This paper deals with the identification of errors-in-variables models where the additive input and output noises are mutually correlated white processes. The proposed solution is based on the extension of the dynamic...
详细信息
The purpose of this paper is to review existing sensor and sensor network ontologies to understand whether they can be reused as a basis for a manufacturing perception sensor ontology, or if the existing ontologies ho...
详细信息
The purpose of this paper is to review existing sensor and sensor network ontologies to understand whether they can be reused as a basis for a manufacturing perception sensor ontology, or if the existing ontologies hold lessons for the development of a new ontology. We develop an initial set of requirements that should apply to a manufacturing perception sensor ontology. These initial requirements are used in reviewing selected existing sensor ontologies. Additionally, we present our developed sensor ontology thus far that incorporates a refined list of requirements. This paper describes 1) extending and refining the requirements; 2) proposing hierarchical structures for verifying the purposes of the ontology; 3) choosing appropriate tools and languages (e.g., OWL (Web Ontology Language) [1] and SensorML (Sensor Markup Language) [2]) to support such an ontology; and 4) extending the Semantic Sensor Network (SSN) ontology with a set of refined requirements (i.e., our developed ontology). This work will be proposed as a standard within the IEEE (Institute of Electrical and Electronics Engineers) Robotics and Automation Society (RAS) Ontologies for Robotics Automation (ORA) Working Group [3].
In large projects parallelization of existing programs or refactoring of source code is time consuming as well as error-prone and would benefit from tool support. However, existing automatic transformation systems are...
详细信息
In large projects parallelization of existing programs or refactoring of source code is time consuming as well as error-prone and would benefit from tool support. However, existing automatic transformation systems are not extensively used because they either require tedious definitions of source code transformations or they lack general adaptability. In our approach, a programmer changes code inside a project, resulting in before and after source code versions. The difference (the generated transformation) is stored in a database. When presented with some arbitrary code, our tool mines the database to determine which of the generalized transformations possibly apply. Our system is different from a pure compiler based (semantics preserving) approach as we only suggest code modifications. Our contribution is a set of generalizing annotations that we have found by analyzing recurring patterns in open source projects. We show the usability of our system and the annotations by finding matches and applying generated transformations in real-world applications.
This paper deals with the implementation of a Nonlinear Interference Suppressor (NIS) into a wireless LTE transceiver. This within the context of high energy efficient multi-standard transceivers controlled by a cogni...
详细信息
ISBN:
(纸本)9781467318129
This paper deals with the implementation of a Nonlinear Interference Suppressor (NIS) into a wireless LTE transceiver. This within the context of high energy efficient multi-standard transceivers controlled by a cognitive radio platform. In multimode transceivers, the transmitter for one communication standard may induce a large interferer in the receiver for another standard. To linearly suppress this interferer, which can be several orders of magnitude larger than the desired received signal, the receiver should have a very large linear dynamic range, resulting in excessive power consumption. For this reason, we consider the NIS, a closed-loop tuning method that exploits the locally available interference as side information. The wireless LTE transceiver model, includes all the baseband signal treatment blocks and the RF front-end of a low IF direct conversion receiver architecture. A mobile WiMAX signal is considered as the interference signal at the receiver. The obtained symbol error rate (SER) is observed for different system configurations. Matlab simulation results in this practical scenario show that the NIS can strongly suppress the interferer while a symbol error rate performance close to that of an exactly linear receiver is achieved. This results permit to identify perspective directions for the better multi-standard and high energy efficient transceivers implementation.
Management control in public university hospitals is a challenging task because of continuous changes due to external pressures (e.g. economic pressures, stakeholder focuses and scientific progress) and internal compl...
详细信息
Management control in public university hospitals is a challenging task because of continuous changes due to external pressures (e.g. economic pressures, stakeholder focuses and scientific progress) and internal complexities (top management turnover, shared leadership, technological evolution, and researcher oriented mission). Interactive budgeting contributed to improving vertical and horizontal communication between hospital and stakeholders and between different organizational levels. This paper describes an application of Analytic Hierarchy Process (AHP) to enhance interactive budgeting in one of the biggest public university hospital in Italy. AHP improved budget allocation facilitating elicitation and formalization of units' needs. Furthermore, AHP facilitated vertical communication among manager and stakeholders, as it allowed multilevel hierarchical representation of hospital needs, and horizontal communication among staff of the same hospital, as it allowed units' need prioritization and standardization, with a scientific multi-criteria approach, without using complex mathematics. Finally, AHP allowed traceability of a complex decision making processes (as budget allocation), this aspect being of paramount importance in public sectors, where managers are called to respond to many different stakeholders about their choices.
We investigate evolutionary computation approaches as a mechanism to program networks of excitable chemical droplets. For this kind of systems, we assigned a specific task and concentrated on the characteristics of si...
详细信息
A new stability analysis technique for systems composed of a differential equation coupled with a continuous time difference equation is proposed. It is based on the explicit construction of Lyapunov functionals from ...
详细信息
ISBN:
(纸本)9781467357159
A new stability analysis technique for systems composed of a differential equation coupled with a continuous time difference equation is proposed. It is based on the explicit construction of Lyapunov functionals from the knowledge of Lyapunov functions for subsystems. Robustness results of iISS type are inferred from these functionals.
Cloud computing has emerged as a new paradigm where IT resources are offered by cloud providers in a flexible and elastic way. However, the use and development of cloud services has not been standardized, thereby deri...
详细信息
ISBN:
(纸本)9781450315661
Cloud computing has emerged as a new paradigm where IT resources are offered by cloud providers in a flexible and elastic way. However, the use and development of cloud services has not been standardized, thereby deriving in migratability and interoperability difficulties. Different standardization initiatives exist seeking to normalize this situation, however none has predominated and a generalized consensus has not been reached. Consequently, several alternatives have been proposed based on the use of intermediate layers or middlewares seeking to isolate developers from the variability of specific cloud vendor services. These approaches provide a valid solution at the risk of shifting the lock-in effect from vendors to middlewares. In this paper, we explore an alternative solution based on the use of software adaptation (SA) techniques. Different guidelines are presented as the basis of an approach that will favor cloud application interoperability and migratability thereby avoiding vendor lock-in.
暂无评论