Search results for "Network"
showing 10 items of 7718 documents
Multiple Classifiers and Data Fusion for Robust Diagnosis of Gearbox Mixed Faults
2019
Detection and isolation of single and mixed faults in a gearbox are very important to enhance the system reliability, lifetime, and service availability. This paper proposes a hybrid learning algorithm, consisting of multilayer perceptron (MLP)- and convolutional neural network (CNN)-based classifiers, for diagnosis of gearbox mixed faults. Domain knowledge features are required to train the MLP classifier, while the CNN classifier can learn features itself, allowing to reduce the required knowledge features for the counterpart. Vibration data from an experimental setup with gearbox mixed faults is used to validate the effectiveness of the algorithms and compare them with conventional metho…
Facilitating IP deployment in a MARTE-based MDE methodology using IP-XACT: a XILINX EDK case study
2012
International audience; In this paper we present framework for the deployment of hardware IPs at high-levels of abstraction. It is based in a model- driven approach that aims at the automatic generation of Dynamic Partial Reconfiguration designs created in Xilinx Platform Studio (XPS). Contrary to previous approaches, we make use of the IP-XACT standard to facilitate the deployment of hardware IPs, their parameterization and subsequent integration. We propose an extension to the MARTE profile for IP deployment, and we introduce the necessary model transformations to obtain a high- level representation from an IP-XACT component library. These models are then used to create a platform in MART…
Preliminary test on a cascode switch for high-frequency applications
2020
Nowadays, an increasing electrification level is being addressed towards different sectors, such as transportation and industrial electronics. To bear that, high speed electrical machines represent a mature technology in different application fields, e.g. avionics, automotive, compressors and spindles. In order to guarantee high speed while keeping high power quality without adopting bulky filtering circuits, DC-AC converters shall be controlled by means of high Pulse Width Modulation (PWM) frequencies. In addition to the emerging switching device technologies, such as those based on Silicon-Carbide (SiC) and Gallium-Nitride (GaN), alternative circuital topologies are crucial in order to co…
Fusion of CNN and sparse representation for threat estimation near power lines and poles infrastructure using aerial stereo imagery
2021
Abstract Fires or electrical hazards and accidents can occur if vegetation is not controlled or cleared around overhead power lines, resulting in serious risks to people and property and significant costs to the community. There are numerous blackouts due to interfering the trees with the power transmission lines in hilly and urban areas. Power distribution companies are facing a challenge to monitor the vegetation to avoid blackouts and flash-over threats. Recently, several methods have been developed for vegetation monitoring; however, existing methods are either not accurate or could not provide better disparity map in the textureless region. Moreover, are not able to handle depth discon…
Building Information Modeling (BIM) Enabled Facilities Management Using Hadoop Architecture
2017
International audience; Protecting the safety of occupants and the environment is a core value within Facilities Management. Data acquisition systems such as wireless sensor networks can help to monitor facilities to reduce hazards such as fire, water flooding and burglaries. Building Information Modeling (BIM) is a revolutionary development that is reshaping the Architecture Engineering and Construction (AEC) industry. BIM is both a process and a technology, offers wide solutions for facilities management. In order to monitor and manage facilities data in a BIM based simulated environment, this work reports upon a development of a system that uses BIM software and a wireless sensor technol…
Design and implementation of a long-range low-power wake-up radio and customized DC-MAC protocol for LoRaWAN
2019
In this paper, we present the design and implementation of a long-rage wake-up radio (WuR) and customized duty cycled (DC) MAC protocol for wireless IoT devices. The WuRx achieves a sensivity of −70 dBm by consuming just 0.032 mA, thereby optimizing the energy consumption of battery powered long-range wireless IoT devices. Reducing the power consumption of these devices minimizes the overall costs when deployed in large scale.
WiHAR : From Wi-Fi Channel State Information to Unobtrusive Human Activity Recognition
2020
A robust and unobtrusive human activity recognition system is essential to a multitude of applications, such as health care, active assisted living, robotics, sports, and tele-immersion. Existing well-performing activity recognition methods are either vision- or wearable sensor-based. However, they are not fully passive. In this paper, we develop WiHAR—an unobtrusive Wi-Fi-based activity recognition system. WiHAR uses the Wi-Fi network interface card to capture the channel state information (CSI) data. These CSI data are effectively processed, and then amplitude and phase information is used to obtain the spectrogram. In the subsequent step, the time-variant mean Doppler shift (MDS) caused …
Towards the definitive evaluation framework for cross-platform app development approaches
2019
Abstract Mobile app development is hindered by device fragmentation and vendor-specific modifications. Boundaries between devices blur with PC-tablet hybrids on the one side and wearables on the other. Future apps need to support a host of app-enabled devices with differing capabilities, along with their software ecosystems. Prior work on cross-platform app development concerned concepts and prototypes, and compared approaches that target smartphones. To aid choosing an appropriate framework and to support the scientific assessment of approaches, an up-to-date comparison framework is needed. Extending work on a holistic, weighted set of assessment criteria, we propose what could become the …
Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets
2021
International audience; With the Internet's unprecedented growth and nations' reliance on computer networks, new cyber‐attacks are created every day as means for achieving financial gain, imposing political agendas, and developing cyberwarfare arsenals. Network security is thus acquiring increasing attention among researchers, practitioners, network architects, policy makers, and others. To defend organizations' networks from existing, foreseen, and future threats, intrusion detection systems (IDSs) are becoming a must. Existing surveys on anomaly‐based IDS (AIDS) focus on specific components such as detection mechanisms and lack many others. In contrast to existing surveys, this article co…
Medium access in WiFi networks: strategies of selfish nodes [Applications Corner]
2009
This article provides a game theoretical analysis of the WiFi MAC protocol to understand the risks or the advantages offered by possible modifications of MAC functionalities implemented at the driver level.