Search results for "dent"

showing 10 items of 16910 documents

Abnormal Textures Identification Based on Digital Hilbert Optics Methods: Fundamental Transforms and Models

2017

The article presents the abnormal textures identification technology based on structural and statistical models of amplitude-phase images (APIm) – multidimensional data arrays (semantic models) and statistical correlation analysis methods using the generalized discrete Hilbert transforms (DHT) – 2D Hilbert (Foucault) isotropic (HTI), anisotropic (HTA) and total transforms – AP-analysis (APA) to calculate the APIm. The identified fragments of textures are obtained as examples of experimental observation of real mammograms contains areas of pathological tissues. The DHT based information technology as conceptual chart description is discussed and illustrated with DHO domain images. As additio…

0209 industrial biotechnologybusiness.industryComputer scienceIsotropyStatistical modelPattern recognition02 engineering and technologyBase (topology)Domain (mathematical analysis)030218 nuclear medicine & medical imaging03 medical and health sciencesIdentification (information)020901 industrial engineering & automation0302 clinical medicineComputer visionArtificial intelligenceAnomaly (physics)Anisotropybusiness
researchProduct

Modeling Energy Demand Aggregators for Residential Consumers

2013

International audience; Energy demand aggregators are new actors in the energy scenario: they gather a group of energy consumers and implement a demand- response paradigm. When the energy provider needs to reduce the current energy demand on the grid, it can pay the energy demand aggregator to reduce the load by turning off some of its consumers loads or postponing their activation. Currently this operation involves only greedy energy consumers like industrial plants. In this paper we want to study the potential of aggregating a large number of small energy consumers like home users as it may happen in smart grids. In particular we want to address the feasibility of such approach by conside…

0209 industrial biotechnologydemand-response paradigm020209 energyEnergy current02 engineering and technologycomputer.software_genre7. Clean energyNews aggregatorload regulation[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]020901 industrial engineering & automationdemand side management; load regulation; queueing theory; smart power grids; demand-response paradigm; energy consumers; energy demand aggregator modeling; greedy energy consumers; home users; industrial plants; power load control; queuing theory; residential consumers; smart grids; Delays; Home appliances; Load modeling; Power demand; Sociology; Statistics; Switchesresidential consumerSociologySettore ING-INF/04 - Automatica0202 electrical engineering electronic engineering information engineeringindustrial plantenergy demand aggregator modelingDemand loadSimulationStatisticQueueing theoryDelayLoad modelingdemand side managementSettore ING-INF/03 - Telecomunicazionigreedy energy consumerpower load controlLoad balancing (electrical power)Poisson processEnvironmental economicsGridenergy consumerHome applianceSettore ING-IND/33 - Sistemi Elettrici Per L'EnergiaSmart gridQueueing theorymart gridLoad regulationqueuing theoryPower demandEnergy demand aggregatorsmart power gridcomputerSwitcheshome user
researchProduct

New delay-dependent stability of Markovian jump neutral stochastic systems with general unknown transition rates

2015

This paper investigates the delay-dependent stability problem for neutral Markovian jump systems with generally unknown transition rates GUTRs. In this neutral GUTR model, each transition rate is completely unknown or only its estimate value is known. Based on the study of expectations of the stochastic cross-terms containing the integral, a new stability criterion is derived in terms of linear matrix inequalities. In the mathematical derivation process, bounding stochastic cross-terms, model transformation and free-weighting matrix are not employed for less conservatism. Finally, an example is provided to demonstrate the effectiveness of the proposed results.

0209 industrial biotechnologygeneral uncertain transition rateStability criterionModel transformationDelay-dependent stability02 engineering and technologyTransition rate matrixStability (probability)neutral-type stochastic systemTheoretical Computer ScienceDelay dependentMatrix (mathematics)Markovian jump020901 industrial engineering & automationControl theoryBounding overwatch0202 electrical engineering electronic engineering information engineeringApplied mathematicsMathematicscomputer.programming_languageDelay-dependent stability; neutral-type stochastic system;Markovian switching; general uncertain transition rate; mean-square exponentially stable; Control and Systems Engineering; Theoretical Computer Science; Computer Science Applications1707 Computer Vision and Pattern RecognitionMarkovian switchingComputer Science Applications1707 Computer Vision and Pattern RecognitionComputer Science ApplicationsControl and Systems Engineeringmean-square exponentially stable020201 artificial intelligence & image processingcomputerInternational Journal of Systems Science
researchProduct

Manufacturing Risk Identification in the Steel Industry

2020

The steel manufacturing industry is an inseparable part of the nuclear power plant construction project. This industry is a business full of dynamics, risks, and challenges. The implementation of risk management becomes an obligation that must be executed in managing this very complex project. In general, risk management in manufacturing includes steps to understand and identify potential problems that may occur, evaluate, monitor, and handle risks. The main risk management objectives are to prevent or minimize adverse effects due to unforeseen events through risk aversion or preparation of contingency plans related to those risks. This paper describes the identification of risk factors and…

0209 industrial biotechnologynuclear power plantindustriesComputer sciencesteel manufacturing02 engineering and technology010501 environmental sciencesrisk management01 natural scienceslaw.invention020901 industrial engineering & automationOrder (exchange)lawSteel millNuclear power plantObligationlcsh:Environmental sciencesRisk management0105 earth and related environmental scienceslcsh:GE1-350Contingency planbusiness.industryRisk aversionIdentification (information)Risk analysis (engineering)businessE3S Web of Conferences
researchProduct

Damage identification of a jacket support structure for offshore wind turbines

2020

Offshore jacket structures are regarded as a suitable type of support structure for offshore wind turbines in immediate water depths. Because of the welded tubular members used and environmental conditions, offshore jackets are often subjected to fatigue damages during their service life. Underwater sensors can provide measurements of the structural vibration signals and provide an efficient way to detect damages at early stages. In this work, simplified forms of the damages are assumed, random damages are imposed on the jacket structure, and damaged indicators are established from combination of modal shapes. Then, a response surface is constructed mapping the damage indicators and damages…

0211 other engineering and technologiesComputingMilieux_LEGALASPECTSOFCOMPUTING020101 civil engineering02 engineering and technology0201 civil engineeringVDP::Teknologi: 500Identification (information)Offshore wind powerStructural vibrationService lifeDamagesEnvironmental scienceSubmarine pipeline021108 energySensitivity (control systems)UnderwaterMarine engineering
researchProduct

A Novel Border Identification Algorithm Based on an “Anti-Bayesian” Paradigm

2013

Published version of a chapter in the book: Computer Analysis of Images and Patterns. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-642-40261-6_23 Border Identification (BI) algorithms, a subset of Prototype Reduction Schemes (PRS) aim to reduce the number of training vectors so that the reduced set (the border set) contains only those patterns which lie near the border of the classes, and have sufficient information to perform a meaningful classification. However, one can see that the true border patterns (“near” border) are not able to perform the task independently as they are not able to always distinguish the testing samples. Thus, researchers have worked on thi…

021103 operations researchComputer scienceVDP::Mathematics and natural science: 400::Information and communication science: 420::Algorithms and computability theory: 4220211 other engineering and technologiesClass (philosophy)02 engineering and technologyField (computer science)Term (time)Support vector machineSet (abstract data type)Identification (information)Bayes' theoremCardinality0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingVDP::Mathematics and natural science: 400::Mathematics: 410::Algebra/algebraic analysis: 414InformationSystems_MISCELLANEOUSAlgorithm
researchProduct

Model Co-creation from a Modeler’s Perspective: Lessons Learned from the Collaboration Between Ethnographers and Modelers

2018

This paper reports on the authors’ ongoing collaboration on model co-creation, a process that involves not only the reconciliation of methodologies (qualitative vs. quantitative), but also of epistemologies (empirical vs empirical/rationalist) and ontologies (observable referent vs. abstracted referent). The co-creation process has taken place over several months, from early 2017, both in person, teleconferencing and via email. The result was an ethnographic model of the refugee situation in Lesbos, Greece. The qualifier “ethnographic” means that the simulation’s purpose was to capture the problem situation described by ethnographers in a manner that resembles their observations, not to ans…

021103 operations researchProcess (engineering)Field (Bourdieu)05 social sciencesPerspective (graphical)0211 other engineering and technologiesQualitative property02 engineering and technologyReferentEpistemologyIdentification (information)0502 economics and businessCo-creationSociologyResearch question050203 business & management
researchProduct

On the Influence of Affect in EEG-Based Subject Identification

2021

Biometric signals have been extensively used for user identification and authentication due to their inherent characteristics that are unique to each person. The variation exhibited between the brain signals (EEG) of different people makes such signals especially suitable for biometric user identification. However, the characteristics of these signals are also influenced by the user’s current condition, including his/her affective state. In this paper, we analyze the significance of the affect-related component of brain signals within the subject identification context. Consistent results are obtained across three different public datasets, suggesting that the dominant component of the sign…

021110 strategic defence & security studiesAuthenticationBiometricsmedicine.diagnostic_testbusiness.industryComputer science0211 other engineering and technologiesContext (language use)Pattern recognition02 engineering and technologyElectroencephalographyHuman-Computer InteractionIdentification (information)Component (UML)0202 electrical engineering electronic engineering information engineeringTask analysismedicine020201 artificial intelligence & image processingArtificial intelligencebusinessAffective computingSoftwareIEEE Transactions on Affective Computing
researchProduct

Cybersecurity in Europe

2021

Information security is increasingly necessary between citizens and public services. In a nearby environment, such as cities, there are digital services and infrastructures that help improve our quality of life. Secure access to services must be regulated and offer trust to the user. Initiatives like the Regulation from European Union, (EU) N° 910/2014 of the European Parliament and the Council intend to favour solutions for problems like interoperability and cybersecurity. In this chapter, two European countries are considered so that implementations of the electronic identification, authentication, and trust services are presented and discussed. The main contribution is a description of r…

021110 strategic defence & security studiesAuthenticationIdentification (information)Computer science020204 information systems0211 other engineering and technologies0202 electrical engineering electronic engineering information engineering02 engineering and technologyComputer securitycomputer.software_genrecomputer
researchProduct

Strategies of Identification of a Base-Isolated Hospital Building by Coupled Quasi-Static and Snap-Back Tests

2020

In this paper, the description of a series of quasi-static pushing tests and dynamic snap-back tests is proposed, involving the base-isolated emergency building of the Palermo university hospital. The base isolation system is characterized by a set of double-curved friction pendulum isolators placed on the top of the columns of the underground level, characteristics that cannot be found in the experimental studies available in the literature. The aim of the work was to investigate the static and dynamic properties of the building in question and comparing the in-situ results with the characteristics assigned during the design process and to assess the level of agreement. Static lateral push…

021110 strategic defence & security studiesComputer sciencebusiness.industry0211 other engineering and technologies020101 civil engineering02 engineering and technologyBuilding and ConstructionStructural engineeringGeotechnical Engineering and Engineering GeologyUniversity hospitalBase (topology)0201 civil engineeringSettore ICAR/09 - Tecnica Delle CostruzioniSettore ING-IND/31 - ElettrotecnicaSnap backIdentification (information)friction friction pendulum bearing full-scale experimental tests in-situ testing seismic isolation snap-back testSeismic isolationbusinessQuasistatic processCivil and Structural EngineeringJournal of Earthquake Engineering
researchProduct