200,468 research outputs found

    Supporting group maintenance through prognostics-enhanced dynamic dependability prediction

    Get PDF
    Condition-based maintenance strategies adapt maintenance planning through the integration of online condition monitoring of assets. The accuracy and cost-effectiveness of these strategies can be improved by integrating prognostics predictions and grouping maintenance actions respectively. In complex industrial systems, however, effective condition-based maintenance is intricate. Such systems are comprised of repairable assets which can fail in different ways, with various effects, and typically governed by dynamics which include time-dependent and conditional events. In this context, system reliability prediction is complex and effective maintenance planning is virtually impossible prior to system deployment and hard even in the case of condition-based maintenance. Addressing these issues, this paper presents an online system maintenance method that takes into account the system dynamics. The method employs an online predictive diagnosis algorithm to distinguish between critical and non-critical assets. A prognostics-updated method for predicting the system health is then employed to yield well-informed, more accurate, condition-based suggestions for the maintenance of critical assets and for the group-based reactive repair of non-critical assets. The cost-effectiveness of the approach is discussed in a case study from the power industry

    Stative sentences in Japanese and the role of the nominative marker "ga" : a thesis submitted in partial fulfillment of the requirements for the degree of Master of Arts in Japanese at Massey University, Palmerston North, New Zealand

    Get PDF
    The Japanese nominative particle ga is normally associated with the marking of subjects. However, there are several constructions involving stative predicates, where it has been claimed, notably by those working within a generative framework, that a ga-marked NP can be an object and that such sentences are transitive. Such an analysis has particularly arisen in the case of sentences with more than one ga-marked NP, exhibiting so-called double ga marking. The following study makes two claims. Firstly, that one of the functions of ga in such sentences is to provide a discourse frame akin to the topic marking function of the postpositional particle wa. Secondly it argues that stative sentences associated with double ga-marking are in fact intransitive and that the ga-marked NP's that have been claimed to be objects are in fact subjects

    The reliability programme: final report

    Get PDF

    Spread spectrum-based video watermarking algorithms for copyright protection

    Get PDF
    Merged with duplicate record 10026.1/2263 on 14.03.2017 by CS (TIS)Digital technologies know an unprecedented expansion in the last years. The consumer can now benefit from hardware and software which was considered state-of-the-art several years ago. The advantages offered by the digital technologies are major but the same digital technology opens the door for unlimited piracy. Copying an analogue VCR tape was certainly possible and relatively easy, in spite of various forms of protection, but due to the analogue environment, the subsequent copies had an inherent loss in quality. This was a natural way of limiting the multiple copying of a video material. With digital technology, this barrier disappears, being possible to make as many copies as desired, without any loss in quality whatsoever. Digital watermarking is one of the best available tools for fighting this threat. The aim of the present work was to develop a digital watermarking system compliant with the recommendations drawn by the EBU, for video broadcast monitoring. Since the watermark can be inserted in either spatial domain or transform domain, this aspect was investigated and led to the conclusion that wavelet transform is one of the best solutions available. Since watermarking is not an easy task, especially considering the robustness under various attacks several techniques were employed in order to increase the capacity/robustness of the system: spread-spectrum and modulation techniques to cast the watermark, powerful error correction to protect the mark, human visual models to insert a robust mark and to ensure its invisibility. The combination of these methods led to a major improvement, but yet the system wasn't robust to several important geometrical attacks. In order to achieve this last milestone, the system uses two distinct watermarks: a spatial domain reference watermark and the main watermark embedded in the wavelet domain. By using this reference watermark and techniques specific to image registration, the system is able to determine the parameters of the attack and revert it. Once the attack was reverted, the main watermark is recovered. The final result is a high capacity, blind DWr-based video watermarking system, robust to a wide range of attacks.BBC Research & Developmen

    The management of academic workloads: full report on findings

    Get PDF
    The pressures on UK higher education (from explicit competition and growth in student numbers, to severe regulatory demands) are greater than ever, and have resulted in a steady increase in measures taken by universities to actively manage their finances and overall quality. These pressures are also likely to have impacted on staff and, indeed, recent large surveys in the sector have indicated that almost half of respondents find their workloads unmanageable. Against this background it would seem logical that the emphasis on institutional interventions to improve finance and quality, should be matched by similar attention given to the allocation of workloads to staff, and a focus on how best to utilise people’s time - the single biggest resource available within universities. Thus the aim of this piece of research was to focus on the processes and practices surrounding the allocation of staff workloads within higher education. Ten diverse organisations were selected for study: six universities in the UK, two overseas universities and two non higher education (but knowledge-intensive) organisations. In each, a crosssection of staff was selected, and in-depth interviews carried out. A total of 59 such interviews were carried out across the ten organisations. By identifying typical practices, as well as interesting alternatives, views on the various strengths and weaknesses of each of their workload allocation approaches was collated; and associated factors requiring attention identified. Through an extensive process of analysis, approaches which promoted more equitable loads for individuals, and which might provide synergies for institutions were also investigated

    Learning Hybrid Process Models From Events: Process Discovery Without Faking Confidence

    Full text link
    Process discovery techniques return process models that are either formal (precisely describing the possible behaviors) or informal (merely a "picture" not allowing for any form of formal reasoning). Formal models are able to classify traces (i.e., sequences of events) as fitting or non-fitting. Most process mining approaches described in the literature produce such models. This is in stark contrast with the over 25 available commercial process mining tools that only discover informal process models that remain deliberately vague on the precise set of possible traces. There are two main reasons why vendors resort to such models: scalability and simplicity. In this paper, we propose to combine the best of both worlds: discovering hybrid process models that have formal and informal elements. As a proof of concept we present a discovery technique based on hybrid Petri nets. These models allow for formal reasoning, but also reveal information that cannot be captured in mainstream formal models. A novel discovery algorithm returning hybrid Petri nets has been implemented in ProM and has been applied to several real-life event logs. The results clearly demonstrate the advantages of remaining "vague" when there is not enough "evidence" in the data or standard modeling constructs do not "fit". Moreover, the approach is scalable enough to be incorporated in industrial-strength process mining tools.Comment: 25 pages, 12 figure
    corecore