Search results for "computer.programming_language"
showing 10 items of 986 documents
Study of Wine Producers' Marketing Communication in Extreme Territories - Application of the AGIL Scheme to Wineries Websites Features
2020
This study measures the communication ability of wineries in two extreme territories of Southern Italy, Mount Etna and the island of Pantelleria. The evaluation of four dimensions of web communication was carried out by the AGIL Scheme (i.e. adaptation, goal-attainment, integration, latent pattern maintenance). The study provides a generalizable model to be applied in other similar studies. Also, focus groups of experts were carried out. The method proved to be suitable to measure the communication effectiveness of wineries through websites. Extreme territories may add value to the wine, regardless of the brand. The heroic wines may become the symbol of these territories helping environment…
Simple scheme for extracting work with a single bath
2019
We propose a simple protocol exploiting the thermalization of a storage bipartite system S to extract work from a resource system R. The protocol is based on a recent work definition involving only a single bath. A general description of the protocol is provided without specifying the characteristics of S. We quantify both the extracted work and the ideal efficiency of the process, also giving maximum bounds for them. Then, we apply the protocol to two cases: two interacting qubits and the Rabi model. In both cases, for very strong couplings, an extraction of work comparable with the bare energies of the subsystems of S is obtained and its peak is reached for finite values of the bath tempe…
Extension and Tuning of Virtual Synchronous Machine to Avoid Oscillatory Instability in Isolated Power Networks
2020
The risk of oscillatory instability introduced by virtual synchronous machines (VSM) control in isolated power networks is investigated. The considered control is a common scheme widely studied in literature, in several configurations and for different case studies. The impact of the VSM control on the system stability is examined for the existing power network of a Mediterranean island. The VSM control is implemented within the power converters interfacing the energy storage systems (ESS) installed in the network. Simulations and analysis show the occurrence of oscillatory instability in the system, with the ESS-VSM and the synchronous machines of the network progressively swinging against…
Toward Self-Supervised Feature Learning for Online Diagnosis of Multiple Faults in Electric Powertrains
2021
This article proposes a novel online fault diagnosis scheme for industrial powertrains without using historical faulty or labeled training data. The proposed method combines a one-class support vector machine (SVM) based anomaly detection and supervised convolutional neural network (CNN) algorithms to online detect multiple faults and fault severities under variable speeds and loads. The one-class SVM algorithm is to derive a score for defining faults or health classes in the first stage, and the resulting health classes are used as the training data for the CNN-based classifier in the second stage. Within this framework, the self-supervised learning of the proposed CNN algorithm allows the…
Thompson Sampling Guided Stochastic Searching on the Line for Adversarial Learning
2015
The multi-armed bandit problem has been studied for decades. In brief, a gambler repeatedly pulls one out of N slot machine arms, randomly receiving a reward or a penalty from each pull. The aim of the gambler is to maximize the expected number of rewards received, when the probabilities of receiving rewards are unknown. Thus, the gambler must, as quickly as possible, identify the arm with the largest probability of producing rewards, compactly capturing the exploration-exploitation dilemma in reinforcement learning. In this paper we introduce a particular challenging variant of the multi-armed bandit problem, inspired by the so-called N-Door Puzzle. In this variant, the gambler is only tol…
Call Admission Control in Single and Two-Tier Cellular Networks
2010
We consider four strategies for call admission control (CAC) in single and two-tier cellular networks, which are designed to ensure advantage of handover calls: dynamic redundancy (cutoff priority scheme), partial dynamic redundancy (fractional guard channel scheme), static redundancy (rigid division-based CAC scheme) and restriction of the number of new calls admitted (new call bounding scheme). We show the advantage of dynamic reservation by numerical analysis. We strictly prove it in the case of two-channel system with losses.
An attribute based access control scheme for secure sharing of electronic health records
2016
Electronic health records (EHRs) play a vital role in modern health industry, allowing the possibility of flexible sharing of health information in the quest of provisioning advanced and efficient healthcare services for the users. Although sharing of EHRs has significant benefits, given that such records contain lot of sensitive information, secure sharing of EHRs is of paramount importance. Thus, there is a need for the realization of sophisticated access control mechanisms for secure sharing of EHRs, which has attracted significant interest from the research community. The most prominent access control schemes for sharing of EHRs found in literature are role based and such solutions have…
Secure and efficient data storage in unattended wireless sensor networks
2009
©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Article also available from publisher: http://dx.doi.org/10.1109/NTMS.2009.5384753 Providing forward and backward secrecy is still a big challenge in Unattended Wireless Sensor Networks (UWSNs), though some storage schemes have been proposed. Additionally, high storage requirement needs efficient storage techniques. In this paper, we propose a novel homomorphic…
Contributions to the knowledge base on PV performance: Evaluation of the operation of PV systems using different technologies installed in southern N…
2011
To assist in establishing an accepted knowledge base on PV-modules and systems performance using a representative range of technologies, devices have to be installed at diverse locations, covering a broad range of environmental conditions. For the example of a high latitude location, modules and systems are installed and under investigation in southern Norway (Kristiansand region) by the University of Agder in cooperation with industrial partners. This paper presents first results of the analysis of module performance. The operational behavior of the modules is used to derive a modeling scheme applicable for performance prediction. This use is demonstrated by giving the expected annual perf…
No Reservations Required: Achieving Fairness between Wi-Fi and NR-U with Self-Deferral Only
2021
Wireless technologies coexisting in unlicensed bands should receive a fair share of the available channel resources, even when they use different access methods. We consider the problem of coexistence between Wi-Fi and New Radio Unlicensed (NR-U) nodes, which employ, respectively, a random and scheduled access scheme. The latter typically resorts to reservation signals (RSs), which allow keeping the control of the channel until the start of the next synchronized slot. This mechanism, although effective for increasing the channel access opportunities of scheduled-based nodes, is also a waste of channel resources. We investigate alternative solutions, based on self-deferral only. We built ana…