Search results for " STORAGE"
showing 10 items of 984 documents
Economic feasibility of stationary electrochemical storages for electric bill management applications: The Italian scenario
2016
Battery energy storage systems (BESSs) are expected to become a fundamental element of the electricity infrastructure, thanks to their ability to decouple generation and demand over time. BESSs can also be used to store electricity during low-price hours, when the demand is low, and to meet the demand during peak hours, thus leading to savings for the consumer. This work focuses on the economic viability of BESS from the point of view of the electricity customer. The analysis refers to a lithium-ion (Li-ion), an advanced lead-acid, a zinc-based, a sodium-sulphur (NaS) and a flow battery. The total investment and replacement costs are estimated in order to calculate the cumulated cash flow, …
UJI RobInLab's approach to the Amazon Robotics Challenge 2017
2017
This paper describes the approach taken by the team from the Robotic Intelligence Laboratory at Jaume I University to the Amazon Robotics Challenge 2017. The goal of the challenge is to automate pick and place operations in unstructured environments, specifically the shelves in an Amazon warehouse. RobInLab's approach is based on a Baxter Research robot and a customized storage system. The system's modular architecture, based on ROS, allows communication between two computers, two Arduinos and the Baxter. It integrates 9 hardware components along with 10 different algorithms to accomplish the pick and stow tasks. We describe the main components and pipelines of the system, along with some e…
Detection of algorithmically generated malicious domain names using masked N-grams
2019
Abstract Malware detection is a challenge that has increased in complexity in the last few years. A widely adopted strategy is to detect malware by means of analyzing network traffic, capturing the communications with their command and control (C&C) servers. However, some malware families have shifted to a stealthier communication strategy, since anti-malware companies maintain blacklists of known malicious locations. Instead of using static IP addresses or domain names, they algorithmically generate domain names that may host their C&C servers. Hence, blacklist approaches become ineffective since the number of domain names to block is large and varies from time to time. In this paper, we i…
A decomposition approach to dual shuttle automated storage and retrieval systems
2016
[EN] Automated Storage and Retrieval Systems (AS/RS) have become vital in today¿s distribution and production environments, however it remains necessary to equip them with more efficient operational control policies. Motivated by real situations encountered by companies employing AS/RS, the present paper studies a miniload AS/RS system, with a dual shuttle crane in which a set of storage and retrieval requests must be scheduled such that the prioritized waiting time is minimized. Dual shuttle cranes have received minimal academic attention and thus continue to pose new problems that must be solved. The miniload AS/RS problem is addressed by decomposing it into a location assignment and sequ…
A predictive learning approach to optimal load sharing in energy management systems
2019
Given the total power demand, $P_{d}$ , current practice of equal load sharing in the process industry is to distribute the load among power supply units and machines (e.g., diesel/aas/wind turbines) in proportion to the maximum power, i.e., $P_{i}=\frac{p_{\max}^{i}}{\sum_{j}P_{\max}^{j}}P_{d}$ , where $P_{\max}^{i}$ denotes the maximum power of the ithunit. However, the efficiency of power supply units, vary in time and are highly individual, even in the case of units from same brand and model. Thus, by considering and utilizing these individual differences, it is possible to share the load in a more fuel/cost/energy optimal manner. To capture this potential, the work presented in this pa…
Hypervisor Memory Introspection and Hypervisor Based Malware Honeypot
2020
Memory acquisition is a tool used in advanced forensics and malware analysis. Various methods of memory acquisition exist. Such solutions are ranging from tools based on dedicated hardware to software-only solutions. We proposed a hypervisor based memory acquisition tool. [22]. Our method supports ASLR and Modern operating systems which is an innovation compared to past methods [27, 36]. We extend the hypervisor assisted memory acquisition by adding mass storage device honeypots for the malware to cross and propose hiding the hypervisor using bluepill technology.
Secure and Privacy Preserving Pattern Matching in Distributed Cloud-based Data Storage
2019
Given two strings: pattern $p$ of length $m$ and text $t$ of length $n$ . The string matching problem is to find all (or some) occurrences of the pattern $p$ in the text $t$ . We introduce a new simple data structure, called index arrays, and design fast privacy-preserving matching algorithm for string matching. The motivation behind introducing index arrays is determined by the need for pattern matching on distributed cloud-based datasets with semi-trusted cloud providers. It is intended to use encrypted index arrays both to improve performance and protect confidentiality and privacy of user data.
Changes in total anthocyanin content and antioxidant activity in sweet cherries during frozen storage, and air-oven and infrared drying
2016
Introduction. Sweet cherries are important dietary components, based mainly on their content of antioxidant compounds related to health benefits. Different preservation procedures cause changes in the content of these compounds. Our work aimed at evaluation of changes in the total anthocyanin contents and antioxidant activities in fresh, frozen and dried sweet cherry fruits. Materials and methods. The total anthocyanin content of edible parts of sweet cherries was studied under different postharvest conditions. The total antioxidant activities were studied using total phenolic content and ferric reducing antioxidant power assays. Results and discussion. We report higher amounts of phenolics…
Clinical course of sly syndrome (mucopolysaccharidosis type VII).
2016
WOS: 000377110800007
Resting Energy Expenditure and Substrate Oxidation in Malnourished Patients With Type 1 Glycogenosis.
2019
Abstract Context Type 1a and 1b glycogenosis [glycogen storage disorder (GSD)1a, GSD1b] are rare diseases generally associated with malnutrition. Although abnormal substrate oxidation rates and elevated energy expenditures might contribute to malnutrition, this issue has not been investigated. Objective To investigate whether abnormal resting energy expenditure (REE) and substrate oxidation rate characterize patients with GSD1. Design Cross-sectional study Setting Outpatient referral center for rare diseases and laboratory of clinical nutrition at the University Hospital of Palermo Patients Five consecutive patients with GSD1 (4 type a, 1 type b; 3 men, 2 women; age range, 19 to 49 years) M…