Fault detection is important for effective and safe process operation. Partial least squares (PLS) has been used successfully in fault detection for multivariate processes with highly correlated variables. However, th...
详细信息
Fault detection is important for effective and safe process operation. Partial least squares (PLS) has been used successfully in fault detection for multivariate processes with highly correlated variables. However, the conventional PLS-based detection metrics, such as the Hotelling's T 2 and the Q statistics are not well suited to detect small faults because they only use information about the process in the most recent observation. Exponentially weighed moving average (EWMA), however, has been shown to be more sensitive to small shifts in the mean of process variables. In this paper, a PLS-based EWMA fault detection method is proposed for monitoring processes represented by PLS models. The performance of the proposed method is compared with that of the traditional PLS-based fault detection method through a simulated example involving various fault scenarios that could be encountered in real processes. The simulation results clearly show the effectiveness of the proposed method over the conventional PLS method.
This research paper examined the connectedness of STEM faculty to others both within and across academic departments who might be potential resources for diffusion of Learner-centered practices, and the impact of part...
This work presents an algorithm for automated real-time ramp detection using 3D point cloud data in the context of shared-control powered wheelchairs. Limitations in the interfaces available to those with severe motor...
详细信息
ISBN:
(纸本)9781509039302
This work presents an algorithm for automated real-time ramp detection using 3D point cloud data in the context of shared-control powered wheelchairs. Limitations in the interfaces available to those with severe motor impairments can make basic maneuvering tasks with powered wheelchairs difficult. Although a significant amount of work has been done on obstacle detection and avoidance, much less attention has been given to algorithms for the safe and reliable detection of ramps and inclines;even though navigating these structures is an important part of urban life. We provide an algorithmic solution for accurately detecting traversable inclines for applications with powered wheelchairs using the Point Cloud Library (PCL) within the Robotics Operating System (ROS) framework. All algorithms are implemented first in simulation and later evaluated on data obtained from indoor and outdoor urban environments. We measure the performance of our algorithm with systematic testing on several different ramp structures, observed from varied viewpoints. Results show that our algorithm is successful in detecting the orientation, slope, and width of traversable ramps with up to 100% accuracy and an average detection accuracy of 88%.
There are several ways to deal with security issues of confidential data sent via the internet, including using cryptographic techniques and steganography. Steganography is the science and art of concealing informatio...
There are several ways to deal with security issues of confidential data sent via the internet, including using cryptographic techniques and steganography. Steganography is the science and art of concealing information / messages in a media in such a way that its existence is not detected by other parties who are not entitled to the information. Instead, cryptography disguises the meaning of a message, but does not hide that there is a message because the file looks suspicious. The Steganography technique used here was End Of File (EOF). The EOF technique described how to add data or files at the end of the image file. For this technique, the size of data or files that will be hidden could be larger than the size of the image file. The hidden data will be inserted at the end of the file so that it will not affect the image. This steganography application is also equipped with a cryptographic function Data Encryption Standard (DES) at the time of insertion of data that functions as a generator code and encrypts data, so that the security of a data in the file is more protected and protected from those who are not entitled to know the data.
We present a novel nearest neighbor search scheme named aggregating tree (A-Tree) for high dimensional data that uses vector quantization encodings (VQ-encodings) to build a radix tree, and perform the nearest neighbo...
详细信息
ISBN:
(纸本)9781509059119
We present a novel nearest neighbor search scheme named aggregating tree (A-Tree) for high dimensional data that uses vector quantization encodings (VQ-encodings) to build a radix tree, and perform the nearest neighbor search by beam search. To search accurately and efficiently, we suggest VQ-encodings to satisfy locally aggregating encoding criterion: for any node of the corresponding A-Tree, neighboring vectors should aggregate in fewer subtrees to make beam search efficient. We suggest another two criteria for effective VQ-encodings which resembles balanced and uncorrelated bit criteria for hashing codes. We use generalized residual vector quantization (GRVQ) encodings to build A-Tree to meet the suggested criteria, and this combination shows significantly better performances. Our methods are validated on several standard benchmark datasets, including one containing a billion vectors. Experimental results show the superior efficiency and effectiveness of our proposed methods compared to the state-of-the-art.
High-performance materials rely on small reorganization energies to facilitate both charge separation and charge transport. Here, we performed DFT calculations to predict small reorganization energies of rectangular s...
详细信息
While physical coordinates are useful for IoT and sensor network operations, physical localization is not a viable option for large-scale networks of simple devices in complex or harsh environments. Topology Preservin...
详细信息
ISBN:
(纸本)9781479966653
While physical coordinates are useful for IoT and sensor network operations, physical localization is not a viable option for large-scale networks of simple devices in complex or harsh environments. Topology Preserving Maps (TPM) extracted from anchor-based Virtual Coordinates (VCs) are an attractive localization free alternative for physical maps. We present an approach, based on the theory of low-rank matrix completion, to extract TPMs with only partial information about VCs. Evaluation using 2D and 3D networks with random anchors shows that accurate TPMs can be obtained even when up to 40% to 60% of random coordinates are missing. Coordinate generation and communication cost thus may be reduced significantly. TPM generation can now also be based on a different VC system as long as it characterizes each node with distances to a small set of random nodes instead of a global set of anchors.
The standard treatment of quantum corrections to semiclassical electronic conduction assumes that charge carriers propagate many wavelengths between scattering events, and succeeds in explaining multiple phenomena (we...
详细信息
High-performance materials rely on small reorganization energies to facilitate both charge separation and charge transport. Here, we performed DFT calculations to predict small reorganization energies of rectangular s...
详细信息
暂无评论