a barrier to several prevalent classes of software vulnerabilities. Finally, we exhibit work on network analysis and intrusion detection for the low-power, low-latency, and low-bandwidth wireless networks common to IoT applications. By targeting these areas of the hardware-software stack, we seek to establish a trustworthy system that extends from power-on through application runtime

    Faculty Publications and Creative Works 2003

    Get PDF
    Faculty Publications & Creative Works is an annual compendium of scholarly and creative activities of University of New Mexico faculty during the noted calendar year. It serves to illustrate the robust and active intellectual pursuits conducted by the faculty in support of teaching and research at UNM

    Black holes, gravitational waves and fundamental physics: a roadmap

    Get PDF
    The grand challenges of contemporary fundamental physics—dark matter, dark energy, vacuum energy, inflation and early universe cosmology, singularities and the hierarchy problem—all involve gravity as a key component. And of all gravitational phenomena, black holes stand out in their elegant simplicity, while harbouring some of the most remarkable predictions of General Relativity: event horizons, singularities and ergoregions. The hitherto invisible landscape of the gravitational Universe is being unveiled before our eyes: the historical direct detection of gravitational waves by the LIGO-Virgo collaboration marks the dawn of a new era of scientific exploration. Gravitational-wave astronomy will allow us to test models of black hole formation, growth and evolution, as well as models of gravitational-wave generation and propagation. It will provide evidence for event horizons and ergoregions, test the theory of General Relativity itself, and may reveal the existence of new fundamental fields. The synthesis of these results has the potential to radically reshape our understanding of the cosmos and of the laws of Nature. The purpose of this work is to present a concise, yet comprehensive overview of the state of the art in the relevant fields of research, summarize important open problems, and lay out a roadmap for future progress. This write-up is an initiative taken within the framework of the European Action on 'Black holes, Gravitational waves and Fundamental Physics'

    POF 2016: 25th International Conference on Plastic Optical Fibres - proceedings

    Get PDF

    Security of Ubiquitous Computing Systems

    Get PDF
    The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. This book is open access under a CC BY license
    corecore