Search results for "NETWORKS"

showing 10 items of 3260 documents

Reliable diagnostics using wireless sensor networks

2019

International audience; Monitoring activities in industry may require the use of wireless sensor networks, for instance due to difficult access or hostile environment. But it is well known that this type of networks has various limitations like the amount of disposable energy. Indeed, once a sensor node exhausts its resources, it will be dropped from the network, stopping so to forward information about maybe relevant features towards the sink. This will result in broken links and data loss which impacts the diagnostic accuracy at the sink level. It is therefore important to keep the network's monitoring service as long as possible by preserving the energy held by the nodes. As packet trans…

0209 industrial biotechnologyGeneral Computer ScienceComputer science[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS]02 engineering and technologyData loss[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]Network topology[SPI.AUTO]Engineering Sciences [physics]/Automatic[INFO.INFO-IU]Computer Science [cs]/Ubiquitous ComputingPrognostics and health management[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]020901 industrial engineering & automation0202 electrical engineering electronic engineering information engineeringAdaBoostElectroniquebusiness.industryNetwork packetGeneral Engineering[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationWireless sensor networksRandom forest[SPI.TRON]Engineering Sciences [physics]/Electronics[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Sensor node020201 artificial intelligence & image processing[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Gradient boosting[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessWireless sensor networkComputer networkComputers in Industry
researchProduct

An Ontology to Support Semantic Management of FMEA Knowledge

2016

<p>Risk mitigation has always been a special concern for organization’s strategic management. Various tools and techniques have been developed to manage risk in an effective way. Failure Mode and Effects Analysis (FMEA) is one of the tools used for effective assessment of risk. It analyzes all potential failure modes, their causes, and effects on a product or process. Moreover it recommends actions to mitigate failures in order to enhance product reliability. Organizations spend their resources and domain experts make their efforts to complete this analysis. It further helps organizations identify the expected risks and plan strategies in advance to tackle them. But unfortunately the …

0209 industrial biotechnologyKnowledge managementComputer Networks and Communicationsbusiness.industryProcess (engineering)Computer science0102 computer and information sciences02 engineering and technologyReuseOntology (information science)01 natural sciencesComputer Science Applications020901 industrial engineering & automationComputational Theory and MathematicsData retrievalRisk analysis (engineering)010201 computation theory & mathematicsStrategic managementbusinessFailure mode and effects analysisRisk managementNatural languageInternational Journal of Computers Communications & Control
researchProduct

Interrogating witnesses for geometric constraint solving

2012

International audience; Classically, geometric constraint solvers use graph-based methods to decompose systems of geometric constraints. These methods have intrinsic limitations, which the witness method overcomes; a witness is a solution of a variant of the system. This paper details the computation of a basis of the vector space of free infinitesimal motions of a typical witness, and explains how to use this basis to interrogate the witness for dependence detection. The paper shows that the witness method detects all kinds of dependences: structural dependences already detectable by graph-based methods, but also non-structural dependences, due to known or unknown geometric theorems, which…

0209 industrial biotechnologyMathematical optimizationGeometric constraintsTheoretical computer science[ INFO.INFO-NA ] Computer Science [cs]/Numerical Analysis [cs.NA]InfinitesimalComputationRigidity (psychology)02 engineering and technologyTheoretical Computer ScienceDependent and independent constraintsGeometric networks020901 industrial engineering & automation0202 electrical engineering electronic engineering information engineeringConstraint solvingMathematicsGeometric transformationWitness configuration020207 software engineering[INFO.INFO-NA]Computer Science [cs]/Numerical Analysis [cs.NA]16. Peace & justiceWitnessComputer Science ApplicationsComputational Theory and MathematicsConstraint decompositionGraph (abstract data type)Infinitesimal motionsAlgorithmInformation SystemsVector space
researchProduct

Efficient Transport Protocol for Networked Haptics Applications

2008

The performance of haptic application is highly sensitive to communication delays and losses of data. It implies several constraints in developing networked haptic applications. This paper describes a new internet protocol called Efficient Transport Protocol (ETP), which aims at developing distributed interactive applications. TCP and UDP are transport protocols commonly used in any kind of networked communication, but they are not focused on real time application. This new protocol is focused on reducing roundtrip time (RTT) and interpacket gap (IPG). ETP is, therefore, optimized for interactive applications which are based on processes that are continuously exchanging data. ETP protocol i…

0209 industrial biotechnologySession Initiation ProtocolInternet Protocol Control Protocolcomputer.internet_protocolComputer scienceResource Reservation ProtocolLink Control ProtocolDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunications02 engineering and technologylaw.invention020901 industrial engineering & automationInternet protocol suitelawInternet Protocol0202 electrical engineering electronic engineering information engineeringUser Datagram ProtocolReal Time Streaming Protocolcomputer
researchProduct

Graph-theoretical derivation of brain structural connectivity

2020

Brain connectivity at the single neuron level can provide fundamental insights into how information is integrated and propagated within and between brain regions. However, it is almost impossible to adequately study this problem experimentally and, despite intense efforts in the field, no mathematical description has been obtained so far. Here, we present a mathematical framework based on a graph-theoretical approach that, starting from experimental data obtained from a few small subsets of neurons, can quantitatively explain and predict the corresponding full network properties. This model also changes the paradigm with which large-scale model networks can be built, from using probabilisti…

0209 industrial biotechnologyTheoretical computer scienceComputer scienceNeuronal network02 engineering and technologyMECHANISMSCENTRALITY020901 industrial engineering & automationSettore MAT/05 - Analisi MatematicaNeuronal networksConnectome0202 electrical engineering electronic engineering information engineeringINDEXComputer Science::DatabasesRandom graphsSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniSettore INF/01 - InformaticaQuantitative Biology::Neurons and CognitionApplied MathematicsProbabilistic logicExperimental data020206 networking & telecommunicationsComputational MathematicsSYNCHRONIZATIONSIMULATIONGraph (abstract data type)Applied Mathematics and Computation
researchProduct

Design and Calibration of a Specialized Polydioptric Camera Rig

2017

International audience; It has been observed in the nature that all creatures have evolved highly exclusive sensory organs depending on their habitat and the form of resources availability for their survival. In this project, a novel omnidirectional camera rig, inspired from natural vision sensors, is proposed. It is exclusively designed to operate for highly specified tasks in the field of mobile robotics. Navigation problems on uneven terrains and detection of the moving objects while the robot is itself in motion are the core problems that omnidirectional systems tackle. The proposed omnidirectional system is a compact and a rigid vision system with dioptric cameras that provide a 360° f…

0209 industrial biotechnologydepthComputer Networks and CommunicationsMachine visionComputer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONstereo-vision02 engineering and technologylcsh:QA75.5-76.95020901 industrial engineering & automationOmnidirectional cameraArtificial Intelligence[ INFO.INFO-TI ] Computer Science [cs]/Image Processing0202 electrical engineering electronic engineering information engineeringStructure from motionComputer visionSmart cameraComputingMethodologies_COMPUTERGRAPHICSpolydioptricstructure from motionbusiness.industryRGB-DRoboticscalibrationomnidirectionalStereopsisHardware and ArchitectureICT[INFO.INFO-TI]Computer Science [cs]/Image Processing [eess.IV][SPI.OPTI]Engineering Sciences [physics]/Optics / PhotonicRobot020201 artificial intelligence & image processinglcsh:Electronic computers. Computer scienceArtificial intelligence[ SPI.OPTI ] Engineering Sciences [physics]/Optics / PhotonicbusinessSoftwareStereo cameraInformation Systems
researchProduct

Input Selection Methods for Soft Sensor Design: A Survey

2020

Soft Sensors (SSs) are inferential models used in many industrial fields. They allow for real-time estimation of hard-to-measure variables as a function of available data obtained from online sensors. SSs are generally built using industries historical databases through data-driven approaches. A critical issue in SS design concerns the selection of input variables, among those available in a candidate dataset. In the case of industrial processes, candidate inputs can reach great numbers, making the design computationally demanding and leading to poorly performing models. An input selection procedure is then necessary. Most used input selection approaches for SS design are addressed in this …

0209 industrial biotechnologylcsh:T58.5-58.64lcsh:Information technologyComputer Networks and CommunicationsComputer scienceFeature selectionprediction02 engineering and technologyFunction (mathematics)input selectionSoft sensorcomputer.software_genresoft sensor; inferential model; input selection; feature selection; regression; predictionfeature selection020901 industrial engineering & automationinferential model0202 electrical engineering electronic engineering information engineeringsoft sensorregression020201 artificial intelligence & image processingData miningInput selectioncomputerSelection (genetic algorithm)Future Internet
researchProduct

Aesthetic considerations for the min-max K-Windy Rural Postman Problem

2017

[EN] The aesthetic quality of routes is a feature of route planning that is of practical importance, but receives relatively little attention in the literature. Several practitioners have pointed out that the visual appeal of a proposed set of routes can have a strong influence on the willingness of a client to accept or reject a specific routing plan. While some work has analyzed algorithmic performance relative to traditional min-sum or min-max objective functions and aesthetic objective functions, we are not aware of any work that has considered a multi-objective approach. This work considers a multi-objective variant of the Min-Max K-Vehicles Windy Rural Postman Problem, discusses sever…

021103 operations researchComputer Networks and Communications0211 other engineering and technologiesMin-Max objective02 engineering and technologyMulti-Objective problemsCombinatoricsArc routing problemsAesthetic objectiveHardware and Architecture0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingMATEMATICA APLICADAHumanitiesSoftwareInformation SystemsMathematicsNetworks
researchProduct

Rough Set Theory for Optimization of Packet Management Mechanism in IP Routers

2020

Bandwidth and consequently optimum overall efficiency of network system relies greatly on mechanism of packet management in IP routers. Our research objective is to implement rough set theory to minimizing number of the network system attributes responsible for decision making in selection of those packets, which improve its transmission. Such an approach is called priority queuing system model, as we assign priority to the packets selected, following rough set theory. Regardless of the file format, for all the routers, packets are transmitted in sequence one-by-one. Nonetheless, quality of streaming data largely depends on how much the packet loss is minimized, or eliminated at all, if pos…

021103 operations researchNetwork packetComputer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSBandwidth (signal processing)0211 other engineering and technologies02 engineering and technologySystem modelIPv6Set (abstract data type)Transmission (telecommunications)Packet lossRough setbusinessComputer network
researchProduct

Secure and efficient verification for data aggregation in wireless sensor networks

2017

Summary The Internet of Things (IoT) concept is, and will be, one of the most interesting topics in the field of Information and Communications Technology. Covering a wide range of applications, wireless sensor networks (WSNs) can play an important role in IoT by seamless integration among thousands of sensors. The benefits of using WSN in IoT include the integrity, scalability, robustness, and easiness in deployment. In WSNs, data aggregation is a famous technique, which, on one hand, plays an essential role in energy preservation and, on the other hand, makes the network prone to different kinds of attacks. The detection of false data injection and impersonation attacks is one of the majo…

021110 strategic defence & security studiesComputer Networks and Communicationsbusiness.industryComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS0211 other engineering and technologiesEarly detection020206 networking & telecommunications02 engineering and technologyImpersonation attackComputer Science ApplicationsData aggregatorRobustness (computer science)Information and Communications TechnologySoftware deploymentScalability0202 electrical engineering electronic engineering information engineeringbusinessWireless sensor networkComputer networkInternational Journal of Network Management
researchProduct