Search results for "Wire"
showing 10 items of 1383 documents
Adaptive consensus-based distributed detection in WSN with unreliable links
2016
Event detection is a crucial tasks in wireless sensor networks. The importance of a fast response makes distributed strategies, where nodes exchange information just with their one-hop neighbors to reach local decisions, more adequate than schemes where all nodes send observations to a central entity. Distributed detectors are usually based on average consensus, where all nodes iteratively communicate to asymptotically agree on a final result. In a realistic scenario, communications are subject to random failures, which impacts the performance of the consensus. We propose an alternative detector, which adapts to the statistical properties of the consensus and compensate deviations from the …
Reliable diagnostics using wireless sensor networks
2019
International audience; Monitoring activities in industry may require the use of wireless sensor networks, for instance due to difficult access or hostile environment. But it is well known that this type of networks has various limitations like the amount of disposable energy. Indeed, once a sensor node exhausts its resources, it will be dropped from the network, stopping so to forward information about maybe relevant features towards the sink. This will result in broken links and data loss which impacts the diagnostic accuracy at the sink level. It is therefore important to keep the network's monitoring service as long as possible by preserving the energy held by the nodes. As packet trans…
Graph Filtering of Time-Varying Signals over Asymmetric Wireless Sensor Networks
2019
In many applications involving wireless sensor networks (WSNs), the observed data can be modeled as signals defined over graphs. As a consequence, an increasing interest has been witnessed to develop new methods to analyze graph signals, leading to the emergence of the field of Graph Signal Processing. One of the most important processing tools in this field is graph filters, which can be easily implemented distributedly over networks by means of cooperation among the nodes. Most of previous works related to graph filters assume the same connection probability in both link directions when transmitting an information between two neighboring nodes. This assumption is not realistic in practice…
Ultrasonic phased array inspection of a Wire + Arc Additive Manufactured (WAAM) sample with intentionally embedded defects
2019
In this study, Wire + Arc Additive Manufacture (WAAM) was employed to manufacture a steel specimen with intentionally embedded defects which were subsequently used for calibration of an ultrasonic phased array system and defect sizing. An ABB robot was combined with the Cold Metal Transfer (CMT) Gas Metal Arc (GMA) process to deposit 20 layers of mild steel. Tungsten-carbide balls (ø1-3 mm) were intentionally embedded inside the additive structure after the 4th, 8th, 12th and 18th layers to serve as ultrasonic reflectors, simulating defects within the WAAM sample. An ultrasonic phased array system, consisting of a 5 MHz 64 Element phased array transducer, was used to inspect the WAAM sample…
Friction stir extrusion to recycle aluminum alloys scraps: Energy efficiency characterization
2019
Abstract Solid state recycling refers to a group of processes allowing direct recycling of metals scraps into semi-finished product. Their main advantage lies in avoiding the molten state of the material which badly affects the environmental performance of the conventional (remelting based) recycling routes. It is expected that such process category would lower the environmental performance of metals recycling. In this paper, the friction stir extrusion process for aluminum alloy AA 2050 wire production is analyzed under the primary energy demand perspective. The process electrical energy demand is quantified with varying process parameters. An empirical modelling approach was applied and a…
Inverse kinematic control of an industrial robot used in Vessel-to-Vessel Motion Compensation
2017
An increased level of complex offshore load handling operations is expected due to an increased amount of floating wind turbines, remote fish farms, and autonomous shipping, and in general more advanced operations to be carried out at sea. A common problem for these applications is that both equipment and personnel have to be transported between two floating vessels at sea. An investigation of the Vessel-to-Vessel Motion Compensation (VVMC) problem may increase the efficiency and safety of such operations in the future. In this paper, a control algorithm has been developed and experimentally tested in the Norwegian Motion Laboratory featuring two Stewart platforms (SPs), an industrial robot…
Algorithmic Approach for Slot Filling Factors Determination in Electrical Machines
2018
In several industrial sectors, such as electric and hybrid traction, the demand for increasingly efficient and high power density electrical machines has grown considerably over the last few years. The improvement of slot filling factor of the electrical machines is an useful provision to satisfy this request. In particular, this topic has been the subject of interest for the industrial sector in recent years, since the technology of winding processes have evolved and allow an economically sustainable realization of windings with an ordered structure rather than randomly. The winding phase must be supported by an accurate design process in which it is possible to evaluate the maximum slot f…
Survey of Cyber Threats in Air Traffic Control and Aircraft Communications Systems
2018
Air traffic control systems based on the ADS-B standard have been widely adopted in civil aviation to the point that they are now considered the de facto standard. ADS-B provides major benefits to airports and airlines by increasing the safety of air traffic management and control and allowing more flights to travel near busy airports. However, the ADS-B technology lacks sufficient security measures. The ADS-B system is vulnerable and exposed to cyberattacks. We survey the potential known threats and attacks against ADS-B and assess the potential cybersecurity threats to air traffic management and control. The widespread use of ADS-B and the lack of security features in it, i.e., all the AD…
Secure and efficient verification for data aggregation in wireless sensor networks
2017
Summary The Internet of Things (IoT) concept is, and will be, one of the most interesting topics in the field of Information and Communications Technology. Covering a wide range of applications, wireless sensor networks (WSNs) can play an important role in IoT by seamless integration among thousands of sensors. The benefits of using WSN in IoT include the integrity, scalability, robustness, and easiness in deployment. In WSNs, data aggregation is a famous technique, which, on one hand, plays an essential role in energy preservation and, on the other hand, makes the network prone to different kinds of attacks. The detection of false data injection and impersonation attacks is one of the majo…
Subjective Logic-Based In-Network Data Processing for Trust Management in Collocated and Distributed Wireless Sensor Networks
2018
While analyzing an explosive amount of data collected in today’s wireless sensor networks (WSNs), the redundant information in the sensed data needs to be handled. In-network data processing is a technique which can eliminate or reduce such redundancy, leading to minimized resource consumption. On the other hand, trust management techniques establish trust relationships among nodes and detect unreliable nodes. In this paper, we propose two novel in-network data processing schemes for trust management in static WSNs. The first scheme targets at networks, where sensor nodes are closely collocated to report the same event. Considering both spatial and temporal correlations, this scheme generat…