An Analysis Method for Heating Network Leaks Monitoring
نویسندگان
چکیده
Modern district heating (DH) systems are complex engineering structures that play an essential role in large city infrastructures. DH networks have many sensors, nodes, and methods for monitoring the status of network. Sensing, processing, analytical actuation (SPA) incoming information handled by SPA semantic Computing method can be applied to similar problems. The Semantic searches correlations between sets data identify correct scenario respond events. This article explores integration functions analyze multivariate sensing data, including from multivariable sensors infrared images, creating a system networks. focus is assess whether approach suitable candidate use monitor emergency events Specific target assessment [1] multi-parameter network sensor such as water temperature, sweat rate, energy delivered, etc., [2] image camera mounted on unmanned aerial vehicle (UAV) location underground leaks. A computational model, mathematical model meaning (MMM), spatial filtering proposed integrating computing leak detection
منابع مشابه
Low Invasive Temperature Monitoring Method for Hyperthermia Using Induction Heating
In this study, we develop a local heating method and monitoring method for hyperthermia using the Ferromagnetic Implant with Low Curie Temperature (FILCT) under a high frequency magnetic field. We describe the experimental setup and in vitro experimental results.
متن کاملAn Effective Method for Crop Monitoring Using Wireless Sensor Network
The main aim of this paper is to propose a state of art wireless sensor technology in agriculture, which can show the path to the rural farming community to replace some of the traditional techniques. In this project, the sensor motes have several external sensors namely leaf wetness, soil moisture, soil pH, atmospheric pressure sensors attached to it. Based on the value of soil moisture sensor...
متن کاملAn Ant Colony Optimization Algorithm for Network Vulnerability Analysis
Intruders often combine exploits against multiple vulnerabilities in order to break into the system. Each attack scenario is a sequence of exploits launched by an intruder that leads to an undesirable state such as access to a database, service disruption, etc. The collection of possible attack scenarios in a computer network can be represented by a directed graph, called network attack gra...
متن کاملA Leakage Monitoring System of Pipeline in Heating Network
Supervisory control and data acquisition system (SCADA) is used to monitor the operating data of heating network. But it can do data acquisition and some simple operations only. So in this paper with the data collected by SCADA a leakage monitoring system of pipeline in heating network is designed by the Matble graphical user interface program (GUI). The theoretical basis of this monitoring is ...
متن کاملanalysis of power in the network society
اندیشمندان و صاحب نظران علوم اجتماعی بر این باورند که مرحله تازه ای در تاریخ جوامع بشری اغاز شده است. ویژگیهای این جامعه نو را می توان پدیده هایی از جمله اقتصاد اطلاعاتی جهانی ، هندسه متغیر شبکه ای، فرهنگ مجاز واقعی ، توسعه حیرت انگیز فناوری های دیجیتال، خدمات پیوسته و نیز فشردگی زمان و مکان برشمرد. از سوی دیگر قدرت به عنوان موضوع اصلی علم سیاست جایگاه مهمی در روابط انسانی دارد، قدرت و بازتولید...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Frontiers in artificial intelligence and applications
سال: 2022
ISSN: ['1879-8314', '0922-6389']
DOI: https://doi.org/10.3233/faia210483