107 research outputs found

    Fuzzy control systems for thermal processes: synthesis, design and implementation

    Get PDF
    A completed case study on fuzzy logic control of thermal processes has been carried out using a professional laboratory oven for industrial purpose as an experimental test rig. It involved system engineering design analysis, control synthesis, and implementation as well as application software and signal interface design and development. The resulting expertise and lessons learned are reported in this contribution. The structure of PD type of fuzzy logic controllers is closely discussed along with synthesis issues of membership functions and knowledge rule base. Special software was developed using Microsoft Visual Studio, C++ and Visual basic for GUI for a standard PC platform. The application software designed and implemented has four modules: FIS editor, Rule Editor, Membership Function Editor and Fuzzy Controller with Rule Viewer. Quality and performance of the overall fuzzy process control system have been investigated and validated to fulfill the required quality specification

    GW approximations and vertex corrections on the Keldysh time-loop contour: application for model systems at equilibrium

    Get PDF
    We provide the formal extension of Hedin's GW equations for single-particle Green's functions with electron-electron interaction onto the Keldysh time-loop contour. We show an application of our formalism to the plasmon model of a core electron within the plasmon-pole approximation. We study in detail the diagrammatic perturbation expansion of the core-electron/plasmon coupling on the spectral functions of the so-called S-model which provides an exact solution, concentrating especially on the effects of self-consistency and vertex corrections on the GW self-energy. For the S-model, self-consistency is essential for GW-like calculations to obtain the full spectral information. The second- order exchange diagram (i.e. a vertex correction) is crucial to obtain a better spectral description of the plasmon peak and side-band peaks in comparison to GW-like calculations. However, the vertex corrections are well reproduced within a non-self-consistent calculation. We also consider conventional equilibrium GW calculations for the pure jellium model. We find that with no second-order vertex correction, we cannot obtain the full set of plasmon side-band peaks. Finally, we address the issues of formal connection for the Dyson equations of the time-ordered Green's function and the Keldysh Green's functions at equilibrium in the cases of zero and finite temperature.Comment: Published in PRB November 22 201

    Supervisory-plus-regulatory control design for efficient operation of industrial furnaces

    Get PDF
    A two-level system engineering design approach to integrated control and supervision of industrial multi-zone furnaces has been elaborated and tested. The application case study is the three-zone 25 MW RZS furnace plant at Skopje Steelworks. The integrated control and supervision design is based on combined use of general predictive control optimization of set-points and steady-state decoupling,at the upper level, and classical two-term laws with stady-state decouling, at the executive control level. This design technique exploits the intrinsic stability of thermal processes and makes use of constrained optimization, standard non-parametric time-domain process models, identified under operating conditions, using truncated k-time sequence matrices, controlled autoregressive moving average models. Digital implementations are sought within standard computer process control platform for practical engineering and maintenance reasons

    Protection of Digital Elevation Model - One Approach

    Get PDF
    The quality of DEMs is especially being considered based on the spatial resolution of the created digital models and the type of terrain of the interest area. DEM analysis was performed specifically for LiDAR-based DEMs, as well as a comparison with results obtained using the radar recording method (Shuttle Radar Topography Mission). The application of DEM data for security-sensitive systems requires the fulfillment of security requirements, such as authenticity, integrity, confidentiality, and non-repudiation. For this purpose, the authors have developed a model for non-repudiation and protecting DEM data. The model simulation shows it is possible to detect even the smallest changes made in the transmission or the DEM location, as well as proving the data authenticity and non-repudiation of the sender. DEM data security testing has shown that DEM data is effectively protected from the source of origin to the end entity location

    An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware

    Full text link
    In this paper we describe the first single-key attack which can recover the full key of the full version of Grain-128 for arbitrary keys by an algorithm which is significantly faster than exhaustive search (by a factor of about 238). It is based on a new version of a cube tester, which uses an improved choice of dynamic variables to eliminate the previously made assumption that ten particular key bits are zero. In addition, the new attack is much faster than the previous weak-key attack, and has a simpler key recovery process. Since it is extremely difficult to mathemat-ically analyze the expected behavior of such attacks, we implemented it on RIVYERA, which is a new massively parallel reconfigurable hardware, and tested its main components for dozens of random keys. These tests experimentally verified the correctness and expected complexity of the attack, by finding a very significant bias in our new cube tester for about 7.5 % of the keys we tested. This is the first time that the main compo-nents of a complex analytical attack are successfully realized against a full-size cipher with a special-purpose machine. Moreover, it is also the first attack that truly exploits the configurable nature of an FPGA-based cryptanalytical hardware

    Dose escalation and pharmacokinetic study of a humanized anti-HER2 monoclonal antibody in patients with HER2/neu-overexpressing metastatic breast cancer

    Get PDF
    We conducted a phase I pharmacokinetic dose escalation study of a recombinant humanized anti-p185HER2 monoclonal antibody (MKC-454) in 18 patients with metastatic breast cancer refractory to chemotherapy. Three or six patients at each dose level received 1, 2, 4 and 8 mg kg–1 of MKC-454 as 90-min intravenous infusions. The first dose was followed in 3 weeks by nine weekly doses. Target trough serum concentration has been set at 10 μg ml–1 based on in vitro observations. The mean value of minimum trough serum concentrations at each dose level were 3.58 ± 0.63, 6.53 ± 5.26, 40.2 ± 7.12 and 87.9 ± 23.5 μg ml–1 respectively. At 2 mg kg–1, although minimum trough serum concentrations were lower than the target trough concentration with a wide range of variation, trough concentrations increased and exceeded the target concentration, as administrations were repeated weekly. Finally 2 mg kg–1 was considered to be sufficient to achieve the target trough concentration by the weekly dosing regimen. One patient receiving 1 mg kg–1 had grade 3 fever, one at the 1 mg kg–1 level had severe fatigue defined as grade 3, and one at 8 mg kg–1 had severe bone pain of grade 3. No antibodies against MKC-454 were detected in any patients. Objective tumour responses were observed in two patients; one receiving 4 mg kg–1 had a partial response in lung metastases and the other receiving 8 mg kg–1 had a complete response in soft tissue metastases. These results indicate that MKC-454 is well tolerated and effective in patients with refractory metastatic breast cancers overexpressing the HER2 proto-oncogene. Further evaluation of this agent with 2–4 mg kg–1 weekly intravenous infusion is warranted. © 1999 Cancer Research Campaig

    Identification and design principles of low hole effective mass p-type transparent conducting oxides

    Get PDF
    The development of high-performance transparent conducting oxides is critical to many technologies from transparent electronics to solar cells. Whereas n-type transparent conducting oxides are present in many devices, their p-type counterparts are not largely commercialized, as they exhibit much lower carrier mobilities due to the large hole effective masses of most oxides. Here we conduct a high-throughput computational search on thousands of binary and ternary oxides and identify several highly promising compounds displaying exceptionally low hole effective masses (up to an order of magnitude lower than state-of-the-art p-type transparent conducting oxides), as well as wide band gaps. In addition to the discovery of specific compounds, the chemical rationalization of our findings opens new directions, beyond current Cu-based chemistries, for the design and development of future p-type transparent conducting oxides.United States. Office of Naval Research (Award N00014-11-1-0212

    EEG artifacts reduction by multivariate empirical mode decomposition and multiscale entropy for monitoring depth of anaesthesia during surgery

    Get PDF
    Electroencephalography (EEG) has been widely utilized to measure the depth of anaesthesia (DOA) during operation. However, the EEG signals are usually contaminated by artifacts which have a consequence on the measured DOA accuracy. In this study, an effective and useful filtering algorithm based on multivariate empirical mode decomposition and multiscale entropy (MSE) is proposed to measure DOA. Mean entropy of MSE is used as an index to find artifacts-free intrinsic mode functions. The effect of different levels of artifacts on the performances of the proposed filtering is analysed using simulated data. Furthermore, 21 patients' EEG signals are collected and analysed using sample entropy to calculate the complexity for monitoring DOA. The correlation coefficients of entropy and bispectral index (BIS) results show 0.14 ± 0.30 and 0.63 ± 0.09 before and after filtering, respectively. Artificial neural network (ANN) model is used for range mapping in order to correlate the measurements with BIS. The ANN method results show strong correlation coefficient (0.75 ± 0.08). The results in this paper verify that entropy values and BIS have a strong correlation for the purpose of DOA monitoring and the proposed filtering method can effectively filter artifacts from EEG signals. The proposed method performs better than the commonly used wavelet denoising method. This study provides a fully adaptive and automated filter for EEG to measure DOA more accuracy and thus reduce risk related to maintenance of anaesthetic agents.This research was financially supported by the Center for Dynamical Biomarkers and Translational Medicine, National Central University, Taiwan, which is sponsored by Ministry of Science and Technology (Grant Number: NSC102-2911-I-008-001). Also, it was supported by Chung-Shan Institute of Science and Technology in Taiwan (Grant Numbers: CSIST-095-V301 and CSIST-095-V302) and National Natural Science Foundation of China (Grant Number: 51475342)

    Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery

    Get PDF
    In this paper, we describe a new variant of cube attacks called correlation cube attack. The new attack recovers the secret key of a cryptosystem by exploiting conditional correlation properties between the superpoly of a cube and a specific set of low-degree polynomials that we call a basis, which satisfies that the superpoly is a zero constant when all the polynomials in the basis are zeros. We present a detailed procedure of correlation cube attack for the general case, including how to find a basis of the superpoly of a given cube. One of the most significant advantages of this new analysis technique over other variants of cube attacks is that it converts from a weak-key distinguisher to a key recovery attack. As an illustration, we apply the attack to round-reduced variants of the stream cipher Trivium. Based on the tool of numeric mapping introduced by Liu at CRYPTO 2017, we develop a specific technique to efficiently find a basis of the superpoly of a given cube as well as a large set of potentially good cubes used in the attack on Trivium variants, and further set up deterministic or probabilistic equations on the key bits according to the conditional correlation properties between the superpolys of the cubes and their bases. For a variant when the number of initialization rounds is reduced from 1152 to 805, we can recover about 7-bit key information on average with time complexity 2442^{44}, using 2452^{45} keystream bits and preprocessing time 2512^{51}. For a variant of Trivium reduced to 835 rounds, we can recover about 5-bit key information on average with the same complexity. All the attacks are practical and fully verified by experiments. To the best of our knowledge, they are thus far the best known key recovery attacks for these variants of Trivium, and this is the first time that a weak-key distinguisher on Trivium stream cipher can be converted to a key recovery attack
    • …
    corecore