فیلترها/جستجو در نتایج    

فیلترها

سال

بانک‌ها



گروه تخصصی











متن کامل


نویسندگان: 

SRIVASTAVA M. | Bhardwaj K.

اطلاعات دوره: 
  • سال: 

    2019
  • دوره: 

    15
  • شماره: 

    3
  • صفحات: 

    343-351
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    141
  • دانلود: 

    0
چکیده: 

In this paper two R-L network simulator configurations employing a single VDDIBA, one resistance and one grounded capacitance are presented. The first configuration is a grounded series resistor-inductor (R-L) network simulator and the second configuration is intended for grounded parallel resister-inductor (R-L) circuit simulation. Both the proposed circuits enjoy several beneficial features such as: 1) compact structure employing only one VDDIBA and two passive elements, 2) electronic tuning of inductive part of realized series/parallel R-L impedances, 3) independent control of inductive and resistive parts of realized parallel R-L impedance, 4) no requirement of any component matching, and 5) un-deviated performance in non-ideal environment. By choosing appropriate values of Active/passive elements, a series R-L circuit for simulating resistance of 7. 742 kΩ and inductance of value 7. 742 mH has been developed. Similarly a parallel R-L simulation circuit to simulate a resistance of value 1 kΩ and inductance of value 77. 4 μ H is implemented. To study the influence of parasitics on developed lossy inductances, the behavior of these configurations has been studied keeping terminal parasitics of VDDIBAs under consideration. To check the performance and usefulness of the proposed configurations some second-order filtering circuits have been designed. To confirm the theoretical analysis, PSPICE Simulation results have been included.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 141

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
اطلاعات دوره: 
  • سال: 

    1403
  • دوره: 

    13
  • شماره: 

    25
  • صفحات: 

    33-49
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    16
  • دانلود: 

    0
چکیده: 

This article investigates the problem of simultaneous attitude and vibration control of a flexible spacecraft to perform high precision attitude maneuvers and reduce vibrations caused by the flexible panel excitations in the presence of external disturbances, system uncertainties, and actuator faults. Adaptive integral sliding mode control is used in conjunction with an attitude actuator fault iterative learning observer (based on sliding mode) to develop an Active fault tolerant algorithm considering rigid-flexible body dynamic interactions. The discontinuous structure of fault-tolerant control led to discontinuous commands in the control signal, resulting in chattering. This issue was resolved by introducing an adaptive rule for the sliding surface. Furthermore, the utilization of the sign function in the iterative learning observer for estimating actuator faults has not only enhanced its robustness to external disturbances through a straightforward design, but has also led to a decrease in computing workload. The strain rate feedback control algorithm has been employed with the use of piezoelectric sensor/actuator patches to minimize residual vibrations caused by rigid-flexible body dynamic interactions and the effect of attitude actuator faults. Lyapunov's law ensures finite-time overall system stability even with fully coupled rigid-flexible nonlinear dynamics. Numerical simulations demonstrate the performance and advantages of the proposed system compared to other conventional approaches.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 16

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
نویسندگان: 

GHASEMI S. | KHODABAKHSHIAN A. | HOOSHMAND R.

اطلاعات دوره: 
  • سال: 

    2020
  • دوره: 

    8
  • شماره: 

    2
  • صفحات: 

    152-163
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    82
  • دانلود: 

    0
چکیده: 

After extreme events such as floods, thunderstorms, blizzards and hurricanes there will be devastating effects in the distribution Networks which may cause a partial or complete blackout. Then, the major concern for the system operators is to restore the maximum critical loads as soon as possible by available generation units. In order to solve this problem, this paper provides a restoration strategy by using Distributed Generations (DGs). In this strategy, first, the shortest paths between DGs and critical loads are identified. Then, the best paths are determined by using a decision-making method, named PROMOTHEE-II to achieve the goals. The uncertainties for the output power of DGs are also considered in different scenarios. The IEEE 123-node distribution network is used to show the performance of the suggested method. The simulation results clearly show the efficiency of the proposed strategy for critical loads restoration in distribution Networks.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 82

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
اطلاعات دوره: 
  • سال: 

    1399
  • دوره: 

    9
  • شماره: 

    1
  • صفحات: 

    197-207
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    122
  • دانلود: 

    43
چکیده: 

در این پژوهش به بررسی فرآیند گذرا در موتور های سوخت مایع با سیکل انبساطی پرداخته شده است. بدین منظور موتور انبساطی RL-10، به عنوان نمونه مورد مطالعه انتخاب شده است. در موتورهای سیکل انباسطی به دلیل استفاده از سیال عبوری از مسیر انتقال حرارت در سیستم خنک کاری به جای بهره مندی از مولد گاز برای به حرکت در آوردن توربین، فرآیند راه-اندازی دارای پیچیدگی های خاصی است. این فرآیند توسط شیرآلات کنترلی مدیریت می شود. شناخت اثر فرآیند و ترتیب زمانی باز و بسته شدن شیر ها در تحلیل این نوع سیستم ها حایز اهمیت است. در این مقاله ابتدا به مدل دینامیکی موتور انبساطی توسعه و با استفاده از نتایج تست تجربی مورد اعتبار سنجی قرار گرفت. در پایان با استفاده از این مدل اقدام به بررسی اثر باز و بسته شدن شیرها بر رفتار دینامیکی موتور با اندازه گیری مشخصه های زمانی سیستم، گردید. این بررسی نشان داد فرآیندو ترتیب باز و بسته شدن شیرها در مسیر اکسید کننده در این نوع موتورها از اهمیت بسزایی برخوردار است.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 122

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 43 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
نویسندگان: 

Raisi Sarbizhan E.

اطلاعات دوره: 
  • سال: 

    621
  • دوره: 

    4
  • شماره: 

    1
  • صفحات: 

    81-95
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    4
  • دانلود: 

    0
چکیده: 

This research targets the investigation of characteristics within the maximal product of two RL-graphs by scrutinizing particular types of RL-graphs. Our first step in this quest entails introducing RL-graph concepts, followed by defining what constitutes a strong RL-graph, further elucidated by a practical example. Subsequently, we lay out the connection between RL-graphs and their maximal products. In particular, a theorem establishes that two RL-graphs are regular if their maximal product maintains regularity, and a parallel rule applies to α-regular RL-graphs. Contrarily, the reverse is not inherently true, a claim supported by a specific example. Nonetheless, by incorporating an additional condition, we validate the converse. Lastly, we assert that two RL-graphs are connected only if their maximal product is also a connected RL-graph. In conclusion, the maximal product of two RL-graphs holds potential in modeling societal health metrics and road accident rates.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 4

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
نویسندگان: 

JAVAN M.R.

اطلاعات دوره: 
  • سال: 

    2013
  • دوره: 

    13
  • شماره: 

    2
  • صفحات: 

    23-28
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    218
  • دانلود: 

    0
چکیده: 

In this paper, we formulate the resource allocation problem for secure communications in a single cell OFDMA network where a base station wants to communicate to the users which are spread over its coverage area while an adversary is present in the network. In our model, we assume that the adversary s an Active attacker which is able to either eavesdrop on the information transmitted over the wireless link or jam the connection by sending an interference signal but is not able to both eavesdrop and jam at the same time. The attacker's aim is to choose between eavesdropping and jamming a subcarrier such that the secrecy rate over that subcarrier is minimized. Knowing this strategy, users should consider the minimum of secrecy data rate in both cases as their achievable secrecy rate over each subcarrier. We formulate our proposed resource allocation problem into an optimization problem whose objective is to maximize the total secrecy rate of all users over all subcarriers while it is required that the total transmit power of base station remains below a predefined threshold. To solve the proposed optimization problem, we use the dual Lagrange approach. Using simulations, we study the behavior and the efficiency of the proposed scheme.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 218

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
اطلاعات دوره: 
  • سال: 

    2017
  • دوره: 

    7
  • شماره: 

    SUPP.
  • صفحات: 

    141-163
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    61
  • دانلود: 

    0
چکیده: 

In this paper, for eachlattice-valued map A®L with some properties, a ring representation A®RL is constructed. This representation is denoted byc which is an f-ring homomorphism and a Q-linear map, where its indexc, mentions to a lattice-valued map. We use the notation a dpqa= (a − p)+^ (q − a)+, where p, q Î Q and a Î A, that is nominated asinterval projection. To get a well-defined f-ring homomorphism tc, we need such concepts asbounded, continuous, and Q-compatible for c, which are defined and some related results are investigated. On the contrary, we present a cozero lattice-valued map c f: A®L for each f-ring homomorphism f: A®RL. It is proved that crc=cr and tcf=f, which they make a kind of correspondence relation between ring representations A®RL and the lattice-valued maps A®L, where the mapping cr: A®L is called a realizationof c. It is shown that tcr=tc and crr=cr.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 61

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
اطلاعات دوره: 
  • سال: 

    2019
  • دوره: 

    5
  • شماره: 

    3
  • صفحات: 

    129-142
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    115
  • دانلود: 

    0
چکیده: 

One of the serious threats to cyberspace is the Bot Networks or Botnets. Bots are malicious software that acts as a network and allows hackers to remotely manage and control infected computer victims. Given the fact that DNS is one of the most common protocols in the network and is essential for the proper functioning of the network, it is very useful for monitoring, detecting and reducing the activity of the Botnets. DNS queries are sent in the early stages of the life cycle of each Botnet, so infected hosts are identified before any malicious activity is performed. Because the exchange of information in the network environment and the volume of information is very high, Storing and indexing this massive data requires a large database. By using the DNS traffic analysis, we try to identify the Botnets. We used the data generated from the network traffic and information of known Botnets with the Splunk platform to conduct data analysis to quickly identify attacks and predict potential dangers that could arise. The analysis results were used in tests conducted on real network environments to determine the types of attacks. Visual IP mapping was then used to determine actions that could be taken. The proposed method is capable of recognizing known and unknown Bots.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 115

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
اطلاعات دوره: 
  • سال: 

    1400
  • دوره: 

    50
  • شماره: 

    4 (پیاپی 94)
  • صفحات: 

    1797-1809
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    390
  • دانلود: 

    153
چکیده: 

روش شبیه سازی مونت کارلو به طور گسترده در ارزیابی قابلیت اطمینان شبکه های توزیع مورد استفاده قرار می گیرد. بزرگ ترین مزیت این روش سادگی و انعطاف پذیری آن برای اعمال به هر سیستمی است. در مقابل، حجم زیاد محاسبات و نتایج غیردقیق از معایب این روش هستند. در این کار، یک روش جدید ارزیابی شاخص های قابلیت اطمینان در شبکه های فعال پیشنهاد شده است. این روش ترکیبی از روش شبیه سازی مونت کارلو و روش تحلیلی است. این روش برخلاف روش های شبیه سازی دارای جواب یکتا است. با توجه به اینکه، هدف از ارایه این روش جدید ارزیابی قابلیت اطمینان، پر کردن خلاهای موجود در روش شبیه سازی مونت کارلو است، درنتیجه روش شبیه سازی مونت کارلو ترتیبی با جزییات بیشتری مورد بررسی قرار می گیرد. برای اثبات کارایی روش جدید، ارزیابی شاخص های قابلیت اطمینان باس2 RBTS حالت شبکه غیرفعال و شبکه فعال (باس 2 و 4 RBTS اصلاح شده شامل منابع تولید پراکنده و ذخیره کننده انرژی) با استفاده از روش جدید و روش مونت کارلو انجام شده و با همدیگر مقایسه شده اند. نتایج حاصل از این دو روش نشان می دهد که روش جدید نتایج دقیقی دارد و زمان اجرای کمتری نسبت به روش شبیه سازی مونت کارلو دارد.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 390

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 153 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
اطلاعات دوره: 
  • سال: 

    2020
  • دوره: 

    15
  • شماره: 

    1
  • صفحات: 

    23-34
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    177
  • دانلود: 

    0
چکیده: 

It is well known that the sum of two z-ideals in C(X) is either C(X) or a z-ideal. The main aim of this paper is to study the sum of strongly z-ideals in RL, the ring of real-valued continuous functions on a frame L. For every ideal I in RL, we introduce the biggest strongly z-ideal included in I and the smallest strongly z-ideal containing I, denoted by Isz and Isz, respectively. We study some properties of Isz and Isz: Also, it is observed that the sum of any family of minimal prime ideals in the ring RL is either RL or a prime strongly z-ideal in RL. In particular, we show that the sum of two prime ideals in RL which are not chains is a prime strongly z-ideal.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 177

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button