Cloud computing technology has matured, so cloud computing produces a wide range of cloud service. Cloud storage services are one of cloud services where cloud service provider can provide storage space to customers. ...
详细信息
Cloud computing technology has matured, so cloud computing produces a wide range of cloud service. Cloud storage services are one of cloud services where cloud service provider can provide storage space to customers. Because cloud storage services bring a lot of convenience, many enterprises and users store the data to the cloud storage. However, the user will outsource data to the cloud storage service, but the user is difficult to manage remote data in the cloud. Therefore, how users verify data integrity is a major challenge. In recent years, public audit is used to verify data integrity by which the user allows other to verify the user's data. Because the feature of cloud service allows users to communicate with each other on the cloud platform, the cloud storage service allows the data owner to share their data to other users. Therefore, public auditing extends to the share data, so the original operation becomes not the same including signature, public audits, dynamic data and user revocation which generates on the situation of shared data. In the paper, we define the requirements of public auditing with shared data and explain four representative approaches which include analysis function, security, and performance requirements. Finally, we provide some topics for future research.
An automated test system and procedure is proposed, designed to enable systematic testing of electrical impedance tomography (EIT) devices. The system is designed to calculate reliable, repeatable and accurate perform...
详细信息
This paper proposes a method to compute finite abstractions that can be used for synthesizing robust hybrid control strategies for nonlinear systems. Most existing methods for computing finite abstractions utilize som...
详细信息
Production of robotic hands have significantly increased in recent years due to their high demand in industry and wide scope in number of applications such as tele-operation, mobile robotics, industrial robots, biomed...
详细信息
Production of robotic hands have significantly increased in recent years due to their high demand in industry and wide scope in number of applications such as tele-operation, mobile robotics, industrial robots, biomedical robotics etc. Following this trend, there have been many researches done on the control of such robotic hands. Since human like clever manipulating, grasping, lifting and sense of different objects are desirable for researchers and crucial in determining the overall performance of any robotic hand, researchers have proposed different methods of controlling such devices. In this paper, we discussed the control methods applied on systems actuated by pneumatic muscles. We tested three different controllers and verified the results on our uniquely designed ambidextrous robotic hand structure. Performances of all three control methods namely proportional-integral-derivative control (PID), Bang-bang control and Back stepping control has been compared and best controller is proposed. For the very first time, we have validated the possibility of controlling multi finger ambidextrous robot hand by using Back stepping Control. The five finger ambidextrous robot hand offers total of 13 degrees of freedom (DOFs) and it can bend its fingers in both ways left side and right side offering full ambidextrous functionality by using only 18 pneumatic artificial muscles (PAMs). Pneumatic systems are being widely used in many domestic, industrial and robotic applications due to its advantages such as structural flexibility, simplicity, reliability, safety and elasticity.
The injection of a high frequency signal in the stator via inverter has been proven to be a viable option to estimate the magnet temperature in permanent magnet synchronous machines (PMSMs). Injection of a pulsating d...
详细信息
ISBN:
(纸本)9781467371520
The injection of a high frequency signal in the stator via inverter has been proven to be a viable option to estimate the magnet temperature in permanent magnet synchronous machines (PMSMs). Injection of a pulsating d-axis current is especially appealing, as it is insensitive to the speed, L_d and L_q inductance variations. Furthermore, it is suitable both for interior PMSMs (IPMSMs) and surface PMSMs (SPMSMs). Regardless of its promising characteristics, there is a number of issues which can reduce its accuracy, including machine assembling tolerances and rotor lamination grain orientation, which might need to be considered. This paper analyzes the sensitivity of temperature estimation using pulsating d-axis high frequency current injection to rotor eccentricities, PM assembling tolerances and lamination grain orientation. Preliminary results indicate that these issues can have a non-negligible impact on the accuracy of the method.
The confluence of cheap wireless communication, sensing and computation has produced a new group of smart devices and by using thousands of these kind of devices in self-organizing networks has formed a new technology...
详细信息
The confluence of cheap wireless communication, sensing and computation has produced a new group of smart devices and by using thousands of these kind of devices in self-organizing networks has formed a new technology that is called wireless sensor networks (WSNs). WSNs use sensor nodes that placed in open areas or in public places and with a huge number that creates many problems for the researchers and network designer, for giving an appropriate design for the wireless network. The problems are security, routing of data and processing of large amount of data etc. This paper describes the types of WSNs and the possible solutions for tackling the listed problems and solution of many other problems. This paper will deliver the knowledge about the WSN and types with literature review so that a person can get more knowledge about this emerging field.
HPC systems are growing in number of components which have to be interconnected in an efficient way. For that reason, network design has become a key issue in the development of these systems, especially when they are...
详细信息
HPC systems are growing in number of components which have to be interconnected in an efficient way. For that reason, network design has become a key issue in the development of these systems, especially when they are made of thousands of elements. In order to maximize the performance achieved by the network with an affordable cost, new network topologies have been proposed in the last years. Among them, one of the most popular is the dragonfly topology which benefits from high radix switches. As it is not affordable to test these topologies in large real systems, simulation is widely used. In that sense, simulation frameworks are used for avoiding problems and costs derived from developing a simulator from scratch, as well as easing the design of new models. In that sense, OMNeT++ is one of the most prominent simulation frameworks, deeply accepted in modeling large networks. This paper focuses on the modeling of fully-connected dragonfly topologies and its implementation in generic HPC-system simulators. First, we explain in detail the modeling of the dragonfly interconnection pattern. Next, we also describe the modeling of the minimal-path routing algorithm which fits the proposed pattern, as well as the mechanism required for avoiding deadlocks. Besides, we describe the basics of the implementation of the proposed model in an OMNeT++-based simulator. Finally, by means of a set of experiments carried out under several dragonfly configurations, we show performance results obtained from the simulator that implements our dragonfly model, and we compare them with results shown in other papers for validation purposes. Although this evaluation has been made using an OMNeT++-based simulator, the modeled interconnection pattern and routing algorithm can be adapted to any simulation tool.
Individual identification at a distance using gait features has newly gained growing interest from biometrics researchers. Most of the researchers have been shown that different covariate factors can affect different ...
详细信息
Skyrmions are topologically protected magnetic solitons which are attracting a lot of interest from either a fundamental or a technological point of view. Skyrmions can behave as static objects, being shifted in a rac...
详细信息
ISBN:
(纸本)9781467374194
Skyrmions are topologically protected magnetic solitons which are attracting a lot of interest from either a fundamental or a technological point of view. Skyrmions can behave as static objects, being shifted in a racetrack memory or as dynamical solitons, giving rise to topological droplets. This paper points out that a Neel skyrmion based racetrack memory driven by the spin-Hall effect could be a competitive memory architecture, and that, in nano-contact geometry, the spin-transfer torque, together with the Dzyaloshinskii-Moriya interaction, can excite stationary and non-stationary topological droplets.
暂无评论