Search results for "RDW"

showing 10 items of 1401 documents

Reconfigurable electrical interconnection strategies for photovoltaic arrays: A review

2014

Non-uniform irradiance significantly decreases the power delivered by solar photovoltaic arrays. A promising technique for compensating these power losses relies on dynamically reconfiguring the electrical connections between photovoltaic modules. This paper presents the current state-of-the-art strategies for photovoltaic array reconfiguration in order to increase the power output under partial shading and mismatch conditions. The different approaches have been compared in terms of effectiveness of the control algorithms, monitored electrical and environmental variables, overall hardware complexity and specific features of each solution. Finally, the most challenging aspects of the reconfi…

InterconnectionEngineeringRenewable Energy Sustainability and the Environmentbusiness.industryReconfiguration algorithmPhotovoltaic systemMPPTPhotovoltaic arraysControl reconfigurationSettore ING-IND/32 - Convertitori Macchine E Azionamenti ElettriciElectrical mismatchMaximum power point trackingReconfigurable photovoltaic arrayPower (physics)Partial shadingSettore ING-IND/33 - Sistemi Elettrici Per L'EnergiaSettore ING-IND/31 - ElettrotecnicaHardware complexityElectronic engineeringTCTPower outputSwitching matrixbusiness
researchProduct

On the development of a communication-aware task mapping technique

2004

Clusters have become a very cost-effective platform for high-performance computing. In these systems, although currently existing networks actually provide enough bandwidth for the existing applications and workstations, the trend is towards the interconnection network becoming the system bottleneck. Therefore, in the future, scheduling strategies will have to take into account the communication requirements of the applications and the communication bandwidth that the network can offer. One of the key issues in these strategies is the task mapping technique used when the network becomes the system bottleneck.In this paper, we propose a communication-aware mapping technique that tries to mat…

InterconnectionWorkstationbusiness.industryComputer scienceDistributed computingLoad balancing (computing)BottleneckNetwork traffic controllaw.inventionScheduling (computing)Network simulationHardware and ArchitecturelawTimestampbusinessSoftwareComputer networkJournal of Systems Architecture
researchProduct

Update of the Binoth Les Houches Accord for a standard interface between Monte Carlo tools and one-loop programs

2014

We present an update of the Binoth Les Houches Accord (BLHA) to standardise the interface between Monte Carlo programs and codes providing one-loop matrix elements.

Interface (Java)Computer scienceCollider physics530 PhysicsMonte Carlo methodGeneral Physics and AstronomyFOS: Physical sciences10192 Physics Institute01 natural sciencesComputational scienceMatrix (mathematics)AutomationPhysics and Astronomy (all)High Energy Physics - Phenomenology (hep-ph)Collider physic0103 physical sciencesStatistical physics010306 general physicsCollider physicsParticle Physics - PhenomenologyMonte Carlo programNLO computationNLO computationsLOOP (programming language)010308 nuclear & particles physics1708 Hardware and ArchitectureMonte Carlo programsLes Houches Accord3100 General Physics and AstronomyHigh Energy Physics - PhenomenologyHardware and Architecture[PHYS.HPHE]Physics [physics]/High Energy Physics - Phenomenology [hep-ph]Computer Science::Programming Languagesddc:004
researchProduct

Empathes: A general code for nudged elastic band transition states search

2022

Abstract An easy and flexible interface, Empathes (Extensible Minimum PATH EStimator), that allows to perform Nudged Elastic Band calculation for the determination of transition states is presented. The code is designed to be easily modified, in order to be associated with the user's preferred calculation software, even with those which implement composite approaches. In particular, the interfaces to Gaussian and Siesta programs are discussed in details, being the former only used for testing purpose, while the latter can be productively employed for transition states search with that commonly used density functional theory software for periodic calculations. Program summary Program Title: …

Interface (Java)business.industryComputer scienceFortranGaussianNEBGeneral Physics and AstronomySiestaComputational sciencesymbols.namesakeSoftwareHardware and ArchitectureChemical reactionsPath (graph theory)symbolsSIESTA (computer program)businessRealization (systems)Reactive systemcomputercomputer.programming_languageComputer Physics Communications
researchProduct

Formal verification of a Cooperative Automatic Repeat reQuest MAC protocol

2012

Author's version of an article published in the journal: Computer Standards & Interfaces. Also available from the publisher at: http://dx.doi.org/10.1016/j.csi.2011.12.001 Cooperative communications, in which a relay node helps the source node to deliver its packets to the destination node, are able to obtain significant benefits in terms of transmission reliability, coverage extension and energy efficiency. A Cooperative Automatic Repeat reQuest (C-ARQ) MAC protocol has been recently proposed to exploit cooperative diversity at the MAC layer. in this paper, we validate the integrity and the validity of the C-ARQ protocol using formal methods. The protocol logic is modeled in SDL and implem…

Internet Protocol Control Protocolcomputer.internet_protocolComputer scienceVDP::Mathematics and natural science: 400::Information and communication science: 420::Algorithms and computability theory: 422Distributed computingAutomatic repeat requestGeneral Inter-ORB ProtocolData_CODINGANDINFORMATIONTHEORYInternet protocol suitefinite model-checkingComputer Science::Networking and Internet ArchitecturePROMELAComputer Science::Information Theorybusiness.industryNode (networking)Link Control ProtocolComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKScooperative communicationsCooperative diversityprotocol verificationHardware and ArchitecturebusinessLawcomputerSoftwareReverse Address Resolution ProtocolComputer networkComputer Standards & Interfaces
researchProduct

AI-IoT Platform for Blind Estimation of Room Acoustic Parameters Based on Deep Neural Networks

2023

Room acoustical parameters have been widely used to describe sound perception in indoor environments, such as concert halls, conference rooms, etc. Many of them have been standardized and often have a high computational demand. With the increasing presence of deep learning approaches in automatic monitoring systems, wireless acoustic sensor networks (WASNs) offer great potential to facilitate the estimation of such parameters. In this scenario, Convolutional Neural Networks (CNNs) offer significant reductions in the computational requirements for in-node parameter predictions, enabling the so-called Artificial Intelligence-Internet of Things (AI-IoT). In this paper, we describe the design a…

InternetComputer Networks and CommunicationsHardware and ArchitectureInformàticaSignal ProcessingComputer Science ApplicationsInformation SystemsIEEE Internet of Things Journal
researchProduct

Fuzzy Logic, Knowledge and Natural Language

2012

This is an introductive study on what Fuzzy Logic is, on the difference between Fuzzy Logic and the other many-valued calculi and on the possible relationship between Fuzzy Logic and the complex sciences. Fuzzy Logic is nowadays a very popular logic methodology. Different kinds of applications in cybernetics, in software programming and its growing use in medicine seems to make Fuzzy Logic, according to someone, the “new” logic of science and technology. In his enthusiastic panegyric of Fuzzy Logic, Kosko (1993) argues that after thirty years from the birth of this calculus, it is time to declare the new era of Fuzzy Logic and to forget the old era of classical logic. I think that this poin…

Interpretation (logic)business.industryPhilosophyClassical logicProbabilistic logicVaguenessSettore M-FIL/02 - Logica E Filosofia Della ScienzaFuzzy logicFuzzy Logic Knowledge Natural Language SetTheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGESOntologyCyberneticsComputingMethodologies_GENERALArtificial intelligencebusinessNatural languageHardware_LOGICDESIGN
researchProduct

A Trusted Hybrid Learning Approach to Secure Edge Computing

2021

Securing edge computing has drawn much attention due to the vital role of edge computing in Fifth Generation (5G) wireless networks. Artificial Intelligence (AI) has been adopted to protect networks against attackers targeting the connected edge devices or the wireless channel. However, the proposed detection mechanisms could generate a high false detection rate, especially against unknown attacks defined as zero-day threats. Thereby, we propose and conceive a new hybrid learning security framework that combines the expertise of security experts and the strength of machine learning to protect the edge computing network from known and unknown attacks, while minimizing the false detection rat…

Intrustion Detection: Computer science [C05] [Engineering computing & technology]Monitoringbusiness.industryComputer scienceFeature extractionHybrid learningServersHybrid learning: Sciences informatiques [C05] [Ingénierie informatique & technologie]Computer Science ApplicationsImage edge detectionHuman-Computer Interaction[SPI]Engineering Sciences [physics]Hardware and ArchitectureServerSecurityEdge ComputingFeature extractionEnginesElectrical and Electronic Engineeringbusiness5GEdge computingComputer network
researchProduct

Development of a Low-Cost IoT System for Lightning Strike Detection and Location

2019

Lightning and thunder are some of the most violent natural phenomena. They generate a great deal of expenditure and economic loss, especially when they strike in cities. The identification of the concrete geographic area where they strike is of critical importance for emergency services in order to enhance their effectiveness by doing an intensive coverage of the affected area. To achieve this purpose at the city scale, this paper proposes the design, prototype, and validation of a distributed network of Internet of Things (IoT) devices. The IoT devices are empowered with lightning detection capabilities and are synchronized with the other devices in the sensor network. All of them cooperat…

IoTComputer Networks and CommunicationsComputer scienceLightning (connector)Real-time computing0211 other engineering and technologies02 engineering and technology01 natural scienceslaw.inventionlaw0103 physical sciencesElectrical and Electronic Engineering010306 general physicsLightning detection021110 strategic defence & security studiesThunderLightningsensor designLightning strikeHardware and ArchitectureControl and Systems EngineeringSignal Processinglightning detection and locationTrilaterationWireless sensor networkFIWAREElectronics
researchProduct

A Design Theory for Secure Information Systems Design Methods

2006

Many alternative methods for designing secure information systems (SIS) have been proposed to ensure system security. However, within all the literature on SIS methods, there exists little theoretically grounded work that addresses the fundamental requirements and goals of SIS design. This paper first uses design theory to develop a SIS design theory framework that defines six requirements for SIS design methods, and second, shows how known SIS design methods fail to satisfy these requirements. Third, the paper describes a SIS design method that does address these requirements and reports two empirical studies that demonstrate the validity of the proposed framework. peerReviewed

Iterative designComputer scienceDistributed computingAxiomatic designComputer Science ApplicationsHardware_GENERALSystems engineeringDesigntheorySystems designProbabilistic designIDEF4Design methodsInformation SystemsDesign technologyHardware_LOGICDESIGN
researchProduct