• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 9
  • 2
  • 2
  • 1
  • Tagged with
  • 16
  • 16
  • 9
  • 6
  • 6
  • 4
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Real Time Monitoring of Machining Process and Data Gathering for Digital Twin Optimization

Rajendran, Ajith, Asokan, Gautham January 2021 (has links)
In the development stages of a Digital twin of production assets, especially machine tools, real time process monitoring and data gathering proves to be vital. Having a monitoring system that monitors and updates the operators or managers in real time, helps improve productivity in terms of reducing downtime through predictive/preventive analytics and by incorporating in process quality assessment capabilities. When it comes to Real time monitoring of machine tools andprocesses, sensor technologies have proven to be the most effective and widely researched. Years of research and development have paved the way for many smart sensor technologies that come both in built with the machine tools as well as external applications. However, these technologies prove to be expensive and complicated to implement especially for Small and Medium Enterprises. This thesis focuses on evaluating and testing a simple, cost-efficient monitoring system using inexpensive sensor technologies that would help optimize an existing Digital twin setup for machine tools for Small and Medium Enterprises. Experiments with a 5 axis CNC machine tool using different tools and varying operating parameters, materials were performed,and the relevant sensor data were collected, mapped, analysed for accuracy and benchmarking. The thesis also evaluates the integration of this data with the information already collected from other sources, improve existing data reliability, and provides guidelines on this could be transformed usefully to create more value to SME’s.
12

UAV Routing Protocol (URP) for crop health management / UAV Routing Protocol (URP) pour la gestion de la santé des cultures

Mohammad, Ammad Uddin 19 December 2017 (has links)
Les réseaux de capteurs sans fil sont maintenant un moyen crédible de collecte de données sur les cultures. L'installation d'une structure de communication fixe pour relayer les données surveillées depuis la tête de grappe jusqu'à sa destination finale peut être soit impraticable en raison de la topologie du terrain, soit prohibitive en raison du coût initial élevé. Une solution plausible consiste à utiliser des véhicules aériens sans pilote (UAV) comme moyen alternatif de collecte de données et de contrôle de supervision limité de l'état des détecteurs. Dans cet article, nous considérons le cas des parcelles agricoles disjointes comprenant chacune des grappes de capteurs, organisées de manière prédéterminée en fonction des objectifs d'élevage. Cette recherche vise à trouver une solution optimale pour la recherche de UAV et la collecte de données à partir de tous les capteurs installés dans un champ de culture. En outre, le protocole de routage des capteurs tiendra compte d'un compromis entre la gestion de l'énergie et les frais généraux de diffusion des données. Le système proposé est évalué en utilisant un modèle simulé et il devrait trouver une classe parmi toutes les sous-considérations. / Wireless sensor networks are now a credible means for crop data collection. The installation of a fixed communication structure to relay the monitored data from the cluster head to its final destination can either be impractical because of land topology or prohibitive due to high initial cost. A plausible solution is to use Unmanned Aerial Vehicles (UAV) as an alternative means for both data collection and limited supervisory control of sensors status. In this paper, we consider the case of disjoint farming parcels each including clusters of sensors, organized in a predetermined way according to farming objectives. This research focuses to drive an optimal solution for UAV search and data gathering from all sensors installed in a crop field. Furthermore, the sensor routing protocol will take into account a tradeoff between energy management and data dissemination overhead.The proposed system is evaluated by using a simulated model and it should find out a class among all under consideration.
13

Energy efficiency in wireless ad hoc and sensor networks: routing, node activity scheduling and cross-layering

Mahfoudh, Saoucene 20 January 2010 (has links) (PDF)
In this thesis, we consider wireless ad hoc and sensor networks where energy matters. Indeed, sensor nodes are characterized by a small size, a low cost, an advanced communication technology, but also a limited amount of energy. This energy can be very expensive, difficult or even impossible to renew. Energy efficient strategies are required in such networks to maximize network lifetime. We distinguish four categories of strategies: 1. Energy efficient routing, 2. Node activity scheduling, 3. Topology control by tuning node transmission power and 4. Reduction of the volume of information transferred. Our contribution deals with energy efficient routing and node activity scheduling. For energy efficient routing, the idea consists in reducing the energy spent in the transmission of a packet from its source to its destination, while avoiding nodes with low residual energy. The solution we propose, called EOLSR, is based on the link state OLSR routing protocol. We show by simulation that this solution outperforms the solution that selects routes minimizing the end-to-end energy consumption, as well as the solution that builds routes based on node residual energy. We then show how we can improve the benefit of energy efficient routing using cross layering. Informa- tion provided by the MAC layer improves the reactivity of the routing protocol and the robustness of routes. Moreover, taking into account the specificities of some applications like data gathering allows the routing protocol to reduce its overhead by maintaining routes only to the sink nodes. Concerning node activity scheduling, since the sleep state is the least power consuming state, our aim is to schedule node state between sleeping and active to minimize energy consumption while ensuring network and application functionalities. We propose a solution, called SERENA, based on node coloring. The idea is to assign a color to each node, while using a small number of colors and ensuring that two nodes with the same color can transmit without interfering. This color is mapped into a slot in which the node can transmit its messages. Consequently, each node is awake during its slot and the slots granted to its one-hop neighbors. It sleeps the remaining time. We show how this algorithm can adapt to different application requirements: broadcast, immediate acknowledgement of unicast transmissions... The impact of each additional requirement is evaluated by simulation. An originality of this work lies in taking into account real wireless propagation conditions. Color conflicts are then possible. A cross-layering approach with the MAC layer is used to solve these conflicts. We also show how cross-layering with the application layer can improve the coloring per- formance for data gathering applications. This work has been done for the ANR OCARI project whose aim is to design and implement a wireless sensor network for applications in harsh environments such as power plants and war- ships. The network layer including SERENA and EOLSR has been specified and is now under implementation.
14

Classifying Urgency : A Study in Machine Learning for Classifying the Level of Medical Emergency of an Animal’s Situation

Strallhofer, Daniel, Ahlqvist, Jonatan January 2018 (has links)
This paper explores the use of Naive Bayes as well a Linear Support Vector Machines in order to classify a text based on the level of medical emergency. The primary source of testing will be an online veterinarian service’s customer data. The aspects explored are whether a single text gives enough information for a medical decision to be made and if there are alternative data gathering processes that would be preferred. Past research has proven that text classifiers based on Naive Bayes and SVMs can often give good results. We show how to optimize the results so that important decisions can be made with these classifications as a basis. Optimal data gathering procedures will be a part of this optimization process. The business applications of such a venture will also be discussed since implementing such a system in an online medical service will possibly affect customer flow, goodwill, cost/revenue, and online competitiveness. / Denna studie utforskar användandet av Naive Bayes samt Linear Support Vector Machines för att klassificera en text på en medicinsk skala. Den huvudsakliga datamängden som kommer att användas för att göra detta är kundinformation från en online veterinär. Aspekter som utforskas är om en enda text kan innehålla tillräckligt med information för att göra ett medicinskt beslut och om det finns alternativa metoder för att samla in mer anpassade datamängder i framtiden. Tidigare studier har bevisat att både Naive Bayes och SVMs ofta kan nå väldigt bra resultat. Vi visar hur man kan optimera resultat för att främja framtida studier. Optimala metoder för att samla in datamängder diskuteras som en del av optimeringsprocessen. Slutligen utforskas även de affärsmässiga aspekterna utigenom implementationen av ett datalogiskt system och hur detta kommer påverka kundflödet, goodwill, intäkter/kostnader och konkurrenskraft.
15

On Asymmetric Distributed Source Coding For Wireless Sensor Networks

Samar, * 12 1900 (has links)
We are concerned with addressing the worst-case distributed source coding (DSC) problem in asymmetric and interactive communication scenarios and its application to data-gathering wireless sensor networks in enhancing their lifetime. First, we propose a unified canonical framework, obtained by considering different communication constraints and objectives, to address the variants of DSC problem. Second, as for the worst-case information-theoretic analysis, the notion of information entropy cannot be used, we propose information ambiguity, derive its various properties, and prove that it is a valid information measure. Third, for a few variants of our interest of DSC problem, we provide the communication protocols and prove their optimality. In a typical data-gathering sensor network, the base-station that wants to gather sensor data is often assumed to be much more resourceful with respect to energy, computation, and communication capabilities compared to sensor nodes. Therefore, we argue that in such networks, the base-station should bear the most of the burden of communication and computation in the network. Allowing the base-station and sensor nodes to interactively communicate with each other enables us to carry this out. Our definition of sensor network lifetime allows us to reduce the problem of maximizing the worst-case network lifetime to the problem of minimizing the number of bits communicated by the nodes in the worst-case, which is further reduced to the worst-case DSC problem in asymmetric and interactive communication scenarios, with the assumption that the base-station knows the support-set of sensor data. We demonstrate that the optimal solutions of the energy-oblivious DSC problem variants cannot be directly applied to the data-gathering sensor networks, as those may be inefficient in the energy-constrained sensor networks. We address a few energy-efficient variants of DSC problem and provide optimal communication protocols for the sensor networks, based on those variants. Finally, we combine distributed source coding with two other system level opportunities of channel coding and cooperative nature of the nodes to further enhance the lifetime of the sensor networks. We address various scenarios and demonstrate the dependence of the computational complexity of the network lifetime maximization problem on the complex interplay of above system-level opportunities.
16

Κρυπτογραφία και κρυπτανάλυση με μεθόδους υπολογιστικής νοημοσύνης και υπολογιστικών μαθηματικών και εφαρμογές

Λάσκαρη, Ελένη 24 January 2011 (has links)
Η διδακτορική διατριβή επικεντρώθηκε στη μελέτη νέων τεχνικών κρυπτογραφίας και κρυπτανάλυσης, αλλά και στην ανάπτυξη νέων πρωτοκόλλων για την ασφαλή ηλεκτρονική συγκέντρωση δεδομένων. Το πρώτο πρόβλημα το οποίο διερεύνησε η διατριβή ήταν η δυνατότητα εφαρμογής των μεθόδων Υπολογιστικής Νοημοσύνης στην κρυπτολογία. Στόχος ήταν η ανίχνευση των κρίσιμων σημείων κατά την εφαρμογή των μεθόδων αυτών στον πολύ απαιτητικό αυτό τομέα προβλημάτων και η μελέτη της αποτελεσματικότητας και της αποδοτικότητάς τους σε διάφορα προβλήματα κρυπτολογίας. Συνοψίζοντας, τα αποτελέσματα της διατριβής για την εφαρμογή μεθόδων Υπολογιστικής Νοημοσύνης στην κρυπτολογία υποδεικνύουν ότι παρά το γεγονός ότι η κατασκευή των αντικειμενικών συναρτήσεων είναι πολύ κρίσιμη για την αποδοτικότητα των μεθόδων, η Υπολογιστική Νοημοσύνη μπορεί να προσφέρει σημαντικά πλεονεκτήματα στον κλάδο αυτό όπως είναι η αυτοματοποίηση κάποιων διαδικασιών κρυπτανάλυσης ή κρυπτογράφησης, ο γρήγορος έλεγχος της σθεναρότητας νέων κρυπτοσυστημάτων αλλά και ο συνδυασμός τους με τυπικές μεθόδους που χρησιμοποιούνται μέχρι σήμερα για την αξιοποίηση της απλότητας και της αποδοτικότητάς τους. Το δεύτερο πρόβλημα που μελετάται στην διατριβή είναι η εφαρμογή μεθόδων αντίστροφης πολυωνυμικής παρεμβολής για την εύρεση της τιμής του διακριτού λογαρίθμου αλλά και του λογαρίθμου του Lucas. Για την μελέτη αυτή χρησιμοποιήθηκαν δύο υπολογιστικές μέθοδοι αντίστροφης πολυωνυμικής παρεμβολής, οι μέθοδοι Aitken και Neville, οι οποίες είναι κατασκευαστικές και επιτρέπουν την πρόσθεση νέων σημείων παρεμβολής για καλύτερη προσέγγιση του πολυωνύμου με μικρό υπολογιστικό κόστος. Η παρούσα μελέτη έδειξε ότι και με την προτεινόμενη μεθοδολογία το συνολικό κόστος υπολογισμού της τιμής των λογαρίθμων παραμένει υψηλό, ωστόσο η κατανομή των πολυωνύμων που έδωσαν την λύση των προβλημάτων δείχνει ότι η μεθοδολογία που χρησιμοποιήθηκε είτε εντόπισε την λύση στα πρώτα στάδια κατασκευής των πολυωνύμων είτε εντόπισε πολυώνυμα μικρού σχετικά βαθμού που προσεγγίζουν την αντίστοιχη λύση. Το τρίτο πρόβλημα που πραγματεύεται η παρούσα διατριβή είναι η δημιουργία νέων σθεναρών κρυπτοσυστημάτων με την χρήση μη-γραμμικών δυναμικών απεικονίσεων. Η αξιοποίηση των ιδιοτήτων του χάους στην κρυπτογραφία έχει αποτελέσει αντικείμενο μελέτης τα τελευταία χρόνια από τους ερευνητές λόγω της αποδεδειγμένης πολυπλοκότητας των συστημάτων του και των ιδιαίτερων στατιστικών ιδιοτήτων τους. Η διατριβή συνεισφέρει προτείνοντας ένα νέο συμμετρικό κρυπτοσύστημα που βασίζεται σε περιοδικές δυναμικές τροχιές και παρουσιάζει και τρεις τροποποιήσεις του που το καθιστούν ιδιαίτερα σθεναρό απέναντι στις συνήθεις κρυπταναλυτικές επιθέσεις. Δίνεται επίσης το υπολογιστικό κόστος κρυπτογράφησης και αποκρυπτογράφης του προτεινόμενου σχήματος και παρουσιάζονται πειραματικά αποτελέσματα που δείχνουν ότι η δομή των κρυπτογραφημάτων του κρυπτοσυστήματος δεν παρέχει πληροφορία για την ύπαρξη τυχόν μοτίβων στο αρχικό κείμενο. Τέλος, στην διατριβή αυτή προτείνονται δύο πρωτόκολλα για την ασφαλή ηλεκτρονική συγκέντρωση δεδομένων. Η συγκέντρωση δεδομένων από διαφορετικές βάσεις με ασφάλεια και ιδιωτικότητα θα ήταν σημαντική για την μελέτη των γνώσεων που ενυπάρχουν στα δεδομένα αυτά, με διάφορες μεθόδους εξόρυξης δεδομένων και ανάλυσης, καθώς οι γνώσεις αυτές ενδεχομένως δεν θα μπορούσαν να αποκαλυφθούν από την επιμέρους μελέτη των δεδομένων χωριστά από κάθε βάση. Τα δύο πρωτόκολλα που προτείνονται βασίζονται σε τροποποιήσεις πρωτοκόλλων ηλεκτρονικών εκλογών με τρόπο τέτοιο ώστε να ικανοποιούνται τα απαραίτητα κριτήρια ασφάλειας και ιδιωτικότητας που απαιτούνται για την συγκέντρωση των δεδομένων. Η βασική διαφορά των δύο πρωτοκόλλων είναι ότι στο ένα γίνεται χρήση έμπιστου τρίτου μέλους για την συγκέντρωση των δεδομένων, ενώ στο δεύτερο όχι. Και στις δύο περιπτώσεις, παρουσιάζεται ανάλυση της ασφάλειας των σχημάτων αλλά και της πολυπλοκότητάς τους αναφορικά με το υπολογιστικό τους κόστος. / In this PhD thesis we study problems of cryptography and cryptanalysis through Computational Intelligence methods and computational mathematics. Furthermore, we examine the establishment and security of new privacy preserving protocols for electronic data gathering. Part I is dedicated to the application of Computational Intelligence (CI) methods, namely Evolutionary Computation (EC) methods and Artificial Neural Networks (ANNs), for solving problems of cryptology. Initially, three problems of cryptanalysis are formulated as discrete optimization tasks and Evolutionary Computation methods are utilized to address them. The first conclusion derived by these experiments is that when EC methods are applied to cryptanalysis special attention must be paid to the design of the fitness function so as to include as much information as possible for the target problem. The second conclusion is that when EC methods (and CI methods in general) can be used as a quick practical assessment for the efficiency and the effectiveness of proposed cryptographic systems. We also apply EC methods for the cryptanalysis of Feistel ciphers and for designing strong Substitution boxes. The results show that the proposed methods are able to tackle theses problem efficiently and effectively with low cost and in automated way. Then, ANNs are employed for classical problems of cryptography as a measure of their robustness. The results show that although different topologies, training methods and formulation of the problems were tested, ANNs were able to obtain the solution of the problems at hand only for small values of their parameters. The performance of ANNs is also studied on the computation of a Boolean function derived from the use of elliptic curves in cryptographic applications. The results indicate that ANNs are able to adapt to the data presented with high accuracy, while their response to unknown data is slightly better than a random selection. Another important finding is that ANNs require a small amount of storage for the known patterns in contrast to the storage needed of the data itself. Finally, a theoretical study of the application of Ridge Polynomial Networks for the computation of the least significant bit of the discrete logarithm is presented. In Part II, computational mathematics are utilized for different cryptographic problems. Initially, we consider the Aitken and Neville inverse interpolation methods for a discrete exponential function and the Lucas logarithm function. The results indicate that the computational cost for addressing the problems through this approach is high; however interesting features regarding the degree of the resulting interpolation polynomials are reported. Next, a new symmetric key cryptosystem that exploits the idea of nonlinear mappings and their fixed points to encrypt information is presented. Furthermore, a measure of the quality of the keys used is introduced. The experimental results indicate that the proposed cryptosystem is efficient and secure to ciphertext-only attacks. Finally, three modifications of the basic cryptosystem that render it more robust are presented and efficiency issues are discussed. Finally, at Part III of the thesis, two protocols for privacy preserving electronic data gathering are proposed. The security requirements that must be met for data gathering with privacy are presented and then two protocols, based on electronic voting protocols, are analytically described. Security and complexity issues are also discussed.

Page generated in 0.1162 seconds