Search results for "RDW"
showing 10 items of 1401 documents
Reconfigurable electrical interconnection strategies for photovoltaic arrays: A review
2014
Non-uniform irradiance significantly decreases the power delivered by solar photovoltaic arrays. A promising technique for compensating these power losses relies on dynamically reconfiguring the electrical connections between photovoltaic modules. This paper presents the current state-of-the-art strategies for photovoltaic array reconfiguration in order to increase the power output under partial shading and mismatch conditions. The different approaches have been compared in terms of effectiveness of the control algorithms, monitored electrical and environmental variables, overall hardware complexity and specific features of each solution. Finally, the most challenging aspects of the reconfi…
On the development of a communication-aware task mapping technique
2004
Clusters have become a very cost-effective platform for high-performance computing. In these systems, although currently existing networks actually provide enough bandwidth for the existing applications and workstations, the trend is towards the interconnection network becoming the system bottleneck. Therefore, in the future, scheduling strategies will have to take into account the communication requirements of the applications and the communication bandwidth that the network can offer. One of the key issues in these strategies is the task mapping technique used when the network becomes the system bottleneck.In this paper, we propose a communication-aware mapping technique that tries to mat…
Update of the Binoth Les Houches Accord for a standard interface between Monte Carlo tools and one-loop programs
2014
We present an update of the Binoth Les Houches Accord (BLHA) to standardise the interface between Monte Carlo programs and codes providing one-loop matrix elements.
Empathes: A general code for nudged elastic band transition states search
2022
Abstract An easy and flexible interface, Empathes (Extensible Minimum PATH EStimator), that allows to perform Nudged Elastic Band calculation for the determination of transition states is presented. The code is designed to be easily modified, in order to be associated with the user's preferred calculation software, even with those which implement composite approaches. In particular, the interfaces to Gaussian and Siesta programs are discussed in details, being the former only used for testing purpose, while the latter can be productively employed for transition states search with that commonly used density functional theory software for periodic calculations. Program summary Program Title: …
Formal verification of a Cooperative Automatic Repeat reQuest MAC protocol
2012
Author's version of an article published in the journal: Computer Standards & Interfaces. Also available from the publisher at: http://dx.doi.org/10.1016/j.csi.2011.12.001 Cooperative communications, in which a relay node helps the source node to deliver its packets to the destination node, are able to obtain significant benefits in terms of transmission reliability, coverage extension and energy efficiency. A Cooperative Automatic Repeat reQuest (C-ARQ) MAC protocol has been recently proposed to exploit cooperative diversity at the MAC layer. in this paper, we validate the integrity and the validity of the C-ARQ protocol using formal methods. The protocol logic is modeled in SDL and implem…
AI-IoT Platform for Blind Estimation of Room Acoustic Parameters Based on Deep Neural Networks
2023
Room acoustical parameters have been widely used to describe sound perception in indoor environments, such as concert halls, conference rooms, etc. Many of them have been standardized and often have a high computational demand. With the increasing presence of deep learning approaches in automatic monitoring systems, wireless acoustic sensor networks (WASNs) offer great potential to facilitate the estimation of such parameters. In this scenario, Convolutional Neural Networks (CNNs) offer significant reductions in the computational requirements for in-node parameter predictions, enabling the so-called Artificial Intelligence-Internet of Things (AI-IoT). In this paper, we describe the design a…
Fuzzy Logic, Knowledge and Natural Language
2012
This is an introductive study on what Fuzzy Logic is, on the difference between Fuzzy Logic and the other many-valued calculi and on the possible relationship between Fuzzy Logic and the complex sciences. Fuzzy Logic is nowadays a very popular logic methodology. Different kinds of applications in cybernetics, in software programming and its growing use in medicine seems to make Fuzzy Logic, according to someone, the “new” logic of science and technology. In his enthusiastic panegyric of Fuzzy Logic, Kosko (1993) argues that after thirty years from the birth of this calculus, it is time to declare the new era of Fuzzy Logic and to forget the old era of classical logic. I think that this poin…
A Trusted Hybrid Learning Approach to Secure Edge Computing
2021
Securing edge computing has drawn much attention due to the vital role of edge computing in Fifth Generation (5G) wireless networks. Artificial Intelligence (AI) has been adopted to protect networks against attackers targeting the connected edge devices or the wireless channel. However, the proposed detection mechanisms could generate a high false detection rate, especially against unknown attacks defined as zero-day threats. Thereby, we propose and conceive a new hybrid learning security framework that combines the expertise of security experts and the strength of machine learning to protect the edge computing network from known and unknown attacks, while minimizing the false detection rat…
Development of a Low-Cost IoT System for Lightning Strike Detection and Location
2019
Lightning and thunder are some of the most violent natural phenomena. They generate a great deal of expenditure and economic loss, especially when they strike in cities. The identification of the concrete geographic area where they strike is of critical importance for emergency services in order to enhance their effectiveness by doing an intensive coverage of the affected area. To achieve this purpose at the city scale, this paper proposes the design, prototype, and validation of a distributed network of Internet of Things (IoT) devices. The IoT devices are empowered with lightning detection capabilities and are synchronized with the other devices in the sensor network. All of them cooperat…
A Design Theory for Secure Information Systems Design Methods
2006
Many alternative methods for designing secure information systems (SIS) have been proposed to ensure system security. However, within all the literature on SIS methods, there exists little theoretically grounded work that addresses the fundamental requirements and goals of SIS design. This paper first uses design theory to develop a SIS design theory framework that defines six requirements for SIS design methods, and second, shows how known SIS design methods fail to satisfy these requirements. Third, the paper describes a SIS design method that does address these requirements and reports two empirical studies that demonstrate the validity of the proposed framework. peerReviewed