Search results for "Others"

showing 10 items of 524 documents

Artificial Intelligence in Protecting Smart Building’s Cloud Service Infrastructure from Cyberattacks

2020

Gathering and utilizing stored data is gaining popularity and has become a crucial component of smart building infrastructure. The data collected can be stored, for example, into private, public, or hybrid cloud service infrastructure or distributed service by utilizing data platforms. The stored data can be used when implementing services, such as building automation (BAS). Cloud services, IoT sensors, and data platforms can face several kinds of cybersecurity attack vectors such as adversarial, AI-based, DoS/DDoS, insider attacks. If a perpetrator can penetrate the defenses of a data platform, she can cause significant harm to the system. For example, the perpetrator can disrupt a buildin…

Computer scienceDenial-of-service attackCloud computingComputerApplications_COMPUTERSINOTHERSYSTEMStekoälyComputer securitycomputer.software_genreInsiderpilvipalvelutälytalotComponent (UML)cloud servicetietoturvakyberturvallisuusBuilding automationbusiness.industryattack vectorsartificial intelligencePopularityartificial-intelligence-based applicationsHeating systemälytekniikkabusinessdata platformCloud storagecomputerverkkohyökkäykset
researchProduct

Off-line Programming and simulation for automatic robot control software generation

2007

In this paper an off-line programming approach for welding robots is presented. The approach is based on the integration of a software tool for robot simulation and an user-friendly interface for automatic generation of the control program. The user can graphically arrange the components in a robotic work-cell and simulate the movements and operations of robotic arms before converting motions and operating sequences in controller-specific tasks. This methodology guarantees high level of flexibility of the robotic system when high variety of work-pieces needs to be welded. The approach has been implemented and tested in a real welding work-cell.

Computer scienceInterface (computing)ComputerApplications_COMPUTERSINOTHERSYSTEMSControl engineeringWeldingComputer simulationControl system analysisRobot applicationsRobotic armsSettore ING-IND/35 - Ingegneria Economico-GestionaleRobot controllaw.inventionRobot weldinglawRobotUser interfaceAutomatic programmingRobotic armSettore ING-IND/16 - Tecnologie E Sistemi Di LavorazioneSimulation
researchProduct

Grammars++ for modelling information in text

1999

Abstract Grammars provide a convenient means to describe the set of valid instances in a text database. Flexibility in choosing a grammar can be exploited to provide information modelling capability by designing productions in the grammar to represent entities and relationships of interest to database applications. Additional constraints can be specified by attaching predicates to selected nonterminals in the grammar. When used for database definition, grammars can provide the functionality that users have come to expect of database schemas. Extended grammars can also be used to specify database manipulation, including query, update, view definition, and index specification.

Computer scienceViewmedia_common.quotation_subjectComputerApplications_COMPUTERSINOTHERSYSTEMScomputer.software_genreQuery languageDatabase designAdaptive grammarRule-based machine translationmedia_commonGrammarProgramming languagebusiness.industryDatabase schemaPredicate (grammar)TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGESExtended Affix GrammarHardware and ArchitectureAffix grammarStochastic context-free grammarSynchronous context-free grammarArtificial intelligenceL-attributed grammarbusinesscomputerSoftwareNatural language processingInformation SystemsInformation Systems
researchProduct

Localization and Activity Classification of Unmanned Aerial Vehicle Using mmWave FMCW Radars

2021

In this article, we present a novel localization and activity classification method for aerial vehicle using mmWave frequency modulated continuous wave (FMCW) Radar. The localization and activity classification for aerial vehicle enables the utilization of mmWave Radars in security surveillance and privacy monitoring applications. In the proposed method, Radar’s antennas are oriented vertically to measure the elevation angle of arrival of the aerial vehicle from ground station. The height of the aerial vehicle and horizontal distance of the aerial vehicle from Radar station on ground are estimated using the measured radial range and the elevation angle of arrival. The aerial vehicle’s activ…

Computer sciencebusiness.industryComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONComputerApplications_COMPUTERSINOTHERSYSTEMSConvolutional neural networklaw.inventionSupport vector machinelawActivity classificationChirpRange (statistics)Computer visionGradient boostingArtificial intelligenceElectrical and Electronic EngineeringRadarbusinessInstrumentationEdge computingIEEE Sensors Journal
researchProduct

Adaptive Vehicle Mode Monitoring Using Embedded Devices with Accelerometers

2012

Monitoring of specific attributes such as vehicle speed and fuel consumption as well as cargo safety is an important problem for transport domain. This task is performed using specific multiagent monitoring systems. To ensure secure operation of such systems they should have autonomous and adaptive behaviour.

Computer sciencebusiness.industryReal-time computingComputerApplications_COMPUTERSINOTHERSYSTEMSMonitoring systemAccelerometerDomain (software engineering)Task (project management)Mode (computer interface)Adaptive behaviourEmbedded systemFuel efficiencyAccelerometer databusiness
researchProduct

Study of a Self-Contained Electro-Hydraulic Cylinder Drive

2018

Self-contained electro-hydraulic cylinders that can be powered just by an electrical wire will be popular in the coming years. Combining electrical-drives and hydraulic cylin- ders exploits some excellent properties of these two technologies and enables flexible implementation. To fully benefit from such a drive solution, there is the need to develop electro-hydraulic cylinders capable of operating independently as opposed to standard hydraulic systems that are connected to a central power supply. Therefore, this paper presents a numerical investigation of a self-contained electro-hydraulic cylinder with passive load- holding capability. The corresponding dynamic model is proposed and used …

Computer sciencelawElectrical wireMechanical engineeringComputerApplications_COMPUTERSINOTHERSYSTEMSHydraulic machineryActuatorElectro hydraulicCylinder (engine)law.inventionPower (physics)2018 Global Fluid Power Society PhD Symposium (GFPS)
researchProduct

An optimization approach for communal home meal delivery service

2009

Abstract: This paper is the first to discuss the communal home meal delivery problem. The problem can be modelled as a multiple travelling salesman problem with time windows, that is closely related to the well-studied vehicle routing problem with time windows. Experimental results are reported for a real-life case study from Central Finland over several alternative scenarios using the SPIDER commercial solver. The comparison with current practice reveals that a significant savings potential can be obtained using off-the-shelf optimization tools. As such, the potential for supporting real-life communal routing problems can be considered to be important for VRP practitioners.

Computer. AutomationService (systems architecture)Operations researchApplied MathematicsComputerApplications_COMPUTERSINOTHERSYSTEMSTransportationSolver/dk/atira/pure/sustainabledevelopmentgoals/responsible_consumption_and_productionTravelling salesman problemVehicle routingComputational MathematicsCurrent practiceTime windowsVehicle routing problemHome deliveryHeuristicsRouting (electronic design automation)SDG 12 - Responsible Consumption and ProductionMathematicsMathematicsJournal of computational and applied mathematics
researchProduct

MODERN COMMUNICATION MANAGEMENT USING IT&C STRATEGY

2012

Businesses are based on communication, which allows a `whole` to function. The `whole` can be an individual, a team, a community, a nation, a system, the global population. Those that master communication, to perfection, can become `winners` - in the sense that they can look confidently towards the future and can be those who manifest themselves which make them continuously succeed. Communication can be a problem of trust and acceptance or rejection of other people`s ideas and feelings and it requires abilities, and developing abilities requires practice. Supervising the general tendencies inside and outside an organization is achieved through communication in order to be sure that the stra…

ComputerApplications_COMPUTERSINOTHERSYSTEMSRevista economica
researchProduct

THE LOW-COST AIRLINES` IMPACT ON THE BEHAVIOR OF THE PASSENGERS FROM NORTH-EASTERN ROMANIA

2012

In Romania, the low-cost airlines represent a relatively new branch in this industry. The purposes of the present paper are to identify the consumption behavior of the Romanian passengers from the north-Eastern part of the country, related to the type of the airline they prefer to use: low-cost or legacy carrier, to analyze the reasons of their choice and to determine the profile of the clients that travel more with low-cost operators and, respectively, with the legacy ones. To achieve these objectives, we have conducted a theoretical investigation of the specialized literature and an empirical research on the Romanian passengers.

ComputerApplications_COMPUTERSINOTHERSYSTEMSRevista economica
researchProduct

A legal and economic analysis of the concept of anticipatory breach under the CISG

2021

Contractual remedies are traditionally available after the breach of a contract, but can a party suspecting non-performance prior to the date of performance entitled to seek for remedies? The United Nations Convention on the International Sale of Goods (CISG), regulates the doctrine of anticipatory breach in Articles 71-73, outlining the circumstances in which an anticipatory breach is deemed to occur and the remedies available to the aggrieved party. The Convention entitles the innocent party to the right to suspend or avoid but it contains unambiguous terms in need for interpretation. Additionally, the doctrine of anticipatory breach begs the questions of economic efficiency, a fundamenta…

ComputerApplications_COMPUTERSINOTHERSYSTEMSComputingMilieux_LEGALASPECTSOFCOMPUTING:LAW/JURISPRUDENCE::Other law::International law [Research Subject Categories]:LAW/JURISPRUDENCE::Private law::Commercial and company law [Research Subject Categories]Contract law
researchProduct