Month: June 2024
Need to use SPO Service Online Powershell Module without credentials-based login for an Automation
I need to access the Sharepoint Admin Center via a Powershell Runbook through a Power Automate flow in order to perform hourly checks on Site Storage Usage in Sharepoint. I have a runbook that currently gets this data on a folder-basis with the PnP Module, but i’m unsure if this will work for this issue. My assumption is that i’ll need to use the SPO Service module, but it requires credentials-based login with administrative access. Is there a way to circumvent this?
I need to access the Sharepoint Admin Center via a Powershell Runbook through a Power Automate flow in order to perform hourly checks on Site Storage Usage in Sharepoint. I have a runbook that currently gets this data on a folder-basis with the PnP Module, but i’m unsure if this will work for this issue. My assumption is that i’ll need to use the SPO Service module, but it requires credentials-based login with administrative access. Is there a way to circumvent this? Read More
Unable to set up Webinar invite from a Group Team calendar
Hi all,
Hoping you can help. We have a Team site and calendar set up for our WIT (Women in Tech) in our organisation. We want to set up 3 webinars in July for people to register for but have noticed that the only option to set up a webinar has to come from the Calendar icon in Teams which automatically reverts to the personal calendar of the person sending the invite and not the WIT calendar as the sender.
This would look odd when recieving the registration from a person and not WIT. It also would make editing the invite hard as even the co-organisers are limited as they are not the person sending the invite so making co-organizers ability void then. Anyone have a solution so the invite sender can be the WIT calendar. I know it can be done for Teams meetings, but we want to have it as a webinar though. Thanks in advance for any help you can give on this query.
Hi all, Hoping you can help. We have a Team site and calendar set up for our WIT (Women in Tech) in our organisation. We want to set up 3 webinars in July for people to register for but have noticed that the only option to set up a webinar has to come from the Calendar icon in Teams which automatically reverts to the personal calendar of the person sending the invite and not the WIT calendar as the sender. This would look odd when recieving the registration from a person and not WIT. It also would make editing the invite hard as even the co-organisers are limited as they are not the person sending the invite so making co-organizers ability void then. Anyone have a solution so the invite sender can be the WIT calendar. I know it can be done for Teams meetings, but we want to have it as a webinar though. Thanks in advance for any help you can give on this query. Read More
Training Materials (Microsoft Learn courses) Missing for MB500
It seems like something removed the Microsoft Learn videos associated with the MB-500 exam: https://learn.microsoft.com/en-us/credentials/certifications/d365-finance-and-operations-apps-developer-associate/?practice-assessment-type=certification#certification-prepare-for-the-exam
The Learn courses are still visible through an internet archive, albeit have a year out of date, but I was wondering whether this removal was accidental or an indication that the training material has been deprecated and new Learn courses will be added.
It seems like something removed the Microsoft Learn videos associated with the MB-500 exam: https://learn.microsoft.com/en-us/credentials/certifications/d365-finance-and-operations-apps-developer-associate/?practice-assessment-type=certification#certification-prepare-for-the-exam The Learn courses are still visible through an internet archive, albeit have a year out of date, but I was wondering whether this removal was accidental or an indication that the training material has been deprecated and new Learn courses will be added. Read More
Cumulative Update #27 for SQL Server 2019 RTM
The 27th cumulative update release for SQL Server 2019 RTM is now available for download at the Microsoft Downloads site. Please note that registration is no longer required to download Cumulative updates.
To learn more about the release or servicing model, please visit:
CU27 KB Article: https://learn.microsoft.com/troubleshoot/sql/releases/sqlserver-2019/cumulativeupdate27
Starting with SQL Server 2017, we adopted a new modern servicing model. Please refer to our blog for more details on Modern Servicing Model for SQL Server
Microsoft® SQL Server® 2019 RTM Latest Cumulative Update: https://www.microsoft.com/download/details.aspx?id=100809
Update Center for Microsoft SQL Server: https://learn.microsoft.com/en-us/troubleshoot/sql/releases/download-and-install-latest-updates
Microsoft Tech Community – Latest Blogs –Read More
Simulating load profile in Simulink
I am trying to add a variable load (Residential Load profile) in small microgrid system. I have the load profile data but i couldn’t find a way to add it in simulink. I know about three phase dynamic load, however i am looking to add a customize load profile in simulink. Is there any way i can setup load profile in Simulink. I will really appreciate the help. Thanks.I am trying to add a variable load (Residential Load profile) in small microgrid system. I have the load profile data but i couldn’t find a way to add it in simulink. I know about three phase dynamic load, however i am looking to add a customize load profile in simulink. Is there any way i can setup load profile in Simulink. I will really appreciate the help. Thanks. I am trying to add a variable load (Residential Load profile) in small microgrid system. I have the load profile data but i couldn’t find a way to add it in simulink. I know about three phase dynamic load, however i am looking to add a customize load profile in simulink. Is there any way i can setup load profile in Simulink. I will really appreciate the help. Thanks. load profile, simulink MATLAB Answers — New Questions
How to make an FMU debugging-friendly in Simulink?
We are trying to develop an FMU that is compatible with Simulink. We are using Matlab 2023b+ on Windows x64. The FMU is FMI v3.0 and was originally generated using MSVC 2022 on Windows. The FMU only support co-simulation currently.
We are able to successfully use the FMU using `fmusim`, the executable provided here: https://github.com/modelica/Reference-FMUs . The FMU also correctly works in FMPy https://github.com/CATIA-Systems/FMPy . The FMU also passes the validation check here: https://fmu-check.herokuapp.com/ . However, when we try in Simulink, the simulation stays stuck on t=0.0, i.e. the start. We have added logs to the FMU and are able to see which statement the execution is stuck on, though, the reason for that is not clear.
To solve this, we would like to try to debug by placing breakpoints and view the value of the local variables etc. When trying to use the fmudialog.compileFMUSources we get a few compile errors. How can one better control the exact compile command that is used by compileFMUSources? Is there a way to avoid re-compilation since it was recently compiled with MSVC?We are trying to develop an FMU that is compatible with Simulink. We are using Matlab 2023b+ on Windows x64. The FMU is FMI v3.0 and was originally generated using MSVC 2022 on Windows. The FMU only support co-simulation currently.
We are able to successfully use the FMU using `fmusim`, the executable provided here: https://github.com/modelica/Reference-FMUs . The FMU also correctly works in FMPy https://github.com/CATIA-Systems/FMPy . The FMU also passes the validation check here: https://fmu-check.herokuapp.com/ . However, when we try in Simulink, the simulation stays stuck on t=0.0, i.e. the start. We have added logs to the FMU and are able to see which statement the execution is stuck on, though, the reason for that is not clear.
To solve this, we would like to try to debug by placing breakpoints and view the value of the local variables etc. When trying to use the fmudialog.compileFMUSources we get a few compile errors. How can one better control the exact compile command that is used by compileFMUSources? Is there a way to avoid re-compilation since it was recently compiled with MSVC? We are trying to develop an FMU that is compatible with Simulink. We are using Matlab 2023b+ on Windows x64. The FMU is FMI v3.0 and was originally generated using MSVC 2022 on Windows. The FMU only support co-simulation currently.
We are able to successfully use the FMU using `fmusim`, the executable provided here: https://github.com/modelica/Reference-FMUs . The FMU also correctly works in FMPy https://github.com/CATIA-Systems/FMPy . The FMU also passes the validation check here: https://fmu-check.herokuapp.com/ . However, when we try in Simulink, the simulation stays stuck on t=0.0, i.e. the start. We have added logs to the FMU and are able to see which statement the execution is stuck on, though, the reason for that is not clear.
To solve this, we would like to try to debug by placing breakpoints and view the value of the local variables etc. When trying to use the fmudialog.compileFMUSources we get a few compile errors. How can one better control the exact compile command that is used by compileFMUSources? Is there a way to avoid re-compilation since it was recently compiled with MSVC? fmu, debugging, simulink, co-simulation MATLAB Answers — New Questions
setting the yticklabels with $10^{-2}$ appearing at the top
I want the y axis to be labelled as
But I actually got
The problem is that the ticklabels are too wide. How can I make it appprear as I desire?I want the y axis to be labelled as
But I actually got
The problem is that the ticklabels are too wide. How can I make it appprear as I desire? I want the y axis to be labelled as
But I actually got
The problem is that the ticklabels are too wide. How can I make it appprear as I desire? plot MATLAB Answers — New Questions
How to calculate very large number by Matlab
I want to find S_1+S_2+S_3I want to find S_1+S_2+S_3 I want to find S_1+S_2+S_3 @staff MATLAB Answers — New Questions
New Blog | Detect suspicious processes running on hidden desktops
By Saar Cohen
With ransomware campaigns continuing to grow, they remain top of mind for security leaders. Across these sophisticated cyberattacks, the use of remote desktop protocol (RDP) compromise has reached record levels, making it even more critical to provide analysts with full visibility into potentially malicious RDP session use.
That’s why today we are excited to announce a new way to identify potentially compromised devices in your organization via the new ‘DesktopName’ field in Defender for Endpoint, which enables analysts to easily detect, investigate, and hunt for suspicious interactive process executed on so called ‘hidden desktops’.
The importance to RDP
A remote desktop session over RDP (Remote Desktop Protocol) provides users with access to connect remotely to endpoints and is often leveraged as the entry point for attackers to access a target machine. RDP however, introduces some undesirable disadvantages for the attacker.
For example, Windows by default only allows for a single remote RDP session which can cause detectable friction as both the legitimate user and the attacker begin vying for interactivity on the same device. To mitigate this, attackers may opt for other Remote Monitoring and Management (RMM) approaches as described in the examples below.
Read the full post here: Detect suspicious processes running on hidden desktops
By Saar Cohen
With ransomware campaigns continuing to grow, they remain top of mind for security leaders. Across these sophisticated cyberattacks, the use of remote desktop protocol (RDP) compromise has reached record levels, making it even more critical to provide analysts with full visibility into potentially malicious RDP session use.
That’s why today we are excited to announce a new way to identify potentially compromised devices in your organization via the new ‘DesktopName’ field in Defender for Endpoint, which enables analysts to easily detect, investigate, and hunt for suspicious interactive process executed on so called ‘hidden desktops’.
The importance to RDP A remote desktop session over RDP (Remote Desktop Protocol) provides users with access to connect remotely to endpoints and is often leveraged as the entry point for attackers to access a target machine. RDP however, introduces some undesirable disadvantages for the attacker. For example, Windows by default only allows for a single remote RDP session which can cause detectable friction as both the legitimate user and the attacker begin vying for interactivity on the same device. To mitigate this, attackers may opt for other Remote Monitoring and Management (RMM) approaches as described in the examples below.
Read the full post here: Detect suspicious processes running on hidden desktops Read More
Flattening nested JSON values in a dataflow with varying keys.
We are using Azrue DevOps REST API calls to return JSON files and storing them in blob. Then we perform a dataflow to transform the data. The issue is a portion of the JSON being stored in blob has varying keys.
When we specify the columns to map in a Select action, we are selecting specifically one of the varying keys from a list of options. But need to map ALL of these – we cannot manually specify these because the data source is so large.
We cannot implement a standard name for this section of the JSON. A wildcard for { } would work ideally but is not supported. We do not care what the keys are, just the contents (id, name).
Select Action:
Source Column:
resources.pipelines.{src-release}.pipeline.id
resources.pipelines.{src-release}.pipeline.name
resources.pipelines.{build }.pipeline.id
resources.pipelines.{build }.pipeline.name
Mapping Name as:
‘pipelineID’
‘pipelineName’
Below is a JSON snippet which highlights the key from the source JSON
Example of Select action mapping – each key shows as its own dropdown:
We are using Azrue DevOps REST API calls to return JSON files and storing them in blob. Then we perform a dataflow to transform the data. The issue is a portion of the JSON being stored in blob has varying keys. When we specify the columns to map in a Select action, we are selecting specifically one of the varying keys from a list of options. But need to map ALL of these – we cannot manually specify these because the data source is so large. We cannot implement a standard name for this section of the JSON. A wildcard for { } would work ideally but is not supported. We do not care what the keys are, just the contents (id, name). Select Action:Source Column:resources.pipelines.{src-release}.pipeline.idresources.pipelines.{src-release}.pipeline.nameresources.pipelines.{build }.pipeline.idresources.pipelines.{build }.pipeline.name Mapping Name as:‘pipelineID’‘pipelineName’Below is a JSON snippet which highlights the key from the source JSON Example of Select action mapping – each key shows as its own dropdown: Read More
Can’t upload excel file
I created a portfolio project through excel (the big picture). I have a google site as my portfolio website. my issue is I can’t upload the excel file I had to convert it into google sheets (the small picture at the bottom). The middle picture is google sheets which doesn’t display my dashboard. If anyone can assist me with this issue I’ll be more than grateful for the help. I have 2 more projects I want to add but
I created a portfolio project through excel (the big picture). I have a google site as my portfolio website. my issue is I can’t upload the excel file I had to convert it into google sheets (the small picture at the bottom). The middle picture is google sheets which doesn’t display my dashboard. If anyone can assist me with this issue I’ll be more than grateful for the help. I have 2 more projects I want to add but Read More
Windows 22631.3737 or 22631.3807 Block file protection when copying/pasting files on a network drive
It works normally in 22631.3672
but after updating Windows 22631.3737 or 22631.3807, if you copy a file from a network drive and paste it to a local drive, an issue occurs where file protection is blocked.
It works normally in 22631.3672but after updating Windows 22631.3737 or 22631.3807, if you copy a file from a network drive and paste it to a local drive, an issue occurs where file protection is blocked. Read More
How to choose value of Ts for converting continuous state space (SS) matrix to discrete SS matrix?
Hi,
I converted Transfer function to state space matrix but I am curious how to choose best Ts?
I am not sure what is the function of this Ts related to plant?
I just used random values of Ts to check the affect of conversion, I found that changing Ts can chane the Discrete SS A,B matrices while it has no affect on C matrix.
I will use c2d distrete state space matrix in MPC controller for designing a controller to deploy on real plant. Please help me in understanding Ts and how to choose the best Ts value based on some facts?
My code is
%Transfer Function By System identification
num = [-1.324 6.6e05 -6.914e09 5.128e13 -1.054e19]
den = [1 1.99e04 1.371e09 1.145e13 4.037e17]
%Conversion to SS
plant = tf([num],[den], ‘OutputDelay’,0.001)
% Simplify the model to remove insignificant poles and zeros
SSpzt = ss(plant) %This gives continuous time linear state space model of TFpzt
Ac = SSpzt.A;
Bc = SSpzt.B;
Cc = SSpzt.C;
Dc = SSpzt.D;
Ts = 0.0001 %Sampling time actual = 3.1309e-05
Td = 0.009; %time Delay baed on frequency data
%Contineous Model to discrete Statespace Matrices
SSpzt_dis = c2dm(Ac,Bc,Cc,Dc,Ts)
[Ad,Bd,Cd,Dd] = c2dm(Ac, Bc, Cc, Dc, Ts)
sysdis = ss(Ad,Bd,Cd,Dd,Ts)
sysdis.D = 0Hi,
I converted Transfer function to state space matrix but I am curious how to choose best Ts?
I am not sure what is the function of this Ts related to plant?
I just used random values of Ts to check the affect of conversion, I found that changing Ts can chane the Discrete SS A,B matrices while it has no affect on C matrix.
I will use c2d distrete state space matrix in MPC controller for designing a controller to deploy on real plant. Please help me in understanding Ts and how to choose the best Ts value based on some facts?
My code is
%Transfer Function By System identification
num = [-1.324 6.6e05 -6.914e09 5.128e13 -1.054e19]
den = [1 1.99e04 1.371e09 1.145e13 4.037e17]
%Conversion to SS
plant = tf([num],[den], ‘OutputDelay’,0.001)
% Simplify the model to remove insignificant poles and zeros
SSpzt = ss(plant) %This gives continuous time linear state space model of TFpzt
Ac = SSpzt.A;
Bc = SSpzt.B;
Cc = SSpzt.C;
Dc = SSpzt.D;
Ts = 0.0001 %Sampling time actual = 3.1309e-05
Td = 0.009; %time Delay baed on frequency data
%Contineous Model to discrete Statespace Matrices
SSpzt_dis = c2dm(Ac,Bc,Cc,Dc,Ts)
[Ad,Bd,Cd,Dd] = c2dm(Ac, Bc, Cc, Dc, Ts)
sysdis = ss(Ad,Bd,Cd,Dd,Ts)
sysdis.D = 0 Hi,
I converted Transfer function to state space matrix but I am curious how to choose best Ts?
I am not sure what is the function of this Ts related to plant?
I just used random values of Ts to check the affect of conversion, I found that changing Ts can chane the Discrete SS A,B matrices while it has no affect on C matrix.
I will use c2d distrete state space matrix in MPC controller for designing a controller to deploy on real plant. Please help me in understanding Ts and how to choose the best Ts value based on some facts?
My code is
%Transfer Function By System identification
num = [-1.324 6.6e05 -6.914e09 5.128e13 -1.054e19]
den = [1 1.99e04 1.371e09 1.145e13 4.037e17]
%Conversion to SS
plant = tf([num],[den], ‘OutputDelay’,0.001)
% Simplify the model to remove insignificant poles and zeros
SSpzt = ss(plant) %This gives continuous time linear state space model of TFpzt
Ac = SSpzt.A;
Bc = SSpzt.B;
Cc = SSpzt.C;
Dc = SSpzt.D;
Ts = 0.0001 %Sampling time actual = 3.1309e-05
Td = 0.009; %time Delay baed on frequency data
%Contineous Model to discrete Statespace Matrices
SSpzt_dis = c2dm(Ac,Bc,Cc,Dc,Ts)
[Ad,Bd,Cd,Dd] = c2dm(Ac, Bc, Cc, Dc, Ts)
sysdis = ss(Ad,Bd,Cd,Dd,Ts)
sysdis.D = 0 state space modeling, model predictive controller, system identification MATLAB Answers — New Questions
Has the MATLAB ‘mget’ function changed from versions R2020a to R2024a?
I ask this question becasue i have a script that runs perfectly well in the 2020 version using mget. Once i upgraded to 2024 the mget function started to run into issues and now i get an error every time i use it. Can i get some guidance on how to fix this?I ask this question becasue i have a script that runs perfectly well in the 2020 version using mget. Once i upgraded to 2024 the mget function started to run into issues and now i get an error every time i use it. Can i get some guidance on how to fix this? I ask this question becasue i have a script that runs perfectly well in the 2020 version using mget. Once i upgraded to 2024 the mget function started to run into issues and now i get an error every time i use it. Can i get some guidance on how to fix this? ftp, mget.m MATLAB Answers — New Questions
Count across other files
Member IDActive1Y2N3Y4N
N6N
Member IDActive1N2N3Y4Y
Y6N
I have 12 spreadsheets for gym membership, one for each month and each one contains a table showing whether a member is active or not in that month. Example below for September. Member IDActive1Y2N3Y4N5N6N The next month, October the table might look like this: Member IDActive1N2N3Y4Y5Y6N That would mean that MemberID 1,3,4 and 5 would have been active, ie a count of 4. What’s the best way of creating a count for “The number of members active in the last 6 months”? So in October I would need to find this count using data from the Oct, Sep, Aug, Jul, Jun and May files. Thanks Read More
New Blog | A Closer Look at Azure WAF’s Data Masking Capabilities for Azure Front Door
By David Frazee
The Azure Web Application Firewall (WAF) on Azure Front Door offers centralized protection for your web applications against vulnerabilities and threats. The effectiveness of your Azure WAF in managing traffic can be assessed through WAF logs stored in specified locations such as a Log Analytics Workspace or Storage Accounts. These logs document requests that have been either matched or blocked by WAF rules. This data is crucial for monitoring, auditing, and resolving issues. By default, WAF logs are maintained in a plain text format for user convenience and analysis. However, these client requests might include sensitive personal data, like personally identifiable information (PII), which can include names, addresses, contact details, and financial information. Without proper sanitization, logs containing such PII could be exposed to unauthorized access. To address this, Azure Front Door WAF now offers sensitive data protection through log scrubbing. WAF log scrubbing employs a customizable rules engine to pinpoint and redact sensitive portions within the requests, replacing them with a series of asterisks (******) to prevent data exposure. This blog will explains the log scrubbing process and provides practical examples for a more comprehensive understanding.
Log Scrubbing
The Azure Front Door WAF’s sensitive data protection feature using log scrubbing is compatible with all WAF policy rule sets including Default Rule Set (DRS), Bot Manager Ruleset, and any Custom rules. It utilizes a range of match variables, such as client IP, headers, cookies, and request arguments, to identify data for scrubbing. Rule creation involves selecting a match variable, an operator, and defining a selector, which determines the specific key to be cleansed from the logs. Take a simple login process, which generally involves username and password fields; these are two distinct keys that can be targeted as selectors. Should a dubious login attempt activate the WAF, it records the username and password if they contain the suspect string or code injection. The log scrubber then anonymizes these details, obscuring the malicious content while preserving the attack’s characteristics and significantly reducing the risk of personal data exposure.
See below for the full list of Match Variables:
Match Variable
Operator
Selector
Request IP Address
Equals any
<None>
Request URI
Equals any
<None>
Request Header Names
Equals/Equals any
<Custom>
Request Cookie Names
Equals/Equals any
<Custom>
Request Body Post Arg Names
Equals/Equals any
<Custom>
Request Body Json Arg Names
Equals/Equals any
<Custom>
Query String Arg Names
Equals/Equals any
<Custom>
Request IP, Request URI & Request Header
In our initial scenario, we examine the log scrubbing engine’s capability to conceal the requester’s IP address, the request URI, and the User-Agent that activated the WAF rule. In this example, the User-Agent is a carrier for a SQL injection string within the User-Agent key’s value. The log scrubbing rules are configured so that the selector targets User-Agent within the Request Header Names, ensuring every User-Agent occurrence, including the embedded SQL injection string, is cleansed from the WAF logs. This scenario serves as an example on how to write log scrubbing rules to cleanse potentially sensitive values. It is best practice to specify only those values that contain potential personally identifiable information (PII) or other sensitive data, rather than generic request headers like User-Agent.
Read the full post here: A Closer Look at Azure WAF’s Data Masking Capabilities for Azure Front Door
By David Frazee
The Azure Web Application Firewall (WAF) on Azure Front Door offers centralized protection for your web applications against vulnerabilities and threats. The effectiveness of your Azure WAF in managing traffic can be assessed through WAF logs stored in specified locations such as a Log Analytics Workspace or Storage Accounts. These logs document requests that have been either matched or blocked by WAF rules. This data is crucial for monitoring, auditing, and resolving issues. By default, WAF logs are maintained in a plain text format for user convenience and analysis. However, these client requests might include sensitive personal data, like personally identifiable information (PII), which can include names, addresses, contact details, and financial information. Without proper sanitization, logs containing such PII could be exposed to unauthorized access. To address this, Azure Front Door WAF now offers sensitive data protection through log scrubbing. WAF log scrubbing employs a customizable rules engine to pinpoint and redact sensitive portions within the requests, replacing them with a series of asterisks (******) to prevent data exposure. This blog will explains the log scrubbing process and provides practical examples for a more comprehensive understanding.
Log Scrubbing
The Azure Front Door WAF’s sensitive data protection feature using log scrubbing is compatible with all WAF policy rule sets including Default Rule Set (DRS), Bot Manager Ruleset, and any Custom rules. It utilizes a range of match variables, such as client IP, headers, cookies, and request arguments, to identify data for scrubbing. Rule creation involves selecting a match variable, an operator, and defining a selector, which determines the specific key to be cleansed from the logs. Take a simple login process, which generally involves username and password fields; these are two distinct keys that can be targeted as selectors. Should a dubious login attempt activate the WAF, it records the username and password if they contain the suspect string or code injection. The log scrubber then anonymizes these details, obscuring the malicious content while preserving the attack’s characteristics and significantly reducing the risk of personal data exposure.
See below for the full list of Match Variables:
Match Variable
Operator
Selector
Request IP Address
Equals any
<None>
Request URI
Equals any
<None>
Request Header Names
Equals/Equals any
<Custom>
Request Cookie Names
Equals/Equals any
<Custom>
Request Body Post Arg Names
Equals/Equals any
<Custom>
Request Body Json Arg Names
Equals/Equals any
<Custom>
Query String Arg Names
Equals/Equals any
<Custom>
Request IP, Request URI & Request Header
In our initial scenario, we examine the log scrubbing engine’s capability to conceal the requester’s IP address, the request URI, and the User-Agent that activated the WAF rule. In this example, the User-Agent is a carrier for a SQL injection string within the User-Agent key’s value. The log scrubbing rules are configured so that the selector targets User-Agent within the Request Header Names, ensuring every User-Agent occurrence, including the embedded SQL injection string, is cleansed from the WAF logs. This scenario serves as an example on how to write log scrubbing rules to cleanse potentially sensitive values. It is best practice to specify only those values that contain potential personally identifiable information (PII) or other sensitive data, rather than generic request headers like User-Agent.
Read the full post here: A Closer Look at Azure WAF’s Data Masking Capabilities for Azure Front Door Read More
Technical Pattern: Build Your Own AI Assistant
Microsoft Tech Community – Latest Blogs –Read More
No se como crear un 4×1 polyshape with 3 properties
Error using polyshape/checkInput
x- and y-coordinate vectors must both be numeric or both be cell arrays.
Error in polyshape (line 169)
[X, Y, tc, simpl, collinear] = polyshape.checkInput(param, varargin{:});
Error in untitled2 (line 19)
cborders=polyshape(cborders)Error using polyshape/checkInput
x- and y-coordinate vectors must both be numeric or both be cell arrays.
Error in polyshape (line 169)
[X, Y, tc, simpl, collinear] = polyshape.checkInput(param, varargin{:});
Error in untitled2 (line 19)
cborders=polyshape(cborders) Error using polyshape/checkInput
x- and y-coordinate vectors must both be numeric or both be cell arrays.
Error in polyshape (line 169)
[X, Y, tc, simpl, collinear] = polyshape.checkInput(param, varargin{:});
Error in untitled2 (line 19)
cborders=polyshape(cborders) polyshape MATLAB Answers — New Questions
Custom fit curve and plotted curve are different, help
Hi everyone, I’m using the Fitter App to fit some point with a custom equation, the fit is done correctly but when I put the same values for the same parameters in a MATLAB to plot the points with a scatterplot and the fit curve like a plot the fit curve is shifted up or down, and I have to manually adjust the parameters to get a decent looking graph (I’m posting an example)Hi everyone, I’m using the Fitter App to fit some point with a custom equation, the fit is done correctly but when I put the same values for the same parameters in a MATLAB to plot the points with a scatterplot and the fit curve like a plot the fit curve is shifted up or down, and I have to manually adjust the parameters to get a decent looking graph (I’m posting an example) Hi everyone, I’m using the Fitter App to fit some point with a custom equation, the fit is done correctly but when I put the same values for the same parameters in a MATLAB to plot the points with a scatterplot and the fit curve like a plot the fit curve is shifted up or down, and I have to manually adjust the parameters to get a decent looking graph (I’m posting an example) curve fitting, plot MATLAB Answers — New Questions
Does MATLAB’s pattern() function use full-wave MoM or superposition of elements for antenna array analysis?
This question is probably more for MATLAB staffs but I am open to any response.
I am conducting research to compare the results of radiation patterns and electromagnetic behaviors of various antenna arrays. Specifically, for the same array, I am interested in simulations that consider the entire array structure, which includes multiple antenna elements and their excitations, versus simulations of individual array elements followed by superimposing their patterns, EM fields, and phase fronts.
I reviewed the MATLAB documentation on Modeling Mutual Coupling in Large Arrays Using Embedded Element Pattern , which provided a clear example of full-wave Method of Moments (MoM) simulation approaches compared to the superposition of isolated elements. Additionally, the Method of Moments Solver for Metal and Dielectric Structures documentation explained that multiple excitation feeds create a voltage matrix that interacts with the iteration matrix. This process exemplifies the full-wave MoM approach, incorporating the entire array structure and excitation points concurrently.
However, I also came across this PDF, Smart RF Design of Digitally Controlled RF Transmitters and Receivers from MathWorks themselves. On page 15 of the slides, it says:
"Phased Array System Toolbox computes the array pattern using the superposition of the pattern of each individual element – ULA, URA, UCA and conformal arrays use the same pattern for all elements – Heterogeneous arrays have different patterns for different elements"
The statement in the PDF seems to contradict the documentation provided, suggesting that the array pattern is computed using the superposition of each individual element instead of a full-wave Method of Moments (MoM) approach.
After reading, now I am confused, if I simply do the following:
% Create the first Custom3D object using triangulation
customShape = shape.Custom3D(tr);
% Create the second Custom3D object using triangulation
customShape2 = shape.Custom3D(tr2);
% Create the third Custom3D object using triangulation
customShape3 = shape.Custom3D(tr3);
%assign locations to the Custom3D objects
[~]= translate(customShape,[0 0 0]);
[~]= translate(customShape2,[1 0 0]);
[~]= translate(customShape3,[0 0 1]);
%creat the array using the combined Custom3D objects
antShapearray = customShape + customShape2 + customShape3;
antarray = customAntenna(Shape=antShapearray);
[~] = createFeed(antarray,[0 0 0; 1 0 0; 0 0 1],[1 1 1]);
%obtain EM results
show(antarray)
pattern(antarray,freq)
Does MATLAB analyze the antenna array as a whole, or does it analyze each geometry individually and then superimpose the results?
Many thanksThis question is probably more for MATLAB staffs but I am open to any response.
I am conducting research to compare the results of radiation patterns and electromagnetic behaviors of various antenna arrays. Specifically, for the same array, I am interested in simulations that consider the entire array structure, which includes multiple antenna elements and their excitations, versus simulations of individual array elements followed by superimposing their patterns, EM fields, and phase fronts.
I reviewed the MATLAB documentation on Modeling Mutual Coupling in Large Arrays Using Embedded Element Pattern , which provided a clear example of full-wave Method of Moments (MoM) simulation approaches compared to the superposition of isolated elements. Additionally, the Method of Moments Solver for Metal and Dielectric Structures documentation explained that multiple excitation feeds create a voltage matrix that interacts with the iteration matrix. This process exemplifies the full-wave MoM approach, incorporating the entire array structure and excitation points concurrently.
However, I also came across this PDF, Smart RF Design of Digitally Controlled RF Transmitters and Receivers from MathWorks themselves. On page 15 of the slides, it says:
"Phased Array System Toolbox computes the array pattern using the superposition of the pattern of each individual element – ULA, URA, UCA and conformal arrays use the same pattern for all elements – Heterogeneous arrays have different patterns for different elements"
The statement in the PDF seems to contradict the documentation provided, suggesting that the array pattern is computed using the superposition of each individual element instead of a full-wave Method of Moments (MoM) approach.
After reading, now I am confused, if I simply do the following:
% Create the first Custom3D object using triangulation
customShape = shape.Custom3D(tr);
% Create the second Custom3D object using triangulation
customShape2 = shape.Custom3D(tr2);
% Create the third Custom3D object using triangulation
customShape3 = shape.Custom3D(tr3);
%assign locations to the Custom3D objects
[~]= translate(customShape,[0 0 0]);
[~]= translate(customShape2,[1 0 0]);
[~]= translate(customShape3,[0 0 1]);
%creat the array using the combined Custom3D objects
antShapearray = customShape + customShape2 + customShape3;
antarray = customAntenna(Shape=antShapearray);
[~] = createFeed(antarray,[0 0 0; 1 0 0; 0 0 1],[1 1 1]);
%obtain EM results
show(antarray)
pattern(antarray,freq)
Does MATLAB analyze the antenna array as a whole, or does it analyze each geometry individually and then superimpose the results?
Many thanks This question is probably more for MATLAB staffs but I am open to any response.
I am conducting research to compare the results of radiation patterns and electromagnetic behaviors of various antenna arrays. Specifically, for the same array, I am interested in simulations that consider the entire array structure, which includes multiple antenna elements and their excitations, versus simulations of individual array elements followed by superimposing their patterns, EM fields, and phase fronts.
I reviewed the MATLAB documentation on Modeling Mutual Coupling in Large Arrays Using Embedded Element Pattern , which provided a clear example of full-wave Method of Moments (MoM) simulation approaches compared to the superposition of isolated elements. Additionally, the Method of Moments Solver for Metal and Dielectric Structures documentation explained that multiple excitation feeds create a voltage matrix that interacts with the iteration matrix. This process exemplifies the full-wave MoM approach, incorporating the entire array structure and excitation points concurrently.
However, I also came across this PDF, Smart RF Design of Digitally Controlled RF Transmitters and Receivers from MathWorks themselves. On page 15 of the slides, it says:
"Phased Array System Toolbox computes the array pattern using the superposition of the pattern of each individual element – ULA, URA, UCA and conformal arrays use the same pattern for all elements – Heterogeneous arrays have different patterns for different elements"
The statement in the PDF seems to contradict the documentation provided, suggesting that the array pattern is computed using the superposition of each individual element instead of a full-wave Method of Moments (MoM) approach.
After reading, now I am confused, if I simply do the following:
% Create the first Custom3D object using triangulation
customShape = shape.Custom3D(tr);
% Create the second Custom3D object using triangulation
customShape2 = shape.Custom3D(tr2);
% Create the third Custom3D object using triangulation
customShape3 = shape.Custom3D(tr3);
%assign locations to the Custom3D objects
[~]= translate(customShape,[0 0 0]);
[~]= translate(customShape2,[1 0 0]);
[~]= translate(customShape3,[0 0 1]);
%creat the array using the combined Custom3D objects
antShapearray = customShape + customShape2 + customShape3;
antarray = customAntenna(Shape=antShapearray);
[~] = createFeed(antarray,[0 0 0; 1 0 0; 0 0 1],[1 1 1]);
%obtain EM results
show(antarray)
pattern(antarray,freq)
Does MATLAB analyze the antenna array as a whole, or does it analyze each geometry individually and then superimpose the results?
Many thanks antenna array, array simulation MATLAB Answers — New Questions