The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Dynamic adaptive streaming over HTTP (DASH) requires a video server to transcode each original video object to all the possible bit-rate versions, resulting in high CPU power consumption. To address this, we propose a new scheme that balances quality-of-experience (QoE) against transcoding energy. We start by introducing the concept of transcoding gain to express QoE achieved as a result of transcoding...
The electric power system is moving rapidly towards an increased penetration of renewable energy resources. The new power to gas (PtG) technology has been recently introduced as a means to prevent renewable generation curtailment and to store any excess of renewable energy production during off-peak periods. This paper proposes a methodology for simultaneously studying the combined system flow of...
This paper presents a method for assess the risk index in a power transformers park, risk index is a metric that allows park administrator to ensure an optimal physical asset management, allocating properly financial and human resources in operation and maintenance actions. Assessing risk index requires calculating two secondary sub-index termed failure probability and consequence factor. Those indexes...
In this paper, we consider the output consensus problem of linear multi-agent systems subject to different agent dynamics by utilizing event-triggered control strategies. Both the dynamics and output of the agents are affected by non-identical disturbances, which are not measurable. The proposed event-triggered control scheme has a desirable feature that each individual agent independently decides...
Assembling is an essential part of the Learning Objects paradigm from its beginnings. There are currently many methodologies that are aimed at automating part or all the assembly process. In this paper, we present a case study in which a specific Learning Objects assembly methodology was applied. To carry out this process an Assembly System, called ELO-Tool, was used. The results obtained are analyzed...
Due to increasing volume of data in information technology, saving storage space and providing security to data has acquired more attention and popularity. In data processing and data mining, duplicates can effect severely. Data deduplication is a technique that eliminates duplicate data and store only one copy, promoting single instance storage. The main challenges are to identify maximum duplicate...
Currently, and increasingly, education uses technology to support teaching and learning processes, the present work shows a system to determine the best instructional techniques, taking into account students' learning styles, using a modification of the Felder and Soloman test. This modification, called FuzzyILS, was performed by Silva, Vicari and Ponce in 2016, and proposes the fuzzy of Felder and...
A multilevel evaluation model integrating Triangular Fuzzy Numbers (TFNs), Analytical Hierarchical Process (AHP) and Grey Relational Analysis (GRA) was Proposed to evaluate Brownfield Redevelopment Projects (BRPs). Three schemes were proposed including 1: Housing Society, 2: Industrial Park 3: Commercial Development. Initially, primary indicators were identified through extensive literature review...
This article introduces the process carried out for creating two Learning Objects (LOs) linked to the operation of inserting an element into a vector, in Pascal. It starts with the motivation to attend a concrete educational need in relation to the learning of the topic in initial Programming courses. To this end, the development of complementary educational materials is proposed. The decision to...
This paper presents a method for assess the risk index in a power transformers park, risk index is a metric that allows park administrator to ensure an optimal physical asset management, allocating properly financial and human resources in operation and maintenance actions. Assessing risk index requires calculating two secondary sub-index termed failure probability and consequence factor. Those indexes...
This paper addresses the problem of the fault detection problem for discrete-time Markovian jump systems under an event-triggered scheme. The event-triggered scheme from the plant to the fault detection filter is utilized to reduce the frequency of transmission. Our attention is focused on the design of a fault detection filter such that the residual system is stochastically stable and satisfies some...
The risk assessment is an important task in operational management. Since secondary system of substation(SSOS) is an important part to ensure the safe operation of the substation, close attention is needed to its operation risk causing power loss. According to past research, the difficulties of its risk assessment include complex relationship of secondary devices, and risk analysis of its impact on...
In this paper, we investigated two designed structures for application in optical buffers with using photonic crystal technology. In the first structure, silicon slab is used with air holes in hexagonal lattice. However, in the second structure, we used Lithium Niobate slab with air holes. In the two cases, slow light criteria and optical buffering is demonstrated with bit length, delay time and buffer...
Companies deal with different problems that must be solved. Operations Research offers a methodology (SSM) that helps to identify their solutions. This project consisted in analyzing components of a real supermarket process in order to identify process improvements. SSM helped to find feasible improvements which were analyzed applying Agile Requirements.
The clustering of web resources is a significant and difficult task. In previous work has suggested ways to unify web information sources, trying to solve problems like heterogeneity of content, lack of structure, availability, distribution, quantity and quality. However, there are more complex than other domains where the solution is an even more cumbersome problem, due to the quantity and variety...
With the advent of cloud computing more and more IT and business organizations are migrating to cloud for its entrancing features of computing and storage infrastructure. At the same, security, privacy of cloud computing is not at satisfactory level. To make things worse, clouds inherent nature brought new set of security issues. Specially, the cloud storage causes dilemma between two important factors:...
Aiming at the performance evaluation on image captioning and video captioning, this paper discusses the existing performance metrics and then suggests a novel overall performance metric based on grey relational analysis of Grey System Theory. In our metric, all the available performance metrics of each captioning model is used to extract a comparative sequence. Meanwhile, a reference sequence is constructed...
We present a comprehensive study of deposited silicon microring resonators for photonic-integrated circuitry. Refractive index, thickness, and widths variations are estimated. The statistical deviations are sufficiently low to realize photonic circuits of high quality for instance deposited on various substrates and integrated with heterogeneous materials.
As a global innovation capital and industrial cluster representative, Silicon Valley affects the whole world for its scientific and technological innovation. Patent co-citation can be used as information carrier to identify the core technology patents and evaluate technical similarities between enterprises in industrial clusters. In this paper, we carry out industrial clusters analysis of Silicon...
Photovoltaic (PV) penetration in Low-Voltage (LV) networks is expected to increase in the following years, posing a series of problems in the operation pf low-voltage networks. Among the most important challenges imposed, is the reverse power flow caused by high injected energy from distributed PVs during peak irradiation hours. This is the reason of voltage rises above the permissible limits. Amongst...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.