Search results for "Network"
showing 10 items of 7718 documents
Poly[1-ethyl-3-methylimidazolium [tri-μ-isothiocyanato-manganate(II)]]
2019
The title compound, {(C9H11N2)[Mn(NCS)3]} n , has been obtained as a side product of the salt metathesis reaction of 1-ethyl-3-methylimidazolium bromide, (EMIm)Br, and K2[Mn(NCS)4]. The structure consists of discrete 1-ethyl-3-methylimidazolium cations and an anionic two-dimensional network of manganese(II)-based complex anions, interconnected by thiocyanate ions. Every Mn2+ ion is coordinated by three S atoms of three NCS− ions and three N atoms of further three NCS− ions in a meridional octahedral fashion.
Towards a "fingerprint" of paper network; separating forgeries from genuine by the properties of fibre structure
2014
A novel method is introduced for distinguishing counterfeit banknotes from genuine samples. The method is based on analyzing differences in the networks of paper fibers. The main tool is a curvelet-based algorithm for measuring the distribution of overall fiber orientation and quantifying its anisotropy. The use of a couple or more appropriate parameters makes it possible to distinguish forgeries from genuine samples as concentrated point clouds in a two- or three-dimensional parameter space. Furthermore, the techniques of making watermarks is investigated by comparing genuine and counterfeit e50 banknotes. In addition, the so-called wire markings are shown to differ significantly from each…
Towards digital cognitive clones for the decision-makers: adversarial training experiments
2021
Abstract There can be many reasons for anyone to make a digital copy (clone) of own decision-making behavior. This enables virtual presence of a professional decision-maker simultaneously in many places and processes of Industry 4.0. Such clone can be used as one’s responsible representative when the human is not available. Pi-Mind (“Patented Intelligence”) is a technology, which enables “cloning” cognitive skills of humans using adversarial machine learning. In this paper, we present a cyber-physical environment as an adversarial learning ecosystem for cloning image classification skills. The physical component of the environment is provided by the logistic laboratory with camera-surveilla…
Taxonomy of generative adversarial networks for digital immunity of Industry 4.0 systems
2021
Abstract Industry 4.0 systems are extensively using artificial intelligence (AI) to enable smartness, automation and flexibility within variety of processes. Due to the importance of the systems, they are potential targets for attackers trying to take control over the critical processes. Attackers use various vulnerabilities of such systems including specific vulnerabilities of AI components. It is important to make sure that inappropriate adversarial content will not break the security walls and will not harm the decision logic of critical systems. We believe that the corresponding security toolset must be organized as a trainable self-protection mechanism similar to immunity. We found cer…
The Effect of Damage Functions on Urban Flood Damage Appraisal
2014
Flooding damage appraisal can been obtained by interpolating real damage data caused by historical flooding events or accounting the effects of a flood in terms of the depreciation of assets. Most often, the expected damage is evaluated by means of damage functions describing the relationship occurring between the damage and hydraulic characteristics of flood. The present paper aims to evaluate the uncertainty linked to the choice of the depth-damage function adopted in the flood damage analysis. Several possible depth-damage function formulations were selected in literature and applied to historical flooding events monitored in the "Centro Storico" catchment in Palermo (Italy). (C) 2013 Th…
'Dark Ecological Network': strategically tackling light pollution for biodiversity and people
2021
Night-time light pollution from artificial sources can disrupt biological processes and fragment habitats. This study presents a new concept foraddressing the problem: a 'dark ecological network'. Its development involves mapping a new system of connected functional zones and corridors where dark can be preserved to help birds, bats and other taxa, and gives people the chance to experience starry skies.
Col : A Data Collection Protocol for Vanet
2012
International audience; In this paper, we present a protocol to collect data within a vehicular ad hoc network (VANET). In spite of the intrinsic dynamic of such network, our protocol simultaneously offers three relevant properties: (1) It allows any vehicle to collect data beyond its direct neighborhood (i.e., vehicles within direct communication range) using vehicle-to-vehicle communications only (i.e., the infrastructure is not required); (2) It tolerates possible network partitions; (3) It works on demand and stops when the data collection is achieved. To the best of our knowledge, this is the first collect protocol having these three characteristics. All that is chiefly obtained thanks…
UAV-Assisted Data Collection in Wireless Sensor Networks: A Comprehensive Survey
2021
Wireless sensor networks (WSNs) are usually deployed to different areas of interest to sense phenomena, process sensed data, and take actions accordingly. The networks are integrated with many advanced technologies to be able to fulfill their tasks that is becoming more and more complicated. These networks tend to connect to multimedia networks and to process huge data over long distances. Due to the limited resources of static sensor nodes, WSNs need to cooperate with mobile robots such as unmanned ground vehicles (UGVs), or unmanned aerial vehicles (UAVs) in their developments. The mobile devices show their maneuverability, computational and energy-storage abilities to support WSNs in mul…
LPV model identification for gain scheduling control: An application to rotating stall and surge control problem
2006
Abstract We approach the problem of identifying a nonlinear plant by parameterizing its dynamics as a linear parameter varying (LPV) model. The system under consideration is the Moore–Greitzer model which captures surge and stall phenomena in compressors. The control task is formulated as a problem of output regulation at various set points (stable and unstable) of the system under inputs and states constraints. We assume that inputs, outputs and scheduling parameters are measurable. It is worth pointing out that the adopted technique allows for identification of an LPV model's coefficients without the requirements of slow variations amongst set points. An example of combined identification…
Predicting the availability of users' devices in Decentralized Online Social Networks
2018
The understanding of the user temporal behavior is a crucial aspect for all those systems that rely on user resources for daily operations, such as decentralized online social networks (DOSNs). Indeed, DOSNs exploit the devices of their users to take on and share the tasks needed to provide services such as storing the published data. In the last years, the increasing popularity of DOSN services has changed the way of how people interact with each other by enabling users to connect to these services at any time by using their personal devices (such as notebooks or smartphones). As a result, the availability of data in these systems is strongly affected (or reflected) by the temporal behavio…