Search results for "Computer program"
showing 10 items of 807 documents
Electromagnetic optimization of passive RFID sensor nodes
2012
RFID passive tags are nowadays starting to be considered more than labeling devices: by properly analyzing the two-ways communication link it is possible to get information about the state of a tagged object, without any specific embedded sensor or local power supply. Despite of the generality and the straightforwardness of the approach, the design of such a class of devices requires specific strategies to make the radio-sensors able to properly track the evolution of the phenomena under observation, jointly optimizing communication and sensing requirements. In this paper the optimization problem is formalized by means of convenient matching charts and evaluated in realistic experimental ex…
25-kW/50-kHz generator for induction heating
1991
The authors present the features, technology, and construction of a transistorized generator for induction heating operating over the 4-50 kHz frequency range. This type of 25 kW output-power generator allows replacement of the electronic tube generators for most of their applications. The advantages of this new generator are more energy efficiency, extended life, reduced size, separated heating station of the generator, and connection by flexible cable. In addition, the generator has incorporated a frequency automatic tracking system that allows operating without any adjustments over a wide frequency range. >
Proposal of geographic information systems methodology for quality control procedures of data obtained in naturalistic driving studies
2015
The primary goal of naturalistic driving studies is to provide a comprehensive observation of the driver's behaviour under real-life conditions by measureing a great number of parameters at high temporal frequencies. Achieving this goal, however, is a complex endeavor that faces many challenges such as the complexity of the vehicle instrumentation during the phase of data collection, and the difficult handling of large data volumes during the phase of data analysis. These drawbacks often cause episodes of data losses. Improving the technical aspects of the collection of naturalistic data is of paramount importance to increase the return of the investment made in it. An aspect to consider is…
Success factors for information technology supported international technology transfer: Finding expert consensus
2006
Information technology (IT)-supported international technology transfer (ITT) is complex, risky, and fails often. No empirical studies are available on the factors that affect the success of IT-supported ITT. We review applicable theories (i.e. diffusion of innovation theory) and empirical research in conventional technology transfer to develop such a model. We carry out a multiple focus group method to rank factors that affect the success of IT-supported ITT and then apply a branch and bound method to derive a consensus ranking of these factors. The identified consensus ranking sheds light on factors that are similar to those of DOI theory and suggests a pattern of factors that affect IT-s…
Determination of Technological Forces in the Incremental Forming Process
2013
The paper presents a joint theoretical and experimental approach to determine the technological forces within the asymmetric single point incremental forming ASPIF process, based upon a theoretical model, image processing and data acquisition. The first step of this approach was to develop a theoretical model of the forces within the process, based upon the model of a mechanical feed drive of a CNC milling machine. By means of this model, relationships between the resistant torque at the motor spindle level and the technological force on the movement axis could be determined. Using an image processing method, which allowed the user to extract information within the machines operator panel a…
A combined multi-criteria approach to support FMECA analyses: A real-world case
2018
[EN] The paper proposes an approach that combines reliability analyses and multi-criteria decision methods to optimize maintenance activities of complex systems. A failure mode, effects, and criticality analysts (FMECA) is initially performed and the fuzzy TOPSIS (FTOPSIS) method is then applied to rank previously identified failure modes. For prioritization, failure modes are assessed against three evaluation criteria that differ from those traditionally involved in risk priority number (RPN) computation (i.e. severity, occurrence and detection). Two criteria refer to the maintenance management reflecting the operational time taken by the maintenance activity performed after the occurrence…
Compact instrumentation for radiation tolerance test of flash memories in space environment
2010
Aim of this work is the description of a test equipment, designed to be integrated on board of a microsatellite, able to investigate the radiation tolerance of non-volatile memory arrays in a real flight experiment. An FPGA-based design was adopted to preserve a high flexibility degree. Besides standard Program/Read/Erase functions, additional features such as failure data screening and latch-up protection have been implemented. The instrument development phase generated, as a by-product, a non-rad-hard version of the instrument that allowed performing in-situ experiments using 60Co and 10 MeV Boron irradiation facilities on Ground. Preliminary measurement results are reported to show the i…
A Comparative Analysis of the Reliability of Simple and Two-Level Checkpointing Techniques in two Different Distributed Industrial Control System Arc…
2003
In Distributed industrial control systems it is necessary to guarantee certain reliability level. In this sense, Checkpointing and Rollback techniques offer interesting possibilities to achieve fault tolerance without appreciable cost and complexity increment. Several Checkpointing techniques have been proposed. Most of them suppose the presence of stable storage in the system. But distributed industrial control systems usually do not dispose of this kind of storage. So, another storage strategy has to be employed. If Checkpoints were locally stored (Simple Checkpointing), the system tolerates only transient faults. If Checkpoints were locally, at the same node, and, additionally, at anothe…
Instrumentation und Nachweisvermögen oberwellenpolarographischer Analysenverfahren
1978
Der Einflus der Instrumentation der einzelnen Baugruppen eines Oberwellenpolarographen auf das Nachweisvermogen der Gesamtmeseinrichtung wird untersucht. Der Gesamtaufbau eines solchen Polarographen wird beschrieben.
Consensus-based Distributed Intrusion Detection for Multi-Robot Systems
2008
This paper addresses a security problem in robotic multi-agent systems, where agents are supposed to cooperate according to a shared protocol. A distributed Intrusion Detection System (IDS) is proposed here, that detects possible non-cooperative agents. Previous work by the authors showed how single monitors embedded on-board the agents can detect non- cooperative behavior, using only locally available information. In this paper, we allow such monitors to share the collected information in order to overcome their sensing limitation. In this perspective, we show how an agreement on the type of behavior of a target-robot may be reached by the monitors, through execution of a suitable consensu…