Search results for "Modeling and simulation"

showing 10 items of 1561 documents

Comparison between two different cardiovascular models during a hemorrhagic shock scenario

2020

Hemorrhagic shock is a form of hypovolemic shock determined by rapid and large loss of intravascular blood volume and represents the first cause of death in the world, whether on the battlefield or in civilian traumatology. For this, the ability to prevent hemorrhagic shock remains one of the greatest challenges in the medical and engineering fields. The use of mathematical models of the cardiocirculatory system has improved the capacity, on one hand, to predict the risk of hemorrhagic shock and, on the other, to determine efficient treatment strategies. In this paper, a comparison between two mathematical models that simulate several hemorrhagic scenarios is presented. The models considere…

blood flow simulationComputer science02 engineering and technologyShock HemorrhagichemodynamicsSettore ING-INF/01 - Elettronicahemorrhagic shockBattlefield0502 economics and business0202 electrical engineering electronic engineering information engineeringmedicineQA1-939HumansStructured modelSettore MAT/07 - Fisica MatematicaMathematical modelApplied Mathematics05 social sciencesModels CardiovascularGeneral MedicineComputational MathematicsRisk analysis (engineering)cardiovascular modelModeling and SimulationShock (circulatory)Settore ING-INF/06 - Bioingegneria Elettronica E InformaticaHemorrhagic shockTreatment strategy020201 artificial intelligence & image processingmedicine.symptomhemorrhageGeneral Agricultural and Biological Sciences050203 business & managementTP248.13-248.65MathematicsBiotechnology
researchProduct

Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets

2021

International audience; With the Internet's unprecedented growth and nations' reliance on computer networks, new cyber‐attacks are created every day as means for achieving financial gain, imposing political agendas, and developing cyberwarfare arsenals. Network security is thus acquiring increasing attention among researchers, practitioners, network architects, policy makers, and others. To defend organizations' networks from existing, foreseen, and future threats, intrusion detection systems (IDSs) are becoming a must. Existing surveys on anomaly‐based IDS (AIDS) focus on specific components such as detection mechanisms and lack many others. In contrast to existing surveys, this article co…

business.industryComputer scienceAnomaly (natural sciences)020206 networking & telecommunications02 engineering and technologyIntrusion detection system[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]Computer securitycomputer.software_genre[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR][INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingThe Internet[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Electrical and Electronic Engineering[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businesscomputer
researchProduct

D Sensor-Based Obstacle Detection Comparing Octrees and Point clouds Using CUDA

2012

This paper presents adaptable methods for achieving fast collision detection using the GPU and Nvidia CUDA together with Octrees. Earlier related work have focused on serial methods, while this paper presents a parallel solution which shows that there is a great increase in time if the number of operations is large. Two dierent models of the environment and the industrial robot are presented, the rst is Octrees at dierent resolutions, the second is a point cloud representation. The relative merits of the two dierent world model representations are shown. In particular, the experimental results show the potential of adapting the resolution of the robot and environment models to the task at h…

business.industryComputer sciencePoint cloudComputer Science ApplicationsComputational sciencelaw.inventionIndustrial robotTask (computing)CUDAControl and Systems EngineeringlawModeling and SimulationObstacleRobotComputer visionCollision detectionArtificial intelligencebusinessRepresentation (mathematics)SoftwareModeling, Identification and Control: A Norwegian Research Bulletin
researchProduct

Interference Estimation in IEEE 802.11 Networks

2010

This article describes a technique for distinguishing and quantifying medium access control (MAC) and physical layer (PHY) interference in error-prone 802.11 networks. This technique, is fully distributed, allowing each station to estimate interference individually. The estimator is based on an extended Kalman filter coupled to a mechanism for revealing abrupt changes in state. The network state is a vector of two components, representing PHY interference, expressed in terms of channel-error rate, and MAC interference. Two distinct state models are considered. When PHY interference can be assumed to be constant for all stations, network congestion is expressed by the number of competing ter…

business.industryComputer scienceSettore ING-INF/03 - TelecomunicazioniWiFiComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPhysical layerKalman filterInterference (wave propagation)Network congestionExtended Kalman filterIEEE 802.11Control and Systems EngineeringPHYModeling and SimulationComputer Science::Networking and Internet ArchitectureElectronic engineeringWirelessElectrical and Electronic EngineeringbusinessKalman FilterComputer Science::Information Theory
researchProduct

Hybrid descriptive-inferential method for key feature selection in prostate cancer radiomics

2021

In healthcare industry 4.0, a big role is played by radiomics. Radiomics concerns the extraction and analysis of quantitative information not visible to the naked eye, even by expert operators, from biomedical images. Radiomics involves the management of digital images as data matrices, with the aim of extracting a number of morphological and predictive variables, named features, using automatic or semi-automatic methods. Multidisciplinary methods as machine learning and deep learning are fully involved in this field. However, the large number of features requires efficient and effective core methods for their selection, in order to avoid bias or misinterpretations problems. In this work, t…

business.industryComputer sciencefeature selection image analysis prostate cancer radiomicsFeature selectionManagement Science and Operations Researchmedicine.diseaseMachine learningcomputer.software_genreprostate cancerGeneral Business Management and AccountingProstate cancerRadiomicsimage analysisradiomicsModeling and SimulationFeature selectionmedicineKey (cryptography)Artificial intelligencebusinesscomputer
researchProduct

The dynamics over the next few years of the Spanish mobile telecommunications market share: a mathematical modelling approach

2013

Taking into account available data from 2002 to 2009 about the market share percentages of the Spanish mobile telecommunications service providers, a dynamic diffusion model to study the evolution of the clients’ change between the different companies during the period 2010–2016 is proposed. The constructed model provides a tool for forecasting short-term trends about the customers’ preferences with respect to mobile network operators taking into account both, autonomous decisions due to direct marketing and advertising strategies, and also decisions adopted through interaction via social influence. The model can provide insights to companies for designing strategies in order to gain market…

business.industryMarket shareApplied MathematicsService providerSocial interactionModellingComputer Science ApplicationsDirect marketingControl and Systems EngineeringOrder (exchange)Mobile telecommunications servicesModeling and SimulationMarket share analysisCellular networkECONOMIA FINANCIERA Y CONTABILIDADMobile telephonyMarket shareMATEMATICA APLICADAbusinessSoftwareSimulationIndustrial organizationForecastingSocial influenceMathematical and Computer Modelling of Dynamical Systems
researchProduct

Probabilistic models for the fatigue resistance of welded steel joints subjected to constant amplitude loading

2022

Abstract S-N curves found in various rules and regulations are the basic tool for the practicing engineer when carrying out life predictions for welded details in dynamically loaded structures. The present work is investigating the expected fatigue life and associated scatter for welded steel joints subjected to Constant Amplitude (CA) loading. The objective is to obtain more reliable life predictions based on advancements in the probabilistic model fitted to collected life data. A Random Fatigue Limit Model (RFLM) is proposed to obtain fatigue resistance curves at given probability levels of survival. As a distinction to more conventional statistical methods, the model is treating both the…

business.industryMechanical EngineeringProbabilistic logicStatistical modelWeldingStructural engineeringFatigue limitIndustrial and Manufacturing Engineeringlaw.inventionTransverse planeMechanics of MaterialslawModeling and SimulationVDP::Teknologi: 500::Maskinfag: 570General Materials ScienceFillet (mechanics)businessConstant (mathematics)Random variableMathematicsInternational Journal of Fatigue
researchProduct

A Rule-Based Method to Model Myocardial Fiber Orientation for Simulating Ventricular Outflow Tract Arrhythmias

2017

Comunicació presentada a: FIMH 2017 9th International Conference, celebrada a Toronto, Canadà, de l'11 al 13 de juny de 2017. Myocardial fiber orientation determines the propagation of electrical waves in the heart and the contraction of cardiac tissue. One common approach for assigning fiber orientation to cardiac anatomi- cal models are Rule-Based Methods (RBM). However, RBM have been developed to assimilate data mostly from the Left Ventricle. In conse- quence, fiber information from RBM does not match with histological data in other areas of the heart, having a negative impact in cardiac simulations beyond the LV. In this work, we present a RBM where fiber orientation is separately mode…

business.industryOrientation (computer vision)Fiber (mathematics)Fiber orientationOutflow tractsAnatomy030204 cardiovascular system & hematologyArrhythmias[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation030218 nuclear medicine & medical imaging03 medical and health sciencesElectrophysiology0302 clinical medicinemedicine.anatomical_structureRule-based methodVentriclemedicinecardiovascular system[INFO.INFO-IM]Computer Science [cs]/Medical ImagingVentricular outflow tractOutflowElectrophysiological simulationsInterventricular septumbusinessEndocardium
researchProduct

Large-eddy simulations of turbulent flow with heat transfer in simple and complex geometries using Harwell-FLOW3D

1996

Abstract Large-eddy simulation (LES) results are presented and discussed for the turbulent flow with heat transfer in different geometrical configurations, including a plane channel, a channel bearing transverse square ribs on one of the walls, and a crossed-corrugated air heater. They were obtained using the computational fluid dynamics (CFD) code Harwell-FLOW3D (Release 2), finite-volume grids having up to 423 nodes, and the Smagorinsky subgrid model with several variants regarding near-wall damping and wall boundary conditions. The first problem (plane turbulent Poiseuille flow with heat transfer) was mainly used as a benchmark to investigate the influence of numerical methods (pressure-…

business.industryTurbulenceApplied MathematicsPrandtl numberTurbulence modelFluid mechanicsGeometryMechanicsComputational fluid dynamicsHeat TransferHagen–Poiseuille equationLarge Eddy SimulationSubgrid modelPhysics::Fluid Dynamicssymbols.namesakeModelling and SimulationModeling and SimulationHeat transfersymbolsBoundary value problemCFDbusinessSettore ING-IND/19 - Impianti NucleariMathematicsLarge eddy simulationApplied Mathematical Modelling
researchProduct

Robust technique for 3D shape reconstruction

2017

Abstract In this paper a robust and simple scheme is presented for three dimensional (3D) shape reconstruction of real object. A novel composite pattern technique is proposed for projecting the light pattern on the object of interest. The proposed scheme reduces the number of patterns by combining the primary color coded channels into one composite format. Our approach uses both spatial and temporal intensity variation for calibration and construction phase. Gamma calibration is considered with the propose scheme. High quality depth map is obtained from the linear light reflected by the shape of object without complex calculations. Experimental results demonstrated that proposed technique i…

business.product_categoryGeneral Computer Sciencebusiness.industry3D reconstructionFlashlight02 engineering and technology01 natural sciencesTheoretical Computer ScienceStructured-light 3D scanner010309 opticsDepth mapModeling and Simulation0103 physical sciences0202 electrical engineering electronic engineering information engineeringCalibration020201 artificial intelligence & image processingComputer visionArtificial intelligenceComposite patternbusinessDigital cameraStructured lightMathematicsJournal of Computational Science
researchProduct