Search results for "21"
showing 10 items of 34876 documents
Gear classification and fault detection using a diffusion map framework
2015
This article proposes a system health monitoring approach that detects abnormal behavior of machines. Diffusion map is used to reduce the dimensionality of training data, which facilitates the classification of newly arriving measurements. The new measurements are handled with Nyström extension. The method is trained and tested with real gear monitoring data from several windmill parks. A machine health index is proposed, showing that data recordings can be classified as working or failing using dimensionality reduction and warning levels in the low dimensional space. The proposed approach can be used with any system that produces high-dimensional measurement data. peerReviewed
On shape differentiation of discretized electric field integral equation
2013
Abstract This work presents shape derivatives of the system matrix representing electric field integral equation discretized with Raviart–Thomas basis functions. The arising integrals are easy to compute with similar methods as the entries of the original system matrix. The results are compared to derivatives computed with automatic differentiation technique and finite differences, and are found to be in an excellent agreement. Furthermore, the derived formulas are employed to analyze shape sensitivity of the input impedance of a planar inverted F-antenna, and the results are compared to those obtained using a finite difference approximation.
Two-phase routing in three-dimensional blocked optical tori
2014
The contribution of this paper is an all-optical 3D network architecture. We describe scheduled, two-phase routing for it. The three-dimensional blocked optical torus BOT of block size b consists of b2 × b2 × b2 nodes for the first phase routing. Processors are evenly deployed at the underlying torus so that every bth node consists of a processor. Additionally, a BOT consists of b3 blocks of b × b × b subnetworks for the second phase routing. Routing of each packet is done in two phases. Firstly, packets are routed from source processor to an intermediate target node at the target block. Secondly, packets are routed from the intermediate targets at the target block to the target processor (…
Interactive map interface for controlling bridge crane automation A cognitive-affective approach
2016
This study outlines the development process of a new touch screen based user interface for controlling bridge crane automation in industrial environments. A user study of existing situation (n1 = 11) was used to develop an understanding of the cognitive and emotional design goals for crane operation. Conceptualization of these goals in the context of automation produced a set of requirements, which were used to develop a map-based touch screen user interface. Two field tests (n2 = 5, n3 = 5) revealed how bridge crane operators cognise and emotionally experience the increasing automation and how the user interface should be designed to support the operator’s spatial mental representation as …
Anomaly Detection Algorithms for the Sleeping Cell Detection in LTE Networks
2015
The Sleeping Cell problem is a particular type of cell degradation in Long-Term Evolution (LTE) networks. In practice such cell outage leads to the lack of network service and sometimes it can be revealed only after multiple user complains by an operator. In this study a cell becomes sleeping because of a Random Access Channel (RACH) failure, which may happen due to software or hardware problems. For the detection of malfunctioning cells, we introduce a data mining based framework. In its core is the analysis of event sequences reported by a User Equipment (UE) to a serving Base Station (BS). The crucial element of the developed framework is an anomaly detection algorithm. We compare perfor…
Comparing the cost-efficiency of CoAP and HTTP in Web of Things applications
2014
Abstract Constrained Application Protocol (CoAP) has been introduced as a simpler alternative to the Hypertext Transfer Protocol (HTTP) for connecting constrained smart objects to the Web. The adoption of the protocol depends on its relative advantage, and the cost–benefit associated with the use of the protocol is a significant factor affecting a protocol adoption decision. This paper aims at deepening the understanding of the cost–benefits of CoAP and identifies the application scenarios where its use is likely to be economically justifiable. The paper analyzes the costs of using CoAP and HTTP in the Web of Things (WoT) applications, by identifying the components of the total cost of owne…
Volkswagen Emission Crisis : Managing Stakeholder Relations on the Web
2016
Organizations establish their own profiles at social media sites to publish pertinent information to customers and other stakeholders. During a long and severe crisis, multiple issues may emerge in media interaction. Positive responses and prompt interaction from the official account of e.g. a car manufacturer creates clarity and reduces anxiety among stakeholders. This research targets the Volkswagen 2015 emission scandal that became public on Sept. 18, 2015. We report its main phases over time based on public web information. To better understand the online interaction and reactions of the company, we scrutinized what information was published on VW’s official web sites, Facebook, and Twi…
Issues in e-learning quality assurance
2011
As a decisive factor, the future of any discipline rests on quality, and e-learning is no exception. Due to its multidisciplinary nature, the contribution from various fields such as education, technology, and economy are needed to achieve quality, thereby creating rich learning experience. Undertaking such a task is challenging according to Pawlowski and Ehler (2006) because "it is necessary to find a valid perspective and definition of quality. This requires an answer to the question for which processes of educational scenario quality development has to be carried out, which quality and according to which perspective it is defined." Being diverse and situational/context dependent, there s…
Ontology-based standardization on knowledge exchange in social knowledge management environments
2012
After the hype around Web 2.0, organizations have revisited their efforts on knowledge management in order to create beneficial effects from their employees' activities in social environments. While there is not much doubt about the positive effects on creativity and flexibility, handling the variety of knowledge work environments that are in use at different organizational units or business partners can negatively affect productivity. While standards have generally mushroomed in the IT domain, there is a lack of standards in knowledge management. This paper argues for a standard on exchanging knowledge between social environments. We revisit related work, particularly standards which can b…
Linear fusion of interrupted reports in cooperative spectrum sensing for cognitive radio networks
2015
Interrupted reporting has recently been introduced as an effective method to increase the energy efficiency of cooperative spectrum sensing schemes in cognitive radio networks. In this paper, joint optimization of the reporting and fusion phases in a cooperative sensing with interrupted reporting is considered. This optimization aims at finding the best weights used at the fusion center to construct a linear fusion of the received interrupted reports, jointly with Bernoulli distributions governing the statistical behavior of the interruptions. The problem is formulated by using the deflection criterion and as a nonconvex quadratic program which is then solved for a suboptimal solution, in a…