The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper deals with the electric field analysis of 150 kV compact transmission line. The 150 kV compact transmission line is constructed by reusing existing right of way, occupied by existing distribution lines. The 150 kV compact transmission line is designed by mutual utilization of the 150 kV transmission line with 20 kV distribution line. The electric field of the transmission line was calculated...
This paper presents monitoring as a service for networked medical cyber-physical systems in the operating room based on the recent IEEE 11073 standards for interoperable medical device communication. Runtime Verification techniques are used to allow for a formal specification and verification. Based on the specification so called monitors are automatically synthesized. At runtime, the monitors observe...
Direct current internal resistance (DCIR) is a key parameter to determine consistency of power characteristics of a battery pack. This consistency is influenced by batteries' internal temperature, which reflects consistency of the batteries' thermal characteristics inherently. In this paper, an evaluation method for thermal consistency of batteries' DCIR is proposed. Arrhenius coefficient of DCIR...
Traditional Chinese Medicine (TCM) symptoms are the basis of the diagnosis and differentiation. Analyzing TCM symptoms is significant for discovering the knowledge of TCM. Different doctors of TCM prefers using different terms for the same symptom, which is not conducive to the standardization of TCM knowledge and hinders the heritage of TCM. This paper presents a solution to structure the symptoms...
Telehealth relies on the ability of Information and Communication Technology (ICT) to maximize the quality of care provided remotely. Remote Patient Monitoring (RPM) is a key part within telehealth that enables patient to use devices to measure vital signs and sends it to a healthcare professional. Patients usually have multiple devices to measure vital signs. Those devices might be manufactured by...
Traditional Chinese Medicine (TCM) symptoms are the basis of the diagnosis and differentiation. Analyzing TCM symptoms is significant for discovering the knowledge of TCM. Different doctors of TCM prefers using different terms for the same symptom, which is not conducive to the standardization of TCM knowledge and hinders the heritage of TCM. This paper presents a solution to structure the symptoms...
Lack of healthcare infrastructure has caused millions of deaths in developing countries. People in such countries generally suffer from infectious diseases and are denied treatment at appropriate time or not warned about emerging epidemics. This mainly happens because of poor establishment of public health services, lack of access to health statistics and nonexistence of precise medical data. The...
EWMA control charts have been used by several authors to monitor residuals of power curves for fault detection in wind turbines. In this study, we analyze the effect of non-constant variance in the residuals of a power curve on the performance of an EWMA control chart. We show that the variance can be modelled as a function of wind speed and use this insight to derive wind speed-adjusted control limits...
The author focuses on the issue of IT security for micro enterprises, specifically enterprises carrying out manual work considering German law and industrial requirements, with the aim of developing a self-implemented IT security assessment designed to identify threats and aid in increasing their security level. This is necessary because micro-enterprises contributing to the national economy have...
New software applications for linear multivariable system identification are presented. The incorporated algorithms use subspace-based techniques (MOESP, N4SID, or their combination) to find a standard discrete-time state-space description, and optionally the covariance matrices and Kalman predictor gain, using input and output (I/O) trajectories. For flexibility, separate applications are offered...
This paper describes an RDF data model for repositories concerned with managing various aspects of the life cycle of research outputs, such as articles, data sets or learning objects. Using the figshare application as a use-case and starting from its relational model, it proposes a new mechanism for storing, enhancing and disseminating metadata, using workflows specific to the linked data ecosystem,...
Determinism is a key concern in the certification of software for safety-critical systems. In this paper, we evaluate the role of determinism in certification standards, using airborne software as example. We analyze and speculate how the requirements and underlying concepts related to determinism can be adapted for Machine Learning algorithms.In addition, we systematically identify and analyze a...
Following the trend of privacy preserving online social network publishing, various anonymization mechanisms have been designed and employed. Many differential privacybased mechanisms claim that they can preserve the utility as well as guarantee the privacy. Their utility analysis are always based on some specifically chosen metrics.This paper aims to find a novel angle that describing the network...
We present a deterministic distributed algorithm that computes a (2δ-1)-edge-coloring, or even list-edge-coloring, in any n-node graph with maximum degree δ, in O(log^8 δ ⋅ log n) rounds. This answers one of the long-standing open questions of distributed graph algorithms} from the late 1980s, which asked for a polylogarithmic-time algorithm. See, e.g.,...
In a non-uniform Constraint Satisfaction problem CSP(Γ), where G is a set of relations on a finite set A, the goal is to find an assignment of values to variables subject to constraints imposed on specified sets of variables using the relations from Γ. The Dichotomy Conjecture for the non-uniform CSP states that for every constraint language \Gm the problem CSP(Γ)...
Clustering is a classic topic in optimization with k-means being one of the most fundamental such problems. In the absence of any restrictions on the input, the best known algorithm for k-means with a provable guarantee is a simple local search heuristic yielding an approximation guarantee of 9+≥ilon, a ratio that is known to be tight with respect to such methods.We overcome this barrier...
Internet scale continues to expand, the IPv6 protocol standard is implemented in the network gradually, make the behavior characteristic of the network become more changeful and more unstable, so it can be more detailed to carry on network situation perception system according to network data stream to become the next research direction. The support of IPv6 Network Situation Awareness system is realized...
As the number and variety of cyber threats increase, it becomes more critical to share intelligence information in a fast and efficient manner. However, current cyber threat intelligence data do not contain sufficient information about how to specify countermeasures or how institutions should apply countermeasures automatically on their networks. A flexible and agile network architecture is required...
We consider the fundamental derandomization problem of deterministically finding a satisfying assignment to a CNF formula that has many satisfying assignments. We give a deterministic algorithm which, given an n-variable \poly(n)-clause CNF formula F that has at least ≥ 2^n satisfying assignments, runs in time \[ n^{\tilde{O}(\log\log n)^2} \] for ≥ \ge 1/\polylog(n) and outputs...
AC/DC converters for worldwide deployment or multiple applications are often required to operate with single-or three-phase AC connections at a variety of voltages. Electric vehicle charging is an excellent example: a typical AC/DC converter optimized for a 400 V three-phase European connection will only produce about 35% of rated power when operating on a 240 V single-phase connection in North America...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.