This paper presents a Model-Based Design(MBD)approach for the design and control of a customized manipulator intended for drilling and position-ing of dental implants accurately with minimal human intervention.While p...This paper presents a Model-Based Design(MBD)approach for the design and control of a customized manipulator intended for drilling and position-ing of dental implants accurately with minimal human intervention.While performing an intra-oral surgery for a prolonged duration within a limited oral cavity,the tremor of dentist's hand is inevitable.As a result,wielding the drilling tool and inserting the dental implants safely in accurate position and orientation is highly challenging even for experienced dentists.Therefore,we introduce a customized manipulator that is designed ergonomically by taking in to account the dental chair specifications and anthropomorphic data such that it can be readily mounted onto the existing dental chair.The manipulator can be used to drill holes for dental inserts and position them with improved accuracy and safety.Further-more,a thorough multi-body motion analysis of the manipulator was carried out by creating a virtual prototype of the manipulator and simulating its controlled movements in various scenarios.The overall design was prepared and validated in simulation using Solid works,MATLAB and Simulink through Model Based Design(MBD)approach.The motion simulation results indicate that the manipulator could be built as a prototype readily.展开更多
For several years now, electric vehicles (EVs) have been expected to become widely available in the micro-mobility field. However, the insufficiency of such vehicles’ battery-charging and discharging performance has ...For several years now, electric vehicles (EVs) have been expected to become widely available in the micro-mobility field. However, the insufficiency of such vehicles’ battery-charging and discharging performance has limited their practical use. A hybrid energy storage system, which comprises a capacitor and battery, is a promising solution to this problem;however, to apply model-based designs, which are indispensable to embedded systems, such as the electronic control units used in EVs, a simple and accurate capacitor model is required. Within this framework, a lithium-ion capacitor (LIC) model is proposed, and its charging and discharging performances are evaluated against an actual LIC. The model corresponds accurately to the actual LIC, and the results indicate that the proposed LIC model will work well when used with Model-Based Design (MBD).展开更多
This paper presents a state-of-the-art review in modeling approach of hardware in the loop simulation(HILS)realization of electric machine drives using commercial real time machines.HILS implementation using digital s...This paper presents a state-of-the-art review in modeling approach of hardware in the loop simulation(HILS)realization of electric machine drives using commercial real time machines.HILS implementation using digital signal processors(DSPs)and field programmable gate array(FPGA)for electric machine drives has been investigated but those methods have drawbacks such as complexity in development and verification.Among various HILS implementation approaches,more efficient development and verification for electric machine drives can be achieved through use of commercial real time machines.As well as implementation of the HILS,accurate modeling of a control target system plays an important role.Therefore,modeling trend in electric machine drives for HILS implementation is needed to be reviewed.This paper provides a background of HILS and commercially available real time machines and characteristics of each real time machine are introduced.Also,recent trends and progress of permanent magnet synchronous machines(PMSMs)modeling are presented for providing more accurate HILS implementation approaches in this paper.展开更多
Security practices such as Audits that often focus on penetration testing are performed to find flaws in some types of vulnerability & use tools, which have been tailored to resolve certain risks based on code err...Security practices such as Audits that often focus on penetration testing are performed to find flaws in some types of vulnerability & use tools, which have been tailored to resolve certain risks based on code errors, code conceptual <span style="font-family:Verdana;">assumptions bugs</span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">,</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> etc. Most existing security practices in e-Commerce are</span></span></span><span><span><span style="font-family:;" "=""><span style="font-family:Verdana;"> dealt with as an auditing activity. They may have policies of security, which are enforced by auditors who enable a particular set of items to be reviewed, but </span><span style="font-family:Verdana;">also fail to find vulnerabilities, which have been established in complianc</span><span style="font-family:Verdana;">e </span><span style="font-family:Verdana;">with application logic. In this paper, we will investigate the problem of business</span><span style="font-family:Verdana;"> logic vulnerability in the component-based rapid development of e-commerce applications while reusing design specification of component. We propose secure application functional processing Logic Security technique for compo</span><span style="font-family:Verdana;">nent-based e-commerce application, based on security requirement of</span><span style="font-family:Verdana;"> e-business </span><span style="font-family:Verdana;">process and security assurance logical component behaviour specification</span><span style="font-family:Verdana;"> ap</span><span style="font-family:Verdana;">proach to formulize and design a solution for business logic vulnerability</span><span style="font-family:Verdana;"> phenomena.</span></span></span></span>展开更多
A new geometric constraint model is described, which is hierarchical and suitable for parametric feature based modeling. In this model, different levels of geometric information are represented to support various stag...A new geometric constraint model is described, which is hierarchical and suitable for parametric feature based modeling. In this model, different levels of geometric information are represented to support various stages of a design process. An efficient approach to parametric featu-re based modeling is also presented, adopting the high level geometric constraint model. The low level geometric model such as B-reps can be derived automatically from the high level geometric constraint model, enabling designers to perform their task of detailed design.展开更多
文摘This paper presents a Model-Based Design(MBD)approach for the design and control of a customized manipulator intended for drilling and position-ing of dental implants accurately with minimal human intervention.While performing an intra-oral surgery for a prolonged duration within a limited oral cavity,the tremor of dentist's hand is inevitable.As a result,wielding the drilling tool and inserting the dental implants safely in accurate position and orientation is highly challenging even for experienced dentists.Therefore,we introduce a customized manipulator that is designed ergonomically by taking in to account the dental chair specifications and anthropomorphic data such that it can be readily mounted onto the existing dental chair.The manipulator can be used to drill holes for dental inserts and position them with improved accuracy and safety.Further-more,a thorough multi-body motion analysis of the manipulator was carried out by creating a virtual prototype of the manipulator and simulating its controlled movements in various scenarios.The overall design was prepared and validated in simulation using Solid works,MATLAB and Simulink through Model Based Design(MBD)approach.The motion simulation results indicate that the manipulator could be built as a prototype readily.
文摘For several years now, electric vehicles (EVs) have been expected to become widely available in the micro-mobility field. However, the insufficiency of such vehicles’ battery-charging and discharging performance has limited their practical use. A hybrid energy storage system, which comprises a capacitor and battery, is a promising solution to this problem;however, to apply model-based designs, which are indispensable to embedded systems, such as the electronic control units used in EVs, a simple and accurate capacitor model is required. Within this framework, a lithium-ion capacitor (LIC) model is proposed, and its charging and discharging performances are evaluated against an actual LIC. The model corresponds accurately to the actual LIC, and the results indicate that the proposed LIC model will work well when used with Model-Based Design (MBD).
基金supported in part by the National Research Foundation of Korea(NRF)grant funded by Korea government(No.2020R1C1C1013260)in part by INHA UNIVERSITY Research Grant.
文摘This paper presents a state-of-the-art review in modeling approach of hardware in the loop simulation(HILS)realization of electric machine drives using commercial real time machines.HILS implementation using digital signal processors(DSPs)and field programmable gate array(FPGA)for electric machine drives has been investigated but those methods have drawbacks such as complexity in development and verification.Among various HILS implementation approaches,more efficient development and verification for electric machine drives can be achieved through use of commercial real time machines.As well as implementation of the HILS,accurate modeling of a control target system plays an important role.Therefore,modeling trend in electric machine drives for HILS implementation is needed to be reviewed.This paper provides a background of HILS and commercially available real time machines and characteristics of each real time machine are introduced.Also,recent trends and progress of permanent magnet synchronous machines(PMSMs)modeling are presented for providing more accurate HILS implementation approaches in this paper.
文摘Security practices such as Audits that often focus on penetration testing are performed to find flaws in some types of vulnerability & use tools, which have been tailored to resolve certain risks based on code errors, code conceptual <span style="font-family:Verdana;">assumptions bugs</span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">,</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> etc. Most existing security practices in e-Commerce are</span></span></span><span><span><span style="font-family:;" "=""><span style="font-family:Verdana;"> dealt with as an auditing activity. They may have policies of security, which are enforced by auditors who enable a particular set of items to be reviewed, but </span><span style="font-family:Verdana;">also fail to find vulnerabilities, which have been established in complianc</span><span style="font-family:Verdana;">e </span><span style="font-family:Verdana;">with application logic. In this paper, we will investigate the problem of business</span><span style="font-family:Verdana;"> logic vulnerability in the component-based rapid development of e-commerce applications while reusing design specification of component. We propose secure application functional processing Logic Security technique for compo</span><span style="font-family:Verdana;">nent-based e-commerce application, based on security requirement of</span><span style="font-family:Verdana;"> e-business </span><span style="font-family:Verdana;">process and security assurance logical component behaviour specification</span><span style="font-family:Verdana;"> ap</span><span style="font-family:Verdana;">proach to formulize and design a solution for business logic vulnerability</span><span style="font-family:Verdana;"> phenomena.</span></span></span></span>
文摘A new geometric constraint model is described, which is hierarchical and suitable for parametric feature based modeling. In this model, different levels of geometric information are represented to support various stages of a design process. An efficient approach to parametric featu-re based modeling is also presented, adopting the high level geometric constraint model. The low level geometric model such as B-reps can be derived automatically from the high level geometric constraint model, enabling designers to perform their task of detailed design.