The HomeCare is a special monitoring system of the basic life functions. It has been primarily designed to take care for elderly people. But many of the designed devices could be used in the other branches of biotelem...
详细信息
The HomeCare is a special monitoring system of the basic life functions. It has been primarily designed to take care for elderly people. But many of the designed devices could be used in the other branches of biotelemetry. Our HomeCare system is designed with respect to user comfort and it uses as cheap technical solutions as possible. In cooperation with the Ostrava University a Homecare Testing Flat has been realized. There are tested our Homecare solutions in vivo. This article is focused on the designed HomeCare system, on measured parameters and on used wireless technologies. The Circadian rhythm measurement and its usage in the HomeCare system are discussed in the article too.
作者:
Desbiens, A.Núñez, E.Del Villar, R.Hodouin, D.Poulin, É.
Department of Electrical and Computer Engineering Pavillon Pouliot Québec City QC G1V 0A6 Canada Process Control Group
Xstrata Process Support Centre P.O. Box 40 Falconbridge ON P0M 1S0 Canada
Department of Mining Metallurgical and Materials Engineering Pavillon Pouliot Québec City QC G1V 0A6 Canada
Because of globalization and international competition, mineral processing plant managers seek at reducing production costs. These plants are major energy consumers and therefore energy efficiency is becoming an impor...
详细信息
Because of globalization and international competition, mineral processing plant managers seek at reducing production costs. These plants are major energy consumers and therefore energy efficiency is becoming an important objective. Other incentives are the energy cost that will probably continue to rise and the environmental and social pressures for reducing energy consumption. Using more energy efficient equipment is a first approach. Better plant operation using on-line data processing, as described in this paper, is another way to improve energy efficiency. On-line data processing consists in using the measurements provided by sensors and the knowledge of the plant behaviour to automatically, continuously and adequately manipulate plant actuators. An ideal on-line data processing is made up of three hierarchic layers: process observation, process control and process optimization. The layers, their interaction and their energetic benefits are described. Some case studies illustrate the energy efficiency improvements provided to mineral processing plants by using on-line data processing techniques.
In conventional signature analysis, faulty units are identified by mismatch between the actual and reference signatures. The amount of reference signatures can be quite large for a complex system that requires high te...
详细信息
In conventional signature analysis, faulty units are identified by mismatch between the actual and reference signatures. The amount of reference signatures can be quite large for a complex system that requires high testing resolution. This complicates the diagnosis procedure. We show how under certain restrictions this amount can be reduced, preserving the diagnosis resolution and the aliasing rate. We construct a signature analyzer that is capable of locating faulty units. If the analyzer is implemented in the external automated test equipment, its throughput requirements can be diminished.
In this paper, an input/output system identification technique for the Wiener-Hammerstein model and its feedback extension is proposed. In the proposed framework, the identification of the nonlinearity is non-parametr...
详细信息
ISBN:
(纸本)9781424431236
In this paper, an input/output system identification technique for the Wiener-Hammerstein model and its feedback extension is proposed. In the proposed framework, the identification of the nonlinearity is non-parametric. The identification problem can be formulated as a non-convex quadratic program (QP). A convex semidefinite programming (SDP) relaxation is then formulated and solved to obtain a sub-optimal solution to the original non-convex QP. The convex relaxation turns out to be tight in most cases. Combined with the use of local search, high quality solutions to the Wiener-Hammerstein identification can frequently be found. As an application example, randomly generated Wiener-Hammerstein models are identified.
A novel polarization-frequency-multiplexing scheme is implemented to suppress noise in a fiber-based Gaussian-modulated coherent-state quantum key distribution system. The achievable secrete key rate is 0.30 bit/pulse...
详细信息
ISBN:
(纸本)9781557528599
A novel polarization-frequency-multiplexing scheme is implemented to suppress noise in a fiber-based Gaussian-modulated coherent-state quantum key distribution system. The achievable secrete key rate is 0.30 bit/pulse with a 5 km-fiber and 0.05 bit/pulse with a 20 km-fiber.
Brain emotional learning based intelligent controller (BELBIC) is based on computational model of limbic system in the mammalian brain. In recent years, this model was applied in many linear and nonlinear control appl...
Brain emotional learning based intelligent controller (BELBIC) is based on computational model of limbic system in the mammalian brain. In recent years, this model was applied in many linear and nonlinear control applications. Previous studies show that this controller has fast response, simple implementation and robustness with respect to disturbances. It is also possible to define emotional signal based on control application objectives. But in the previous studies, internal instability of this controller was not considered and control task were done in limited time period. In this article mathematical description of BELBIC is investigated and improved to avoid internal instability. Simulation and implementation of improved model was done on level plant. The obtained results showed that instability of model has been solved in the new model without loss of performance by using Integral Anti Windup (IAW).
We describe various results related to the random-party distillation of multiparty entangled states—that is, conversion of such states into entangled states shared between fewer parties, where those parties are not p...
详细信息
We describe various results related to the random-party distillation of multiparty entangled states—that is, conversion of such states into entangled states shared between fewer parties, where those parties are not predetermined. In previous work we showed that certain output states (namely Einstein-Podolsky-Rosen pairs) could be reliably acquired from a prescribed initial multipartite state [namely the W state |W⟩=13(|100⟩+|010⟩+|001⟩)] via random-party distillation that could not be reliably created between predetermined parties. Here we provide a more rigorous definition of what constitutes “advantageous” random-party distillation. We show that random-party distillation is always advantageous for W-class three-qubit states (but only sometimes for Greenberger-Horne-Zeilinger class states). We show that the general class of multiparty states known as symmetric Dicke states can be readily converted to many other states in the class via random-party distillation. Finally we show that random-party distillation is provably not advantageous in the limit of multiple copies of pure states.
The security of a standard bidirectional “plug-and-play” quantum key distribution (QKD) system has been an open question for a long time. This is mainly because its source is equivalently controlled by an eavesdropp...
详细信息
The security of a standard bidirectional “plug-and-play” quantum key distribution (QKD) system has been an open question for a long time. This is mainly because its source is equivalently controlled by an eavesdropper, which means the source is unknown and untrusted. Qualitative discussion on this subject has been made previously. In this paper, we solve this question directly by presenting the quantitative security analysis on a general class of QKD protocols whose sources are unknown and untrusted. The securities of standard Bennett-Brassard 1984 protocol, weak+vacuum decoy state protocol, and one-decoy state protocol, with unknown and untrusted sources are rigorously proved. We derive rigorous lower bounds to the secure key generation rates of the above three protocols. Our numerical simulation results show that QKD with an untrusted source gives a key generation rate that is close to that with a trusted source.
Quantum-key-distribution (QKD) systems can send quantum signals over more than 100km standard optical fiber and are widely believed to be secure. Here, we show experimentally a technologically feasible attack—namely,...
详细信息
Quantum-key-distribution (QKD) systems can send quantum signals over more than 100km standard optical fiber and are widely believed to be secure. Here, we show experimentally a technologically feasible attack—namely, the time-shift attack—against a commercial QKD system. Our result shows that, contrary to popular belief, an eavesdropper, Eve, has a non-negligible probability (∼4%) to break the security of the system. Eve’s success is due to the well-known detection efficiency loophole in the experimental testing of Bell’s inequalities. Therefore, the detection efficiency loophole plays a key role not only in fundamental physics, but also in technological applications such as QKD systems.
Eight years on from the start of the development of the aLF (active Learning Framework) platform, by the Innova group (in the LINED, Spain), we have approximately 100,000 users grouped in more than 500 virtual learnin...
详细信息
ISBN:
(纸本)9781424419692
Eight years on from the start of the development of the aLF (active Learning Framework) platform, by the Innova group (in the LINED, Spain), we have approximately 100,000 users grouped in more than 500 virtual learning communities. The development of an integrated space of communities and courses has provided a unified model adapted to the new European Higher Education Area (EHEA). In the first part of the paper the fundamentals of aLF are discussed, and the service model provided based on the concept of virtual community. Following the description of aLF, how the official digital repository (based on an application of Fedora) has been integrated into aLF to allow professors and students to search for (and retrieve) digital content (audio and video generated from more than 30 years of LINED activity and references from papers) is described. The paper will discuss the application developed together with the advantages of using it: recorded classes reused in the courses, access to institutional library material in a distance education model and a simple way of consulting related content to help students in their learning activities.
暂无评论