• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 30
  • 24
  • 12
  • 8
  • 5
  • 4
  • 4
  • 3
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 113
  • 24
  • 23
  • 22
  • 13
  • 13
  • 13
  • 12
  • 12
  • 11
  • 10
  • 9
  • 8
  • 8
  • 8
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

Controle adaptativo para acesso à memória compartilhada em sistemas em chip / Adaptive control for shared access memory in system-on-chip the number

Bonatto, Alexsandro Cristóvão January 2014 (has links)
Acessos simultâneos gerados por Elementos de Processamento (EP) contidos nos Sistemas em Chip (SoC) para um único canal de memória externa coloca desafios que requerem uma atenção especial por constituírem o gargalo para o desempenho de processamento. No caso em que os EPs são microprocessadores, a questão fica ainda mais evidente, pois a taxa de aumento da velocidade dos microprocessadores excede a taxa de aumento da velocidade da DRAM. Ambas aumentam exponencialmente, mas a expoente dos microprocessadores é maior do que a das memórias. Este efeito é denominado de “muro de memória” (Memory Wall) e representa que o gargalo de processamento está relacionado à diferença de velocidade. Neste cenário, novas estratégias de controle de acesso são necessárias para melhorar o desempenho. Plataformas heterogêneas de processamento multimídia são formadas por diversos EPs. Os acessos con- correntes à regiões de memória não contíguas em uma DRAM reduzem a largura de banda e aumentam a latência de acesso aos dados, degradando o desempenho de processamento. Esta tese mostra que a eficiência computacional pode ser melhorada com o uso de um fluxo de projeto centralizado em memória, ou seja, orientado para os aspectos funcionais da DRAM. Neste trabalho é apresentado um subsistema de memória com gerenciamento adaptativo de compar- tilhamento do canal de memória entre múltiplos clientes. Esta tese apresenta a arquitetura de um controlador de memória com comportamento predizível que faz a avaliação do pior caso de execução para as transações solicitadas pelos clientes em tempo de execução. Um modelo baseado em atrasos é utilizado para prever os piores casos para o conjunto de clientes. O sub-sistema de memória centraliza a comunicação de dados e gerencia os acessos dos diversos EPs do sistema, de forma que a comunicação seja atendida de acordo com as necessidades de cada aplicação. São apresentadas três contribuições principais: 1) um método de projeto de sistemas integrados centralizado em memória, que orienta o projeto para os aspectos funcionais da me- mória compartilhada; 2) um modelo baseado em atrasos para estimar o pior caso de execução do sistema, quanto aos tempos de resposta e largura de banda mínima alocada por cliente; 3) um árbitro adaptativo para gerenciamento dos acessos à memória externa com garantias de prazos de execução das transações. / The number of Processing Elements (PE) contained in a System-on-Chip (SoC) follows the growth of the number of transistors per chip. A SoC composed of multiple PEs, in some ap- plications such as multimedia, implements algorithms that handle large volumes of data and justify the use of an external memory with large capacity. External memory accesses are shared by multiple PEs adding challenges that may have special attention because they constitute the bottleneck for performance and relevant factor for power consumption. In the case where the PEs are microprocessors, this issue becomes even more evident as the rate of increase of speed of microprocessors exceeds the rate of increase in speed of DRAM. This effect is called “mem- ory wall” and represents that the bottleneck processing is related to the speed of data access. In this scenario, new access control strategies are needed to improve processing performance. Heterogeneous platforms for multimedia processing are formed by several PEs. The concur- rent accesses to DRAM reduce bandwidth and increase latency access to data, degrading the processing performance. This thesis shows that significant improvements in computational effi- ciency can be obtained using a design methodology oriented to the functional aspects of DRAM through a memory subsystem with adaptive management. It is presented the data communica- tion architecture for integration of PEs system based on an analytical model to reduce latency and guarantee Quality of Service (QoS). The memory subsystem is organized as a hierarchy of memories, with a proposed integration of PEs oriented centered in the main memory. The memory subsystem centralized data communication and manages the access of several PEs sys- tem so that communication is served according to the needs of each application. This thesis proposes three major contributions: 1) a methodology for design integrated systems based on the memory-centric design approach, 2) an analytical model based on delays used to evaluate the worst-case performance of the memory subsystem, 3) an arbiter for adaptive management of accesses to the external memory with guaranteed execution times of transactions.
42

Controle adaptativo para acesso à memória compartilhada em sistemas em chip / Adaptive control for shared access memory in system-on-chip the number

Bonatto, Alexsandro Cristóvão January 2014 (has links)
Acessos simultâneos gerados por Elementos de Processamento (EP) contidos nos Sistemas em Chip (SoC) para um único canal de memória externa coloca desafios que requerem uma atenção especial por constituírem o gargalo para o desempenho de processamento. No caso em que os EPs são microprocessadores, a questão fica ainda mais evidente, pois a taxa de aumento da velocidade dos microprocessadores excede a taxa de aumento da velocidade da DRAM. Ambas aumentam exponencialmente, mas a expoente dos microprocessadores é maior do que a das memórias. Este efeito é denominado de “muro de memória” (Memory Wall) e representa que o gargalo de processamento está relacionado à diferença de velocidade. Neste cenário, novas estratégias de controle de acesso são necessárias para melhorar o desempenho. Plataformas heterogêneas de processamento multimídia são formadas por diversos EPs. Os acessos con- correntes à regiões de memória não contíguas em uma DRAM reduzem a largura de banda e aumentam a latência de acesso aos dados, degradando o desempenho de processamento. Esta tese mostra que a eficiência computacional pode ser melhorada com o uso de um fluxo de projeto centralizado em memória, ou seja, orientado para os aspectos funcionais da DRAM. Neste trabalho é apresentado um subsistema de memória com gerenciamento adaptativo de compar- tilhamento do canal de memória entre múltiplos clientes. Esta tese apresenta a arquitetura de um controlador de memória com comportamento predizível que faz a avaliação do pior caso de execução para as transações solicitadas pelos clientes em tempo de execução. Um modelo baseado em atrasos é utilizado para prever os piores casos para o conjunto de clientes. O sub-sistema de memória centraliza a comunicação de dados e gerencia os acessos dos diversos EPs do sistema, de forma que a comunicação seja atendida de acordo com as necessidades de cada aplicação. São apresentadas três contribuições principais: 1) um método de projeto de sistemas integrados centralizado em memória, que orienta o projeto para os aspectos funcionais da me- mória compartilhada; 2) um modelo baseado em atrasos para estimar o pior caso de execução do sistema, quanto aos tempos de resposta e largura de banda mínima alocada por cliente; 3) um árbitro adaptativo para gerenciamento dos acessos à memória externa com garantias de prazos de execução das transações. / The number of Processing Elements (PE) contained in a System-on-Chip (SoC) follows the growth of the number of transistors per chip. A SoC composed of multiple PEs, in some ap- plications such as multimedia, implements algorithms that handle large volumes of data and justify the use of an external memory with large capacity. External memory accesses are shared by multiple PEs adding challenges that may have special attention because they constitute the bottleneck for performance and relevant factor for power consumption. In the case where the PEs are microprocessors, this issue becomes even more evident as the rate of increase of speed of microprocessors exceeds the rate of increase in speed of DRAM. This effect is called “mem- ory wall” and represents that the bottleneck processing is related to the speed of data access. In this scenario, new access control strategies are needed to improve processing performance. Heterogeneous platforms for multimedia processing are formed by several PEs. The concur- rent accesses to DRAM reduce bandwidth and increase latency access to data, degrading the processing performance. This thesis shows that significant improvements in computational effi- ciency can be obtained using a design methodology oriented to the functional aspects of DRAM through a memory subsystem with adaptive management. It is presented the data communica- tion architecture for integration of PEs system based on an analytical model to reduce latency and guarantee Quality of Service (QoS). The memory subsystem is organized as a hierarchy of memories, with a proposed integration of PEs oriented centered in the main memory. The memory subsystem centralized data communication and manages the access of several PEs sys- tem so that communication is served according to the needs of each application. This thesis proposes three major contributions: 1) a methodology for design integrated systems based on the memory-centric design approach, 2) an analytical model based on delays used to evaluate the worst-case performance of the memory subsystem, 3) an arbiter for adaptive management of accesses to the external memory with guaranteed execution times of transactions.
43

Architecture for IMS Security to Mobile:Focusing on Artificial Immune System and Mobile Agents Integration / English to Swedish

Chalamalasetty, Kalyani January 2009 (has links)
The IP Multimedia Subsystem (IMS) is an open IP based service infrastructure that enables an easy deployment of new rich multimedia services mixing voice and data. The IMS is an overlay network on top of IP that uses SIP as the primary signaling mechanism. As an emerging technology, the SIP standard will certainly be the target of Denial of Service (DoS) attacks and consequently IMS will also inherit this problem. The objective of proposed architecture for IMS is to cram the potential attacks and security threats to IP Multimedia Subsystem (IMS) and explore the security solutions developed by 3GPP. This research work incorporates the ideas of immune system and multiagent architecture that is capable of detecting, identifying and recovering from an attack. The proposed architecture protects IMS core components i.e. P-CSCF (Proxy- Call Session Control Function), I-CSCF (Interrogating-Call Session Control Function), S-CSCF (Serving Call Session Control Function) and HSS (Home Subscriber Server) from external and internal threats like eavesdropping, SQL injection and denial-ofservice (DoS) attacks. In the first level i.e. CPU under normal load all incoming and out going messages were investigated to detect and prevent SQL injection. Second level considers Denial of Service (DOS) attacks when CPU load exceeds threshold limit. Proposed architecture is designed and evaluated by using an approach called Architecture Tradeoff Analysis Method (ATAM). The results obtained confirm consistency of the architecture. / kalyani-0046737527800
44

Lokální navigace robotu pro vnější použití / Local Navigation for Outdoor Robot

Skácel, Martin January 2010 (has links)
This diploma thesis deals with complete designing and implementation of local navigation of a robot which travels according to set GPS. This work contains a study of contemporary used principles of the sensors which can be used as the components of the robot. There are sensors for measuring the surroundings of the robot and orientation of the robot in the environs. The equipment includes an instructing control unit with the ATmega8 microcontroller. This equipment collects data from the sensors and transfers them to the other systems of the robot. The following part of the thesis deals with the draft of the buses and communication protocols, which are necessary for connection between the sensors and the control unit. The I2C and RS232 buses were chosen as the most suitable. The communication protocol was borrowed from the semester project written by Bc. Michal Sitta. The main task of this control unit is reading out the data which have been measured from connected sensors. The realization of interface between the sensor bus and the major system is another core goal of the control unit. The system for a local navigation is designed with the approach which allows the widest range of extensibility. During the designing of the control unit the future possibility of insertion other sensors was taken into consideration.
45

Des mécanismes d’authentification basés sur l’identité de l’utilisateur pour renforcer la sécurité des réseaux / User identity based authentication mechanisms for network security enhancement

Abid, Mohamed 01 February 2011 (has links)
Dans cette thèse, nous concevons trois nouveaux mécanismes d'authentification basés sur l'identité des utilisateurs. Par conséquent, nous apportons des améliorations sur le contrôle d'accès à différents types de réseaux tels que les réseaux domestiques, les réseaux gouvernementaux et les réseaux cellulaires. L'identité se base sur des gabarits biométriques publics, des chaînes de caractères simples comme l’adresses e-mail ou l’identifiant (login). La première solution concerne l'utilisation de données biométriques dans les mécanismes d'authentification des réseaux domestiques (Home Network HN). Nous voulons personnaliser l'accès de chaque utilisateur dans le HN et prévenir les utilisateurs illégitimes (en passant par la passerelle domestique « Home Gateway (HG) ») d'avoir accès aux services. Nous proposons une nouvelle méthode d'authentification biométrique qui respecte la contrainte de ne pas sauvegarder les données biométriques (Biometric Template (BT)) des utilisateurs dans le HG. Pour satisfaire cette contrainte, nous proposons d'utiliser la méthode de « Fuzzy Vault » pour cacher un secret utilisé pour l'authentification. Un logiciel génère une identité biométrique révocable (BioID) en utilisant une transformation fonctionnelle. Ce BioID est utilisé par le mécanisme du fuzzy vault pour cacher une clé de session secrète. La deuxième solution propose des mécanismes d'authentification pour les passeports biométriques (e-Passeports). Les paramètres de chiffrement sont générés en utilisant les données biométriques et, ainsi, ils seront personnalisés pour l'utilisateur. Notre proposition introduit un nouveau mécanisme d'authentification pour le passeport biométrique utilisant le protocole Diffie-Hellman de partage de clé basé sur les courbes elliptiques (ECDH). Ce protocole est nécessaire pour générer une clé de session utilisée pour authentifier le voyageur et le système d'inspection (IS) et ainsi sécuriser l'échange des données entre eux. Notre protocole peut utiliser les points "minuties" d'une empreinte digitale et le code de l'iris du détenteur du passeport électronique. Dans la troisième solution, nous avons travaillé sur le réseau cellulaire et nous avons utilisé une chaîne de caractères simple (l’adresse e-mail de l’utilisateur) comme identifiant pour accéder aux services. Nous avons choisi l'IP Multimedia Subsystem (IMS) qui est une architecture de recouvrement pour la fourniture de services multimédia, comme support. Nous avons conçu un nouveau mécanisme d'authentification aux services en utilisant la cryptographie basée sur l'identité (IBC). L'objectif était d'authentifier les utilisateurs en utilisant leurs identifiants public et privé pour surmonter les faiblesses connues du protocole «Authentication and Key Agreement (AKA) ». Nous nous sommes concentrés sur les tentatives d'écoute et d’usurpation d'identité qui peuvent avoir lieu dans le scénario classique de l’IMS et nous avons montré comment la solution proposée peut prévenir ces attaques. Nous avons ensuite proposé d'ajouter une vérification par lot au niveau du Bootstrapping Server Function (BSF) pour diminuer le délai de vérification des signatures et le temps de réponse de l’authentification. / In this thesis, we design three new authentication mechanisms based on user identity. Therefore, we bring improvements in access control for different classes of networks such as Home Network, Governmental Network and Cellular Network. The identity can be biometric public features, simple strings (email addresses, login...), etc. The first solution concerns the use of biometric in Home Network' authentication mechanisms. In the Home Network (HN) case study, we aim at personalizing the access of each user in the HN and preventing illegitimate users (passing by the Home Gateway (HG)) to have any access. We propose a new biometric authentication method which respects the constraint of the non storage of the users' Biometric Template (BT) in the HG. To satisfy this constraint, we propose using the fuzzy vault method to hide a secret that should be used for authentication. A software generates a revocable biometric identity (BioID) using a functional transformation. This BioID is used in the fuzzy vault mechanisms to hide a secret session key. The second solution proposes e-Passport authentication mechanisms. The cryptographic parameters are generated using the biometric templates and hence, personalized for the user. In travel document case study, we present our proposal which introduces a new e-Passport authentication mechanisms based on the Elliptic Curve Diffie-Hellman (ECDH) Key Agreement protocol. This protocol is needed to generate a session key used to authenticate the traveler and the Inspection System (IS) to exchange secure data. Our protocol is defined using minutiae data (fingerprint) and iris code of the e-Passport holder. In the third solution, we worked on the Cellular Network and we used a simple string, like email addresses, as identifier to access to services. We choose the IP Multimedia Subsystem (IMS) which is an overlay architecture for the provision of multimedia services. We design a new service authentication mechanism relying on Identity Based Cryptography (IBC) for the IMS architecture. The goal was to authenticate the users using their public and private identifiers to overcome known weaknesses in the Authentication and Key Agreement (AKA) protocol. We focused on the eavesdropping and impersonation attacks that can take place in classical IMS scenario and we showed how our proposed solution can prevent against these attacks. We, then, proposed to add a Batch Verification on the Bootstrapping Server Function (BSF) to decrease signature verification delay and the authentication response time.
46

Development of a CubeSat Conceptual Design Tool and Implementation of the EPS Design Module

Nogrady, Sean K 01 June 2021 (has links) (PDF)
This thesis is the product of an effort to develop a CubeSat Conceptual Design Tool for the California Polytechnic State University CubeSat Laboratory. Such a tool is necessary due to inefficiencies with the current conceptual design process. It is being developed to increase accessibility, reduce design time, and promote good systems engineering within CubeSat development. The development of the architecture of a conceptual design tool, the core user-interface element, and the completion of a module for the electrical power subsystem is the focus of this thesis. The architecture is built around different modules to design different subsystems that work in conjunction. The module in the tool was developed to allow a user to size an electrical power subsystem, and that is the basis for future subsystem development. Model-based Systems Engineering was also utilized as an endpoint for the tool’s outputs, and a CubeSat Model has been built for this effort. Validation has been successful on the Conceptual Design Tool as implemented at this time, so the tool it is ready to design CubeSat electrical power subsystems and be expanded upon by other tool developers.
47

Performance optimization of a subsonic Diffuser-Collector subsystem using interchangeable geometries

Boehm, Brian Patrick 09 January 2013 (has links)
A subsonic wind tunnel facility was designed and built to test and optimize various diffuser-collector box geometries at the one-twelfth scale.  The facility was designed to run continuously at an inlet Mach number of 0.42 and an inlet hydraulic diameter Reynolds number of 340,000. Different combinations of diffusers, hubs, and exhaust collector boxes were designed and evaluated for overall optimum performance. Both 3-hole and 5-hole probes were traversed into the flow to generate multiple diffuser inlet and collector exit performance profile plots. Surface oil flow visualization was performed to gain an understanding of the complex 3D flow structures inside the diffuser-collector subsystem. The cutback radial hardware was found to increase the subsystem pressure recovery by over 10% from baseline resulting in an approximate 1% increase in gas turbine power output. / Master of Science
48

Rupture et continuité dans le discours technique arabe d’Internet / Rupture and continuity in the arabic technical discourse of Internet

Affeich, Andrée 29 January 2010 (has links)
Ce travail de recherche mené sur un corpus qui rassemble onze pays arabes, vise à soulever une problématique liée à la rupture et à la continuité au sein de la terminologie arabe d’Internet, terminologie créée dans le monde anglophone, aux États-Unis précisément. Les termes « rupture » et « continuité » montrent un conflit réel entre deux systèmes linguistiques différents : le système de la langue arabe que nous appelons « système autochtone » et celui de la langue anglaise que nous appelons « système étranger ». L’image qui se dessine est celle de deux systèmes qui se disputent une partie d’un jeu d’échec. À l’ouverture, les cavaliers des deux côtés se mobilisent rapidement. Ceux du « système étranger » essaient d’instaurer d’emblée des éléments que nous appelons « éléments de rupture ». Ces derniers se manifestent à travers le phénomène de l’emprunt linguistique sous ses deux formes : emprunt entier et siglaison. En guise de réponse, le « système autochtone » mobilise tout d’abord ses deux cavaliers : il s’agit bien évidemment de deux moyens morpho-syntaxiques : le sous-système de nomination et le sous-système de communication. Ensuite, et afin de ne pas s’écrouler, « le système autochtone » renforce ses positions à l’aide de deux autres procédés : procédé sémantique qu’est la métaphore, et procédé discursive qu’est la reformulation. Dans notre travail, il ne s’agit pas de dire lequel des deux systèmes a gagné, En effet, sur une période de dix ans, nous avons accompagné l’évolution de la terminologie arabe d’Internet afin de tirer des conclusions et de relever plus exactement une certaine tendance générale et globale à la lumière des changements que cette terminologie a connus, changements qui ne sont certainement pas définitifs. / This research carried out on a corpus which gathers eleven Arab countries, aims at raising problems related to the rupture and continuity within the Arabic terminology of Internet, terminology created in the Anglophone world, more precisely in the United States. The terms “rupture” and “continuity” show a real conflict between two different linguistic systems: the Arabic language system which we call “indigenous system” and the English language system which we call “foreign system”. The image which takes shape is that of two systems playing chess. At the beginning of the game, the knights of the two sides are mobilized quickly. Those of the “foreign system” try to impose elements which we call “elements of rupture”. The latter appear through the linguistic loan phenomenon with its two forms: the integral loan and the acronyms. In response to these “elements of rupture”, the “indigenous system” mobilizes first of all its two knights, i.e. its two morpho-syntactic means: the subsystem of nomination and the subsystem of communication. Then, in order not to collapse, the “indigenous system” fortifies its position using two other processes: the semantic process which is the metaphor and the discursive process which is the rewording. In this study, we are not aiming at saying which of the two systems won. Indeed, within a period of ten years, we followed the evolution of the Arabic terminology of Internet in order to draw conclusions, and more exactly to draw a general tendency in light of changes that this terminology has known, changes which are certainly not final.
49

Subsystemmethodik für die Auslegung des niederfrequenten Schwingungskomforts von PKW

Angrick, Christian 16 January 2018 (has links) (PDF)
Um eine zielgerichtete Ableitung von Fahrzeugeigenschaften in frühen Entwicklungsphasen zu ermöglichen, ist eine Subsystemebene erforderlich, die eine konzeptunabhängige Auslegung des Gesamtfahrzeugverhaltens zulässt. In der vorliegenden Arbeit wird daher eine neue Methodik zur Auslegung von Fahrkomfort-Kennwerten auf Basis von Subsystemeigenschaften vorgestellt. Neben der Entwicklung eines geeigneten Modellansatzes, in dem die Subsysteme des Gesamtfahrzeugs durch Greybox-Modelle ohne Komponentenbezug miteinander verknüpft werden, stehen dabei auch dessen Parametrierung sowie die Integration der Methodik im Entwicklungsprozess im Vordergrund. Zur Ableitung der damit verbundenen physikalisch-mechanischen Zusammenhänge werden statische und dynamische Achsprüfstände sowie Simulationen eingesetzt. Die Anwendung der Methodik lässt eine gezielte Eigenschaftsableitung zwischen Gesamtfahrzeug-, Subsystem- und Komponentenebene im Fahrkomfort zu, bei der die Subsystemebene als neue Referenz für die Ableitung von Komponenteneigenschaften dient. Weiterhin erlaubt das Vorgehen eine eigenschaftsbasierte Vorauswahl optimaler Komponentenkonzepte sowie detaillierte Wettbewerbsanalysen. Dadurch wird eine nachhaltige Steigerung der Effizienz im Entwicklungsprozess des Fahrkomforts ermöglicht.
50

Algorithmen zur effizienten Simulation großer Mehrkörpersysteme für Modelica

Schubert, Christian 20 January 2015 (has links) (PDF)
In der vorliegenden Arbeit werden mithilfe von Methoden zur numerischen Behandlung schwach besetzter Matrizen O(n³)- und O(n)-Berechnungsalgorithmen für Mehrkörpersysteme aus deren Bewegungsgleichungen abgeleitet. Durch Verwendung von Dualen Basen kann gezeigt werden, dass sich die bezüglich der Berechnungszeit effizienten Algorithmen sowohl auf Systeme mit explizit als auch implizit formulierten Bindungsgleichungen anwenden lassen. Mit diesen gewonnen Erkenntnissen wird die derzeitige Implementierung der vorgestellten Algorithmen im Sprachstandard Modelica untersucht. Es werden Ansatzmöglichkeiten aufgezeigt, mit denen ausgewählte Modelica Compiler große Mehrkörpersysteme effizienter lösen können. Zum einen wird durch eine graphentheoretische Verallgemeinerung des O(n)-Algorithmus dieser direkt in dem freien Modelica Werkzeug OpenModelica umgesetzt. Zum anderen wird die Methode der Subsysteme für den O(n)-Algorithmus vorgestellt. Sie ermöglicht es, beliebig komplexe Teilsysteme als eigenständige Modellelemente zu erstellen. Die Berechnung von kinematischen Schleifen kann auf diese Weise wesentlich beschleunigt werden. Ferner wird gezeigt, dass sich mit der Methode der Subsysteme Modellgleichungen eines idealen homokinetischen Gelenks ableiten lassen, die frei von Zwangsbedingungen sind. Dies führt ebenfalls zu einer schnelleren und robusteren Berechnung. / Using methods from sparse matrice theory, O(n³)- and O(n)-algorithms for multibody systems are derived from the equations of motion. The concept of Dual Bases reveals that efficient algorithms for explicit joint descriptions, regarding calculation time, may also be applied to systems which use implicit joint constraints. Consequently, the feasibility of implementing these results in Modelica is examined. This leads to new approaches which enable selected Modelica compilers to solve large multibody systems more efficiently. On the one hand side a graph-theoretic generalization of the O(n)-algorithm has been implemented into the OpenModelica compiler. On the other hand, a method of subsystems for the O(n)-algorithm has been devised. It allows to derive the model equations for arbitrary complex sub-systems which can be implemented as new model elements for an O(n)-algorithm library. This has been carried out for recurring kinematic loops of Mobile Machinery improving simulation speed considerably. Furthermore, it is shown that a fast and robust model of an ideal constant velocity joint can be derived that way.

Page generated in 0.0564 seconds