7,172 research outputs found

    Damage identification in structural health monitoring: a brief review from its implementation to the Use of data-driven applications

    Get PDF
    The damage identification process provides relevant information about the current state of a structure under inspection, and it can be approached from two different points of view. The first approach uses data-driven algorithms, which are usually associated with the collection of data using sensors. Data are subsequently processed and analyzed. The second approach uses models to analyze information about the structure. In the latter case, the overall performance of the approach is associated with the accuracy of the model and the information that is used to define it. Although both approaches are widely used, data-driven algorithms are preferred in most cases because they afford the ability to analyze data acquired from sensors and to provide a real-time solution for decision making; however, these approaches involve high-performance processors due to the high computational cost. As a contribution to the researchers working with data-driven algorithms and applications, this work presents a brief review of data-driven algorithms for damage identification in structural health-monitoring applications. This review covers damage detection, localization, classification, extension, and prognosis, as well as the development of smart structures. The literature is systematically reviewed according to the natural steps of a structural health-monitoring system. This review also includes information on the types of sensors used as well as on the development of data-driven algorithms for damage identification.Peer ReviewedPostprint (published version

    Enhancing assertive community treatment with cognitive behavioral social skills training for schizophrenia: study protocol for a randomized controlled trial.

    Get PDF
    BackgroundSchizophrenia leads to profound disability in everyday functioning (e.g., difficulty finding and maintaining employment, housing, and personal relationships). Medications can effectively reduce positive symptoms (e.g., hallucinations and delusions), but they do not meaningfully improve daily life functioning. Psychosocial evidence-based practices (EBPs) improve functioning, but these EBPs are not available to most people with schizophrenia. The field must close the research and service delivery gap by adapting EBPs for schizophrenia to facilitate widespread implementation in community settings. Our hybrid effectiveness and implementation study represents an initiative to bridge this divide. In this study we will test whether an existing EBP (i.e., Cognitive Behavioral Social Skills Training (CBSST)) modified to work in practice settings (i.e., Assertive Community Treatment (ACT) teams) commonly available to persons with schizophrenia results in better consumer outcomes. We will also identify key factors relevant to developing future CBSST implementation strategies.Methods/designFor the effectiveness study component, persons with schizophrenia will be recruited from existing publicly funded ACT teams operating in community settings. Participants will be randomized to one of the 2 treatments (ACT alone or ACT + Adapted CBSST) and followed longitudinally for 18 months with assessments every 18 weeks after baseline (5 in total). The primary outcome domain is psychosocial functioning (e.g., everyday living skills and activities related to employment, education, and housing) as measured by self-report, testing, and observation. Additional outcome domains of interest include mediators of change in functioning, symptoms, and quality of services. Primary analyses will be conducted using linear mixed-effects models for continuous data. The implementation study component consists of a structured, mixed qualitative-quantitative methodology (i.e., Concept Mapping) to characterize and assess the implementation experience from multiple stakeholder perspectives in order to inform future implementation initiatives.DiscussionAdapting CBSST to fit into the ACT service delivery context found throughout the United States creates an opportunity to substantially increase the number of persons with schizophrenia who could have access to and benefit from EBPs. As part of the implementation learning process training materials and treatment workbooks have been revised to promote easier use of CBSST in the context of brief community-based ACT visits.Trial registrationClinicalTrials.gov NCT02254733 . Date of registration: 25 April 2014

    Implementation and Analysis of Combined Machine Learning Method for Intrusion Detection System

    Get PDF
    As one of the security components in Network Security Monitoring System, Intrusion Detection System (IDS) is implemented by many organizations in their networks to detect and address the impact of network attacks. There are many machine-learning methods that have been widely developed and applied in the IDS. Selection of appropriate methods is necessary to improve the detection accuracy in the application of machine-learning in IDS. In this research we proposed an IDS that we developed based on machine learning approach. We use 28 features subset without content features of  Knowledge Data Discovery (KDD) dataset to build machine learning model. From our analysis and experiment we get 28 features subset of KDD dataset that are most likely to be applied for the IDS in the real network. The machine learning model based on this 28 features subset obtained 99.9% accuracy for both two-class and multiclass classification. From our experiments using the IDS we have developed show good performance in detecting attacks on real networks

    5G: 2020 and Beyond

    Get PDF
    The future society would be ushered in a new communication era with the emergence of 5G. 5G would be significantly different, especially, in terms of architecture and operation in comparison with the previous communication generations (4G, 3G...). This book discusses the various aspects of the architecture, operation, possible challenges, and mechanisms to overcome them. Further, it supports users? interac- tion through communication devices relying on Human Bond Communication and COmmunication-NAvigation- SENsing- SErvices (CONASENSE).Topics broadly covered in this book are; • Wireless Innovative System for Dynamically Operating Mega Communications (WISDOM)• Millimeter Waves and Spectrum Management• Cyber Security• Device to Device Communicatio

    5G: 2020 and Beyond

    Get PDF
    The future society would be ushered in a new communication era with the emergence of 5G. 5G would be significantly different, especially, in terms of architecture and operation in comparison with the previous communication generations (4G, 3G...). This book discusses the various aspects of the architecture, operation, possible challenges, and mechanisms to overcome them. Further, it supports users? interac- tion through communication devices relying on Human Bond Communication and COmmunication-NAvigation- SENsing- SErvices (CONASENSE).Topics broadly covered in this book are; • Wireless Innovative System for Dynamically Operating Mega Communications (WISDOM)• Millimeter Waves and Spectrum Management• Cyber Security• Device to Device Communicatio

    Human-friendly robotic manipulators: safety and performance issues in controller design

    Get PDF
    Recent advances in robotics have spurred its adoption into new application areas such as medical, rescue, transportation, logistics, personal care and entertainment. In the personal care domain, robots are expected to operate in human-present environments and provide non-critical assistance. Successful and flourishing deployment of such robots present different opportunities as well as challenges. Under a national research project, Bobbie, this dissertation analyzes challenges associated with these robots and proposes solutions for identified problems. The thesis begins by highlighting the important safety concern and presenting a comprehensive overview of safety issues in a typical domestic robot system. By using functional safety concept, the overall safety of the complex robotic system was analyzed through subsystem level safety issues. Safety regions in the world model of the perception subsystem, dependable understanding of the unstructured environment via fusion of sensory subsystems, lightweight and compliant design of mechanical components, passivity based control system and quantitative metrics used to assert safety are some important points discussed in the safety review. The main research focus of this work is on controller design of robotic manipulators against two conflicting requirements: motion performance and safety. Human-friendly manipulators used on domestic robots exhibit a lightweight design and demand a stable operation with a compliant behavior injected via a passivity based impedance controller. Effective motion based manipulation using such a controller requires a highly stiff behavior while important safety requirements are achieved with compliant behaviors. On the basis of this intuitive observation, this research identifies suitable metrics to identify the appropriate impedance for a given performance and safety requirement. This thesis also introduces a domestic robot design that adopts a modular design approach to minimize complexity, cost and development time. On the basis of functional modularity concept where each module has a unique functional contribution in the system, the robot “Bobbie-UT‿ is built as an interconnection of interchangeable mobile platform, torso, robotic arm and humanoid head components. Implementation of necessary functional and safety requirements, design of interfaces and development of suitable software architecture are also discussed with the design
    • …
    corecore