864 resultados para Component-based systems
Resumo:
The paper suggests a classification of dynamic rule-based systems. For each class of systems, limit behavior is studied. Systems with stabilizing limit states or stabilizing limit trajectories are identified, and such states and trajectories are found. The structure of the set of limit states and trajectories is investigated.
Resumo:
Electrocardiography (ECG) has been recently proposed as biometric trait for identification purposes. Intra-individual variations of ECG might affect identification performance. These variations are mainly due to Heart Rate Variability (HRV). In particular, HRV causes changes in the QT intervals along the ECG waveforms. This work is aimed at analysing the influence of seven QT interval correction methods (based on population models) on the performance of ECG-fiducial-based identification systems. In addition, we have also considered the influence of training set size, classifier, classifier ensemble as well as the number of consecutive heartbeats in a majority voting scheme. The ECG signals used in this study were collected from thirty-nine subjects within the Physionet open access database. Public domain software was used for fiducial points detection. Results suggested that QT correction is indeed required to improve the performance. However, there is no clear choice among the seven explored approaches for QT correction (identification rate between 0.97 and 0.99). MultiLayer Perceptron and Support Vector Machine seemed to have better generalization capabilities, in terms of classification performance, with respect to Decision Tree-based classifiers. No such strong influence of the training-set size and the number of consecutive heartbeats has been observed on the majority voting scheme.
Resumo:
In the current age of fast-depleting conventional energy sources, top priority is given to exploring non-conventional energy sources, designing highly efficient energy storage systems and converting existing machines/instruments/devices into energy-efficient ones. ‘Energy efficiency’ is one of the important challenges for today’s scientific and research community, worldwide. In line with this demand, the current research was focused on developing two highly energy-efficient devices – field emitters and Li-ion batteries, using beneficial properties of carbon nanotubes (CNT). Interface-engineered, directly grown CNTs were used as cathode in field emitters, while similar structure was applied as anode in Li-ion batteries. Interface engineering was found to offer minimum resistance to electron flow and strong bonding with the substrate. Both field emitters and Li-ion battery anodes were benefitted from these advantages, demonstrating high energy efficiency. Field emitter, developed during this research, could be characterized by low turn-on field, high emission current, very high field enhancement factor and extremely good stability during long-run. Further, application of 3-dimensional design to these field emitters resulted in achieving one of the highest emission current densities reported so far. The 3-D field emitter registered 27 times increase in current density, as compared to their 2-D counterparts. These achievements were further followed by adding new functionalities, transparency and flexibility, to field emitters, keeping in view of current demand for flexible displays. A CNT-graphene hybrid structure showed appreciable emission, along with very good transparency and flexibility. Li-ion battery anodes, prepared using the interface-engineered CNTs, have offered 140% increment in capacity, as compared to conventional graphite anodes. Further, it has shown very good rate capability and an exceptional ‘zero capacity degradation’ during long cycle operation. Enhanced safety and charge transfer mechanism of this novel anode structure could be explained from structural characterization. In an attempt to progress further, CNTs were coated with ultrathin alumina by atomic layer deposition technique. These alumina-coated CNT anodes offered much higher capacity and an exceptional rate capability, with very low capacity degradation in higher current densities. These highly energy efficient CNT based anodes are expected to enhance capacities of future Li-ion batteries.
Resumo:
Food production and consumption for cities has become a global concern due to increasing numbers of people living in urban areas, threatening food security. There is the contention that people living in cities have become disconnected with food production, leading to reduced nutrition in diets and increased food waste. Integrating food production into cities (urban agriculture) can help alleviate some of these issues. Lack of space at ground level in high-density urban areas has accelerated the idea of using spare building surfaces for food production. There are various growing methods being used for food production on buildings, which can be split into two main types, soil-less systems and soil-based systems. This paper is a holistic assessment (underpinned by the triple bottom line of sustainable development) of these two types of systems for food production on buildings, looking at the benefits and limitation of each type in this context. The results illustrate that soil-less systems are more productive per square metre, which increases the amount of locally grown, fresh produce available in urban areas. The results also show that soil-based systems for cultivation on buildings are more environmentally and socially beneficial overall for urban areas than soil-less systems.
Resumo:
Authentication plays an important role in how we interact with computers, mobile devices, the web, etc. The idea of authentication is to uniquely identify a user before granting access to system privileges. For example, in recent years more corporate information and applications have been accessible via the Internet and Intranet. Many employees are working from remote locations and need access to secure corporate files. During this time, it is possible for malicious or unauthorized users to gain access to the system. For this reason, it is logical to have some mechanism in place to detect whether the logged-in user is the same user in control of the user's session. Therefore, highly secure authentication methods must be used. We posit that each of us is unique in our use of computer systems. It is this uniqueness that is leveraged to "continuously authenticate users" while they use web software. To monitor user behavior, n-gram models are used to capture user interactions with web-based software. This statistical language model essentially captures sequences and sub-sequences of user actions, their orderings, and temporal relationships that make them unique by providing a model of how each user typically behaves. Users are then continuously monitored during software operations. Large deviations from "normal behavior" can possibly indicate malicious or unintended behavior. This approach is implemented in a system called Intruder Detector (ID) that models user actions as embodied in web logs generated in response to a user's actions. User identification through web logs is cost-effective and non-intrusive. We perform experiments on a large fielded system with web logs of approximately 4000 users. For these experiments, we use two classification techniques; binary and multi-class classification. We evaluate model-specific differences of user behavior based on coarse-grain (i.e., role) and fine-grain (i.e., individual) analysis. A specific set of metrics are used to provide valuable insight into how each model performs. Intruder Detector achieves accurate results when identifying legitimate users and user types. This tool is also able to detect outliers in role-based user behavior with optimal performance. In addition to web applications, this continuous monitoring technique can be used with other user-based systems such as mobile devices and the analysis of network traffic.
Resumo:
Nurse rostering is a complex scheduling problem that affects hospital personnel on a daily basis all over the world. This paper presents a new component-based approach with adaptive perturbations, for a nurse scheduling problem arising at a major UK hospital. The main idea behind this technique is to decompose a schedule into its components (i.e. the allocated shift pattern of each nurse), and then mimic a natural evolutionary process on these components to iteratively deliver better schedules. The worthiness of all components in the schedule has to be continuously demonstrated in order for them to remain there. This demonstration employs a dynamic evaluation function which evaluates how well each component contributes towards the final objective. Two perturbation steps are then applied: the first perturbation eliminates a number of components that are deemed not worthy to stay in the current schedule; the second perturbation may also throw out, with a low level of probability, some worthy components. The eliminated components are replenished with new ones using a set of constructive heuristics using local optimality criteria. Computational results using 52 data instances demonstrate the applicability of the proposed approach in solving real-world problems.
Resumo:
The thesis is focused on introducing basic MIMO-based and Massive MIMO-based systems and their possible benefits. Then going through the implementation options that we have, according to 3GPP standards, for 5G systems and how the transition is done from a non-standalone 5G RAN to a completely standalone 5G RAN. Having introduced the above-mentioned subjects and providing some definition of telecommunications principles, we move forward to a more technical analysis of the Capacity, Throughput, Power consumption, and Costs. Comparing all the mentioned parameters between a Massive-MIMO-based system and a MIMO-based system. In the analysis of power consumption and costs, we also introduce the concept of virtualization and its benefits in terms of both power and costs. Finally, we try to justify a trade-off between having a more reliable system with a high capacity and throughput while keeping the costs as low as possible.
Resumo:
Large component-based systems are often built from many of the same components. As individual component-based software systems are developed, tested and maintained, these shared components are repeatedly manipulated. As a result there are often significant overlaps and synergies across and among the different test efforts of different component-based systems. However, in practice, testers of different systems rarely collaborate, taking a test-all-by-yourself approach. As a result, redundant effort is spent testing common components, and important information that could be used to improve testing quality is lost. The goal of this research is to demonstrate that, if done properly, testers of shared software components can save effort by avoiding redundant work, and can improve the test effectiveness for each component as well as for each component-based software system by using information obtained when testing across multiple components. To achieve this goal I have developed collaborative testing techniques and tools for developers and testers of component-based systems with shared components, applied the techniques to subject systems, and evaluated the cost and effectiveness of applying the techniques. The dissertation research is organized in three parts. First, I investigated current testing practices for component-based software systems to find the testing overlap and synergy we conjectured exists. Second, I designed and implemented infrastructure and related tools to facilitate communication and data sharing between testers. Third, I designed two testing processes to implement different collaborative testing algorithms and applied them to large actively developed software systems. This dissertation has shown the benefits of collaborative testing across component developers who share their components. With collaborative testing, researchers can design algorithms and tools to support collaboration processes, achieve better efficiency in testing configurations, and discover inter-component compatibility faults within a minimal time window after they are introduced.
Resumo:
An efficient expert system for the power transformer condition assessment is presented in this paper. Through the application of Duval`s triangle and the method of the gas ratios a first assessment of the transformer condition is obtained in the form of a dissolved gas analysis (DGA) diagnosis according IEC 60599. As a second step, a knowledge mining procedure is performed, by conducting surveys whose results are fed into a first Type-2 Fuzzy Logic System (T2-FLS), in order to initially evaluate the condition of the equipment taking only the results of dissolved gas analysis into account. The output of this first T2-FLS is used as the input of a second T2-FLS, which additionally weighs up the condition of the paper-oil system. The output of this last T2-FLS is given in terms of words easily understandable by the maintenance personnel. The proposed assessing methodology has been validated for several cases of transformers in service. (C) 2010 Elsevier Ltd. All rights reserved.
Resumo:
A number of characteristics are boosting the eagerness of extending Ethernet to also cover factory-floor distributed real-time applications. Full-duplex links, non-blocking and priority-based switching, bandwidth availability, just to mention a few, are characteristics upon which that eagerness is building up. But, will Ethernet technologies really manage to replace traditional Fieldbus networks? Ethernet technology, by itself, does not include features above the lower layers of the OSI communication model. In the past few years, it is particularly significant the considerable amount of work that has been devoted to the timing analysis of Ethernet-based technologies. It happens, however, that the majority of those works are restricted to the analysis of sub-sets of the overall computing and communication system, thus without addressing timeliness at a holistic level. To this end, we are addressing a few inter-linked research topics with the purpose of setting a framework for the development of tools suitable to extract temporal properties of Commercial-Off-The-Shelf (COTS) Ethernet-based factory-floor distributed systems. This framework is being applied to a specific COTS technology, Ethernet/IP. In this paper, we reason about the modelling and simulation of Ethernet/IP-based systems, and on the use of statistical analysis techniques to provide usable results. Discrete event simulation models of a distributed system can be a powerful tool for the timeliness evaluation of the overall system, but particular care must be taken with the results provided by traditional statistical analysis techniques.
Resumo:
Learning systems are evolving from component based and centralized architectures towards service oriented and decentralized architectures. The standardization of e-learning content and interoperability is a powerful force in this evolution. In this chapter we put in perspective the evolution of e-learning systems and standards, and argue that specialized services will play an important role in future learning systems, especially in those targeted for competitive learning.
Resumo:
Text based on the paper presented at the Conference "Autonomous systems: inter-relations of technical and societal issues" held at Monte de Caparica (Portugal), Universidade Nova de Lisboa, November, 5th and 6th 2009 and organized by IET-Research Centre on Enterprise and Work Innovation
Resumo:
-