124,876 research outputs found

    Automation of the longwall mining system

    Get PDF
    Cost effective, safe, and technologically sound applications of automation technology to underground coal mining were identified. The longwall analysis commenced with a general search for government and industry experience of mining automation technology. A brief industry survey was conducted to identify longwall operational, safety, and design problems. The prime automation candidates resulting from the industry experience and survey were: (1) the shearer operation, (2) shield and conveyor pan line advance, (3) a management information system to allow improved mine logistics support, and (4) component fault isolation and diagnostics to reduce untimely maintenance delays. A system network analysis indicated that a 40% improvement in productivity was feasible if system delays associated with all of the above four areas were removed. A technology assessment and conceptual system design of each of the four automation candidate areas showed that state of the art digital computer, servomechanism, and actuator technologies could be applied to automate the longwall system

    Telerobotic radiation protection tasks in the Super Proton Synchrotron using mobile robots

    Get PDF
    Ponència presentada en la 19th International Conference on Informatics in Control, Automation and Robotics. 14-16 de juliol de 2022, Lisboa, Portugal.In this paper a complete robotic solution is presented, which allows the teleoperation of the radiation survey in the Super Proton Synchrotron (SPS) accelerator at CERN. Firstly, an introduction to radiation protection is given. Subsequently, the execution of the radiation survey in person is described and the potential of robotic solutions for such missions is outlined. After providing a brief state of the art on the subject, the development of the robot base, as well as its component selection and design is shown. Hereafter, the software implementation is explained. The test procedure of this project includes the most important requirements for a correct execution of the survey, as well as the operational steps and data treatment in detail. The results underline the correct execution of the mission, and show the advantages of the teleoperated robotic solution, such as the improved and unified measurement conditions. Thus, this robotic system will allow to significantly reduce the radiation dose of the radiation protection staff. For further development, the automation of this task is planned, which presupposes the gradual autonomization of the robotic system from assisting the user to the self-reliant execution of the survey

    A Taxonomy of Requirements Specification Techniques

    Get PDF
    A taxonomy is introduced and used as a backdrop against which current state-of-the-art in the requirements engineering field is reviewed. The emphasis is on identifying general trends and issues rather than offering the reader a literature survey. The contents of a requirements specification is presented in light of the consensus reached by both theoreticians and practitioners. The desirable proper ties of a requirements may alter the relative significance of difference properties. Finally, the classification of requirements specification techniques is approached from a total system design perspective. The paper shows that, despite significant growth, the requirements area still faces a number of important unresolved issues including the need for: broader formal foundation for both functional and non-functional requirements, greater degree of formality and automation, new requirements development methods, and higher level of integration in the overall design process

    The paradigm-shift of social spambots: Evidence, theories, and tools for the arms race

    Full text link
    Recent studies in social media spam and automation provide anecdotal argumentation of the rise of a new generation of spambots, so-called social spambots. Here, for the first time, we extensively study this novel phenomenon on Twitter and we provide quantitative evidence that a paradigm-shift exists in spambot design. First, we measure current Twitter's capabilities of detecting the new social spambots. Later, we assess the human performance in discriminating between genuine accounts, social spambots, and traditional spambots. Then, we benchmark several state-of-the-art techniques proposed by the academic literature. Results show that neither Twitter, nor humans, nor cutting-edge applications are currently capable of accurately detecting the new social spambots. Our results call for new approaches capable of turning the tide in the fight against this raising phenomenon. We conclude by reviewing the latest literature on spambots detection and we highlight an emerging common research trend based on the analysis of collective behaviors. Insights derived from both our extensive experimental campaign and survey shed light on the most promising directions of research and lay the foundations for the arms race against the novel social spambots. Finally, to foster research on this novel phenomenon, we make publicly available to the scientific community all the datasets used in this study.Comment: To appear in Proc. 26th WWW, 2017, Companion Volume (Web Science Track, Perth, Australia, 3-7 April, 2017

    Operating systems for wireless sensor networks: A survey

    Get PDF
    This paper presents a survey on the current state-of-the-art in Wireless Sensor Network (WSN) Operating Systems (OSs). In recent years, WSNs have received tremendous attention in the research community, with applications in battlefields, industrial process monitoring, home automation, and environmental monitoring, to name but a few. A WSN is a highly dynamic network because nodes die due to severe environmental conditions and battery power depletion. Furthermore, a WSN is composed of miniaturized motes equipped with scarce resources e.g., limited memory and computational abilities. WSNs invariably operate in an unattended mode and in many scenarios it is impossible to replace sensor motes after deployment, therefore a fundamental objective is to optimize the sensor motes' life time. These characteristics of WSNs impose additional challenges on OS design for WSN, and consequently, OS design for WSN deviates from traditional OS design. The purpose of this survey is to highlight major concerns pertaining to OS design in WSNs and to point out strengths and weaknesses of contemporary OSs for WSNs, keeping in mind the requirements of emerging WSN applications. The state-of-the-art in operating systems for WSNs has been examined in terms of the OS Architecture, Programming Model, Scheduling, Memory Management and Protection, Communication Protocols, Resource Sharing, Support for Real-Time Applications, and additional features. These features are surveyed for both real-time and non-real-time WSN operating systems

    Construction informatics in Turkey: strategic role of ICT and future research directions

    Get PDF
    Construction Informatics deals with subjects ranging from strategic management of ICTs to interoperability and information integration in the construction industry. Studies on defining research directions for Construction Informatics have a history over 20 years. The recent studies in the area highlight the priority themes for Construction Informatics research as interoperability, collaboration support, intelligent sites and knowledge sharing. In parallel, today it is widely accepted in the Architecture/Engineering/Construction (AEC) industry that ICT is becoming a strategic asset for any organisation to deliver business improvement and achieve sustainable competitive advantage. However, traditionally the AEC industry has approached investing in ICT with a lack of strategic focus and low level of priority to the business. This paper presents a recent study from Turkey that is focused on two themes. The first theme investigates the strategic role of ICT implementations from an industrial perspective, and explores if organisations within the AEC industry view ICT as a strategic resource for their business practice. The second theme investigates the ‘perspective of academia’ in terms of future research directions of Construction Informatics. The results of the industrial study indicates that ICT is seen as a value-adding resource, but a shift towards the recognition of the importance of ICT in terms of value adding in winning work and achieving strategic competitive advantage is observed. On the other hand, ICT Training is found to be the theme of highest priority from the academia point of view

    Construction informatics in Turkey: strategic role of ICT and future research directions

    Get PDF
    Construction Informatics deals with subjects ranging from strategic management of ICTs to interoperability and information integration in the construction industry. Studies on defining research directions for Construction Informatics have a history over 20 years. The recent studies in the area highlight the priority themes for Construction Informatics research as interoperability, collaboration support, intelligent sites and knowledge sharing. In parallel, today it is widely accepted in the Architecture/Engineering/Construction (AEC) industry that ICT is becoming a strategic asset for any organisation to deliver business improvement and achieve sustainable competitive advantage. However, traditionally the AEC industry has approached investing in ICT with a lack of strategic focus and low level of priority to the business. This paper presents a recent study from Turkey that is focused on two themes. The first theme investigates the strategic role of ICT implementations from an industrial perspective, and explores if organisations within the AEC industry view ICT as a strategic resource for their business practice. The second theme investigates the ‘perspective of academia’ in terms of future research directions of Construction Informatics. The results of the industrial study indicates that ICT is seen as a value-adding resource, but a shift towards the recognition of the importance of ICT in terms of value adding in winning work and achieving strategic competitive advantage is observed. On the other hand, ICT Training is found to be the theme of highest priority from the academia point of view
    • …
    corecore