A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Tackling Faults in the Industry 4.0 Era—A Survey of Machine-Learning Solutions and Key Aspects
2019
Sensors
We start by examining various proposed cloud/fog/edge architectures, highlighting their importance for acquiring manufacturing data in order to train the ML algorithms. ...
In this survey, we focus on the vital processes of fault detection, prediction and prevention in Industry 4.0 and present recent developments in ML-based solutions. ...
In Section 2, an overview of cloud/fog/edge architectures for the integration of ML for fault detection, prediction and prevention is provided. ...
doi:10.3390/s20010109
pmid:31878065
pmcid:PMC6983262
fatcat:n4muoguq5jalrfwqkq4264vswe
2020 Index IEEE Transactions on Industrial Informatics Vol. 16
2020
IEEE Transactions on Industrial Informatics
., Guest Editorial:Special Section on End-Edge-Cloud Orchestrated Algorithms, Systems and Applications; TII July 2020 4788-4790 Jiang, J., see Jia, G., 1993-2002 Jiang, J., see Liu, L., 2072-2080 Jiang ...
., +, TII April 2020 2667-2676
Secure Transmission of Compressed Sampling Data Using Edge Clouds. ...
Wang, Q., +, TII Nov. 2020 7126-7135 Secure Transmission of Compressed Sampling Data Using Edge Clouds. ...
doi:10.1109/tii.2021.3053362
fatcat:blfvdtsc3fdstnk6qoaazskd3i
Massively Digitized Power Grid: Opportunities and Challenges of Use-inspired AI
[article]
2022
arXiv
pre-print
This article presents a use-inspired perspective of the opportunities and challenges in a massively digitized power grid. ...
The impact of these three factors on critical functions of power system operation and planning practices are reviewed and illustrated with industrial practice case studies. ...
Oncor has more than 18, 000 circuit-miles of transmission lines with over 500, 000 transmission insulators. ...
arXiv:2205.05180v1
fatcat:ecmq2wqy2nhk7e2zcabwdkhltq
Volume 2, Issue 3, Special issue on Recent Advances in Engineering Systems (Published Papers) Articles Transmit / Received Beamforming for Frequency Diverse Array with Symmetrical frequency offsets Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 1-6 (2017); View Description Detailed Analysis of Amplitude and Slope Diffraction Coefficients for knife-edge structure in S-UTD-CH Model Eray Arik, Mehmet Baris Tabakcioglu Adv. Sci. Technol. Eng. Syst. J. 2(3), 7-11 (2017); View Description Application
...
2017
Advances in Science, Technology and Engineering Systems
The detection approach monitors the behavior of each service and identifies anomalies as a potential impersonation attack if it deviates significantly from the expected behavior. ...
Providing security for interacting cloud services requires more than user authentication with passwords or digital certificates and confidentiality in data transmission. ...
The major contribution of this paper is our distributed framework for auditing and detecting impersonation attacks in service clouds. ...
doi:10.25046/aj020358
fatcat:2crf76dd75ca5d2yjy6vfxkuwi
Smart Grid Big Data Analytics: Survey of Technologies, Techniques, and Applications
2020
IEEE Access
Smart grids have been gradually replacing the traditional power grids since the last decade. ...
This includes the effective acquisition, transmission, processing, visualization, interpretation, and utilization of big data. ...
Technical developments have been witnessed not only in the power generation side but also in the transmission and distribution sides. ...
doi:10.1109/access.2020.3041178
fatcat:awgtqx6nordadbtjn2a4v4nxe4
2021 Index IEEE Transactions on Instrumentation and Measurement Vol. 70
2021
IEEE Transactions on Instrumentation and Measurement
., TIM 2021 5005808 An Insulator in Transmission Lines Recognition and Fault Detection Model Based on Improved Faster RCNN. ...
., +, TIM 2021 3500909 An Insulator in Transmission Lines Recognition and Fault Detection Model Based on Improved Faster RCNN. ...
doi:10.1109/tim.2022.3156705
fatcat:dmqderzenrcopoyipv3v4vh4ry
BME VIK Annual Research Report on Electrical Engineering and Computer Science 2016
2017
Periodica Polytechnica Electrical Engineering and Computer Science
Thus, participation in these collaborations give a competitive edge and ensure the continuous development of VIK. ...
We are proud of combining engineering applications with sound scientific results, which is the assurance of high-level industrial collaboration leading to novel results and innovation. ...
The aim of MEC is to move the clouds to the edge of the network, close to the clients or even move the clouds with clients. ...
doi:10.3311/ppee.11067
fatcat:danqnppunnhq3mc2ns3qfhdwy4
Supporting the Wellness at Work and Productivity of Ageing Employees in Industrial Environments: The sustAGE Project
2019
Zenodo
These data have to be analysed and visualised, and anomalies have to be detected within a short timeframe. Alarms and alerts have to be parsed in real time. ...
With the chain
of trust principle, it enables the usage of
all services of the Arrowhead local
cloud and the services of other clouds
that are compliant with the Arrowhead
framework, based on a secure ...
doi:10.5281/zenodo.4294256
fatcat:ovybcpqny5eppniw7hb5vcsevy
Financial Cybercrime: A Comprehensive Survey of Deep Learning Approaches to Tackle the Evolving Financial Crime Landscape
2021
IEEE Access
. [11] extends the idea of GAD by classifying both • Semi-supervised anomaly detection: [8] has only nor-
dynamic and static situations. ...
ble learning framework to detect stock price manipulation. ...
doi:10.1109/access.2021.3134076
fatcat:lm2upcaoabbnbie6r4sfzhjh4y
Cyberphysical Security of Grid Battery Energy Storage Systems
2022
IEEE Access
Semi-supervised machine learning on the other hand facilitates training by using a large amount of unlabeled data in conjunction with a small amount of labeled data to train the IDS anomaly detection models ...
Supervised and unsupervised learning anomaly detection systems are often implemented using statistical machine learning algorithms. ...
doi:10.1109/access.2022.3178987
fatcat:z3erpvu6pbh65hk6w25bqb3x7m
Unmanned Aerial Vehicles (UAVs): A Survey on Civil Applications and Key Research Challenges
2019
IEEE Access
beds or anomaly detection frameworks for the stateof-the-art UAV applications. ...
Moreover, UAVs can also be utilized for high voltage inspection of the power transmission lines. ...
doi:10.1109/access.2019.2909530
fatcat:xgknpyuqazhpvferjkkdohxmtu
A Proposal for a Three Detector Short-Baseline Neutrino Oscillation Program in the Fermilab Booster Neutrino Beam
[article]
2015
arXiv
pre-print
This new SBN Program will deliver a rich and compelling physics opportunity, including the ability to resolve a class of experimental anomalies in neutrino physics and to perform the most sensitive search ...
The average request of cold power was around 24 kW, mainly due to insulation losses. ...
For what concerns the maintenance and the adaptation of the cryogenic systems to the new experimental layout at FNAL, this activity will be carried-out under the supervision of the ICARUS Collaboration ...
arXiv:1503.01520v1
fatcat:moqgs7asvbbydaek5dyuhbj57e
Program
2021
2021 National Conference on Communications (NCC)
detection. ...
good power efficiency. ...
We have achieved a total of 8 comb lines − 5 lines within 6 dB power variation. The comb lines are separated by approximately 11 GHz (∼0.085 nm). ...
doi:10.1109/ncc52529.2021.9530194
fatcat:ahdw5ezvtrh4nb47l2qeos3dwq
Comparative Analysis of Different Machine Learning Classifiers for the Prediction of Chronic Diseases
[chapter]
2022
Comparative Analysis of Different Machine Learning Classifiers for the Prediction of Chronic Diseases
The Solar-Stirling engine systems can be the better option for off-grid power generation. ...
Stirling engine has a potential to be competitive enough with the other renewable technologies with some necessary technical modifications to make this heat engine a feasible and effective option for power ...
Based on the detecting mechanism, Two types of IDS-based detection are anomaly-based and misuse-based detection. The usual type of traffic is modeled in anomaly-based detection frameworks. ...
doi:10.13052/rp-9788770227667
fatcat:da47mjbbyzfwnbpde7rgbrlppe
Defense Advanced Research Projects Agency (Darpa) Fiscal Year 2019 Budget Estimates
2018
Zenodo
. --30.000 Title: Millimeter Wave Digital Arrays (MIDAS)* Description: *Formerly Radio Frequency Collaborative Unmanned Distributed System (RF CLOUDS)
FY 2019 2019 Plans: -Demonstrate a low-power, 16 ...
Geospatial Cloud Analytics (GCA)
FY 2019 2019 Plans: -Analyze computational architectures and frameworks for GCA analytics services at global scale. ...
doi:10.5281/zenodo.1215599
fatcat:kxduvg6a5nflhf6iilkwnolobu
« Previous
Showing results 1 — 15 out of 202 results