The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The methodology of case base reasoning (CBR) is proposed to perform supervisory tasks in industrial process. An outlook of main difficulties in applying this methodology in dynamic systems is contrasted with the benefits of applying it. A generic case definition is proposed to achieve supervisory tasks in the domain of dynamic systems. This methodology has been implemented for improving the control...
In this paper Principal Components Analysis (PCA) is used for detecting faults in a plant with multiple operation modes. PCA reduces the dimensionality of the original historical data by projecting it onto a lower dimensionality space. It obtains the principal causes of variability in a process. If some of these causes change, it can be due to a fault in the process. The classical PCA approach confuses...
We studied 58 patients, age 59±13 years, 52% males, with renal disease duration 9.7±6.7 years and haemodialysis (HD) duration 5.2±4.4 years. Digital ECGs were recorded before and after HD. Serum electrolytes (potassium-K, sodium-Na, phosphorus-Ph and calcium-Ca), urea and creatinine levels were evaluated. Percentage change of the above mentioned parameters during HD was estimated.
Permissions-based security model of Android increasingly shows its vulnerability in protecting users' privacy information. According to the permissions-based security model, an application should have the appropriate permissions before gaining various resources (including data and hardware) in the phone. This model can only restrict an application to access system resources without appropriate permissions,...
Respiration rate (RR) is one of the important vital signs used for clinical monitoring of neonates in intensive care units. Due to the fragile skin of the neonates, it is preferable to have monitoring systems with minimal contact with the neonate. Recently, several methods have been proposed for contact-free monitoring of vital signs using a video camera. Detection of the chest-and-abdomen region...
Data with high security requirements is being processed and stored with increasing frequency in the Cloud. To guarantee that the data is being dealt in a secure manner we investigate the applicability of Assurance methodologies. In a typical Cloud environment the setup of multiple layers and different stakeholders determines security properties of individual components that are used to compose Cloud...
In order to overcome the imperfection and insufficiency of the conventional fault diagnosis based on fuzzy logic, the concept of relative inferiority degree is introduced to represent the conversion degree from the actual state to failure state. Using the relative inferiority degree as an input to build the membership function of the fuzzy logic, an improved fault diagnosis model based on the fuzzy...
In this article, a model migration strategy based on subspace separation is proposed for process monitoring by taking advantage of common information between an old process and a new process. Firstly, a global basis vector is extracted and deemed to enclose the cross-set similar correlations. Then two different subspaces are separated from each other in the new dataset. The kernel principal component...
P2P technology has been widely applied in many areas due to its excellent properties. Some botnets also shift towards the decentralized architectures, since they provide a better resiliency against detection and takedown efforts. Besides, modern P2P bots tend to run on compromised hosts in a stealthy way, which renders most existing approaches ineffective. In addition, few approaches address the problem...
For a large-scale software system, especially an online service system, when a performance issue occurs, it is desirable to check whether this issue has occurred before. If there are past similar issues, a known remedy could be applied. Otherwise, a new troubleshooting process may have to be initiated. The symptom of a performance issue can be characterized by a set of metrics. Due to the sophisticated...
Ambient Assisted Living (AAL) is considered as the main technological solution that will enable the aged and people in recovery to maintain their independence and a consequent high quality of life for a longer period of time than would otherwise be the case. This goal is achieved by monitoring human's activities and deploying the appropriate collection of services to set environmental features and...
The Pacific Northwest Geodesic Array at Central Washington University collects telemetered streaming data from 450 GPS stations. These real-time data are used to monitor and mitigate natural hazards arising from earthquakes, volcanic eruptions, landslides, and coastal sea-level hazards in the Pacific Northwest. Recent improvements in both accuracy of positioning measurements and latency of terrestrial...
Increased functional density with shrinking technology could result in escalating noise-induced failures in the field. Further, the low correlation between system level functional test and production test is making it difficult to better screen parts that would fail in the field due to noise. To address these issues, in this paper we present a light-weight fully digital on-chip distributed sensor...
In the deep nanoscale regime, process and runtime variations have emerged as the major sources of uncertainty and unpredictability in circuit operation. Static mitigation approaches do not consider the dependence of variations on workload and chip usage, while adaptive techniques do not incorporate detailed circuit-level information. We propose a fine-grained adaptive technique in which machine learning...
Encryption is a key ingredient in the preservation of the confidentiality of network communications but can also be at odds with the mission of Intrusion Detection Systems (IDSes) to monitor traffic. This affects Advanced Metering Infrastructures (AMIs) too where the scale of the network and the sensitivity of communication make deploying IDSes along with encryption solutions mandatory. In this paper,...
Energy disaggregation is to discover the energy consumption of individual appliances from their aggregated energy values. To solve the problem, most existing approaches rely on either appliances' signatures or their state transition patterns, both hard to obtain in practice. Aiming at developing a simple, universal model that works without depending on sophisticated machine learning techniques or...
Non-Intrusive Load Monitoring (NILM) Systems are one of the main proposals to characterize the household power consumption. This work proposes an alignment method based on the low frequency band power consumption which overrides the high frequency noise. To this end, a Gaussian kernel its used to smooth the power signal in order to obtain the right time where a device is turned on, and therefore making...
One of the most important features in smart grid is power system self-healing and power quality improvement. Power quality monitoring is essential to realize this feature. Installing power quality monitors (PQM) in every component of the power network is not feasible due to economic reasons. So how to find the optimal number and locations of power quality monitors while maintaining system observability...
Short-circuit fault of stator winding due to aging of electrical insulation is one of the most probable faults in motor drive systems. The authors have proposed a simple method for diagnosing the fault probabilistically by considering distributions of features, i.e. magnitude and phase of load current. Laboratory experiments proved that the method was promising. In order to enhance accuracy of diagnosis,...
There is a tremendous amount of attention being focused on improving human health these days. The World Health Organization (WHO) statistics show that disease and mortality rate greatly depend on access to proper healthcare, which is not available to a vast majority of the global population. This technical paper presents our vision of automating some of the healthcare functions such as monitoring...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.