Search results for "Systems architecture"

showing 10 items of 227 documents

Hybrid architecture for shape reconstruction and object recognition

1998

The proposed architecture is aimed to recover 3-D- shape information from gray-level images of a scene; to build a geometric representation of the scene in terms of geometric primitives; and to reason about the scene. The novelty of the architecture is in fact the integration of different approaches: symbolic reasoning techniques typical of knowledge representation in artificial intelligence, algorithmic capabilities typical of artificial vision schemes, and analogue techniques typical of artificial neural networks. Experimental results obtained by means of an implemented version of the proposed architecture acting on real scene images are reported to illustrate the system capabilities.

Artificial neural networkKnowledge representation and reasoningComputer sciencebusiness.industryComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONCognitive neuroscience of visual object recognitionImage processingTheoretical Computer ScienceHuman-Computer InteractionArtificial IntelligenceComputer Science::Computer Vision and Pattern RecognitionPattern recognition (psychology)Systems architectureComputer visionGeometric primitiveArtificial intelligenceGraphicsbusinessSoftware
researchProduct

Analysis of the impact of intermittent distribution by modelling the network-filling process

2010

In many countries, users acquire private tanks to reduce their vulnerability to water scarcity. In such conditions, water managers often apply intermittent distribution in order to reduce the water volumes supplied to the users. This practice modifies the hydraulic behaviour of the network and determines competition among users that need to collect enough water resource for their uses. Intermittent distribution is thus responsible for the inequality that can occur among users: those located in advantaged positions of the network are able to obtain water resources soon after the service period begins, while others have to wait much longer, after the network is full. This paper analyses the i…

Atmospheric ScienceService (systems architecture)EngineeringProcess (engineering)business.industryEnvironmental economicsGeotechnical Engineering and Engineering GeologyWater scarcityWater resourcesCompetition (economics)Resource (project management)Order (exchange)businessSimulationCivil and Structural EngineeringWater Science and TechnologyVulnerability (computing)Journal of Hydroinformatics
researchProduct

Pumps as turbines (PATs) in water distribution networks affected by intermittent service

2013

A hydraulic model was developed in order to evaluate the potential energy recovery from the use of centrifugal pumps as turbines (PATs) in a water distribution network characterized by the presence of private tanks. The model integrates the Global Gradient Algorithm (GGA), with a pressure-driven model that permits a more realistic representation of the influence on the network behaviour of the private tanks filling and emptying. The model was applied to a real case study: a District Metered Area in Palermo (Italy). Three different scenarios were analysed and compared with a baseline scenario (Scenario 0 – no PAT installed) to identify the system configuration with added PATs that permits th…

Atmospheric ScienceService (systems architecture)geographyEngineeringgeography.geographical_feature_categorybusiness.industryNode (networking)Monte Carlo methodGeotechnical Engineering and Engineering GeologyCentrifugal pumpInletpressure-driven demandenergy productionwater distribution networkshydraulic modellingNetwork performancepump as turbineBaseline (configuration management)businessDownstream (networking)SimulationCivil and Structural EngineeringWater Science and TechnologyMarine engineeringJournal of Hydroinformatics
researchProduct

Using continuous user authentication to detect masqueraders

2003

Nowadays computer and network intrusions have become more common and more complicated, challenging the intrusion detection systems. Also, network traffic has been constantly increasing. As a consequence, the amount of data to be processed by an intrusion detection system has been growing, making it difficult to efficiently detect intrusions online. Proposes an approach for continuous user authentication based on the user’s behaviour, aiming at development of an efficient and portable anomaly intrusion detection system. A prototype of a host‐based intrusion detection system was built. It detects masqueraders by comparing the current user behaviour with his/her stored behavioural model. The m…

AuthenticationUser profileComputer scienceAnomaly-based intrusion detection systemReal-time computingIntrusion detection systemLibrary and Information SciencesManagement Science and Operations ResearchComputer securitycomputer.software_genreManagement Information SystemsInformation protection policyHost-based intrusion detection systemSystems architectureBusiness and International ManagementHost (network)computerInformation Management & Computer Security
researchProduct

E-bike battery charging: Methods and circuits

2013

Today, academic and industrial research is focused on innovative battery charging methods to ensure complete mobility of both handheld devices and electric vehicles. Wireless power transfer is actually the leading strategy even if efficiency related issues are to be solved for a successful marketing. In this paper, a wireless battery charging station is proposed for electric assisted pedal bikes. If compared with existing wireless solutions, the proposed system architecture improves power conversion efficiency of the charging equipment. The simulation model of the whole charging station is described in detail. The transmitter, receiver and inductive coupling circuits are described and desig…

Battery (electricity)Engineeringbusiness.industryvehicular and wireless technologieTransmitterElectrical engineeringwireless power transferTopology (electrical circuits)Settore ING-IND/32 - Convertitori Macchine E Azionamenti ElettriciCharging stationSystems architecturewireless battery chargingWirelessinductive power transferAutomotive batteryWireless power transferbusiness2013 International Conference on Clean Electrical Power (ICCEP)
researchProduct

Optimization of urban delivery systems based on electric assisted cargo bikes with modular battery size, taking into account the service requirements…

2021

The implementation of new forms of urban mobility is a fundamental challenge for improving the performance of city logistic systems in terms of efficiency and sustainability. For such purposes, the exploitation of electric vehicles is currently being investigated as an alternative to traditional internal combustion engines. In particular, the employment of lightweight electric cargo bikes is seen as an attractive possibility for designing improved city distribution systems. Such vehicles, however, present substantial limitations related to their endurance, speed, power, and recharging times; therefore, their configuration must be optimized considering the actual operational context and the …

Battery (electricity)Service (systems architecture)TechnologyControl and OptimizationComputer sciencemodular design0211 other engineering and technologiesEnergy Engineering and Power TechnologyContext (language use)02 engineering and technologyelectric cargo bikesParcel deliverycity logisticsOrder (exchange)City logistics Electric cargo bikes Last mile distribution Modular designlast mile distribution0502 economics and businessSettore ING-IND/17 - Impianti Industriali MeccaniciElectrical and Electronic EngineeringEngineering (miscellaneous)050210 logistics & transportationRenewable Energy Sustainability and the Environmentbusiness.industryT05 social sciences021107 urban & regional planningModular designPower (physics)Settore ING-IND/23 - Chimica Fisica ApplicataSustainabilitySystems engineeringbusinessEnergy (miscellaneous)city logistics; last mile distribution; electric cargo bikes; modular design
researchProduct

Bio-inspired security analysis for IoT scenarios

2020

Computer security has recently become more and more important as the world economy dependency from data has kept growing. The complexity of the systems that need to be kept secure calls for new models capable of abstracting the interdependencies among heterogeneous components that cooperate at providing the desired service. A promising approach is attack graph analysis, however, the manual analysis of attack graphs is tedious and error prone. In this paper we propose to apply the metabolic network model to attack graph analysis, using three interacting bio-inspired algorithms: topological analysis, flux balance analysis, and extreme pathway analysis. A developed framework for graph building…

Bio-inspired techniqueService (systems architecture)Security analysisIoTDependency (UML)Computer scienceNetwork securityDistributed computingmedia_common.quotation_subject0211 other engineering and technologies02 engineering and technologyMetabolic networksAttack graphs; Bio-inspired algorithms; Bio-inspired techniques; IoT; Metabolic networks; Network security; Security analysis; System securityAttack graph03 medical and health sciences0302 clinical medicineUse casemedia_common021110 strategic defence & security studiesSecurity analysisbusiness.industryMetabolic network030208 emergency & critical care medicineBio-inspired techniquesNetwork securitySystem securityFlux balance analysisInterdependenceHardware and ArchitectureBio-inspired algorithmGraph (abstract data type)businessSoftwareAttack graphsBio-inspired algorithms
researchProduct

BIOfid dataset: publishing a German gold standard for named entity recognition in historical biodiversity literature

2019

The Specialized Information Service Biodiversity Research (BIOfid) has been launched to mobilize valuable biological data from printed literature hidden in German libraries for over the past 250 years. In this project, we annotate German texts converted by OCR from historical scientific literature on the biodiversity of plants, birds, moths and butterflies. Our work enables the automatic extraction of biological information previously buried in the mass of papers and volumes. For this purpose, we generated training data for the tasks of Named Entity Recognition (NER) and Taxa Recognition (TR) in biological documents. We use this data to train a number of leading machine learning tools and c…

Biological dataService (systems architecture)Information retrievalbusiness.industryComputer science02 engineering and technologyScientific literature010501 environmental sciencescomputer.software_genre01 natural scienceslanguage.human_languageField (computer science)GermanInformation extractionNamed-entity recognitionPublishingddc:020ddc:5700202 electrical engineering electronic engineering information engineeringlanguage020201 artificial intelligence & image processingArtificial intelligencebusinesscomputer0105 earth and related environmental sciences
researchProduct

Human-in-the-Loop Conversation Agent for Customer Service

2020

This paper describes a prototype system for partial automation of customer service operations of a mobile telecommunications operator with a human-in-the loop conversational agent. The agent consists of an intent detection system for identifying the types of customer requests that it can handle appropriately, a slot filling information extraction system that integrates with the customer service database for a rule-based treatment of the common scenarios, and a template-based language generation system that builds response candidates that can be approved or amended by customer service operators. The main focus of this paper is on the system architecture and machine learning system structure …

Business requirementsbusiness.industryComputer sciencemedia_common.quotation_subject020206 networking & telecommunications02 engineering and technologycomputer.software_genreAutomationInformation extraction0202 electrical engineering electronic engineering information engineeringSystems architectureHuman-in-the-loop020201 artificial intelligence & image processingConversationMobile telephonyDialog systembusinessSoftware engineeringcomputermedia_common
researchProduct

Fostering Collaborative Governance in Chronic Disease Management Programs: A Dynamic Performance Management Approach

2020

Chronic diseases are the leading cause of disability and mortality in the world and represent a global health emergency due to the increase in frequency and complexity that has been occurring in recent years. The outcomes related to chronic care needs depend on the joint effort of a multi-provider, multi-disciplinary, and multi-professional service network, which operates along a clinical pathway. However, all the different players involved in the provision of services may have different interests and goals derived from their organizational structure and their role in the overall health system. This context of fragmented governance makes performance management of care services problematic. …

Chronic careService (systems architecture)Performance outcomesProcess managementDynamic performance managementPerformance managementbusiness.industryService delivery frameworkChronic care managementSystem dynamicsCollaborative Governance Chronic disease management programs Dynamic performance management Performance outcomes System Dynamics.Chronic disease management programClinical pathwaySettore SECS-P/07 - Economia AziendalePerformance outcomeChronic disease management programsHealth careBusinessCollaborative governanceCollaborative governance
researchProduct