Search results for "Computer program"

showing 10 items of 807 documents

Electromagnetic optimization of passive RFID sensor nodes

2012

RFID passive tags are nowadays starting to be considered more than labeling devices: by properly analyzing the two-ways communication link it is possible to get information about the state of a tagged object, without any specific embedded sensor or local power supply. Despite of the generality and the straightforwardness of the approach, the design of such a class of devices requires specific strategies to make the radio-sensors able to properly track the evolution of the phenomena under observation, jointly optimizing communication and sensing requirements. In this paper the optimization problem is formalized by means of convenient matching charts and evaluated in realistic experimental ex…

EngineeringGeneralityClass (computer programming)Optimization problemMatching (graph theory)business.industryReal-time computingTrack (rail transport)Object (computer science)Power (physics)Electronic engineeringState (computer science)businessrifd antenna design2012 6th European Conference on Antennas and Propagation (EUCAP)
researchProduct

25-kW/50-kHz generator for induction heating

1991

The authors present the features, technology, and construction of a transistorized generator for induction heating operating over the 4-50 kHz frequency range. This type of 25 kW output-power generator allows replacement of the electronic tube generators for most of their applications. The advantages of this new generator are more energy efficiency, extended life, reduced size, separated heating station of the generator, and connection by flexible cable. In addition, the generator has incorporated a frequency automatic tracking system that allows operating without any adjustments over a wide frequency range. >

EngineeringGenerator (computer programming)Induction heatingbusiness.industryInduction generatorElectrical engineeringFunction generatorElectric generatorlaw.inventionShunt generatorControl and Systems EngineeringlawPower electronicsElectrical and Electronic EngineeringbusinessRamp generatorIEEE Transactions on Industrial Electronics
researchProduct

Proposal of geographic information systems methodology for quality control procedures of data obtained in naturalistic driving studies

2015

The primary goal of naturalistic driving studies is to provide a comprehensive observation of the driver's behaviour under real-life conditions by measureing a great number of parameters at high temporal frequencies. Achieving this goal, however, is a complex endeavor that faces many challenges such as the complexity of the vehicle instrumentation during the phase of data collection, and the difficult handling of large data volumes during the phase of data analysis. These drawbacks often cause episodes of data losses. Improving the technical aspects of the collection of naturalistic data is of paramount importance to increase the return of the investment made in it. An aspect to consider is…

EngineeringGeographic information systemData collectionbusiness.industryGroup method of data handlingMechanical EngineeringQuality controlPoison controlTransportationcomputer.software_genreData qualityInstrumentation (computer programming)Data miningbusinessLawcomputerReliability (statistics)General Environmental ScienceIET Intelligent Transport Systems
researchProduct

Success factors for information technology supported international technology transfer: Finding expert consensus

2006

Information technology (IT)-supported international technology transfer (ITT) is complex, risky, and fails often. No empirical studies are available on the factors that affect the success of IT-supported ITT. We review applicable theories (i.e. diffusion of innovation theory) and empirical research in conventional technology transfer to develop such a model. We carry out a multiple focus group method to rank factors that affect the success of IT-supported ITT and then apply a branch and bound method to derive a consensus ranking of these factors. The identified consensus ranking sheds light on factors that are similar to those of DOI theory and suggests a pattern of factors that affect IT-s…

EngineeringInformation Systems and ManagementKnowledge managementOperations researchbusiness.industryRank (computer programming)Information technologySuccess factorsExpert consensusAffect (psychology)Management Information SystemsEmpirical researchRankingTechnology transferbusinessInformation SystemsInformation & Management
researchProduct

Determination of Technological Forces in the Incremental Forming Process

2013

The paper presents a joint theoretical and experimental approach to determine the technological forces within the asymmetric single point incremental forming ASPIF process, based upon a theoretical model, image processing and data acquisition. The first step of this approach was to develop a theoretical model of the forces within the process, based upon the model of a mechanical feed drive of a CNC milling machine. By means of this model, relationships between the resistant torque at the motor spindle level and the technological force on the movement axis could be determined. Using an image processing method, which allowed the user to extract information within the machines operator panel a…

EngineeringOperator (computer programming)Data acquisitionbusiness.industryCnc millingProcess (computing)Forming processesTorqueMechanical engineeringImage processingGeneral MedicinebusinessJoint (geology)Applied Mechanics and Materials
researchProduct

A combined multi-criteria approach to support FMECA analyses: A real-world case

2018

[EN] The paper proposes an approach that combines reliability analyses and multi-criteria decision methods to optimize maintenance activities of complex systems. A failure mode, effects, and criticality analysts (FMECA) is initially performed and the fuzzy TOPSIS (FTOPSIS) method is then applied to rank previously identified failure modes. For prioritization, failure modes are assessed against three evaluation criteria that differ from those traditionally involved in risk priority number (RPN) computation (i.e. severity, occurrence and detection). Two criteria refer to the maintenance management reflecting the operational time taken by the maintenance activity performed after the occurrence…

EngineeringSafety-critical analysisSafety-critical analysiAHP0211 other engineering and technologiesAnalytic hierarchy process02 engineering and technologyFault (power engineering)Industrial and Manufacturing EngineeringSettore ING-IND/17 - Impianti Industriali Meccanici0202 electrical engineering electronic engineering information engineeringFTOPSISSensitivity (control systems)Safety Risk Reliability and QualityReliability (statistics)021103 operations researchbusiness.industryRank (computer programming)Reliability engineeringFailure mode effects and criticality analysisRanking020201 artificial intelligence & image processingMATEMATICA APLICADAbusinessFailure mode and effects analysisFMECAReliability Engineering & System Safety
researchProduct

Compact instrumentation for radiation tolerance test of flash memories in space environment

2010

Aim of this work is the description of a test equipment, designed to be integrated on board of a microsatellite, able to investigate the radiation tolerance of non-volatile memory arrays in a real flight experiment. An FPGA-based design was adopted to preserve a high flexibility degree. Besides standard Program/Read/Erase functions, additional features such as failure data screening and latch-up protection have been implemented. The instrument development phase generated, as a by-product, a non-rad-hard version of the instrument that allowed performing in-situ experiments using 60Co and 10 MeV Boron irradiation facilities on Ground. Preliminary measurement results are reported to show the i…

EngineeringTolerance analysisbusiness.industrySystem testingSettore ING-INF/01 - ElettronicaFlash memorySpace equipmentNon-volatile memoryNon-volatile memoryFPGA-based instrumentationRadiation hardneInstrumentation (computer programming)businessField-programmable gate arrayRadiation hardeningInstrumentationComputer hardwareSpace environment
researchProduct

A Comparative Analysis of the Reliability of Simple and Two-Level Checkpointing Techniques in two Different Distributed Industrial Control System Arc…

2003

In Distributed industrial control systems it is necessary to guarantee certain reliability level. In this sense, Checkpointing and Rollback techniques offer interesting possibilities to achieve fault tolerance without appreciable cost and complexity increment. Several Checkpointing techniques have been proposed. Most of them suppose the presence of stable storage in the system. But distributed industrial control systems usually do not dispose of this kind of storage. So, another storage strategy has to be employed. If Checkpoints were locally stored (Simple Checkpointing), the system tolerates only transient faults. If Checkpoints were locally, at the same node, and, additionally, at anothe…

Engineeringbusiness.industryApplied MathematicsNode (networking)Reliability (computer networking)Distributed computingFault toleranceIndustrial control systemReliability engineeringModeling and SimulationTransient (computer programming)Stable storageDistributed control systembusinessRollbackSystems Analysis Modelling Simulation
researchProduct

Instrumentation und Nachweisvermögen oberwellenpolarographischer Analysenverfahren

1978

Der Einflus der Instrumentation der einzelnen Baugruppen eines Oberwellenpolarographen auf das Nachweisvermogen der Gesamtmeseinrichtung wird untersucht. Der Gesamtaufbau eines solchen Polarographen wird beschrieben.

Engineeringbusiness.industryClinical BiochemistrySystems engineeringGeneral Materials ScienceGeneral MedicineInstrumentation (computer programming)businessAnalytical ChemistryFresenius' Zeitschrift für analytische Chemie
researchProduct

Consensus-based Distributed Intrusion Detection for Multi-Robot Systems

2008

This paper addresses a security problem in robotic multi-agent systems, where agents are supposed to cooperate according to a shared protocol. A distributed Intrusion Detection System (IDS) is proposed here, that detects possible non-cooperative agents. Previous work by the authors showed how single monitors embedded on-board the agents can detect non- cooperative behavior, using only locally available information. In this paper, we allow such monitors to share the collected information in order to overcome their sensing limitation. In this perspective, we show how an agreement on the type of behavior of a target-robot may be reached by the monitors, through execution of a suitable consensu…

Engineeringbusiness.industryDistributed computingReal-time computingIntrusion detection systemDecentralised systemUpper and lower boundsComputer Science::Multiagent SystemsConsensusSettore ING-INF/04 - AutomaticaConvergence (routing)Transient (computer programming)Intrusion detectionbusinessIntelligent transportation systemProtocol (object-oriented programming)set--valued consensus algorithm
researchProduct