The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents an effective design solution for a high-sensitivity current-shunt monitor which operates with an independent supply voltage from 5 to 16 V and achieves a wide input common-mode voltage range from −16 to 60 V. The proposed current-shunt monitor adopts two amplifiers, a current source and several resistors to constitute a feedback circuit and successfully sense drops across shunt...
Pneumatic control valves are the most frequently used actuators in industrial processes. Its property definitely affects the performance of processes and therefore process monitoring of the pneumatic control valve is of great importance. Canonical Variate Analysis (CVA) is a multivariate data-driven method which considers time correlations and has been demonstrated to be superior to some methods in...
In this paper, we consider the problem of removing outliers from phase measurements in phase of arrival (POA) based localization, applied for the landslide monitoring. Our approach adopts so called cumulative residues and recursively removing outliers. The simulation results show that the proposed method has successfully removed outliers.
Recently, 802.11ah with restricted access window for collision attenuation has been proposed for Internet of Things (IoT) applications. Random grouping of nodes in different access window is utilized to reduce the hidden node collision probability. However, when the coverage area of the sink node is large, the occurrence probability of hidden node problem is still high and severely impacts the system...
The Network on-Chip (NoC) is considered as an emerging technology for distributed embedded systems which is proposed as an alternative interconnection solution in Mutli-Processors System on-Chip (MPSoC). This paper proposes a graphical toll that allows researchers to generate and configure quickly their Network on-Chip in the hope to evaluate easily their contributions in no time. Unlike major existing...
The paper proposes a method for modeling risk management in multi-project environment. Simulation was conducted and the example was provided in the article.
There have been and there are still numerous initiatives aimed at improving the efficiency of Africa's trade corridors in order to make Africa more competitive in this modern and globalised world. If Africa is to fully participate in this emerging global phenomenon, the so called global value chains, then Africa has to immediately up her game in improving in all trade facilitating factors including...
Aviation maintenance is a critical role of aircraft life cycle operation supports, application of advanced Prognostics and Health Management (PHM) technology to aircraft health monitoring and maintenance being in the research stage, facing lack of engineering practices and data problems. In this paper, the concept of maintenance mode based on PHM is put forward. On the basis of traditional maintenance...
There are many software-based tools that can be used to evaluate the radio-ecological impacts. Plume Gaussian is a simple dispersion model, easy to be implemented and developed further. This paper describes the application of Plume Gaussian model to simulate the dispersion of I-131 released around the Serpong Nuclear Area (Kawasan Nuklir Serpong, KNS). The software development consists: mathematical...
Reproducibility of the execution of scientific applications on parallel and distributed systems is a growing interest, underlying the trustworthiness of the experiments and the conclusions derived from experiments. Dynamic loop scheduling (DLS) techniques are an effective approach towards performance improvement of scientific applications via load balancing. These techniques address algorithmic and...
This research focuses on improving business process worked under workflow simulation. In the business process, there are several properties to be considered such as person, cost, time. The current workflow simulation cannot combine these properties to simulate the situation for business decision making. In this paper, the improving business workflow simulation is proposed by adding the business properties...
Model-based simulation and monitoring are becoming part of advanced learning environments. In this paper, we propose a model-based simulation and monitoring framework for management of learning assessment and we describe its architecture and main functionalities. The proposed framework allows user-friendly learning simulation with a strong support for collaboration and social interactions. Moreover,...
In model-driven learning, simulation of Business Process is a key step for improving the learners's skills and enhancing teaching performance. In this paper, we provide the architectural design and the main functionalities of a model-based learning simulation framework. The main objectives of the proposed framework are: i) enable user-friendly learning simulation with a strong support for collaboration...
In this paper, we present Intercom, a simulator framework that provides separate components to address the interdependent aspects of IoT systems, such as sensing, physical interaction, wireless communication, and computation. We initially evaluate a scalable sensing and communication model, which simulates wireless signal strength measurements with an average error of 6.1dBm.
Although the area of surgical simulation has been the subject of study in recent years, it is still necessary to develop artificial experimental models with a perspective to dismiss the use of biological models. Since this makes the simulators more real, transferring the environment of the health professional to a physical or virtual reality, an anesthetic prototype has been developed, where the motor...
Computerized systems employed for the analysis of cardiotocographic signals have become almost indispensable tools in fetal monitoring, for which evaluation of fetal heart rate signals plays a key role. Consequently to the diffusion of these systems, new software and complex signal processing methodologies are spreading and are gaining more and more interest. For testing the performances of new software...
Smart Grids (SGs) are electrical power grid infrastructures that aim at managing both cyber and physical resources and provide efficient energy routing. The cyber part of the system encompasses computing and networking resources, whereas the physical part faces with mechanical and electrical processes. Due to the strong integration and interaction among cyber modules and physical components, the complexity...
To solve the problem of high-energy-consumption of Wireless Sensor Network (WSN) nodes and short WSN lifetime, considering the practical underground environment of coal mine, this paper proposes a novel event-driven WSN in the coal mine system. The paper also discusses different working patterns of the proposed event-driven WSN, and switching methods between them. According to the safety regulation...
With information development, increasing scope and complexity of network management, it is of great significance to achieve autonomic network management. In the relevant researches, system simulation is an indispensable link. The method of simulating the autonomic network management is proposed in this article. It can realize the simulation of system self-sensing, self-configuration, self-optimization,...
In this paper, a new cyber-attack is proposed for distributed systems, while detection of such an attack is recommended based on H-infinity filtering. In particular, we study the effect of a specific attack on the communication links between local control centers. Today's cyber-physical systems are complex and large scale, so that they are distributed over a large area. Using distributed control and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.