Non-linear mapping is one of the most popular solutions for complex datastructures and distinct patterns to cluster data. Auto encoder Networks (AENs) are widely used in clustering as they improve data representation...
详细信息
Acoustic emission was implemented to monitor damage initiation and its progression in a full-scale Pultruded Rod Stitched Efficient Unitized Structure (PRSEUS) carbon/epoxy fuselage panel subjected to combined loading...
详细信息
ISBN:
(纸本)9781605952758
Acoustic emission was implemented to monitor damage initiation and its progression in a full-scale Pultruded Rod Stitched Efficient Unitized Structure (PRSEUS) carbon/epoxy fuselage panel subjected to combined loading of internal pressure and axial load. Prior to panel fracture, emission was generated at a very high rate, with a significant amount of emission apparently generated by fretting among the nearly infinite newly formed fracture surfaces. the separation of burst type waveforms (i.e., which are caused by actual new damage) and emission caused from extraneous sources is demonstrated. the effect of high rate of emission on the corresponding AE signal features is demonstrated. It is shown that the high rate of failure in composites is an added difficulty for damage source identification, which the current AE methodology needs to address.
We present new algorithms computing 3P and 2P + Q by removing the same part of numerators and denominators of their formulas, given two points P and Q on elliptic curves defined over prime fields and binary fields in ...
详细信息
ISBN:
(纸本)9783319224251;9783319224244
We present new algorithms computing 3P and 2P + Q by removing the same part of numerators and denominators of their formulas, given two points P and Q on elliptic curves defined over prime fields and binary fields in affine coordinates. Our algorithms save one or two field multiplications compared with ones presented by Ciet, Joye, Lauter, and Montgomery. Since 2P + Q takes 1 3 proportion, 28.5% proportion, and 25.8% proportion of all point operations by non-adjacent form, binary/ternary approach and tree approach to compute scalar multiplications respectively, 3P occupies 42.9% proportion and 33.4% proportion of all point operations by binary/ternary approach and tree approach to compute scalar multiplications respectively, utilizing our new formulas of 2P + Q and 3P, scalar multiplications by using non-adjacent form, binary/ternary approach and tree approach are improved.
作者:
Gruyer, DMangeas, MAlix, RLIVIC
Unite Mixte INRETS LCPC Lab Interact Vehicules Infrastruct Conducteurs F-78000 Versailles France
Our research enters into the design of perception devices for intelligent vehicles. this device is supposed to be a piece of new driving assistance systems aiming at increasing the safety on road. the European project...
详细信息
ISBN:
(纸本)0780372220
Our research enters into the design of perception devices for intelligent vehicles. this device is supposed to be a piece of new driving assistance systems aiming at increasing the safety on road. the European project PROMEthEUS created in 1988, has emphasized the problem of the interaction between the driver and the vehicle via the driver assistance system 111, this project has been the precursor of several other projects linked to intelligent vehicles. Especially, the European project named CARSENSE [2] involves 11 manufacturers and researchers from the car domain. the purpose of this project is to develop a multi-sensors device which would provide reliable data of the front vehicle environment. At last, this system should help to design some safety assistance systems such an obstacle avoidance module or a semi-autonomous driving assistance at low speed. Our work takes a full part of designing and development of the CARSENSE fusion system box. We are particularly interested in data fusion algorithms giving to the driver some accurate and above all reliable and pertinent information with regard to the current driving situation. In order to deal with information reliability, we have designed a perception algorithm that combines some tools dealing simultaneously withthe inaccuracy and uncertainty of dynamic environment representation.
Federated learning is a potential ML approach that promotes cooperative learning among many distributed systems while ensuring data privacy. In this study, we present a wide review of the design and evaluation of FL, ...
详细信息
We study linear dimension reducing transforms using maximum mutual information between transformed data and class labels as the criterion to learn the transforms. Renyi's quadratic entropy provides a differentiabl...
详细信息
We study linear dimension reducing transforms using maximum mutual information between transformed data and class labels as the criterion to learn the transforms. Renyi's quadratic entropy provides a differentiable and computationally feasible criterion on which gradient ascent algorithms can be based without the limitations of methods using only second order statistics, such as PCA or LDA. Application to class structure visualization in exploratory data analysis is presented.
the Collaborative Computing Project for NMR (CCPN) has build a software framework consisting of the CCPN data model (with APIs) for NMR related data, the CcpNmr Analysis program and additional tools like CcpNmr Format...
详细信息
We describe a method for identifying and performing functional analysis of structured regions that are embedded in natural language documents, such as tables or key-value lists. Such regions often encode information a...
详细信息
ISBN:
(纸本)9782951740891
We describe a method for identifying and performing functional analysis of structured regions that are embedded in natural language documents, such as tables or key-value lists. Such regions often encode information according to ad hoc schemas and avail themselves of visual cues in place of natural language grammar, presenting problems for standard information extraction algorithms. Unlike previous work in table extraction, which assumes a relatively noiseless two-dimensional layout, our aim is to accommodate a wide variety of naturally occurring structure types. Our approach has three main parts. First, we collect and annotate a a diverse sample of "naturally" occurring structures from several sources. Second, we use probabilistic text segmentation techniques, featurized by skip bigrams over spatial and token category cues, to automatically identify contiguous regions of structured text that share a common schema. Finally, we identify the records and fields within each structured region using a combination of distributional similarity and sequence alignment methods, guided by minimal supervision in the form of a single annotated record. We evaluate the last two components individually, and conclude with a discussion of further work.
In HPC applications, memory access behavior is one of the main factors affecting performance. Improving an application's memory access behavior requires studying spatial-temporal data locality. Existing data local...
详细信息
ISBN:
(纸本)9798400710919
In HPC applications, memory access behavior is one of the main factors affecting performance. Improving an application's memory access behavior requires studying spatial-temporal data locality. Existing data locality analyses focus on single locations. We introduce locality metrics between pairs of memory locations that quantify three dimensions of spatial-temporal affinity: temporal access proximity, forward access correlation, and nearby access correlation. We describe methods for distinguishing between potential vs. realized affinity and for reasoning about affinity (or friendship) at multiple resolutions (4D, 3D, 2D, 1D). Finally, we construct spatial-temporal affinity signatures that classify memory behavior and are used to reason about changes in software (data relayout, code refactoring) or hardware (caching, prefetching). We describe methods for signature visualization, interpretation, and quantitative comparison of signatures. We evaluate our methodology using applications with variants that contrast datastructures, data layouts and algorithms. We show that spatial-temporal affinity analysis provides novel insights and enables predictive reasoning about application performance.
In this paper we study proximity structures like Delauney triangulations based on geometric graphs, i.e. graphs which are subgraphs of the complete geometric graph. Given an arbitrary geometric graph G, we define seve...
详细信息
暂无评论