A Protocol Translation Scheme Between EtherCAT Field Network and IPv6-Based Industrial Backbone Network

Author(s):  
Heng Wang ◽  
Qunzhi Bing ◽  
Anhua Deng
2010 ◽  
Vol 21 (6) ◽  
pp. 1416-1425
Author(s):  
Wen-Bin XIE ◽  
Jia LI ◽  
Ming XIAN ◽  
Yong-Guang CHEN

2007 ◽  
Vol 35 (6) ◽  
pp. 1495-1509
Author(s):  
E. M. Saad ◽  
Dr. Osama El Ghandour ◽  
Jehan, M. K

2021 ◽  
Vol 104 (2) ◽  
pp. 003685042110113
Author(s):  
Xianghua Ma ◽  
Zhenkun Yang

Real-time object detection on mobile platforms is a crucial but challenging computer vision task. However, it is widely recognized that although the lightweight object detectors have a high detection speed, the detection accuracy is relatively low. In order to improve detecting accuracy, it is beneficial to extract complete multi-scale image features in visual cognitive tasks. Asymmetric convolutions have a useful quality, that is, they have different aspect ratios, which can be used to exact image features of objects, especially objects with multi-scale characteristics. In this paper, we exploit three different asymmetric convolutions in parallel and propose a new multi-scale asymmetric convolution unit, namely MAC block to enhance multi-scale representation ability of CNNs. In addition, MAC block can adaptively merge the features with different scales by allocating learnable weighted parameters to three different asymmetric convolution branches. The proposed MAC blocks can be inserted into the state-of-the-art backbone such as ResNet-50 to form a new multi-scale backbone network of object detectors. To evaluate the performance of MAC block, we conduct experiments on CIFAR-100, PASCAL VOC 2007, PASCAL VOC 2012 and MS COCO 2014 datasets. Experimental results show that the detection precision can be greatly improved while a fast detection speed is guaranteed as well.


2019 ◽  
Vol 91 (2A) ◽  
pp. 787-802
Author(s):  
Silvia Pondrelli ◽  
Francesca Di Luccio ◽  
Laura Scognamiglio ◽  
Irene Molinari ◽  
Simone Salimbeni ◽  
...  

Abstract Starting in 1988, with the installation of the first broadband (BB) instrument in Italy, the Mediterranean Very Broadband Seismographic Network (MedNet) program established a backbone network of BB stations of the highest quality in the Mediterranean Sea countries. The Mediterranean region is characterized by relevant and frequent seismicity related to its complex tectonics, due to the convergence of two major plates, Africa and Eurasia, and the involvement of other minor plates, as the Adriatic plate. Therefore, the MedNet project became a scientific research infrastructure of excellence, able to fill the gap of regional coverage when the availability of seismic BB instruments was still scarce. The main characteristics of the MedNet network are the highest quality of the seismographic instrumentation at remote sites and very low level of anthropogenic noise with stable conditions of pressure and temperature. After 30 yr of recordings, the MedNet program has proven that the early adoption of very BB instruments in selected sites have been the best choice. A large number of studies benefited from MedNet data, as seismic source computation and Earth structure reconstruction, at local and global scale. We present a concise overview of the contribution given by MedNet data in the last three decades to motivate and financially support the existence of this valuable infrastructure, and to further maintain this project.


1971 ◽  
Vol 43 ◽  
pp. 329-339 ◽  
Author(s):  
Dale Vrabec

Zeeman spectroheliograms of photospheric magnetic fields (longitudinal component) in the CaI 6102.7 Å line are being obtained with the new 61-cm vacuum solar telescope and spectroheliograph, using the Leighton technique. The structure of the magnetic field network appears identical to the bright photospheric network visible in the cores of many Fraunhofer lines and in CN spectroheliograms, with the exception that polarities are distinguished. This supports the evolving concept that solar magnetic fields outside of sunspots exist in small concentrations of essentially vertically oriented field, roughly clumped to form a network imbedded in the otherwise field-free photosphere. A timelapse spectroheliogram movie sequence spanning 6 hr revealed changes in the magnetic fields, including a systematic outward streaming of small magnetic knots of both polarities within annular areas surrounding several sunspots. The photospheric magnetic fields and a series of filtergrams taken at various wavelengths in the Hα profile starting in the far wing are intercompared in an effort to demonstrate that the dark strands of arch filament systems (AFS) and fibrils map magnetic field lines in the chromosphere. An example of an active region in which the magnetic fields assume a distinct spiral structure is presented.


Author(s):  
Taku Wakui ◽  
Takao Kondo ◽  
Fumio Teraoka

AbstractThis paper proposes a general-purpose anomaly detection mechanism for Internet backbone traffic named GAMPAL (General-purpose Anomaly detection Mechanism using Prefix Aggregate without Labeled data). GAMPAL does not require labeled data to achieve general-purpose anomaly detection. For scalability to the number of entries in the BGP RIB (Border Gateway Protocol Routing Information Base), GAMPAL introduces prefix aggregate. The BGP RIB entries are classified into prefix aggregates, each of which is identified with the first three AS (Autonomous System) numbers in the AS_PATH attribute. GAMPAL establishes a prediction model for traffic sizes based on past traffic sizes. It adopts a LSTM-RNN (Long Short-Term Memory Recurrent Neural Network) model that focuses on the periodicity of the Internet traffic patterns at a weekly scale. The validity of GAMPAL is evaluated using real traffic information, BGP RIBs exported from the WIDE backbone network (AS2500), a nationwide backbone network for research and educational organizations in Japan, and the dataset of an ISP (Internet Service Provider) in Spain. As a result, GAMPAL successfully detects anomalies such as increased traffic due to an event, DDoS (Distributed Denial of Service) attacks targeted at a stub organization, a connection failure, an SSH (Secure Shell) scan attack, and anomaly spam.


Author(s):  
Mengxuan Wang ◽  
Jinkun Yao ◽  
Guoshan Zhang ◽  
Bin Guan ◽  
Xinbo Wang ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document