821 resultados para Fault detection, fail-safety, fault tolerance, UAV


Relevância:

40.00% 40.00%

Publicador:

Resumo:

Major funding was provided by the UK Natural Environment Research Council (NERC) under grant NE/I028017/1 and partially supported by Boğaziçi University Research Fund (BAP) under grant 6922. We would like to thank all the project members from the University of Leeds, Boğaziçi University, Kandilli Observatory, Aberdeen University and Sakarya University. I would also like to thank Prof. Ali Pinar and Dr. Kıvanç Kekovalı for their valuable comments. Some of the figures were generated by GMT software (Wessel and Smith, 1995).

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Major funding was provided by the UK Natural Environment Research Council (NERC) under grant NE/I028017/1 and partially supported by Boğaziçi University Research Fund (BAP) under grant 6922. We would like to thank all the project members from the University of Leeds, Boğaziçi University, Kandilli Observatory, Aberdeen University and Sakarya University. I would also like to thank Prof. Ali Pinar and Dr. Kıvanç Kekovalı for their valuable comments. Some of the figures were generated by GMT software (Wessel and Smith, 1995).

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Acknowledgements: The authors would like to thank Total E&P and BG Group for project funding and support, and the Industry Technology Facilitator for facilitating the collaborative development (grant number 3322PSD). The authors would also like to express their gratitude to the Aberdeen Formation Evaluation Society and the College of Physical Sciences at the University of Aberdeen for partial financial support. Raymi Castilla (Total E&P), Fabrizio Agosta and Cathy Hollis are also thanked for their constructive comments and suggestions to improve the standard of this manuscript as are John Still and Colin Taylor (University of Aberdeen) for technical assistance in the laboratory. Piero Gianolla is thanked for his editorial handling of the manuscript.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Peer reviewed

Relevância:

40.00% 40.00%

Publicador:

Resumo:

ACKNOWLEDGMENT We are thankful to RTE for financial support of this project.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The Padul-Nigüelas Fault Zone (PNFZ) is situated at the south-western mountain front of the Sierra Nevada (Spain) in an extensive regime and belongs to the internal zone of the Betic Cordilleras. The aim of this study is a collection of new evidence for neotectonic activity of the fault zone with classical geological field work and modern geophysical methods, such as ground penetrating radar (GPR). Among an apparently existing bed rock fault scarp with triangular facets, other evidences, such as deeply incised valleys and faults in the colluvial wedges, are present in the PNFZ. The preliminary results of our recent field work have shown that the synsedimentary faults within the colluvial sediments seem to propagate basinwards and the bed rock fault is only exhumed due to erosion for the studied segment (west of Marchena). We will use further GPR data and geomorphologic indices to gather further evidences of neotectonic activity of the PNFZ.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

With applications ranging from aerospace to biomedicine, additive manufacturing (AM) has been revolutionizing the manufacturing industry. The ability of additive techniques, such as selective laser melting (SLM), to create fully functional, geometrically complex, and unique parts out of high strength materials is of great interest. Unfortunately, despite numerous advantages afforded by this technology, its widespread adoption is hindered by a lack of on-line, real time feedback control and quality assurance techniques. In this thesis, inline coherent imaging (ICI), a broadband, spatially coherent imaging technique, is used to observe the SLM process in 15 - 45 $\mu m$ 316L stainless steel. Imaging of both single and multilayer builds is performed at a rate of 200 $kHz$, with a resolution of tens of microns, and a high dynamic range rendering it impervious to blinding from the process beam. This allows imaging before, during, and after laser processing to observe changes in the morphology and stability of the melt. Galvanometer-based scanning of the imaging beam relative to the process beam during the creation of single tracks is used to gain a unique perspective of the SLM process that has been so far unobservable by other monitoring techniques. Single track processing is also used to investigate the possibility of a preliminary feedback control parameter based on the process beam power, through imaging with both coaxial and 100 $\mu m$ offset alignment with respect to the process beam. The 100 $\mu m$ offset improved imaging by increasing the number of bright A-lines (i.e. with signal greater than the 10 $dB$ noise floor) by 300\%. The overlap between adjacent tracks in a single layer is imaged to detect characteristic fault signatures. Full multilayer builds are carried out and the resultant ICI images are used to detect defects in the finished part and improve upon the initial design of the build system. Damage to the recoater blade is assessed using powder layer scans acquired during a 3D build. The ability of ICI to monitor SLM processes at such high rates with high resolution offers extraordinary potential for future advances in on-line feedback control of additive manufacturing.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

To maintain the pace of development set by Moore's law, production processes in semiconductor manufacturing are becoming more and more complex. The development of efficient and interpretable anomaly detection systems is fundamental to keeping production costs low. As the dimension of process monitoring data can become extremely high anomaly detection systems are impacted by the curse of dimensionality, hence dimensionality reduction plays an important role. Classical dimensionality reduction approaches, such as Principal Component Analysis, generally involve transformations that seek to maximize the explained variance. In datasets with several clusters of correlated variables the contributions of isolated variables to explained variance may be insignificant, with the result that they may not be included in the reduced data representation. It is then not possible to detect an anomaly if it is only reflected in such isolated variables. In this paper we present a new dimensionality reduction technique that takes account of such isolated variables and demonstrate how it can be used to build an interpretable and robust anomaly detection system for Optical Emission Spectroscopy data.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Post-Keynesian, heterodox and Marxist political economists have rightly argued that the eurozone crisis is not a fiscal crisis but a balance of payments crisis, mainly caused by the pivotal position of Germany in the European Monetary Union (EMU) and its neo-mercantilist model of growth (low wage, low inflation and export-led). This view, however, sees the split between core and periphery in the European Union as something created with the introduction of the EMU in 1999. This chapter contends that this is not the case. By putting forth a global fault-lines historical perspective and focusing on the case of Greece, it is argued that the problem is not the introduction of the EMU but the geopolitical and macroeconomic asymmetries between core and periphery in Europe since the inception of what vaguely – and even inaccurately – can be defined as ‘European modernity’. Global fault-lines offer a macro-historical and macroeconomic understanding of crises seen as structural events generated by the evolving and contradictory tendencies of capitalism as a world system. It is not just a political economy perspective but a perspective that encompasses many instances of the social, especially geopolitical and geocultural structures.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Abstract We present ideas about creating a next generation Intrusion Detection System (IDS) based on the latest immunological theories. The central challenge with computer security is determining the difference between normal and potentially harmful activity. For half a century, developers have protected their systems by coding rules that identify and block specific events. However, the nature of current and future threats in conjunction with ever larger IT systems urgently requires the development of automated and adaptive defensive tools. A promising solution is emerging in the form of Artificial Immune Systems (AIS): The Human Immune System (HIS) can detect and defend against harmful and previously unseen invaders, so can we not build a similar Intrusion Detection System (IDS) for our computers? Presumably, those systems would then have the same beneficial properties as HIS like error tolerance, adaptation and self-monitoring. Current AIS have been successful on test systems, but the algorithms rely on self-nonself discrimination, as stipulated in classical immunology. However, immunologist are increasingly finding fault with traditional self-nonself thinking and a new 'Danger Theory' (DT) is emerging. This new theory suggests that the immune system reacts to threats based on the correlation of various (danger) signals and it provides a method of 'grounding' the immune response, i.e. linking it directly to the attacker. Little is currently understood of the precise nature and correlation of these signals and the theory is a topic of hot debate. It is the aim of this research to investigate this correlation and to translate the DT into the realms of computer security, thereby creating AIS that are no longer limited by self-nonself discrimination. It should be noted that we do not intend to defend this controversial theory per se, although as a deliverable this project will add to the body of knowledge in this area. Rather we are interested in its merits for scaling up AIS applications by overcoming self-nonself discrimination problems.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The role of T-cells within the immune system is to confirm and assess anomalous situations and then either respond to or tolerate the source of the effect. To illustrate how these mechanisms can be harnessed to solve real-world problems, we present the blueprint of a T-cell inspired algorithm for computer security worm detection. We show how the three central T-cell processes, namely T-cell maturation, differentiation and proliferation, naturally map into this domain and further illustrate how such an algorithm fits into a complete immune inspired computer security system and framework.