Traditional concurrency control techniques for database systems (transaction management based on locking protocols) have been successful in many multiuser settings, but these tech...
The use of one-way chains in authentication protocols is a technique of great importance which has many applications. Employing cryptographic techniques in the area of industrial ...
—The present work describes the analysis, modeling and control of a transformerless Boost-Buck power inverter used as a DC-AC power conditioning stage for grid-connected photovol...
Carlos Meza, Domingo Biel, Luis Martinez-Salamero,...
: In this paper, Fuzzy Logic controller is developed for ac/ac Matrix Converter. Furthermore, Total Harmonic Distortion is reduced significantly. Space Vector Algorithm is a method...
Abstract This paper investigates simple and robust transparency-attainable control architectures for bilateral teleoperation. The strength of two-channel control architectures and ...