Search results for " Programming"
showing 10 items of 1616 documents
Decomposition and Mean-Field Approach to Mixed Integer Optimal Compensation Problems
2016
Mixed integer optimal compensation deals with optimization problems with integer- and real-valued control variables to compensate disturbances in dynamic systems. The mixed integer nature of controls could lead to intractability in problems of large dimensions. To address this challenge, we introduce a decomposition method which turns the original n-dimensional optimization problem into n independent scalar problems of lot sizing form. Each of these problems can be viewed as a two-player zero-sum game, which introduces some element of conservatism. Each scalar problem is then reformulated as a shortest path one and solved through linear programming over a receding horizon, a step that mirro…
Interoperable real-time symbolic programming for smart environments
2019
Smart environments demand novel paradigms offering easy configuration, programming and deployment of pervasive applications. To this purpose, different solutions have been proposed ranging from visual paradigms based on mashups to formal languages. However, most of the paradigms proposed in the literature require further external tools to turn application description code into an executable program before the deployment on target devices. Source code generation, runtime upgrades and recovery, and online debugging and inspection are often cumbersome in these programming environments. In this work we describe a methodology for real-time and on-line programming in smart environments that is co…
Fast ultrasonic phased array inspection of complex geometries delivered through robotic manipulators and high speed data acquisition instrumentation
2016
Performance of modern robotic manipulators has enabled research and development of fast automated non-destructive testing (NDT) systems for complex geometries. This paper presents recent outcomes of work aimed at removing the bottleneck due to data acquisition rates, to fully exploit the scanning speed of modern 6-DoF manipulators. State of the art ultrasonic instrumentation has been integrated into a large robot cell to enable fast data acquisition, high scan resolutions and accurate positional encoding. A fibre optic connection between the ultrasonic instrument and the server computer enables data transfer rates up to 1.6GB/s. Multiple data collection methods are compared. Performance of …
The minimum mean cycle-canceling algorithm for linear programs
2022
Abstract This paper presents the properties of the minimum mean cycle-canceling algorithm for solving linear programming models. Originally designed for solving network flow problems for which it runs in strongly polynomial time, most of its properties are preserved. This is at the price of adapting the fundamental decomposition theorem of a network flow solution together with various definitions: that of a cycle and the way to calculate its cost, the residual problem, and the improvement factor at the end of a phase. We also use the primal and dual necessary and sufficient optimality conditions stated on the residual problem for establishing the pricing step giving its name to the algorith…
The Challenge of Coexistence in Socially Vulnerable Schools
2017
Abstract Society in general and schools in particular continue to express their concerns with regard to the many challenges posed nowadays by living in a globalized world, where learning to coexist involves knowing oneself and those around us. Therefore, the professionals from the education sector and specially from the most vulnerable contexts demand the necessity to know strategies and initiatives which enable them to build a democratic school, where learning to coexist is the key to educate engaged citizens living in an increasingly intercultural, changing world. The study presented here has been conducted in two differentiated, but complementary, phases. During the first phase a documen…
HyperWall: A Hypervisor for Detection and Prevention of Malicious Communication
2020
Malicious programs vary widely in their functionality, from key-logging to disk encryption. However, most malicious programs communicate with their operators, thus revealing themselves to various security tools. The security tools incorporated within an operating system are vulnerable to attacks due to the large attack surface of the operating system kernel and modules. We present a kernel module that demonstrates how kernel-mode access can be used to bypass any security mechanism that is implemented in kernel-mode. External security tools, like firewalls, lack important information about the origin of the intercepted packets, thus their filtering policy is usually insufficient to prevent c…
Kick Detection and Influx Size Estimation during Offshore Drilling Operations using Deep Learning
2019
An uncontrolled or unobserved influx or kick during drilling has the potential to induce a well blowout, one of the most harmful incidences during drilling both in regards to economic and environmental cost. Since kicks during drilling are serious risks, it is important to improve kick and loss detection performance and capabilities and to develop automatic flux detection methodology. There are clear patterns during a influx incident. However, due to complex processes and sparse instrumentation it is difficult to predict the behaviour of kicks or losses based on sensor data combined with physical models alone. Emerging technologies within Deep Learning are however quite adapt at picking up …
Development of a fast characterization setup for radionuclide generators demonstrated by a 227Ac-based generator
2021
Abstract The development of a setup for a fast online characterization of radionuclide generators is reported. A generator utilizing the mother nuclide 227Ac sorbed on a cation exchange resin is continuously eluted by using a peristaltic pump. To allow continuous and pulse-free elution of a large volume over extended time periods a 3D-printed interface designed to remove pressure-oscillations induced by the pump was placed between pump and generator column to ensure undisturbed generator elution. The eluate of the generator is passed through a 3D printed flow cell placed inside a borehole Na(Tl)-scintillation detector for high counting efficiency. Alternatively, a HPGe detector suitable for…
PS02.010: ESTABLISHMENT OF THE UPPER GI INTERNATIONAL ROBOTIC ASSOCIATION (UGIRA)
2018
Abstract Background Robot-assisted surgery is increasingly performed for both benign and malignant upper gastro-intestinal disease. However, no global consensus exists regarding exact techniques and implementation methods of robotic esophageal and gastric surgery. To facilitate the effective implementation and advancement of these procedures, evidence based guidelines should be generated. In this context, the ‘Upper GI International Robotic Association’ (UGIRA) was established in 2017. Until now, 20 experienced robotic surgeons from 10 different countries in Europe (The Netherlands, Germany, United Kingdom, Denmark), Asia (Japan, Hong Kong, North-Korea, Taiwan), North-America (United States…
Genome-wide DNA methylation study in human placenta identifies novel loci associated with maternal smoking during pregnancy
2016
BACKGROUND: We conducted an epigenome-wide association study (EWAS) of DNA methylation in placenta in relation to maternal tobacco smoking during pregnancy and examined whether smoking-induced changes lead to low birthweight. METHODS: DNA methylation in placenta was measured using the Illumina HumanMethylation450 BeadChip in 179 participants from the INfancia y Medio Ambiente (INMA) birth cohort. Methylation levels across 431 311 CpGs were tested for differential methylation between smokers and non-smokers in pregnancy. We took forward three top-ranking loci for further validation and replication by bisulfite pyrosequencing using data of 248 additional participants of the INMA cohort. We ex…