The common and well-accepted architectures for monitoring underwater (UW) environments involve UW drones for collecting information and fixed buoys to relay the information outside the water. Fixed buoys lead to some ...
详细信息
ISBN:
(纸本)9798350303582;9798350303599
The common and well-accepted architectures for monitoring underwater (UW) environments involve UW drones for collecting information and fixed buoys to relay the information outside the water. Fixed buoys lead to some disadvantages, such as their high cost and limited coverage of UW devices. To address these problems, new architectures are considered in the literature, where the buoys are eliminated and instead aerial drones are used for collecting data from the UW ones. These architectures potentially lead to improved and more flexible UW monitoring and control. The existing literature for these novel architectures includes some channel models for optical wireless communication through the water-air (W-A) interface. The primary drawback of these models lies in the fusion of the received rays. Furthermore, the mathematical analysis is mostly carried out in 2D and then extended to 3D, leading to reduced modeling accuracy. In this paper, an accurate 3D ray-tracing solution is proposed for channel modeling and simulation of communication through W-A, where the rays observed at the receiver through multi-path are properly combined. Numerical analysis reveals insights and suggestions on optical channel gain variation over time, and also some conclusions on the overall communication system design, such as the best depth of UW devices and the best height of aerial drones.
In this paper, we define reduced dimensional predictors in latent dynamic systems in contrast to the traditional full-dimensional predictor models. Then the estimation of the new latent vector autoregressive model is ...
详细信息
Correcting students' multiple-choice answers is a repetitive and mechanical task that can be considered an image multi-classification task. Assuming possible options are 'abcd' and the correct option is on...
详细信息
The accelerated melting of the Himalayan glaciers due to climate change has caused significant issues including Glacier Lake Outburst Floods (GLOFs), to the downstream communities and the infrastructure. This study fo...
详细信息
Threat Modelling allows defenders to identify threats to which the target system is exposed. Such a process requires a detailed infrastructure analysis to map threats to assets and to identify possible flaws. Unfortun...
详细信息
Threat Modelling allows defenders to identify threats to which the target system is exposed. Such a process requires a detailed infrastructure analysis to map threats to assets and to identify possible flaws. Unfortunately, the process is still mostly done manually and without the support of formally sound approaches. Moreover, Threat Modelling often involves teams with different levels of security knowledge, leading to different possible interpretation in the system under analysis representation. Threat modelling automation comes with two main challenges: (i) the need for a standard representation of models and data used in various stages of the process, establishing a formal vocabulary for all involved parties, and (ii) the requirement for a well-defined inference rule set enabling reasoning process automation for threat identification. The paper presents the ThreMA approach to automating threat modelling for ICT infrastructures, aiming at addressing the key automation issues through the use of ontologies. Specifically, a formal vocabulary for modelling an ICT infrastructure, a threat catalog and a set of inference rules needed to support the reasoning process for threat identification are provided. The proposed approach has been validated against actual significant case studies provided by different Stakeholders of the Italian Public Sector.
The aim of this paper is to model the semifinished gear wheel tip using a coil and the resources provided by the FLUX 2D program. In this case, the inductor was assumed to be supplied with a voltage at its terminals, ...
详细信息
Wireless power transfer system in commercial electronic devices often employ duty cycle control for enhanced load regulation capabilities. When the transmitter operates in deep duty cycle mode, e.g. under light load c...
详细信息
ISBN:
(纸本)9798350316643
Wireless power transfer system in commercial electronic devices often employ duty cycle control for enhanced load regulation capabilities. When the transmitter operates in deep duty cycle mode, e.g. under light load conditions, power receivers based on synchronous rectifiers can exhibit significant voltage ringings on the ac nodes. For receiver-side in-band communication demodulation (e.g. frequency-shift keying as regulated in WPC Qi standards), these transient ringings can be particularly concerning as they can cause data decoding errors, resulting in frequent charging disruptions. While there is a clear need to better understand the ac ringing patterns, most existing literature provide sets of transcendental equations that have no easy analytical solutions. This paper introduces a modeling approach for ringings in duty cycle mode, together with the simplifying assumptions that allow derivations of the ringing waveform without overly complex timing analysis. Good matching is achieved between the analytical predictions, circuit simulations, and experimental results. The proposed method enables highlighting of likely problematic operating scenarios for enhanced in-band communication robustness.
In the era of big data and information, the traditional management of student behaviour is increasingly showing the disadvantages of untimely intervention and"backwardness" of the governance model. Nowadays,...
详细信息
In the article a natural gas deposit is considered as an object with distributed parameters. Mathematical modeling of the process of depletion of the gas deposit taking into account the spatial distribution of paramet...
详细信息
In response to the immense workload and error-prone nature of manually confirming the correct names of devices on the graphical user interface (GUI) of railway station layouts in large stations, which leads to ineffic...
详细信息
ISBN:
(纸本)9798400718267
In response to the immense workload and error-prone nature of manually confirming the correct names of devices on the graphical user interface (GUI) of railway station layouts in large stations, which leads to inefficiency and long processing times, this paper proposes a method for reading interface information of railway computer interlocking station using OpenCV image processing. Validated station layout diagrams are employed as inputs to the image recognition system. By analyzing the graphical features of signal devices, a data model is generated, and a recognition process is designed utilizing OpenCV computer vision library and algorithms for image recognition. This process correctly associates the graphical representations of devices in the interlocking station GUI with their corresponding device names. This method can validate station data, thereby improving its reliability.
暂无评论