Search results for "Computer science"
showing 10 items of 22367 documents
Model of line to shield power line communication system on a Medium Voltage network
2010
In this paper a complete model of a power line communication (PLC) system on a Medium Voltage (MV) network is presented in the case of a line-ground configuration. A simple and friendly Simulink (R) software is used to develop the model. A distributed parameter MV cable model in line-ground configuration is considered together with the power transformers, the signal coupling networks and the receiving and transmitting line coupling interface of a ST7540 FSK powerline transceiver. The performances of the complete PLC communication system are evaluated for different line lengths by means of the attenuation computed as ratio between the received and transmitted voltage signals.
Energie informatique et choix de matériel
1995
The choice of computers been made according to a minimax: one chooses the most powerful computer in the less powerful category. We show here that, in a simple case, if one takes into account the time of equipment utilization, this rule can be given in cause. We study then a case more complicated including some technical parameters like the case of multiprocessor machine and including other human parameters like the intensity of task submission.
Combining hyperspectral UAV and multispectral Formosat-2 imagery for precision agriculture applications
2014
Remote sensing is a key tool for precision agriculture applications as it is capable of capturing spatial and temporal variations in crop status. However, satellites often have an inadequate spatial resolution for precision agriculture applications. High-resolution Unmanned Aerial Vehicles (UAV) imagery can be obtained at flexible dates, but operational costs may limit the collection frequency. The current study utilizes data fusion to create a dataset which benefits from the temporal resolution of Formosat-2 imagery and the spatial resolution of UAV imagery with the purpose of monitoring crop growth in a potato field. The correlation of the Weighted Difference Vegetation Index (WDVI) from …
Interactively Learning the Preferences of a Decision Maker in Multi-objective Optimization Utilizing Belief-rules
2020
Many real life problems can be modelled as multiobjective optimization problems. Such problems often consist of multiple conflicting objectives to be optimized simultaneously. Multiple optimal solutions exist to these problems, and a single solution cannot be said to be the best without preferences given by a domain expert. Preferences can be used to find satisfying solutions: optimal solutions, which best match the expert’s preferences. To model the preferences of the expert, and aid him/her in finding satisfying solutions, a novel method is proposed. The method utilizes machine learning combined with belief-rule based systems to adaptively train a belief rule based system to learn a domai…
Numerical and Experimental Study of a Novel Concept for Hydraulically Controlled Negative Loads
2016
This paper presents a numerical and experimental investigation of a novel concept that eliminates oscillations in hydraulic systems containing a counterbalance valve in series with a pressure compensated flow supply. The concept utilizes a secondary circuit where a low-pass filtered value of the load pressure is generated and fed back to the compensator of the flow supply valve. The novel concept has been implemented on a single boom actuated by a cylinder. A nonlinear model of the system has been developed and an experimental verification shows good correspondence between the model and the real system. The model is used for a parameter study on the novel concept. From the study it is found…
Hard to catch: Experimental evidence supports evasive mimicry
2021
Most research on aposematism has focused on chemically defended prey, but the signalling difficulty of capture remains poorly explored. Similar to classical Batesian and Müllerian mimicry related to distastefulness, such ‘evasive aposematism' may also lead to convergence in warning colours, known as evasive mimicry. A prime candidate group for evasive mimicry areAdelphabutterflies, which are agile insects and show remarkable colour pattern convergence. We tested the ability of naive blue tits to learn to avoid and generalizeAdelphawing patterns associated with the difficulty of capture and compared their response to that of birds that learned to associate the same wing patterns with distast…
Probabilistic Evaluation of the Adaptation Time for Structures under Seismic Loads
2016
Abstract In this paper, a probabilistic approach for the evaluation of the adaptation time for elastic perfectly plastic frames is proposed. The considered load history acting on the structure is defined as a suitable combination of quasi-statical loads and seismic actions. The proposed approach utilizes the Monte Carlo method in order to generate a suitable large number of seismic acceleration histories and for each one the related load combination is defined. Furthermore, for each load combination the related adaptation time is determined, if any, as the optimal one for which the structure is able to shakedown under the unamplified applied actions. A known generalized Ceradini's theorem i…
Linear Types for Higher Order Processes with First Class Directed Channels
1995
Abstract We present a small programming language for distributed systems based on message passing processes. In contrast to similar languages, channels are one-to-one connections between a unique sender and a unique receiver process. Process definitions and channels are first class values and the topology of process systems can change dynamically. The operational semantics of the language is defined by means of graph rewriting rules. A static type system based on the notion of linear types ensures that channels are always used as one-to-one connections.
Detecting Kernel Vulnerabilities During the Development Phase
2015
Testing is one of the major problems in Linux kernel development cycle. Security analysis and ensuring no new vulnerabilities has been introduced is one of the toughest issues of testing. Kernel developers attempt to find as many security issues as possible before merging with the mainline branch. Failure to detect vulnerabilities will result in vulnerable kernel shipped by distribution and vulnerable systems. The kernel developers can choose between several industrial and open source tools to assist in the development process and shorten the development cycle. (Though not as many as user space developers. Kernel tools are limited and rare compared to user space tools) Some of these tools a…
A study on the assessment of the production costs curves in micro-grids
2013
In micro-grids, due to their small scale, there is commonly only one power supplier. A competitive wholesale market hardly exists, so the question about how to consider market issues for small producers within micro-grids arises. On the other hand, the specific features of micro-grids where load and generated power hardly find a balance, require that customers take part to regulation issues, also using demand-response (DR) programs. In this paper, price responsive (PR) policies and their programs are discussed to answer this question. A case study of a micro-grid with one micro-turbine and two photovoltaic (PV) generators is analyzed to assess the overall production cost in order to build a…