This paper presents a novel neural network architecture for the purpose of pervasive visualisation of a 3D human upper limb musculoskeletal system model. Bringing simulation capabilities to resource-poor systems like ...
详细信息
All-reduce is the crucial communication primitive to reduce model parameters in distributed Deep Neural Networks (DNN) training. Most existing all-reduce algorithms are designed for traditional electrical interconnect...
详细信息
Co-speech gesture generation on artificial agents has gained attention recently, mainly when it is based on data-driven models. However, end-to-end methods often fail to generate co-speech gestures related to semantic...
详细信息
ISBN:
(数字)9798350375022
ISBN:
(纸本)9798350375039
Co-speech gesture generation on artificial agents has gained attention recently, mainly when it is based on data-driven models. However, end-to-end methods often fail to generate co-speech gestures related to semantics with specific forms, i.e., Symbolic and Deictic gestures. In this work, we identify which words in a sentence are contextually related to Symbolic and Deictic gestures. Firstly, we appropriately chose 12 gestures recognized by people from the Italian culture, which different humanoid robots can reproduce. Then, we implemented two rule-based algorithms to label sentences with Symbolic and Deictic gestures. The rules depend on the semantic similarity scores computed with the RoBerta model between sentences that heuristically represent gestures and sub-sentences inside an objective sentence that artificial agents have to pronounce. We also implemented a baseline algorithm that assigns gestures without computing similarity scores. Finally, to validate the results, we asked 30 persons to label a set of sentences with Deictic and Symbolic gestures through a Graphical User Interface (GUI), and we compared the labels with the ones produced by our algorithms. For this scope, we computed Average Precision (AP) and Intersection Over Union (IOU) scores, and we evaluated the Average Computational time (ACT). Our results show that semantic similarity scores are useful for finding Symbolic and Deictic gestures in utterances.
Maintaining computer network security has long been an essential component of computer administration. Network security has become essential to companies' safety and steady development in real-time implementation ...
详细信息
Maintaining computer network security has long been an essential component of computer administration. Network security has become essential to companies' safety and steady development in real-time implementation for diverse physical domains employing computers. Establishing a specific physical domain has consistently included a priority job of improving the safety of computer systems management. Study results on the practical implementation of machine intelligence in network security maintenance. Specifically, this paper examines and offers security management techniques for computer network data protection to establish an all-encompassing security shield for networked computers, with the ultimate goal of improving the safety and reliability of the net-worked computers used in commercial settings. Furthermore, the comprehensive research analysis determines an architectural model for machine intelligence-based network security maintenance (MI-NSM), implying an intrusion detection scheme with a novel neural network system. Labelling important properties of objects or data points and searching for commonalities allows the auto-mobile's AI to distinguish between a human, the street, another car, and the sky. The simulation evaluation is performed using the NS2 simulator and observes the security maintenance efficiency over the current security solutions.
The requirements of distributedsystems implemented using IoT paradigms include the sharing of a common time reference. When the applications are intended for industrial scenarios, the desired time synchronization unc...
详细信息
ISBN:
(纸本)9781728148922
The requirements of distributedsystems implemented using IoT paradigms include the sharing of a common time reference. When the applications are intended for industrial scenarios, the desired time synchronization uncertainty decreases, due to the real-time needs of this kind of systems. Currently, the most diffused way to obtain a time reference for an Internet connected device is to use NTP (Network time Protocol) for querying time servers. This paper is focused on industrial IoT applications and it is aimed to evaluate the impact that NTP synchronization performance and NTP throughput may have on the real-time host network. Analytical formulas for estimating the NTP impact are introduced. The work is complemented by the presentation of a use case that shows the use of NTP for the synchronization of a large industrial plant at field level. The results highlight the threat to the real-time behavior of the automation system caused by the uncontrolled peaks of traffic due to NTP. Last, some design considerations for mitigation of the impact are discussed.
Image data is expanding rapidly, along with technology development, so efficient solutions must be considered to achieve high, real-time performance in the case of processing large image datasets. parallel processing ...
详细信息
Image data is expanding rapidly, along with technology development, so efficient solutions must be considered to achieve high, real-time performance in the case of processing large image datasets. parallel processing is increasingly used as an attractive alternative to improve the performance, when using existing distributed architectures but also for sequential commodity computers. It can provide speedup, efficiency, reliability, incremental growth, and flexibility. We present such an alternative and stress the effectiveness of the methods to accelerate computations on a small cluster of PCs compared to a single CPU. Our paper is focused on applying edge detection on large image data sets, as a fundamental and challenging task in image processing and computer vision. Five different techniques, mainly Sobel, Prewitt, LoG, Canny, and Roberts, are compared in a simple experimental setup that includes the OpenCV library functions for image pixels manipulation. Gaussian blur is used to reduce high-frequency components to manage the noise that edge detection is impacted by. Overall, this work is part of a more extensive investigation of image segmentation methods on large image datasets, but the results presented are relevant and show the effectiveness of our approach.
Typical equivalent circuit models for Lithium-ion batteries are represented in the form of the so-called Thevenin form. These models comprise a state of charge (SOC) controlled voltage source as well as lumped element...
详细信息
Typical equivalent circuit models for Lithium-ion batteries are represented in the form of the so-called Thevenin form. These models comprise a state of charge (SOC) controlled voltage source as well as lumped elements such as series resistances as well as at least one RC subnetwork to describe dynamic effects by the terminal current and voltage as input and output of the battery. In classical state estimation approaches, these characteristics are assumed to be identified beforehand, while aging of battery cells is related to a loss of the total capacity, changes in the charging/discharging efficiency, an increase of the Ohmic cell resistance, and/or changes of the time constants of the above-mentioned RC networks. Such variations can be estimated by means of additional parameters that are included in the system's state vector. However, the typically applied approaches do not allow for a direct identification of the nonlinear dependencies of the circuit elements on the SOC and other influence factors such as currents or the cell temperature. Therefore, this paper proposes a real-time capable, two-stage identification of these dependencies on the example of the open-circuit voltage by means of an Unscented Kalman Filter (UKF) approach. In the first stage, the state variables of the dynamic system model are estimated together with a lumped disturbance term (an additive correction of the open-circuit voltage). In the second stage, this disturbance term is used to correct the a-priori knowledge of the open-circuit voltage and to simultaneously express the identification quality in terms of covariances for the coefficients of its piecewise polynomial approximation in each temporal discretization step. The efficiency of the proposed methodology is demonstrated in simulations for an experimentally validated system model. Copyright (c) 2022 The Authors. This is an open access article under the CC BY-NC-ND license (https://***/licenses/by-nc-nd/4.0/)
Power Hardware-in-the-Loop (PHIL) is becoming increasingly popular for compartmentalized testing of electric power equipment in several areas such as in electric drive systems and distributed power generation systems....
Power Hardware-in-the-Loop (PHIL) is becoming increasingly popular for compartmentalized testing of electric power equipment in several areas such as in electric drive systems and distributed power generation systems. The fundamental idea of PHIL is to create flexible conditions for Devices under Test (DUT) to be properly assessed in realtime and dynamic conditions with their rated power levels. Connected to the DUT is the Power Amplifier (PA), which is responsible for increasing the voltage and current levels, given from the real-time Simulator (RTS). The DUT is a physical equipment and high-complexity models are used to control the PAs to emulate necessary conditions for the DUT to be evaluated. One of the main benefits of PHIL is that it can provide a platform for conducting a number of severe tests without risking damaging the equipment that is being emulated, while testing the actual response of the DUT. It can also help with the preliminary design and performance assessment of new types of machines, drivers and controllers, thus significantly reducing the time to market of new equipment. The flexibility of PHIL is also one of its main assets, since the combination of the RTS and the PA can be used for various applications only by changing the model and/or parameters of the emulated element. This thesis will evaluate the main architectures, control strategies and PHIL applications of PAs. Linear Power Amplifiers (LPA) provide an overall great performance due to its high bandwidth but are expensive, mostly at increased power ratings. For high PAs with fast dynamic response and reduced waveform distortion, the Hybrid Power Amplifier (HPA) configuration provides a good cost-performance compromise. HPAs are built essentially with the association of a low-cost Switch Mode Power Amplifier (SMPA) and an LPA. The first configuration to be investigated is the series connected HPA intended for high voltage systems. The SMPA consists of a Cascaded H-Bridge Multilevel (CH
Landslide hazards triggered by atmospheric precipitation and periodic water level fluctuations frequently occur in reservoir areas all over the world, resulting in severe fatalities and loss of properties. For the pur...
详细信息
Landslide hazards triggered by atmospheric precipitation and periodic water level fluctuations frequently occur in reservoir areas all over the world, resulting in severe fatalities and loss of properties. For the purpose of detecting geological disasters ahead of time, a series of advance monitoring techniques have been developed and applied to engineering practices. Among them, the distributed Fiber Optic Sensing (DFOS) technologies have shown their great potential for monitoring the tempo-spatial distribution of multi-fields (displacement, stress, temperature, seepage, etc.) of reservoir landslides. In this paper, the working principles, characteristics and applicability and these technologies are briefly introduced. In particularly, several representative DFOS-based monitoring instruments and equipment are elaborated, which have been successfully used in several landslides in Three Gorges Reservoir (TGR) area in China for long-term in situ observation and comprehensive evaluation of relevant geohazards. The monitoring results of Majiagou landslide show that the sliding surfaces, deformation pattern, and groundwater evolution can be sensitively captured based on the DFOS measurements. Seasonal rainfall and water level fluctuations are found to be the two main triggering factors of the landslide. Meanwhile, long time-series monitoring data shed a bright light on real-time deformation prediction and stability analyses of reservoir landslides. Finally, the challenges and future trends of applying the DFOS systems to landslide monitoring are summarized.
Typical infrastructure for big-data includes multiple machines with data accessed remotely with request-response patterns from different remote locations. Currently, most of the state-of-the-art remote invocation tech...
详细信息
Typical infrastructure for big-data includes multiple machines with data accessed remotely with request-response patterns from different remote locations. Currently, most of the state-of-the-art remote invocation techniques are focused on models for distributed interactions, which have not explored the advantages given by parallel computing, such as those offered to run on distributed stream processors. In this context, the article is focused on the definition of a predictable remote procedure call (RPC) able to take advantage from the distributed stream processing technology. Potentially, this type of infrastructure enables efficient parallel computations, reducing the effective response-time of end-to-end invocations linearly with the number of resources assigned to the system, as the data increases. The article describes a predictable model which defines maximum response-times for different types of applications described in the context of Apache Storm. Evaluation also offers clues on the performance one may expect from this type of infrastructure. (c) 2017 Elsevier B.V. All rights reserved.
暂无评论