Search results for "Network"

showing 10 items of 7718 documents

Multiple Classifiers and Data Fusion for Robust Diagnosis of Gearbox Mixed Faults

2019

Detection and isolation of single and mixed faults in a gearbox are very important to enhance the system reliability, lifetime, and service availability. This paper proposes a hybrid learning algorithm, consisting of multilayer perceptron (MLP)- and convolutional neural network (CNN)-based classifiers, for diagnosis of gearbox mixed faults. Domain knowledge features are required to train the MLP classifier, while the CNN classifier can learn features itself, allowing to reduce the required knowledge features for the counterpart. Vibration data from an experimental setup with gearbox mixed faults is used to validate the effectiveness of the algorithms and compare them with conventional metho…

business.industryComputer science020208 electrical & electronic engineeringFeature extractionPattern recognition02 engineering and technologySensor fusionConvolutional neural networkComputer Science ApplicationsStatistical classificationControl and Systems EngineeringRobustness (computer science)Multilayer perceptron0202 electrical engineering electronic engineering information engineeringArtificial intelligenceElectrical and Electronic EngineeringbusinessClassifier (UML)Information SystemsIEEE Transactions on Industrial Informatics
researchProduct

Facilitating IP deployment in a MARTE-based MDE methodology using IP-XACT: a XILINX EDK case study

2012

International audience; In this paper we present framework for the deployment of hardware IPs at high-levels of abstraction. It is based in a model- driven approach that aims at the automatic generation of Dynamic Partial Reconfiguration designs created in Xilinx Platform Studio (XPS). Contrary to previous approaches, we make use of the IP-XACT standard to facilitate the deployment of hardware IPs, their parameterization and subsequent integration. We propose an extension to the MARTE profile for IP deployment, and we introduce the necessary model transformations to obtain a high- level representation from an IP-XACT component library. These models are then used to create a platform in MART…

business.industryComputer science020208 electrical & electronic engineeringHardware description languageControl reconfiguration020206 networking & telecommunications02 engineering and technology[INFO.INFO-ES] Computer Science [cs]/Embedded SystemsUnified Modeling LanguageSoftware deploymentEmbedded systemComponent (UML)IP-XACT0202 electrical engineering electronic engineering information engineeringSystem integration[INFO.INFO-ES]Computer Science [cs]/Embedded Systems[ INFO.INFO-ES ] Computer Science [cs]/Embedded SystemsbusinesscomputerImplementationcomputer.programming_language
researchProduct

Preliminary test on a cascode switch for high-frequency applications

2020

Nowadays, an increasing electrification level is being addressed towards different sectors, such as transportation and industrial electronics. To bear that, high speed electrical machines represent a mature technology in different application fields, e.g. avionics, automotive, compressors and spindles. In order to guarantee high speed while keeping high power quality without adopting bulky filtering circuits, DC-AC converters shall be controlled by means of high Pulse Width Modulation (PWM) frequencies. In addition to the emerging switching device technologies, such as those based on Silicon-Carbide (SiC) and Gallium-Nitride (GaN), alternative circuital topologies are crucial in order to co…

business.industryComputer science020209 energy020208 electrical & electronic engineeringElectrical engineeringHigh voltageTopology (electrical circuits)high frequency02 engineering and technologyCascode switching devicesSettore ING-IND/32 - Convertitori Macchine E Azionamenti ElettriciConvertersNetwork topology7. Clean energyhigh voltage devices0202 electrical engineering electronic engineering information engineeringCascodeElectronicsbusinesscascode switching devices; high frequency; high voltage devices; power transistorsPulse-width modulationpower transistorsElectronic circuit
researchProduct

Fusion of CNN and sparse representation for threat estimation near power lines and poles infrastructure using aerial stereo imagery

2021

Abstract Fires or electrical hazards and accidents can occur if vegetation is not controlled or cleared around overhead power lines, resulting in serious risks to people and property and significant costs to the community. There are numerous blackouts due to interfering the trees with the power transmission lines in hilly and urban areas. Power distribution companies are facing a challenge to monitor the vegetation to avoid blackouts and flash-over threats. Recently, several methods have been developed for vegetation monitoring; however, existing methods are either not accurate or could not provide better disparity map in the textureless region. Moreover, are not able to handle depth discon…

business.industryComputer science020209 energy05 social sciences02 engineering and technologySparse approximationBelief propagationConvolutional neural networkDynamic programmingDiscontinuity (linguistics)Electric power transmissionManagement of Technology and Innovation0502 economics and business0202 electrical engineering electronic engineering information engineeringmedicineOverhead (computing)Computer visionArtificial intelligenceBusiness and International Managementmedicine.symptombusinessVegetation (pathology)050203 business & managementApplied PsychologyTechnological Forecasting and Social Change
researchProduct

Building Information Modeling (BIM) Enabled Facilities Management Using Hadoop Architecture

2017

International audience; Protecting the safety of occupants and the environment is a core value within Facilities Management. Data acquisition systems such as wireless sensor networks can help to monitor facilities to reduce hazards such as fire, water flooding and burglaries. Building Information Modeling (BIM) is a revolutionary development that is reshaping the Architecture Engineering and Construction (AEC) industry. BIM is both a process and a technology, offers wide solutions for facilities management. In order to monitor and manage facilities data in a BIM based simulated environment, this work reports upon a development of a system that uses BIM software and a wireless sensor technol…

business.industryComputer science020209 energyData managementBig data0211 other engineering and technologiesIntegration02 engineering and technology[SPI.TRON] Engineering Sciences [physics]/Electronics[SPI.TRON]Engineering Sciences [physics]/ElectronicsFacility managementData visualizationData acquisitionBuilding information modeling021105 building & constructionManagement system0202 electrical engineering electronic engineering information engineeringSystems engineeringbusinessWireless sensor network
researchProduct

Design and implementation of a long-range low-power wake-up radio and customized DC-MAC protocol for LoRaWAN

2019

In this paper, we present the design and implementation of a long-rage wake-up radio (WuR) and customized duty cycled (DC) MAC protocol for wireless IoT devices. The WuRx achieves a sensivity of −70 dBm by consuming just 0.032 mA, thereby optimizing the energy consumption of battery powered long-range wireless IoT devices. Reducing the power consumption of these devices minimizes the overall costs when deployed in large scale.

business.industryComputer science05 social sciencesBattery (vacuum tube)050801 communication & media studies020206 networking & telecommunications02 engineering and technologyEnergy consumptionPower (physics)0508 media and communicationsPower consumptionEmbedded systemRange (aeronautics)0202 electrical engineering electronic engineering information engineeringWirelessbusinessInternet of ThingsProtocol (object-oriented programming)2019 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)
researchProduct

WiHAR : From Wi-Fi Channel State Information to Unobtrusive Human Activity Recognition

2020

A robust and unobtrusive human activity recognition system is essential to a multitude of applications, such as health care, active assisted living, robotics, sports, and tele-immersion. Existing well-performing activity recognition methods are either vision- or wearable sensor-based. However, they are not fully passive. In this paper, we develop WiHAR—an unobtrusive Wi-Fi-based activity recognition system. WiHAR uses the Wi-Fi network interface card to capture the channel state information (CSI) data. These CSI data are effectively processed, and then amplitude and phase information is used to obtain the spectrogram. In the subsequent step, the time-variant mean Doppler shift (MDS) caused …

business.industryComputer science05 social sciencesDecision treeWearable computer050801 communication & media studies020206 networking & telecommunicationsComputingMilieux_LEGALASPECTSOFCOMPUTING02 engineering and technologyLinear discriminant analysisActivity recognitionSupport vector machine0508 media and communicationsChannel state information0202 electrical engineering electronic engineering information engineeringSpectrogramComputer visionArtificial intelligencebusinessVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550
researchProduct

Towards the definitive evaluation framework for cross-platform app development approaches

2019

Abstract Mobile app development is hindered by device fragmentation and vendor-specific modifications. Boundaries between devices blur with PC-tablet hybrids on the one side and wearables on the other. Future apps need to support a host of app-enabled devices with differing capabilities, along with their software ecosystems. Prior work on cross-platform app development concerned concepts and prototypes, and compared approaches that target smartphones. To aid choosing an appropriate framework and to support the scientific assessment of approaches, an up-to-date comparison framework is needed. Extending work on a holistic, weighted set of assessment criteria, we propose what could become the …

business.industryComputer science05 social sciencesWearable computer020207 software engineering02 engineering and technologyData scienceVDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420Variety (cybernetics)Market fragmentationSoftwareHardware and Architecture0502 economics and businessCross-platform0202 electrical engineering electronic engineering information engineeringWeb applicationbusinessSet (psychology)Host (network)050203 business & managementSoftwareInformation Systems
researchProduct

Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets

2021

International audience; With the Internet's unprecedented growth and nations' reliance on computer networks, new cyber‐attacks are created every day as means for achieving financial gain, imposing political agendas, and developing cyberwarfare arsenals. Network security is thus acquiring increasing attention among researchers, practitioners, network architects, policy makers, and others. To defend organizations' networks from existing, foreseen, and future threats, intrusion detection systems (IDSs) are becoming a must. Existing surveys on anomaly‐based IDS (AIDS) focus on specific components such as detection mechanisms and lack many others. In contrast to existing surveys, this article co…

business.industryComputer scienceAnomaly (natural sciences)020206 networking & telecommunications02 engineering and technologyIntrusion detection system[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]Computer securitycomputer.software_genre[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR][INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingThe Internet[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Electrical and Electronic Engineering[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businesscomputer
researchProduct

Medium access in WiFi networks: strategies of selfish nodes [Applications Corner]

2009

This article provides a game theoretical analysis of the WiFi MAC protocol to understand the risks or the advantages offered by possible modifications of MAC functionalities implemented at the driver level.

business.industryComputer scienceApplied MathematicsComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSSignal ProcessingWireless lanThroughputMobile telephonyElectrical and Electronic EngineeringbusinessGame theoryProtocol (object-oriented programming)Computer networkIEEE Signal Processing Magazine
researchProduct