436 research outputs found
Coin Disks
A floppy disk cartridge adapter having a removable coin shaped memory disk. The 3 & 1/2 inch size cartridge adapter can fit into conventional personal computer disk drives. The small coin shaped magnetic disk has a diameter of approximately 1 inch, and can be easily snapped into and removed from the cartridge adapter. The coin disk fits on a spindle that is side by side to the floating drive plate used in regular 3 & 1/2 inch floppy diskettes. The spindle can be attached by various drive systems to rotate simultaneously with the rotating drive plate. One version is belt driven, another has the coin disk snap onto a spindle supported wheel whose sides frictionally rub against the drive plate wheel, and a third version has the coin disk snap onto the spindle supported gear wheel whose sides contain teeth which mateably engage like side teeth on the drive plate wheel. The coin disk can be alternatively inserted into a separate casing having a spring loaded shutter so that the conventional disk drive being used can access the magnetic sides of the coin disk by sliding the shutter. When removed from the cartridge adapater, the disk can be instered into a small clip retainer..
Coin Disks replacement for existing 3 1/2 inch floppy discs
A floppy disk cartridge adapter having a removable coin shaped memory disk. The 3 & 1/2 inch size cartridge adapter can fit into conventional personal computer disk drives. The small coin shaped magnetic disk has a diameter of approximately 1 inch, and can be easily snapped into and removed from the cartridge adapter. The coin disk fits on a spindle that is side by side to the floating drive plate used in regular 3 & 1/2 inch floppy diskettes. The spindle can be attached by various drive systems to rotate simultaneously with the rotating drive plate. One version is belt driven, another has the coin disk snap onto a spindle supported wheel whose sides frictionally rub against the drive plate wheel, and a third version has the coin disk snap onto the spindle supported gear wheel whose sides contain teeth which mateably engage like side teeth on the drive plate wheel. The coin disk can be alternatively inserted into a separate casing having a spring loaded shutter so that the conventional disk drive being used can access the magnetic sides of the coin disk by sliding the shutter. When removed from the cartridge adapater, the disk can be instered into a small clip retainer..
Research on Random Fatigue Load Model of Highway Bridge by Vehicle Traffic Based on GMM
Highway bridges have often suffered accidents due to fatigue damage. This paper studies the influence of vehicle operating state on the fatigue performance of bridges. Based on GMM method and K-S test in information statistics, this paper proposes an improved Gaussian hybrid modelling method, and studies the various parameters of vehicle operating state on beam bridge fatigue, such as the impact of the damage and its fatigue life assessment. On this basis, the fatigue cumulative damage formula of multi-vehicle upper bridge is proposed. The traffic load of Shandong JiNan-QingDao expressway has been GMMly analysed by GMM. The Gaussian mixture model is used to fit the vehicle load probability function by standard fatigue vehicle model. Based on the expressway, the vehicle fatigue has been established to facilitate the fatigue load and evaluate the fatigue life. Gradually this paper helps to improve the accuracy and convenience of the probability model, which is conducive to the establishment of a scientific and efficient load probability model for road vehicles
Distributed Data-Driven Power Iteration for Strongly Connected Networks
This paper presents data-driven power iteration to distributively estimate the dominant eigenvalues of an unknown linear time-invariant system. The proposed strategy only requires a single trajectory data or measurements. Furthermore, in order to perform the distributed estimation, the communication network topology can be chosen to be any strongly connected directed graphs. The proposed data-driven power iteration is demonstrated using several numerical examples and is then applied to estimate the generalized algebraic connectivity of cooperative systems and to control the epidemic spreading.acceptedVersionPeer reviewe
Cooperative Systems in Presence of Cyber-Attacks: A Unified Framework for Resilient Control and Attack Identification
This paper considers a cooperative control problem in presence of unknown attacks. The attacker aims at destabilizing the consensus dynamics by intercepting the system’s communication network and corrupting its local state feedback. We first revisit the virtual network based resilient control proposed in our previous work and provide a new interpretation and insights into its implementation. Based on these insights, a novel distributed algorithm is presented to detect and identify the compromised communication links. It is shown that it is not possible for the adversary to launch a harmful and stealthy attack by only manipulating the physical states being exchanged via the network. In addition, a new virtual network is proposed which makes it more difficult for the adversary to launch a stealthy attack even though it is also able to manipulate information being exchanged via the virtual network. A numerical example demonstrates that the proposed control framework achieves simultaneously resilient operation and real-time attack identification.acceptedVersionPeer reviewe
ATMSeer: Increasing Transparency and Controllability in Automated Machine Learning
To relieve the pain of manually selecting machine learning algorithms and
tuning hyperparameters, automated machine learning (AutoML) methods have been
developed to automatically search for good models. Due to the huge model search
space, it is impossible to try all models. Users tend to distrust automatic
results and increase the search budget as much as they can, thereby undermining
the efficiency of AutoML. To address these issues, we design and implement
ATMSeer, an interactive visualization tool that supports users in refining the
search space of AutoML and analyzing the results. To guide the design of
ATMSeer, we derive a workflow of using AutoML based on interviews with machine
learning experts. A multi-granularity visualization is proposed to enable users
to monitor the AutoML process, analyze the searched models, and refine the
search space in real time. We demonstrate the utility and usability of ATMSeer
through two case studies, expert interviews, and a user study with 13 end
users.Comment: Published in the ACM Conference on Human Factors in Computing Systems
(CHI), 2019, Glasgow, Scotland U
Resilient Hierarchical Networked Control Systems : Secure Controls for Critical Locations and at Edge
Integration of information and communication technology (ICT) offers new opportunities in improving the management and operation of critical infrastructures such as power systems as it allows connection of different sensors and control components via a communication network, leading to the so-called networked control systems (NCS). However, the use of open and pervasive ICT such as the Internet or wireless communication technologies comes at a price of making NCS vulnerable to cyber intrusions/attacks which may cause physical damage. This chapter presents control algorithms to ensure resilient and safe operation of NCS under unknown cyberattacks. Specifically, a variant of dynamic watermarking strategies is presented by embedding encoding/decoding components of chaotic signals into the NCS for secure control for critical locations where the measurement/control signals are transmitted to/from the control center via a communication network. In addition, resilient cooperative control algorithms are discussed to ensure safe operation at edge of the NCS which consists of a large number of distributed controllable devices. Several numerical examples are provided to illustrate the proposed control strategies.Peer reviewe
- …