Blar i NTNU Open på dokumenttype "Chapter"
Viser treff 41-60 av 4250
-
A control scheme for utilizing energy storage of the modular multilevel converter for power oscillation damping
(Chapter, 2017)This paper presents a control scheme that utilizes energy storage of the Modular Multilevel Converter (MMC) for Power Oscillation Damping (POD) service. Such a service is used to enhance grid stability by providing damping ... -
A control-oriented model of underwater snake robots exposed to currents
(Chapter, 2015)This paper presents a control-oriented model of a neutrally buoyant underwater snake robot that is exposed to a constant irrotational current. The robot is assumed to move in a horizontal, fully submerged plane with a ... -
A Control–Oriented Model of Underwater Snake Robots
(Conference Publications;ROBIO 2014, Chapter, 2014)In this paper we consider swimming underwater snake robots that are fully immersed in water and moving in a virtual horizontal plane. The main objective of the paper is to develop a model that is well suited for control ... -
A corpus-based analysis of the pragmatic marker you get me
(Chapter, 2017)The chapter examines the use of the emerging pragmatic marker you get me (e.g. I'm just gonna give her a little backhand or whatever cos she needs to learn you get me?) in the 1.5 million word Multicultural London English ... -
A Data Dissemination Protocol for Vehicles with Temporary Cellular Network Inaccessibility
(Chapter, 2019)The cellular network coverage in sparsely populated and mountainous areas is often patchy. That can be a significant impediment for services based on connections between vehicles and their environment. In this paper, we ... -
A Data-driven Approach to Grid Impedance : Identification for Impedance-based Stability Analysis under Different Frequency Ranges
(Chapter, 2019)The instability caused by inappropriate damping design of grid-connected converters under specific grid impedance makes the grid impedance estimation a crucial issue. To guide the system controller design toward a stable ... -
A Data-Driven Security Game to Facilitate Information Security Education
(Chapter, 2019)Many universities have started to educate students on how to develop secure software and systems. One challenge of teaching information security is that the curriculum can easily be outdated, because new attacks and ... -
A decentralized sensor fusion approach to human fatigue monitoring in maritime operations
(Chapter, 2019)Human fatigue is one of the main causes of accidents in maritime domain. How to use physiological data to estimate degree of human fatigue without medical domain knowledge is significant to the safety of tasks in maritime ... -
A Decision Support Model for Routing and Scheduling a Fleet of Fuel Supply Vessels
(Chapter, 2015)We consider a real fuel supply vessel routing and scheduling problem faced by a Hellenic oil company with a given fleet of fuel supply vessels used to supply customer ships outside Piraeus Port. The supply vessels are ... -
A Degrading Element of Safety-instrumented Systems with Combined Maintenance Strategy
(Chapter, 2019)Safety-instrumented systems (SISs) are widely used to prevent hazardous events. The mechanical actuator subsystem in a SIS can become more vulnerable with time due to progressive degradation mechanisms, such as erosion, ... -
A design methodology for resilience in fleets for service operations
(Chapter, 2016)In this paper, we present a new conceptual design methodology for increasing the resilience in complex operations involving a fleet of ships. The objective of the methodology is to support design decisions to reduce ... -
A discussion of risk influencing factors for maritime accidents based on investigation reports
(Chapter, 2017)This paper reports findings from a review of investigation reports from maritime accidents. Based on a systematic analysis of 95 reports, we discuss a selection of typical causes and circumstances for serious maritime ... -
A dynamic model of the drilling action of percussive tools
(Chapter, 2019)A phenomenological model is proposed to explain the existence of sweet spot in the relationship between the rate of penetration (ROP) and the weight-on-bit (WOB), i.e., the existence of an optimal WOB for which the ROP is ... -
A dynamic stress state analysis at the pressure tunnel of Upper Tamakoshi HPP, Nepal
(Chapter, 2018)In theory, in-situ stress state of an area of concern is mainly governed by gravity-induced stress, tectonic ac-tivity and topographic condition of that area. The tectonic and geological environment such as faulting and ... -
A Fair Deal? Paid Domestic Labour in Social Democratic Norway
(Chapter, 2015)In this chapter, I explore some of the paradoxes and ambivalences related to the increase in paid domestic labour in Norway. I focus on the role of employers and their perceptions and experiences of paying others to undertake ... -
A Fault-Tolerant and Consistent SDN Controller
(Chapter, 2016)Software-Defined Networking (SDN) is a new paradigm that promises to enhance network flexibility and innovation. However, operators need to thoroughly assess its advantages and threats before they can implement it. Robustness ... -
A Feature Preprocessing Framework of Remote Sensing Image for Marine Targets Recognition
(Chapter, 2018)The effective extraction of continuous features of marine remote sensing image is the key to the processing of marine target recognition. Since many of the existing data mining algorithms can only deal with discrete ... -
A Formation of Unmanned Vehicles for Tracking of an Acoustic Fish-Tag
(Chapter; Peer reviewed, 2017)In this paper we present a proof-of-concept for an hydro acoustic fish-tag position estimation and tracking system. In our field-tested concept, a formation of Unmanned Surface Vehicles (USV) creates a mobile array of ... -
A framework for estimating the implicit safety level of existing design codes
(Chapter, 2017)Target safety levels ( t ) are key elements for reliability-based design and calibration of design codes. They are derived by monetary optimization or from existing codes. The current article discusses these two approaches ...