Search results for "ComputerApplications_COMPUTERSINOTHERSYSTEMS"
showing 10 items of 254 documents
A Web Application for the Remote Control of Multiple Unmanned Aerial Vehicles
2019
Unmanned Aerial Vehicles (UAVs) are receiving an increasing attention from the research and industry community, and today they are adopted for several civilian and military applications. However, state of the art technologies are still based on a single UAV either directly controlled by the human operator or supervised through the manual definition of a flight plan. As a result, scalability is still a significant limitation for such systems, especially when large areas need to be monitored. In this paper we propose a web based application for the control of multiple UAVs. The application has three layers. The first layer allows the user to remotely submit a monitoring mission through a web …
A methodology for the semi-automatic generation of analytical models in manufacturing
2018
International audience; Advanced analytics can enable manufacturing engineers to improve product quality and achieve equipment and resource efficiency gains using large amounts of data collected during manufacturing. Manufacturing engineers, however, often lack the expertise to apply advanced analytics, relying instead on frequent consultations with data scientists. Furthermore, collaborations between manufacturing engineers and data scientists have resulted in highly specialized applications that are not relevant to broader use cases. The manufacturing industry can benefit from the techniques applied in these collaborations if they can be generalized for a wide range of manufacturing probl…
Matching Economical, Energetic and Environmental Benefits: An Analysis for Hybrid CHCP-Heat Pumps Systems
2006
Abstract The optimization of design and operation of combined heat, cooling and power systems usually leads to select different plant lay-outs and size of components, depending on the adopted optimization criterion (maximum profit or energy saving or minimum environmental impact). This occurs when the current energy prices and the normative provisions supporting cogeneration are not able to coincide with the specific customer’s interest and the overall “social interest” for a reduction in energy consumption and in pollutants’ emissions. At EU level, polygeneration is considered to have a large potential for residential and commercial buildings district network, for the tertiary sector and f…
Supervisors’ relational transparency moderates effects among employees’ illegitimate tasks and job dissatisfaction: a four-wave panel study
2019
Despite repeated calls for the inclusion of leadership in research on illegitimate tasks, little is known about what supervisors can actually do to mitigate negative effects of illegitimate tasks. ...
Measurement of the Charged-Pion Polarizability
2015
The COMPASS collaboration at CERN has investigated pion Compton scattering, $\pi^-\gamma\rightarrow \pi^-\gamma$, at centre-of-mass energy below 3.5 pion masses. The process is embedded in the reaction $\pi^-\mathrm{Ni}\rightarrow\pi^-\gamma\;\mathrm{Ni}$, which is initiated by 190\,GeV pions impinging on a nickel target. The exchange of quasi-real photons is selected by isolating the sharp Coulomb peak observed at smallest momentum transfers, $Q^2<0.0015$\,(GeV/$c$)$^2$. From a sample of 63\,000 events the pion electric polarisability is determined to be $\alpha_\pi\ =\ (\,2.0\ \pm\ 0.6_{\mbox{\scriptsize stat}}\ \pm\ 0.7_{\mbox{\scriptsize syst}}\,) \times 10^{-4}\,\mbox{fm}^3$ under the …
BVS: A Lightweight Forward and Backward Secure Scheme for PMU Communications in Smart Grid
2011
In smart grid, phaser measurement units (PMUs) can upload readings to utility centers via supervisory control and data acquisition (SCADA) or energy management system (EMS) to enable intelligent controlling and scheduling. It is critical to maintain the secrecy of readings so as to protect customers' privacy, together with integrity and source authentication for the reliability and stability of power scheduling. In particular, appealing security scheme needs to perform well in PMUs that usually have computational resource constraints, thus designed security protocols have to remain lightweight in terms of computation and storage. In this paper, we propose a family of schemes to solve this p…
The study on the motivation of compulsory service soldiers and professional sevice candidates.
2006
The aim and the task of this master’s paper is to explore the problems of the compulsory service soldier’s and professional service candidates’ motivation in National Armed Forces, to clarify their desire and willingness to acquire the knowledge, abilities, skills, competences necessary to fulfill military service. In desk study part of the master’s paper, based on education and psychology experts’ statements, author draws up a report on factors which influence the soldier’s motivation and their capabilities to perform its mission. At the first section of the desk study part author keeps a close watch to the soldier’s adaptation features for the military service and the influence of the new…
The MuPix Telescope: A Thin, high Rate Tracking Telescope
2016
The MuPix Telescope is a particle tracking telescope, optimized for tracking low momentum particles and high rates. It is based on the novel High-Voltage Monolithic Active Pixel Sensors (HV-MAPS), designed for the Mu3e tracking detector. The telescope represents a first application of the HV-MAPS technology and also serves as test bed of the Mu3e readout chain. The telescope consists of up to eight layers of the newest prototypes, the MuPix7 sensors, which send data self-triggered via fast serial links to FPGAs, where the data is time-ordered and sent to the PC. A particle hit rate of 1 MHz per layer could be processed. Online tracking is performed with a subset of the incoming data. The ge…
A mechanical model of the smartphone’s accelerometer
2015
To increase the attention of students, several physics experiments can be performed at school, as well at home, by using the smartphone as laboratory tools. In the paper we describe a mechanical model of the smartphone's accelerometer, which can be used in classroom to allow students to better understand the principle of the accelerometer even by students at the beginning of the study in physics.
The EM imaging reconstruction method in γ-ray astronomy
1998
Abstract The simpler imaging reconstruction methods used for γ-ray coded mask telescopes are based on correlation methods, very fast and simple-to-use but with limitations in the reconstructed image. To improve these results, other reconstruction methods have been developed, such as the maximum entropy methods or the Iterative Removal Of Sources (IROS). However, such kind of methods are slower and can be impracticable for very complex telescopes. In this paper we present an alternative image reconstruction method, based on an iterative maximum likelihood algorithm called the EM algorithm, easy to implement and that can be successfully used for not very complex coded mask systems, as is the …