![]() Rinaldi, Marco ![]() ![]() Scientific Conference (2018, September) Detailed reference viewed: 105 (0 UL)![]() Backes, Dietmar ![]() ![]() Scientific Conference (2019, December 11) Detailed reference viewed: 80 (2 UL)![]() Deshpande, Saurabh ![]() ![]() ![]() in Frontiers in Materials (2023) Deep learning surrogate models are being increasingly used in accelerating scientific simulations as a replacement for costly conventional numerical techniques. However, their use remains a significant ... [more ▼] Deep learning surrogate models are being increasingly used in accelerating scientific simulations as a replacement for costly conventional numerical techniques. However, their use remains a significant challenge when dealing with real-world complex examples. In this work, we demonstrate three types of neural network architectures for efficient learning of highly non-linear deformations of solid bodies. The first two architectures are based on the recently proposed CNN U-NET and MAgNET (graph U-NET) frameworks which have shown promising performance for learning on mesh-based data. The third architecture is Perceiver IO, a very recent architecture that belongs to the family of attention-based neural networks–a class that has revolutionised diverse engineering fields and is still unexplored in computational mechanics. We study and compare the performance of all three networks on two benchmark examples, and show their capabilities to accurately predict the non-linear mechanical responses of soft bodies. [less ▲] Detailed reference viewed: 76 (5 UL)![]() Laskaris, Georgios ![]() Scientific Conference (2017, September 12) Detailed reference viewed: 51 (1 UL)![]() Arend, Béatrice ![]() ![]() in Proceedings of the 8th International Conference on Society and Information Technologies (2017, March) Detailed reference viewed: 115 (2 UL)![]() Vitello, Piergiorgio ![]() ![]() Poster (2020, November) As a response to the global outbreak of the SARS-COVID-19 pandemic, authorities have enforced a number of measures including social distancing, travel restrictions that lead to the “temporary” closure of ... [more ▼] As a response to the global outbreak of the SARS-COVID-19 pandemic, authorities have enforced a number of measures including social distancing, travel restrictions that lead to the “temporary” closure of activities stemming from public services, schools, industry to local businesses. In this poster we draw the attention to the impact of such measures on urban environments and activities. For this, we use crowdsensed information available from datasets like Google Popular Times and Apple Maps to shed light on the changes undergone during the outbreak and the recovery [less ▲] Detailed reference viewed: 199 (8 UL)![]() Bui, Huu Phuoc ![]() ![]() ![]() in Computer Methods in Applied Mechanics and Engineering (2018), 345 We present the corotational cut Finite Element Method (FEM) for real-time surgical simulation. The only requirement of the proposed method is a background mesh, which is not necessarily conforming to the ... [more ▼] We present the corotational cut Finite Element Method (FEM) for real-time surgical simulation. The only requirement of the proposed method is a background mesh, which is not necessarily conforming to the boundaries/interfaces of the simulated object. The details of the surface, which can be directly obtained from binary images, are taken into account by a multilevel embedding algorithm which is applied to elements of the background mesh that are cut by the surface. Dirichlet boundary conditions can be implicitly imposed on the surface using Lagrange multipliers, whereas traction or Neumann boundary conditions, which is/are applied on parts of the surface, can be distributed to the background nodes using shape functions. The implementation is verified by convergences studies, of the geometry and of numerical solutions, which exhibit optimal rates. To verify the reliability of the method, it is applied to various needle insertion simulations (e.g. for biopsy or brachytherapy) into brain and liver models. The numerical results show that, while retaining the accuracy of the standard FEM, the proposed method can (1) make the discretisation independent from geometric description, (2) avoid the complexity of mesh generation for complex geometries, and (3) provide computational speed suitable for real-time simulations. Thereby, the proposed method is very suitable for patient-specific simulations as it improves the simulation accuracy by automatically, and properly, taking the simulated geometry into account, while keeping the low computational cost. [less ▲] Detailed reference viewed: 77 (0 UL)![]() ; ; et al in Proceedings of the National Academy of Sciences of the United States of America (2010), 107(29), 13171-13176 Circadian oscillators provide rhythmic temporal cues for a range of biological processes in plants and animals, enabling anticipation of the day/night cycle and enhancing fitness-associated traits. We ... [more ▼] Circadian oscillators provide rhythmic temporal cues for a range of biological processes in plants and animals, enabling anticipation of the day/night cycle and enhancing fitness-associated traits. We have used engineering models to understand the control principles of a plant's response to seasonal variation. We show that the seasonal changes in the timing of circadian outputs require light regulation via feed-forward loops, combining rapid light-signaling pathways with entrained circadian oscillators. Linear time-invariant models of circadian rhythms were computed for 3,503 circadian-regulated genes and for the concentration of cytosolic-free calcium to quantify the magnitude and timing of regulation by circadian oscillators and light-signaling pathways. Bioinformatic and experimental analysis show that rapid light-induced regulation of circadian outputs is associated with seasonal rephasing of the output rhythm. We identify that external coincidence is required for rephasing of multiple output rhythms, and is therefore important in general phase control in addition to specific photoperiod-dependent processes such as flowering and hypocotyl elongation. Our findings uncover a fundamental design principle of circadian regulation, and identify the importance of rapid light-signaling pathways in temporal control. [less ▲] Detailed reference viewed: 114 (4 UL)![]() ; Goncalves, Jorge ![]() in IEEE Transactions on Education (2010), 53(2), 328-334 This paper presents a simple, cost-effective and robust atomic force microscope (AFM), which has been purposely designed and built for use as a teaching aid in undergraduate controls labs. The guiding ... [more ▼] This paper presents a simple, cost-effective and robust atomic force microscope (AFM), which has been purposely designed and built for use as a teaching aid in undergraduate controls labs. The guiding design principle is to have all components be open and visible to the students, so the inner functioning of the microscope has been made clear to see. All of the parts but one are off the shelf, and assembly time is generally less than two days, which makes the microscope a robust instrument that is readily handled by the students with little chance of damage. While the scanning resolution is nowhere near that of a commercial instrument, it is more than sufficient to take interesting scans of micrometer-scale objects. A survey of students after their having used the AFM resulted in a generally good response, with 80% agreeing that they had a positive learning experience. [less ▲] Detailed reference viewed: 159 (0 UL)![]() ; Baroli, Davide ![]() ![]() in Physical Review. E ,Statistical, Nonlinear, and Soft Matter Physics (2019), 99(6), A computational approach that couples molecular-dynamics (MD) and the-finite-element-method (FEM) technique is here proposed for the theoretical study of the dynamics of particles subjected to ... [more ▼] A computational approach that couples molecular-dynamics (MD) and the-finite-element-method (FEM) technique is here proposed for the theoretical study of the dynamics of particles subjected to electromechanical forces. The system consists of spherical particles (modeled as micrometric rigid bodies with proper densities and dielectric functions) suspended in a colloidal solution, which flows in a microfluidic channel in the presence of a generic nonuniform variable electric field generated by electrodes. The particles are subjected to external forces (e.g., drag or gravity) which satisfy a particlelike formulation that is typical of the MD approach, along with an electromechanical force that, in turn, requires the three-dimensional self-consistent solutions of correct continuum field equations during the integration of the equations of motion. In the MD-FEM method used in this work, the finite element method is applied to solve the continuum field equations while the MD technique is used for the stepwise explicit integration of the equations of motion. Our work shows the potential of coupled MD-FEM simulations for the study of electromechanical particles and opens a double perspective for implementing (a) MD away from the field of atomistic simulations and (b) the continuum-particle approach to cases where the conventional force evaluation used in MD is not applicable. [less ▲] Detailed reference viewed: 82 (4 UL)![]() Ostaszewski, Marek ![]() ![]() in Scientific Data (2020) Detailed reference viewed: 100 (5 UL)![]() ; Bordas, Stéphane ![]() in Computational Materials Science (2011), 50(3), 1145-1156 Determining the lifetime of solder joints subjected to thermomechanical loads is crucial to guarantee the quality of electronic devices. The fatigue process is heavily dependent on the microstructure of ... [more ▼] Determining the lifetime of solder joints subjected to thermomechanical loads is crucial to guarantee the quality of electronic devices. The fatigue process is heavily dependent on the microstructure of the joints. We present a new methodology to determine the lifetime of the joints based on microstructural phenomena. Random microstructures are generated to capture the statistical variety of possible microstructures and crack growth calculations are performed. The extended finite element method is used to solve the structural problem numerically which allows a complete automation of the process. Numerical examples are given and compared to experimental data. [less ▲] Detailed reference viewed: 124 (0 UL)![]() ; Höhn, Sviatlana ![]() in Proceedings of the 31st Benelux Conference on Artificial Intelligence (BNAIC 2019) and the 28th Belgian Dutch Conference on Machine Learning (Benelearn 2019) (2019, November) Detailed reference viewed: 72 (0 UL)![]() ; ; Gubenko, Alla ![]() in Creativity: Theories – Research – Applications (2021), 8(1), Detailed reference viewed: 74 (16 UL)![]() Moreno Grandas, Diana Paola ![]() in INTERNATIONAL DESIGN CONFERENCE - DESIGN 2014 (2014, May) Designers are currently facing design problems that are not uniquely related to physical systems but transactional as well. Transactional processes (services) have had a steady growth during the last ... [more ▼] Designers are currently facing design problems that are not uniquely related to physical systems but transactional as well. Transactional processes (services) have had a steady growth during the last three decades and currently add more than 65% of global economic value. This study expands our understanding of designers’ interaction with ideation methods. We investigate a heuristic method known as SCAMPER, focusing on a transactional design problem with a relatively large transactional domain expert sample size (n=60). The study shows, unexpectedly, that the SCAMPER method appears to be both a fixating and de-fixating method (at least for the type of problem explored), where design fixation is not shown to be effectively mitigated by the method; yet, despite this finding, a significantly higher novelty production is achieved when compared to a non-assisted scenario. [less ▲] Detailed reference viewed: 92 (4 UL)![]() Oberhausen, Christof ![]() ![]() in Journal of Advances in Management Research (2017), 14(2), 182-193 Purpose – In most cases, the conventional assessment of value streams is based on key performance indicators (KPIs) like the share of added value, the degree of flow or a comprehensive lead time analysis ... [more ▼] Purpose – In most cases, the conventional assessment of value streams is based on key performance indicators (KPIs) like the share of added value, the degree of flow or a comprehensive lead time analysis. To evaluate cross-enterprise value streams of manufacturing, business or service processes in detail, a holistic methodology is needed. The paper aims to discuss this issue. Design/methodology/approach – In this research paper, the assessment of value streams within complex cross-company networks is described. After a presentation of relevant KPIs in the fields of value stream management (VSM) and supply chain management (SCM), an approach for a cross-enterprise evaluation of value streams on different levels of detail is shown. In addition, the use of an absolute VSM evaluation, in contrast to a relative VSM assessment, is examined. Findings – Based on a uniform and well-balanced set of KPIs and other VSM and SCM parameters, a performance assessment on different levels of value stream detail is enabled. Further investigations reveal the advantages of a relative compared with an absolute VSM assessment. Research limitations/implications – In addition to a comprehensive overview of existing KPIs for a value stream assessment beyond company borders, a holistic and multi-level VSM approach is presented in this paper. In contrast to existing VSM approaches, the described method allows an evaluation and subsequent improvement of value streams within supply chain networks. Up to now, the presented approach for the assessment of cross-enterprise value streams has only been tested in specific industrial environments. In future, the proposed methodology shall also be validated for other process types like business, service or further manufacturing processes. Practical implications – The described cross-company performance measurement approach shows a high practical relevance for organizations operating in supply chain networks. Due to the integrated use of different VSM parameters, the evaluation of highly interconnected value streams across corporate boundaries is facilitated. By means of a case study, the proposed methodology is validated under real industry conditions and proves its practical applicability. Originality/value – One of the novel features of this research is the extension of the traditional VSM method with respect to a relative evaluation of value streams based on a set of significant KPIs. In addition, the allocation of these KPIs to different value stream layers and categories leads to an innovative approach for a multi-level assessment according to the needs of the specific VSM application, e.g. a more standardized use of VSM in complex supply chain networks. [less ▲] Detailed reference viewed: 187 (9 UL)![]() Vitello, Piergiorgio ![]() Doctoral thesis (2023) The importance of data in transportation research has been widely recognized since it plays a crucial role in understanding and analyzing the movement of people, identifying inefficiencies in ... [more ▼] The importance of data in transportation research has been widely recognized since it plays a crucial role in understanding and analyzing the movement of people, identifying inefficiencies in transportation systems, and developing strategies to improve mobility services. This use of data, known as mobility analysis, involves collecting and analyzing data on transport infrastructure and services, traffic flows, demand, and travel behavior. However, traditional data sources have limitations. The widespread use of mobile devices, such as smartphones, has enabled the use of Information and Communications Technology (ICT) to improve data sources for mobility analysis. Mobile crowdsensing (MCS) is a paradigm that uses data from smart devices to provide researchers with more detailed and real-time insights into mobility patterns and behaviors. However, this new data also poses challenges, such as the need to fuse it with other types of information to obtain mobility insights. In this thesis, the primary source of data that is being examined and leveraged is the popularity index of local businesses and points of interest from Google Popular Times (GPT) data. This data has significant potential for mobility analysis as it overcomes limitations of traditional mobility data, such as data availability and lack of reflection of demand for secondary activities. The main objective of this thesis is to investigate how crowdsourced data can contribute to reduce the limitations of traditional mobility datasets. This is achieved by developing new tools and methodologies to utilize crowdsourced data in mobility analysis. The thesis first examines the potential of GPT as a source to provide information on the attractiveness of secondary activities. A data-driven approach is used to identify features that impact the popularity of local businesses and classify their attractiveness based on these features. Secondly, the thesis evaluates the possible use of GPT as a source to estimate mobility patterns. A tool is created to use the crowdness of a station to estimate transit demand information and map the precise volume and temporal dynamics of entrances and exits at the station level. Thirdly, the thesis investigates the possibility of leveraging the popularity of activities around stations to estimate flows in and out of stations. A method is proposed to profile stations based on the dynamic information of activities in catchment areas. Through this data, machine learning techniques are used to estimate transit flows at the station level. Finally, this study concludes by exploring the possibility of exploiting crowdsourced data not only for extracting mobility insights under normal conditions but also to extract mobility trends during anomalous events. To this end, we focused on analyzing the recovery of mobility during the first outbreak of COVID-19 for different cities in Europe. [less ▲] Detailed reference viewed: 82 (11 UL)![]() ; ; Bordas, Stéphane ![]() Book published by Springer (2013) We focus here on the simulation of surgical acts of types similar to cutting and needle insertion in soft tissue, in real time (500 Hz), where the scale of the surgical instrument is several orders of ... [more ▼] We focus here on the simulation of surgical acts of types similar to cutting and needle insertion in soft tissue, in real time (500 Hz), where the scale of the surgical instrument is several orders of magnitude smaller than that of the organ. [less ▲] Detailed reference viewed: 122 (0 UL)![]() ; Bezzaoucha, Souad ![]() ![]() in Proceedings of the 2018 American Control Conference (2018, June 27) In the present paper, the problem of networked control system (NCS) cyber security is considered. The geometric approach is used to evaluate the security and vulnerability level of the controlled system ... [more ▼] In the present paper, the problem of networked control system (NCS) cyber security is considered. The geometric approach is used to evaluate the security and vulnerability level of the controlled system. The proposed results are about the so-called false data injection attacks and show how imperfectly known disturbances can be used to perform undetectable, or at least stealthy, attacks that can make the NCS vulnerable to attacks from malicious outsiders. A numerical example is given to illustrate the approach. [less ▲] Detailed reference viewed: 219 (9 UL)![]() Schafer, Valerie ![]() in Flux: Cahiers Scientifiques Internationaux Réseaux et Territoires (2020), 2019/4 Si les cyberattaques récentes au Moyen-Orient, menées via les noms de domaine, ont eu un vaste écho médiatique fin février 2019, tandis que la revue Défense et Sécurité Internationale consacrait un ... [more ▼] Si les cyberattaques récentes au Moyen-Orient, menées via les noms de domaine, ont eu un vaste écho médiatique fin février 2019, tandis que la revue Défense et Sécurité Internationale consacrait un dossier spécial à la techno-guérilla, les menaces qui pèsent sur les réseaux informatiques ne sont pas nouvelles. L’Afnic – Association Française pour le Nommage Internet en Coopération –, gestionnaire historique du .fr, fait partie des acteurs français confrontés au quotidien aux enjeux de sécurité des réseaux Internet et veille notamment à la sécurité des noms de domaine et au bon fonctionnement du .fr, en terme de disponibilité mais aussi d’intégrité. Mohsen Souissi, alors Responsable des Sécurité des Sys- tèmes d’information (RSSI) à l’Afnic, qu’il a intégrée en 2000 et où il était précédemment responsable Recherche et développement (R&D) de 2007 à 2016, et Stéphane Bortzmeyer, auteur de Cyberstructure (C&F Éditions, 2018) et ingénieur à l’Afnic depuis seize ans, après avoir été administrateur pour plusieurs systèmes et réseaux universitaires et de centres de recherche, reviennent sur les cybermenaces et les enjeux de sécurité auxquels ils sont confrontés. [less ▲] Detailed reference viewed: 132 (1 UL) |
||