Batteries are devices that convert chemical energy contained in its active materials into electric energy throughout electrochemical red-ox reactions. Theoretically, the energy provided by a battery depends only on it...
详细信息
Batteries are devices that convert chemical energy contained in its active materials into electric energy throughout electrochemical red-ox reactions. Theoretically, the energy provided by a battery depends only on its active substances. Practically, just a part of a battery's capacity can be used, due to the nonreactive substances that add up to the process and which influence the magnitude of the charge-transfer reaction, diffusion rates and energy losses. In this paper five methods for modeling the batteries were presented, and one improved empirical model was implemented. The empirical model was built using Mathcad and was validated through the comparison of the experimental obtained characteristics with the ones given by the producer.
Abstract Robots and other intelligent systems in human environment need high-level cognitive capabilities to enable the achievement of complex goals in complex environments using limited computational resources. Robot...
详细信息
Abstract Robots and other intelligent systems in human environment need high-level cognitive capabilities to enable the achievement of complex goals in complex environments using limited computational resources. Robotic cognitive capabilities include attention allocation, planning, perception processing, reasoning about the other agents and the environment. This paper presents an approach for safe robot controlling using the Intelligent Space. In the iSpace networked distributed sensors observe and gather information from the space. In this environment mobile robots can be tracked with ultrasonic positioning system, the topological map can be build using laser range finders and other properties of the space can be recognized. The recognized properties of the space and the mobile code technology make it possible to extend the control framework of mobile robots with components in a safe way. The mobile code is a program-component obtained from a remote system, transferred across a network and dynamically downloaded and executed on the robots. This code is created, verified, stored and transmitted to the robot using the Certified Proved-Property-Carrying Code architecture, where properties and their proofs also attached to the code. The receiver can verify the proofs and it can decide whether to use or to refuse the received mobile component.
We report on an RF- and ultrasound based indoor localisation system which is used for visitor tracking in the iHomeLab laboratory: Visitors get an electronic name badge. This badge can be localised with an average acc...
详细信息
ISBN:
(纸本)9781424437597
We report on an RF- and ultrasound based indoor localisation system which is used for visitor tracking in the iHomeLab laboratory: Visitors get an electronic name badge. This badge can be localised with an average accuracy of less than 10 cm deviation of its spatial position, by means of reference nodes distributed in the lab rooms. The localisation technology is based on ultrasound ranging.
An ultrasound indoor localisation system typically comprises an infrastructure formed by a plurality of fixed nodes, so called beacons. By ultrasound time of flight measurements, the range between a mobile node and so...
详细信息
An ultrasound indoor localisation system typically comprises an infrastructure formed by a plurality of fixed nodes, so called beacons. By ultrasound time of flight measurements, the range between a mobile node and some of the fixed beacons at known positions is detected. Given a minimum of 3 such range measurements, the position of the mobile node can be determined by trilateration. To achieve good accuracy and coverage, even under difficult or disturbed conditions, it is common practice to include more than 3 measurements to calculate a position estimation. The calculation result will somehow average over the reported values. Inclusion of inaccurate measurements will degrade the result. We present an algorithm for selection of the three ¿most believed¿ range measurements out of the obtained ranges. The algorithm is employed in the iLoc indoor localisation system.
In the present developing plan to apply the cryogenic technology for the production of the 13C, an efficient and safe operation is a strong reason to conceive and to apply a modern computer based control strategy. The...
In the present developing plan to apply the cryogenic technology for the production of the 13C, an efficient and safe operation is a strong reason to conceive and to apply a modern computer based control strategy. The authors are concerned with the problem of developing effective and readily implemental techniques for modelling and control of the isotope separation plant. These columns are characterized by complex nonlinearities, with large time‐delays. Furthermore, are subject to external disturbances, which are difficult to model. The present paper presents two models of the plant: a nonlinear model and a linear system obtained by robust feedback linearization.
Abdominal Aortic Aneurysm (AAA) is a dangerous condition where the weakening of the aortic wall leads to its deformation and the generation of a thrombus. To prevent a possible rupture of the aortic wall, AAAs can be ...
详细信息
In this paper we propose an efficient method for mining frequent intertransaction itemsets. Our approach consists in mining maximal frequent itemsets (MFI) by extending the SmartMiner algorithm for the intertransactio...
详细信息
ISBN:
(纸本)9789898111531
In this paper we propose an efficient method for mining frequent intertransaction itemsets. Our approach consists in mining maximal frequent itemsets (MFI) by extending the SmartMiner algorithm for the intertransaction case. We have called the new algorithm InterTraSM (Inter Transaction Smart Miner). Because it uses depth first search the memory needed by the algorithm is reduced;a strategy for passing tail information for a node combined with a dynamic reordering heuristic lead to improved speed. Experiments comparing InterTraSM to other existing algorithms for mining frequent intertransaction itemsets have revealed a significant gain in performance. Further development ideas are also discussed.
Transformational approaches to generating design and implementation models from requirements can bring effectiveness and quality to software development. In this paper we present a framework and associated techniques ...
详细信息
Transformational approaches to generating design and implementation models from requirements can bring effectiveness and quality to software development. In this paper we present a framework and associated techniques to generate the process model of a service composition from a set of temporal business rules. Dedicated techniques including path- finding, branching structure identification and parallel structure identification are used for semi-automatically synthesizing the process model from the semantics-equivalent Finite State Automata of the rules. These process models naturally satisfy the prescribed behavioral constraints of the rules. With the domain knowledge encoded in the temporal business rules, an executable service composition program, e.g., a BPEL program, can be further generated from the process models. A running example in the e-business domain is used for illustrating our approach throughout this paper.
A crucial prerequisite for the deployment and success of Peer-to-Peer data management applications is the availability of metadata in a way that makes it easy to access and combine data from different sources and doma...
详细信息
ISBN:
(纸本)9781605581880
A crucial prerequisite for the deployment and success of Peer-to-Peer data management applications is the availability of metadata in a way that makes it easy to access and combine data from different sources and domains. In this paper, we argue for a unified and distributed infrastructure providing a repository for semantic data by offering location transparency and advanced query services. After discussing the challenges of such an approach, we present our solution which applies extended SPARQL-like query features for dealing with large and possibly heterogeneous data sets. We focus on the integration into efficient distributed query processing and evaluate our approach in a series of experiments. Copyright 2008 ACM.
This work presents a brief overview of some convergence results, [1], in rigid body dynamics. The convergence analysis is done in a measure differential inclusion sense for a class of semi‐implicit time‐stepping sch...
This work presents a brief overview of some convergence results, [1], in rigid body dynamics. The convergence analysis is done in a measure differential inclusion sense for a class of semi‐implicit time‐stepping schemes that contains the semi‐implicit Euler method as well as trapezoidal‐like methods. By using the concept of a reduced friction cone, we can obtain convergence results for the case when the rigid body system includes joints.
暂无评论