5,025 research outputs found

    A hierarchical impact force reconstruction method for Aerospace composites

    Get PDF

    Impact source localisation in aerospace composite structures

    Get PDF
    The most commonly encountered type of damage in aircraft composite structures is caused by low-velocity impacts due to foreign objects such as hail stones, tool drops and bird strikes. Often these events can cause severe internal material damage that is difficult to detect and may lead to a significant reduction of the structure's strength and fatigue life. For this reason there is an urgent need to develop structural health monitoring systems able to localise low-velocity impacts in both metallic and composite components as they occur. This article proposes a novel monitoring system for impact localisation in aluminium and composite structures, which is able to determine the impact location in real-time without a-priori knowledge of the mechanical properties of the material. This method relies on an optimal configuration of receiving sensors, which allows linearization of well-known nonlinear systems of equations for the estimation of the impact location. The proposed algorithm is based on the time of arrival identification of the elastic waves generated by the impact source using the Akaike Information Criterion. The proposed approach was demonstrated successfully on both isotropic and orthotropic materials by using a network of closely spaced surface-bonded piezoelectric transducers. The results obtained show the validity of the proposed algorithm, since the impact sources were detected with a high level of accuracy. The proposed impact detection system overcomes current limitations of other methods and can be retrofitted easily on existing aerospace structures allowing timely detection of an impact event.</p

    Sensitivity-Based Model of Low Voltage Distribution Systems with Distributed Energy Resources

    Get PDF
    A key issue in Low Voltage(LV) distribution systems is to identify strategies for the optimal management and control in the presence of Distributed Energy Resources (DERs). To reduce the number of variables to be monitored and controlled, virtual levels of aggregation, called Virtual Microgrids (VMs), are introduced and identified by using new models of the distribution system. To this aim, this paper, revisiting and improving the approach outlined in a conference paper, presents a sensitivity-based model of an LV distribution system, supplied by a Medium/Low Voltage (MV/LV) substation and composed by several feeders, which is suitable for the optimal management and control of the grid and for VM definition. The main features of the proposed method are: it evaluates the sensitivity coefficients in a closed form; it provides an overview of the sensitivity of the network to the variations of each DER connected to the grid; and it presents a limited computational burden. A comparison of the proposed method with both the exact load flow solutions and a perturb-and-observe method is discussed in a case study. Finally, the method is used to evaluate the impact of the DERs on the nodal voltages of the network

    Decentralized Voltage Optimization Based on the Auxiliary Problem Principle in Distribution Networks with DERs

    Get PDF
    This paper addresses the problem of optimizing the voltage profile of radially-operated distribution systems by acting on the active and reactive powers provided by distributed energy resources (DERs). A novel voltage optimization procedure is proposed by adopting a decentralized control strategy. To this aim, a centralized voltage optimization problem (VOP), minimizing the distance of all the nodal voltages from their reference values, is firstly formulated as a strictly-convex quadratic program. Then, the centralized VOP is rewritten by partitioning the network into voltage control zones (VCZs) with pilot nodes. To overcome the lack of strictly convexity determined by the reduction to the pilot nodes, the dual centralized VOP working on the augmented Lagrangian function is reformulated and iteratively solved by the method of multipliers. Finally, a fully-distributed VOP solution is obtained by applying a distributed algorithm based on the auxiliary problem principle, which allows for solving in each VCZ a quadratic programming problem of small dimension and to drive the VCZ solutions toward the overall optimum by an iterative coordination process that requires to exchange among the VCZs only scalar values. The effectiveness and feasibility of the proposed method have been demonstrated via numerical tests on the IEEE 123-bus system

    Complex phenotype in an Italian family with a novel mutation in SPG3A.

    Get PDF
    Mutations in the SPG3A gene represent a significant cause of autosomal dominant hereditary spastic paraplegia with early onset and pure phenotype. We describe an Italian family manifesting a complex phenotype, characterized by cerebellar involvement in the proband and amyotrophic lateral sclerosis-like syndrome in her father, in association with a new mutation in SPG3A. Our findings further widen the notion of clinical heterogeneity in SPG3A mutations

    CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks

    Get PDF
    Current research in the automotive domain has proven the limitations of the CAN protocol from a security standpoint. Application-layer attacks, which involve the creation of malicious packets, are deemed feasible from remote but can be easily detected by modern IDS. On the other hand, more recent link-layer attacks are stealthier and possibly more disruptive but require physical access to the bus. In this paper, we present CANflict, a software-only approach that allows reliable manipulation of the CAN bus at the data link layer from an unmodified microcontroller, overcoming the limitations of state-of-the-art works. We demonstrate that it is possible to deploy stealthy CAN link-layer attacks from a remotely compromised ECU, targeting another ECU on the same CAN network. To do this, we exploit the presence of pin conflicts between microcontroller peripherals to craft polyglot frames, which allows an attacker to control the CAN traffic at the bit level and bypass the protocol's rules. We experimentally demonstrate the effectiveness of our approach on high-, mid-, and low-end microcontrollers, and we provide the ground for future research by releasing an extensible tool that can be used to implement our approach on different platforms and to build CAN countermeasures at the data link layer.Comment: To appear in CCS'2
    • …
    corecore