The article presents two approaches to the method of implementation of transformations of fuzzy queries into queries in the SQL standard. This implementation can be carried out: (1) in a database (in the form of funct...
详细信息
ISBN:
(纸本)9781728140704
The article presents two approaches to the method of implementation of transformations of fuzzy queries into queries in the SQL standard. This implementation can be carried out: (1) in a database (in the form of functions, procedures, triggers or other acceptable form), using the existing query processing system in the database, and thus it can expand the functionality of that database;(2) in an application (which communicates with the database), and thus a considerable portion of calculations will be transferred from the database to that application. An analysis of those approaches was conducted and it was demonstrated that the presented methods should enjoy extensive practical application.
Calculation of the energy losses is a very important problem for the distribution networks exploitation. The paper presents the linear model of the LV distribution network for the energy losses calculation. The compar...
详细信息
Calculation of the energy losses is a very important problem for the distribution networks exploitation. The paper presents the linear model of the LV distribution network for the energy losses calculation. The comparison of calculation results for different ways of agregation of energy losses magnitudes are presented in the paper.
The paper deals with the calculation of hysteresis power loss in cores of electromechanical converters. The analysis was carried out using the Jiles-Atherton model of ferromagnetic hysteresis incorporated into two-dim...
详细信息
The paper deals with the calculation of hysteresis power loss in cores of electromechanical converters. The analysis was carried out using the Jiles-Atherton model of ferromagnetic hysteresis incorporated into two-dimensional time-stepping finite element model. A vector hysteresis model was constructed by the vectorisation of a scalar model. The total power loss due to hysteresis was split into two component, one originating from the purely alternating magnetic field, and the second being a consequence of the local predomination of vector nature of magnetic field distribution. Two computational examples are presented showing the general applicability of the algorithm for determination of power loss distribution.
This paper presents the performance analysis and the most significant design decisions taken to improve the runtime performance of a quality-diversity volume rendering framework, focusing on using parallel and distrib...
详细信息
ISBN:
(数字)9798350364293
ISBN:
(纸本)9798350364309
This paper presents the performance analysis and the most significant design decisions taken to improve the runtime performance of a quality-diversity volume rendering framework, focusing on using parallel and distributed computing to optimize specific stages within the framework pipeline. After considering the benefits and trade-offs of several aspects like minimization of execution time, portability and hardware independence, we developed a hybrid CPU-GPU parallel computing model that increased the overall efficiency. Using this model, we achieved significant improvement in runtime speed for critical components of the framework compared to the sequential implementation. Additionally, this model can be applied in a wide range of scenarios, where the performance improvements provided by GPU processing can be complemented by CPU parallelization, with better runtime results.
This paper presents a blockchain-based platform for managing and issuing academic certificates that features security, transparency, non-repudiation and traceability. Relying on the security provided by Ethereum block...
详细信息
ISBN:
(数字)9798350364293
ISBN:
(纸本)9798350364309
This paper presents a blockchain-based platform for managing and issuing academic certificates that features security, transparency, non-repudiation and traceability. Relying on the security provided by Ethereum blockchain and using asymmetrical cryptography in certificate generation, combined with certificate revocation mechanisms, the proposed platform offers a reliable, decentralized and secure solution that can be used by academic institutions to streamline the management of academic certificates and reduce bureaucracy.
This paper presents an algorithmic approach for segmenting news broadcasts produced by television stations. The proposed approach uses advanced signal processing techniques to extract and classify audio segments from ...
详细信息
ISBN:
(数字)9798350364293
ISBN:
(纸本)9798350364309
This paper presents an algorithmic approach for segmenting news broadcasts produced by television stations. The proposed approach uses advanced signal processing techniques to extract and classify audio segments from Romanian TV news broadcasts. By using derivative of 1-dimensional Gaussian filter and binary classification models, this paper aims to automatically identify and classify news segments into categories such as studio news, field news, commercials and music breaks. The primary objective of this paper is to develop a segmentation methodology optimized for reduced computational memory and quick processing. By leveraging efficient computational techniques, the news segmentation can be performed in a timely manner without compromising accuracy. This optimization is crucial for real-time or near-real-time applications within TV networks, facilitating tasks such as content monitoring and analysis.
This paper presents the design and practical implementation of a gateway interface between two networks, CAN and Ethernet. Data packets detected over a network will be routed to the other network, with the possibility...
详细信息
This paper presents the design and practical implementation of a gateway interface between two networks, CAN and Ethernet. Data packets detected over a network will be routed to the other network, with the possibility of using various filters. Since there is no standard yet for this purpose, the paper also proposes a method to pack one or more CAN messages in an Ethernet frame. For testing purposes of the interface gateway and its implementation a series of graphical software tools running on a PC client have been developed. These tools are able to send and decode messages using the specified packaging. At the end of the paper a graphical application demonstrates the functionality of the gateway implementation and the benefits of the proposed CAN-Ethernet routing method.
This paper proposes a RISC-V extension, named SigWavy, meant to optimize the PWM control for general purpose or application specific designs. The RISC-V extension named above is a PWM control Unit with a dedicated ISA...
This paper proposes a RISC-V extension, named SigWavy, meant to optimize the PWM control for general purpose or application specific designs. The RISC-V extension named above is a PWM control Unit with a dedicated ISA extension set designed for configuring and driving up to 32 PWM signals. The extension is integrated into RiscPwm, an updated version of our previous work, the RisCanFd SoC, for taking advantage of CAN-FD, a massively used protocol in the areas of automation and mobility. Being configured with the dedicated ISA extension or with parameters directly extracted from CAN-FD commands, the proposed solution manages to configure/reconfigure PWM channels between 4.79x and 9.18x times faster than an ARM Cortex-M7 processor, although our SoC operates with a 6x lower frequency.
The paper deals with the PI and PID controllers settings. The research includes an overview of the most commonly used control quality criteria. It was assumed that the controlled system can be approximated by first or...
详细信息
ISBN:
(纸本)9781509064076
The paper deals with the PI and PID controllers settings. The research includes an overview of the most commonly used control quality criteria. It was assumed that the controlled system can be approximated by first order inertia with dead time. The control systems that includes the model as well as the PI and PID controllers were analyzed in context of control quality taking into account ITAE criterion. The research involved an analysis of the Nyquist diagrams. It enabled us to formulate a new method of tuning of PI and PID controllers. The results obtained with the proposed method were compared to the settings obtained with Ziegler-Nichols method. To illustrate the advantages of the proposed method the system step responses as well as their time and frequency indexes were compared and presented. The proposed method of the PI and PID controller tuning makes it possible to obtain a significant increase of the control quality.
A correct diagnostics together with the early prediction of failure or malfunction of the system are the major issues in modern maintenance. Nowadays, the time-honored diagnostics may be inadequate and lead to omittin...
详细信息
A correct diagnostics together with the early prediction of failure or malfunction of the system are the major issues in modern maintenance. Nowadays, the time-honored diagnostics may be inadequate and lead to omitting failures, resulting in higher costs of repairing damaged equipment. That is why the interest in intelligent diagnostics increases due to the possibility of better interpretation of the component status and early failure prediction. One of the ways of determining the device condition is to measure and analyze the temperature of multiple points on the device. Thermographics may show a beginning of significant wear of a component, and enable a repair or replacing before the failure appears. The paper presents the key aspects of the diagnostics with thermal images, including: technology mapping, mapping algorithms, together with a presentation of available software solutions.
暂无评论