Search results for "Robustness"

showing 10 items of 512 documents

Open-Loop Drug Delivery Strategy to the Cochlea using a Permanent Magnetic Actuator

2018

International audience; The use of robotic devices for drug delivery in sensitive area of the human body is an innovative and reliable solution. Most of them use magnetics fields, to steer micro-nanorobots into diseases locations. In this study, we use a magnetic actuator based on two permanent magnets as an end-effector of a robotic manipulator. The actuator offers the possibility to generate both pushing and pulling forces on the magnetic actuator axis in an open-loop control way. We describe in this paper the robotic drug delivery strategy that we implemented in a 6 degree of freedom robotic manipulator to push and to steer a magnetic microparticle from the round window to the apex of th…

Round windowComputer scienceROUND WINDOW MEMBRANE[INFO.INFO-RB] Computer Science [cs]/Robotics [cs.RO]Open-loop controllerRobot manipulator02 engineering and technology021001 nanoscience & nanotechnologyequipment and supplies[SPI.AUTO]Engineering Sciences [physics]/Automatic[SPI.AUTO] Engineering Sciences [physics]/Automaticmedicine.anatomical_structureControl theoryRobustness (computer science)Magnet[INFO.INFO-AU]Computer Science [cs]/Automatic Control EngineeringDrug deliverymedicineRobot[INFO.INFO-RB]Computer Science [cs]/Robotics [cs.RO]0210 nano-technologyActuator[INFO.INFO-AU] Computer Science [cs]/Automatic Control Engineeringhuman activities
researchProduct

Securing AODV routing protocol against black hole attack in MANET using outlier detection scheme

2017

Imposing security in MANET is very challenging and hot topic of research science last two decades because of its wide applicability in applications like defense. Number of efforts has been made in this direction. But available security algorithms, methods, models and framework may not completely solve this problem. Motivated from various existing security methods and outlier detection, in this paper novel simple but efficient outlier detection scheme based security algorithm is proposed to protect the Ad hoc on demand distance vector (AODV) reactive routing protocol from Black hole attack in mobile ad hoc environment. Simulation results obtained from network simulator tool evident the simpl…

Routing protocolDistance-vector routing protocolRobustness (computer science)business.industryPacket drop attackAd hoc On-Demand Distance Vector RoutingComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSAnomaly detectionMobile ad hoc networkbusinessComputer networkNetwork simulation2017 4th IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics (UPCON)
researchProduct

Reliable Data Gathering in Tree-Based IEEE 802.15.4 Wireless Sensor Networks

2007

This paper describes a routing protocol for enhanced robustness in IEEE 802.15.4-based sensor networks, which also addresses typical MAC layer issues, including power management, synchronization and link reliability. The algorithm uses a single-path strategy in error-free scenarios and resorts to using alternative paths when communication errors are detected. Our proposal exploits implicit acknowledgement of reception, a feature which may be provided by data aggregation when a broadcast medium such as the wireless channel is used. Therefore MAC layer acknowledgements are not used and errors recovery relies on a caching and retransmission strategy. The protocol requires synchronization among…

Routing protocolSettore ING-INF/05 - Sistemi Di Elaborazione Delle Informazionibusiness.industryComputer scienceDistributed computingReliability (computer networking)RetransmissionComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSNetwork allocation vectorWireless sensor networksRobustness (computer science)WirelessbusinessWireless sensor networkIEEE 802.15Computer network
researchProduct

A gray-level 2D feature detector using circular statistics

1997

Abstract This paper presents a new method for corner and circular feature detection in gray-level images. It is based on the application of standard statistical techniques to the distribution of gradient orientations in a circular neighborhood of the prospective feature point. An evaluation using standard procedures and a comparison with other approaches is presented. Results show the robustness of this method as compared to the other corner detectors analyzed. The main novelties are the possibility of detecting points that are centers of circular symmetries, and discriminating between junctions, which are classified into corners (two-edge junctions) and multiple edge junctions.

Scene analysisbusiness.industryDetectorPattern recognitionImage segmentationGray levelArtificial IntelligenceRobustness (computer science)Signal ProcessingComputer Vision and Pattern RecognitionArtificial intelligencebusinessFeature detectionSoftwareMathematicsPattern Recognition Letters
researchProduct

Adaptive Control Design for Underactuated Cranes With Guaranteed Transient Performance: Theoretical Design and Experimental Verification

2022

For antiswing control of underactuated cranes, how to guarantee the converging speed of cranes through control design is essential but still remains unsolved. In this paper, the adaptive antiswing control for underactuated gantry cranes with guaranteed transient performance under unmodeled dynamics and external disturbances is investigated. To sovle this problem, a set of filters are proposed to make the backstepping technique applicable for the control of crane systems. Then through variable transformation the position error and swing angel could be guaranteed converging to the origin with a given exponential speed. Hardware experiments are conducted to show that the proposed scheme achiev…

Scheme (programming language)Adaptive controlComputer scienceUnderactuationVDP::Technology: 500::Mechanical engineering: 570SwingExponential functionControl and Systems EngineeringRobustness (computer science)Control theoryBacksteppingTransient (oscillation)Electrical and Electronic Engineeringcomputercomputer.programming_languageIEEE Transactions on Industrial Electronics
researchProduct

Market Timing with a Robust Moving Average

2015

In this paper we entertain a method of finding the most robust moving average weighting scheme to use for the purpose of timing the market. Robustness of a weighting scheme is defined its ability to generate sustainable performance under all possible market scenarios regardless of the size of the averaging window. The method is illustrated using the long-run historical data on the Standard and Poor's Composite stock price index. We find the most robust moving average weighting scheme, demonstrates its advantages, and discuss its practical implementation.

Scheme (programming language)Moving averageRobustness (computer science)Technical analysisEconometricsEconomicsStock price indexA-weightingMarket timingcomputercomputer.programming_languageWeightingSSRN Electronic Journal
researchProduct

Entanglement robustness via spatial deformation of identical particle wave functions

2021

We address the problem of entanglement protection against surrounding noise by a procedure suitably exploiting spatial indistinguishability of identical subsystems. To this purpose, we take two initially separated and entangled identical qubits interacting with two independent noisy environments. Three typical models of environments are considered: amplitude damping channel, phase damping channel and depolarizing channel. After the interaction, we deform the wave functions of the two qubits to make them spatially overlap before performing spatially localized operations and classical communication (sLOCC) and eventually computing the entanglement of the resulting state. This way, we show tha…

ScienceQC1-999Entanglement protection Indistinguishable particles Open quantum systemsFOS: Physical sciencesGeneral Physics and AstronomyQuantum entanglementAstrophysics01 natural sciencesNoise (electronics)Settore ING-INF/01 - ElettronicaArticleSettore FIS/03 - Fisica Della Materia010305 fluids & plasmasWave–particle dualityRobustness (computer science)0103 physical sciencesStatistical physics010306 general physicsAmplitude damping channelQuantumPhysicsQuantum Physicsentanglement protectionPhysicsQindistinguishable particlesopen quantum systemsQuantum PhysicsQB460-466QubitQuantum Physics (quant-ph)Communication channel
researchProduct

Am I riskier if I rescue my banks? Beyond the effects of bailouts

2021

Abstract We examine the relationship between bank bailouts and sovereign risk in 35 countries and 19 bailouts from 2005 to 2015. Bailouts negatively affect sovereign ratings, with rating agencies consistently perceiving higher risk when a country’s banking system has been rescued (risk-increasing effect). The increase in public debt as a result of the bank bailouts is the main mechanism through which the risk-increasing effect occurs. Moreover, financial soundness and banking market structure shape the impact of bailouts on sovereign risk. In particular, proactiveness in undertaking public bailouts for banking systems that are largely distressed – that is, risky and low profitable – and hig…

Selection biasbusiness.industrymedia_common.quotation_subjectPublic sectorMonetary economicsMarket structureMomentum (finance)DebtEconomicsEndogeneityRobustness (economics)businessGeneral Economics Econometrics and FinanceFinanceCredit riskmedia_commonJournal of Financial Stability
researchProduct

Am I riskier if I rescue my banks? The unintended effects of bailouts

2021

We examine the relationship between bank bailouts and sovereign risk in 35 countries and 19 bailouts during 2005–2015. Bailouts negatively affect sovereign ratings, with rating agencies consistently perceiving higher risk when the country’s banking system has been rescued (risk-increasing effect). Financial soundness and banking market structure shape the impact of bailouts on sovereign risk. In particular, proactiveness in undertaking public bailouts for banking systems that are largely distressed -risky and low profitable- and highly concentrated seems to lead to lower increases in sovereign risk. However, the strength of the connection between the public sector and the banking system nei…

Selection biasbusiness.industrymedia_common.quotation_subjectPublic sectorProactivityMonetary economicsMarket structureMomentum (finance)EconomicsEndogeneityRobustness (economics)businessmedia_commonCredit riskSSRN Electronic Journal
researchProduct

Quantifying Mean Shape and Variability of Footprints Using Mean Sets

2005

This paper1 presents an application of several definitions of a mean set for use in footwear design. For a given size, footprint pressure images corresponding to different individuals constitute our raw data. Appropriate footwear design needs to have knowledge of some kind of typical footprint. Former methods based on contour relevant points are highly sensitive to contour noise; moreover, they lack repeatability because of the need for the intervention of human designers. The method proposed in this paper is based on using mean sets on the thresholded images of the pressure footprints. Three definitions are used, two of them from Vorob’ev and Baddeley-Molchanov and one morphological mean p…

Set (abstract data type)FootprintComputer scienceRobustness (computer science)business.industryPattern recognitionNoise (video)RepeatabilityArtificial intelligenceRaw databusinessHighly sensitive
researchProduct