Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Engineering

A Mixed Consensus And Fuzzy Approach To Position Control Of Four-Wheeled Vehicles, Bita Hasheminezhad Jan 2016

A Mixed Consensus And Fuzzy Approach To Position Control Of Four-Wheeled Vehicles, Bita Hasheminezhad

LSU Master's Theses

Autonomous driving is a growing domain of intelligent transportation systems that utilizes communications to autonomously control cooperative vehicles. This thesis presents a multi-agent solution to the platoon control problem. First, an adaptive controller on linearized longitudinal dynamics of a vehicle is applied to assure vehicles are able to track their reference velocities. Then, an agent-based consensus approach is studied which enables multiple vehicles driving together where each vehicle can follow its predecessor at a close distance, safely. To deal with unexpected events, a fuzzy controller is added to the reference signal of the consensus controller. Simulation results are provided to …


An Architecture For Configuring An Efficient Scan Path For A Subset Of Elements, Arash Ashrafi Jan 2016

An Architecture For Configuring An Efficient Scan Path For A Subset Of Elements, Arash Ashrafi

LSU Master's Theses

LaTeX4Web 1.4 OUTPUT Field Programmable Gate Arrays (FPGAs) have many modern applications. A feature of FPGAs is that they can be reconfigured to suit the computation. One such form of reconfiguration, called partial reconfiguration (PR), allows part of the chip to be altered. The smallest part that can be reconfigured is called a frame. To reconfigure a frame, a fixed number of configuration bits are input (typically from outside) to the frame. Thus PR involves (a) selecting a subset C Í S of k out of n frames to configure and (b) inputting the configuration bits for these k frames. …


A Study Of Fpga Resource Utilization For Pipelined Windowed Image Computations, Aswin Vijaya Varma Jan 2016

A Study Of Fpga Resource Utilization For Pipelined Windowed Image Computations, Aswin Vijaya Varma

LSU Master's Theses

In image processing operations, each pixel is often treated independently and operated upon by using values of other pixels in the neighborhood. These operations are often called windowed image computations (or neighborhood operations). In this thesis, we examine the implementation of a windowed computation pipeline in an FPGA-based environment. Typically, the image is generated outside the FPGA environment (such as through a camera) and the result of the windowed computation is consumed outside the FPGA environment (for example, in a screen for display or an engine for higher level analysis). The image is typically large (over a million pixels 1000×1000 …


Enhancing Program Soft Error Resilience Through Algorithmic Approaches, Sui Chen Jan 2016

Enhancing Program Soft Error Resilience Through Algorithmic Approaches, Sui Chen

LSU Master's Theses

The rising count and shrinking feature size of transistors within modern computers is making them increasingly vulnerable to various types of soft faults. This problem is especially acute in high-performance computing (HPC) systems used for scientific computing, because these systems include many thousands of compute cores and nodes, all of which may be utilized in a single large-scale run. The increasing vulnerability of HPC applications to errors induced by soft faults is motivating extensive work on techniques to make these applications more resilient to such faults, ranging from generic techniques such as replication or checkpoint/restart to algorithm-specific error detection and …


A Frequency Hopping Method To Detect Replay Attacks, Guofu Tang Jan 2016

A Frequency Hopping Method To Detect Replay Attacks, Guofu Tang

LSU Master's Theses

The application of information technology in network control systems introduces the potential threats to the future industrial control system. The malicious attacks undermine the security of network control system, which could cause a huge economic loss. This thesis studies a particular cyber attack called the replay attack, which is motivated by the Stuxnet worm allegedly used against the nuclear facilities in Iran. For replay attack, this thesis injects the narrow-band signal into control signal and adopts the spectrum estimation approach to test the estimation residue. In order to protect the information of the injected signal from knowing by attackers, the …


Real And Reactive Power Control Of Induction Motor Drives, Juan Rafael Nunez Jan 2016

Real And Reactive Power Control Of Induction Motor Drives, Juan Rafael Nunez

LSU Master's Theses

Induction motors are considered the workhorse in the majority of industrial applications. Their rugged, low-maintenance, and efficient designs keep finding new forms of use nowadays. In this work, power control strategies of induction motor drives based on principles of Direct Torque Control and Model Predictive Control are investigated. The proposed methods control the real and reactive power flow into/out of the machine by selecting and applying proper voltage space phasors to the stator. First, the impact of voltage space phasors on real and reactive power variations is explored. Based on these observations, two methods to choose the appropriate voltage space …