نتایج جستجو برای: undesirable output

تعداد نتایج: 199236  

Journal: :Computers & Chemical Engineering 2004
Daniel R. Saffer Francis J. Doyle

The linear programming formulations of model predictive control are known to exhibit degenerate solution behavior. In this work, a multi-parametric linear programming technique is utilized to analyze the control laws that are generated from various linear programming based MPC routines. These various routines explore a number of factors, including objective function selection and constraint han...

2015
Vadim Okun Elizabeth Fong

Multiple techniques and tools, including static analysis and testing, should be used for software assurance. Fuzz testing is one such technique that can be effective for finding security vulnerabilities. In contrast with traditional testing, fuzz testing only monitors the program for crashes or other undesirable behavior. This makes it feasible to run a very large number of test cases. This art...

2002
Jan Willem Polderman Iven Mareels

Simple adaptive controllers based on high gain output feedback suffer a lack of robustness with respect to bounded disturbances. Existing modifications achieve boundedness of all solutions but introduce solutions that, even in the absence of disturbances, do not achieve regulation. In this paper a new modification that achieves the desired robustness without the side-effect of undesirable solut...

2008
Thomas Leroy Jonathan Chauvin Nicolas Petit

Air path control of a spark ignition engine without an EGR loop, equipped with variable-valve-timing (VVT) actuators, is addressed in this paper. VVT devices are used to produce internal exhaust gas recirculation, providing beneficial effects in terms of fuel consumption and pollutant emissions reduction. However, VVT actuators affect the fresh air charge in the cylinders. This has an impact on...

Journal: :Comput. Graph. Forum 2013
Pierre-Edouard Landes Bruno Galerne Thomas Hurtut

We present a novel shape-aware method for synthesizing 2D and 3D discrete element textures consisting of collections of distinct vector graphics objects. Extending the long-proven point process framework, we propose a shape process, a novel stochastic model based on spatial measurements that fully take into account the geometry of the elements. We demonstrate that our approach is well-suited fo...

1999

This application note investigates the design of analog filters that reduce the influence of extraneous noise in data acquisition systems. These types of systems primarily utilize low-pass filters, digital filters or a combination of both. With the analog low-pass filter, high frequency noise and interference can be removed from the signal path prior to the analog-to-digital (A/D) conversion. I...

2006
Elvira Marie B. Aske Stig Strand Sigurd Skogestad

In many cases, optimal operation for a plant is the same as maximum throughput. In this case a rigorous model for the plant is not necessary if we are able to identify the bottleneck. Optimal operation is the same as maximum throughput in the bottleneck. If the bottleneck does not move, this can be realized with singleloop controller from the throughput manipulator to the bottleneck. However, i...

2011
Rim Ayadi Mohamed Masmoudi

The voltage reference represents a very important stage in applications such RF system. Most bandgap voltage reference designer use bipolar junction transistors (BJT) to easily reduce the temperature dependence and supply voltage, other use an operational amplifiers (OP-AMP), which are generally very complex and may present undesirable parasite and high power consumption. This paper presents a ...

2011
N. Luo C. L. Bottasso H. R. Karimi M. Zapateiro

Wind and wave dynamic loads might cause undesirable vibrations that affect the structure integrity and system performance of floating offshore wind turbines. This paper addresses the problem of dynamic load mitigation by using semiactive control techniques with the tuned liquid column dampers placed on the turbine’s tower. The control law is formulated based on the mixed H2/H∞ methods for ensur...

2015
Vinay K. Chaudhri Nikhil Dinesh Eva Banik Umangi Oza

In this paper, we describe the range of sentences that we synthesize from a knowledge base (KB) using a natural language generation (NLG) system. We give an overview of our NLG system, and then focus on the specific challenge in handling overly general classes such as Tangible-Entity and Physical-Object. Such classes are unavoidable in the KB, and it is undesirable to show them in an output for...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید