Search results for "Data acquisition"

showing 10 items of 237 documents

Implementation and performance of the ATLAS second level jet trigger

2008

ATLAS is one of the four major LHC experiments, designed to cover a wide range of physics topics. In order to cope with a rate of 40 MHz and 25 interactions per bunch crossing, the ATLAS trigger system is divided in three different levels. The first one (LVL1, hardware based) identifies signatures in 2 microseconds that are confirmed by the the following trigger levels (software based). The Second Level Trigger (LVL2) only looks at a region of the space around the LVL1 signature (called Region of Interest or ROI), confirming/rejecting the event in about 10 ms, while the Event Filter (Third Level Trigger, EF) has potential full event access and larger processing times, of the order of 1 s. T…

UnpackingPhysicsHistoryData processingLarge Hadron ColliderMathematical modelAtlas (topology)Reconstruction algorithmParticle identificationComputer Science ApplicationsEducationComputational scienceData acquisitionStatistical physicsDetectors and Experimental TechniquesJournal of Physics: Conference Series
researchProduct

UAV Systems for Photogrammetric Data Acquisition of Archaeological Sites

2012

The use of UAV systems for surveying archaeological sites is becoming progressively more common due to the considerable potential in terms of rapidity of survey, costs and accuracy. The paper presents the first results of the photogrammetric survey of the archaeological site of Himera in Sicily (Italy) using by UAV systems. A complete documentation of the site through the production of a DSM and an ortho image were carried out. The research further evaluated two different image processing workflows: a typical photogrammetric approach and a computer vision approach. An ortho image of the archaeological site with a very high resolution was obtained. Dept. of Civil, Environmental, Aerospace an…

Very high resolutionComputer VisionImage processingOrtho imageUAVsArchaeologyDSMGeographyData acquisitionDocumentationPhotogrammetryArchaeologyPhotogrammetryCartographySettore ICAR/06 - Topografia E CartografiaRemote sensingUAVs Photogrammetry Archaeology Computer Vision DSM Ortho-image
researchProduct

Global Trigger Technological Demonstrator for ATLAS Phase-II upgrade

2020

ATLAS detector at the LHC will undergo a major Phase-II upgrade for the High Luminosity LHC. The upgrade affects all major ATLAS systems, including the Trigger and Data Acquisition systems. As part of the Level-0 Trigger System, the Global Trigger uses full-granularity calorimeter cells to perform algorithms, refines the trigger objects and applies topological requirements. The Global Trigger uses a Global Common Module as the building block of its design. To achieve a high input and output bandwidth and substantial processing power, the Global Common Module will host the most advanced FPGAs and optical modules. In order to evaluate the new generation of optical modules and FPGAs running at…

VirtexPhysics - Instrumentation and DetectorsLarge Hadron Colliderbusiness.industryComputer scienceBandwidth (signal processing)FOS: Physical sciencesInstrumentation and Detectors (physics.ins-det)High Energy Physics - ExperimentHigh Energy Physics - Experiment (hep-ex)Data acquisitionUpgradebusinessField-programmable gate arrayHost (network)Computer hardwareParticle Physics - ExperimentBlock (data storage)
researchProduct

Toward a virtual reconstruction of an antique three-dimensional marble puzzle

2017

International audience; Abstract | Introduction | Related Work | Acquisition Setup, Proposed Prototype: Calibration and Visibility | Preprocessing of Scanned Three-Dimensional Fragment Data | Processing of Scanned Three-Dimensional Surface Data: Matching | Conclusion and Future Works | Appendices | Acknowledgments | ReferencesAbstract. The reconstruction of broken objects is an important field of research for many applications, such as art restoration, surgery, forensics, and solving puzzles. In archaeology, the reconstruction of broken artifacts is a very time-consuming task due to the handling of fractured objects, which are generally fragile. However, it can now be supported by three-dim…

[ INFO ] Computer Science [cs]Computer scienceAntique[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS]02 engineering and technology[SDV.MHEP.CHI]Life Sciences [q-bio]/Human health and pathology/SurgeryField (computer science)Task (project management)Domain (software engineering)Data acquisitionComputer graphics (images)Clouds[ INFO.INFO-TI ] Computer Science [cs]/Image ProcessingVirtual reconstruction0202 electrical engineering electronic engineering information engineering[INFO.INFO-IM]Computer Science [cs]/Medical ImagingComputer visionScanning[INFO]Computer Science [cs][ SDV.IB ] Life Sciences [q-bio]/BioengineeringComputing systems[ SDV.MHEP.CHI ] Life Sciences [q-bio]/Human health and pathology/SurgeryElectrical and Electronic EngineeringScanners[ INFO.INFO-DS ] Computer Science [cs]/Data Structures and Algorithms [cs.DS]Image segmentation[ INFO.INFO-IM ] Computer Science [cs]/Medical Imagingbusiness.industryLasers020207 software engineeringImage segmentation3D modelingCamerasAtomic and Molecular Physics and OpticsComputer Science Applications[INFO.INFO-TI]Computer Science [cs]/Image Processing [eess.IV]Calibration020201 artificial intelligence & image processingSurgery[SDV.IB]Life Sciences [q-bio]/BioengineeringArtificial intelligencebusinessAlgorithms
researchProduct

Ontology and protocol secure for SCADA: Int. J. of Metadata, Semantics and Ontologies, 2014 Vol.9, No.2, pp.114 - 127

2014

International audience; In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, th…

[ INFO ] Computer Science [cs]security protocolsComputer sciencedata acquisition[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]020209 energy[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]Cryptography02 engineering and technologysemantic security blockLibrary and Information SciencesComputer securitycomputer.software_genreSOAP protocolSecurity information and event management[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI][INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]SCADAModbus protocolECC cryptography0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]SCADAcontrol systemsCloud computing securityvulnerabilitiesTOMSONbusiness.industryencryption technologyembedded applicationscyber securitysupervisory controlsemantic attacksCryptographic protocolComputer security modelsecurity ontologyComputer Science ApplicationsOSI modellow latencySecurity service020201 artificial intelligence & image processingbusinesscomputerInformation SystemsComputer network
researchProduct

Borexino’s search for low-energy neutrino and antineutrino signals correlated with gamma-ray bursts

2017

International audience; A search for neutrino and antineutrino events correlated with 2350 gamma-ray bursts (GRBs) is performed with Borexino data collected between December 2007 and November 2015. No statistically significant excess over background is observed. We look for electron antineutrinos ( ν¯e ) that inverse beta decay on protons with energies from 1.8  MeV to 15  MeV and set the best limit on the neutrino fluence from GRBs below 8  MeV. The signals from neutrinos and antineutrinos from GRBs that scatter on electrons are also searched for, a detection channel made possible by the particularly radio-pure scintillator of Borexino. We obtain currently the best limits on the neutrino f…

antineutrinoselectronAntineutrinosneutrino: solarPhysics::Instrumentation and Detectorsdata acquisitionSolar neutrino[ PHYS.ASTR ] Physics [physics]/Astrophysics [astro-ph]Astrophysics::High Energy Astrophysical Phenomenalow energy/MeV neutrinosElectrongamma ray: burst01 natural sciencesNuclear physicsLow energy/MeV neutrino0103 physical sciencesNeutrinoLow energy/MeV neutrinosNeutrinosNuclear Experiment010303 astronomy & astrophysicsGamma-ray burstBorexinoscintillation counterPhysicsflavor010308 nuclear & particles physicsbackgroundgamma-ray burstsneutrinosAntineutrinos; Gamma-ray bursts; Low energy/MeV neutrinos; Neutrinos; Astronomy and AstrophysicsAstronomy and Astrophysicssemileptonic decayantineutrinocorrelation: timeNeutrino detectorInverse beta decayddc:540Scintillation counterreadoutHigh Energy Physics::ExperimentBorexinoGamma-ray burstsNeutrinoGamma-ray burst[PHYS.ASTR]Physics [physics]/Astrophysics [astro-ph]
researchProduct

Characterization of a neutron–beta counting system with beta-delayed neutron emitters

2016

A new detection system for the measurement of beta-delayed neutron emission probabilities has been characterized using fission products with well known β-delayed neutron emission properties. The setup consists of BELEN-20, a 4π neutron counter with twenty 3He proportional tubes arranged inside a large polyethylene neutron moderator, a thin Si detector for β counting and a selftriggering digital data acquisition system. The use of delayed-neutron precursors with different neutron emission windows allowed the study of the effect of energy dependency on neutron, β and β-neutron rates. The observed effect is well reproduced by Monte Carlo simulations. The impact of this dependency on the accura…

beta-delayed neutron emission probabilityAstrophysics::High Energy Astrophysical PhenomenaNuclear TheoryGeant4 simulationsself-triggered digital data acquisition systemNuclear Experimentneutron and beta counters
researchProduct

Building Information Modeling (BIM) Enabled Facilities Management Using Hadoop Architecture

2017

International audience; Protecting the safety of occupants and the environment is a core value within Facilities Management. Data acquisition systems such as wireless sensor networks can help to monitor facilities to reduce hazards such as fire, water flooding and burglaries. Building Information Modeling (BIM) is a revolutionary development that is reshaping the Architecture Engineering and Construction (AEC) industry. BIM is both a process and a technology, offers wide solutions for facilities management. In order to monitor and manage facilities data in a BIM based simulated environment, this work reports upon a development of a system that uses BIM software and a wireless sensor technol…

business.industryComputer science020209 energyData managementBig data0211 other engineering and technologiesIntegration02 engineering and technology[SPI.TRON] Engineering Sciences [physics]/Electronics[SPI.TRON]Engineering Sciences [physics]/ElectronicsFacility managementData visualizationData acquisitionBuilding information modeling021105 building & constructionManagement system0202 electrical engineering electronic engineering information engineeringSystems engineeringbusinessWireless sensor network
researchProduct

A microcomputer system for controlling classical conditioning experiments

1994

A microcomputer-based laboratory system for controlling stimulus presentations and data acquisition in classical conditioning experiments is described. The system comprises an Intel 386/486-based microcomputer and a commercially obtained low-cost counter/timer board with input/output lines for stimulus timing and external device control. A simple, yet versatile custom-designed structured programming language is provided for performing an unlimited number of stimulus configurations and their sequences. In electrophysiological studies, the system can be flexibly connected to computer-controlled signal conditioning systems for the amplification and filtering of multiunit and evoked field poten…

business.industryComputer scienceClassical conditioningExperimental and Cognitive PsychologyStimulus (physiology)Structured programmingData acquisitionMicrocomputerIntel 80386Psychology (miscellaneous)TimerbusinessSignal conditioningGeneral PsychologyComputer hardwareBehavior Research Methods, Instruments, & Computers
researchProduct

Pico: A data acquisition program for picosecond laser spectroscopy

1992

Abstract A data acquisition and control program for picosecond pump and probe experiments has been developed. The program PICO is written in C-programming language for maximum efficiency. The software which runs on an IBM PC compatible microcomputer controls a stepper motor driven optical delay, and at the same time collects data from a digital lock-in amplifier. PICO can be used to control any experiment utilizing two-beam pump probe technique. The modular structure of the software allows for easy implementation with different hardware configurations. The program includes: measurement option, manual control of the delay line using a joystick and functions for file retrieval and editing. Ad…

business.industryComputer scienceGeneral Chemical EngineeringAmplifierApplied Microbiology and BiotechnologyData acquisitionSoftwarePicosecondIBM PC compatibleJoystickMicrocomputerLine (text file)businessComputer hardwareBiotechnologyComputers & Chemistry
researchProduct