A two-dimensional hydrodynamic model and a sediment transport model were developed for Mitchell's Cut inlet management study. the models were used to assess the existing condition to address sedimentation and navi...
详细信息
A two-dimensional hydrodynamic model and a sediment transport model were developed for Mitchell's Cut inlet management study. the models were used to assess the existing condition to address sedimentation and navigation problems at Mitchell's Cut. the models were also applied to evaluate inlet management alternatives. Model results show that sedimentation in the interior channels of the inlet system is likely caused mainly by sand transported from the Gulf by flood tide and partly by mud transported from East Matagorda Bay by ebb tide. the inlet is naturally stable. A jetty alternative shows promising performance as it can significantly reduce sedimentation with little change in the hydraulic regime of the study area.
During recent years quantitative precipitation forecasts (QPFs), based on NWP models, were continuously increasing their performances and accuracy especially for light and moderate precipitation thresholds;determinist...
详细信息
During recent years quantitative precipitation forecasts (QPFs), based on NWP models, were continuously increasing their performances and accuracy especially for light and moderate precipitation thresholds;deterministic verification suggests that for high thresholds there wasn't a similar improvement. High thresholds and rare events are particularly difficult to handle and this is a strong limitation for operational activities, particularly for flood forecasting. Where rainfall occurs, when it happens and how much it will be, are information that depends on how the used numerical model is able to determine the size, scale and the evolution of atmospheric systems involved. In this study numerical meteorological simulations of the most important floods occurred along the Arno river basin, Italy, in the 20th century, performed by the Regional Atmospheric modelingsystem (RAMS), are analysed with regard to the sensitivity to geometrical and initial conditions. RAMS is presently used to produce operational QPFs in an integrated hydro-meteorological forecasting system for the Arno river basin. the flood events occurred in November 1966 (100-years estimated recurrence, which caused several deaths and catastrophic damages to public and private goods and to the unique artistic and cultural heritage) and in October 1992 (30-years recurrence flood, with extensive damage). the advanced modules for the parameterisation of surface-water-atmosphere exchanges and for cloud and precipitation microphysical processes, included in RAMS, allow the explicit and likely representation (triggering and evolution) of the cloud and precipitation systems, which make this model a good candidate for such sensitivity analyses. the simulations of the floods occurred over the Arno river basin were initialised by means of the NCEP/NCAR global reanalysis data, and the sensitivity of the forecasts to the spatial horizontal and vertical resolution, the representation of the sea surface temperature and t
We investigate the impact of pair programming on the long term evolution of software systems. We use system dynamics to build simulation models which predict the trend in system growth with and without pair programmin...
详细信息
We investigate the impact of pair programming on the long term evolution of software systems. We use system dynamics to build simulation models which predict the trend in system growth with and without pair programming. Initial results suggest that the extra effort needed for two people to code together may generate sufficient benefit to justify pair programming.
Knowing which methods do not have side effects is necessary in a variety of software tools for program understanding, restructuring, optimization, and verification. We present a general approach for identifying side-e...
详细信息
Knowing which methods do not have side effects is necessary in a variety of software tools for program understanding, restructuring, optimization, and verification. We present a general approach for identifying side-effect-free methods in Java software. Our technique is parameterized by class analysis and is designed to work on incomplete programs. We present empirical results from two instantiations of the approach, based on rapid type analysis and on points-to analysis. In our experiments with several components, on average 22% of the investigated methods were identified as free of side effects. We also present a precision evaluation which shows that the approach achieves almost perfect precision - i.e., it almost never misses methods that in reality have no side effects. these results indicate that very precise identification of side-effect-free methods is possible with simple and inexpensive analysis techniques, and therefore can be easily incorporated in software tools.
DNA microarray provides a powerful basis for analysis of gene expression. Data mining methods such as clustering have been widely applied to microarray data to link genes that show similar expression patterns. However...
详细信息
DNA microarray provides a powerful basis for analysis of gene expression. Data mining methods such as clustering have been widely applied to microarray data to link genes that show similar expression patterns. However, this approach usually fails to unveil gene-gene interactions in the same cluster. We propose to combine graphical model based interaction analysis with other data mining techniques (e.g., association rule, hierarchical clustering) for this purpose. For interaction analysis, we propose the use of graphical Gaussian model to discover pairwise gene interactions and loglinear model to discover multigene interactions. We have constructed a prototype systemthat permits rapid interactive exploration of gene relationships.
this paper discusses VIEWS, a specification for building diagrams that describe the security features of systems. the authors' recent experience with providing security architecture and engineering support to orga...
详细信息
this paper discusses VIEWS, a specification for building diagrams that describe the security features of systems. the authors' recent experience with providing security architecture and engineering support to organizations with large, distributed applications suggests that security architecture and assurance efforts could benefit by following other engineering disciplines, where using graphical models is the norm. Security diagrams can help security architects understand a system 's security posture and can assist them in detecting vulnerabilities. Additionally, diagrams facilitate communications about the security features of a design. the output of a modeling effort using VIEWS is a diagram depicting a system's security features as well as those of the environment in which the system operates. A goal of VIEWS is to allow the display of important security features without injecting cluttering detail. this paper presents examples of security diagrams built with VIEWS.
In this paper we present a novel interactive modelingsystem, called VR Modeler, to create 3D geometric models from a set of photographs. In our approach standard automatic reconstruction techniques are assisted by a ...
详细信息
ISBN:
(纸本)9781581139679
In this paper we present a novel interactive modelingsystem, called VR Modeler, to create 3D geometric models from a set of photographs. In our approach standard automatic reconstruction techniques are assisted by a human operator. the modelingsystem is efficient and easy to use because the user can concentrate on the 2D segmentation and interpretation of the scene whereas our system is responsible for the corresponding 3D information. therefore we developed the user interface of VR Modeler as a monocular 3D modelingsystem. Additionally, we are able to obtain coarse as well as high resolution models from architectural scenes. Finally, we tested the modelingsystem on different types of datasets to demonstrate the usability of our approach.
In the context of software maintenance, legacy software systems are continuously re-engineered in order to correct errors, provide new functionality, or port them into modern platforms. However, software re-engineerin...
详细信息
ISBN:
(纸本)0769522130
In the context of software maintenance, legacy software systems are continuously re-engineered in order to correct errors, provide new functionality, or port them into modern platforms. However, software re-engineering activities should not occur in a vacuum, and it is important to incorporate non-functional requirements as part of the re-engineering process. this work presents an incremental reengineering framework that allows for quality requirements to be modeled as soft-goals, and transformations to be applied selectively towards achieving specific quality requirements for the target system. Moreover, to deal with large software systems, a system can be decomposed into a collection of smaller clusters. the reengineering framework can be applied incrementally to each of these clusters and results are assembled to produce the final system. Using the theory presented We developed a reengineering toolkit to automatically migrate procedural systems to object oriented platforms. We used the toolkit to migrate a number of open source systems including Apache, Bash and Clips. the obtained results demonstrate the effectiveness, usefulness, and scalability of our proposed incremental quality driven migration framework.
In this work, the conditions and the degree of DG exploitation are investigated in a national energy planning. To this purpose, a bottom-up energy systemoptimization model is used to support policy planning for the s...
详细信息
In this work, the conditions and the degree of DG exploitation are investigated in a national energy planning. To this purpose, a bottom-up energy systemoptimization model is used to support policy planning for the sustainable use of energy. the national power system is modelled through the energy flow optimization model (EFOM) as a network of energy chains, starting from the primary energy supply and ending in the end use sectors. the study is carried out over a period of 15-20 years assuming feasible scenarios that take into account the characteristics and availability of different technologies and on policy measures such as energy taxes or constraints for the amounts of emissions and energy resources. the proposed methodology is applied to the case of the Italian energy system.
A common way to elude a signature-based NIDS is to transform an attack instance that the NIDS recognizes into another instance that it misses. For example, to avoid matching the attack payload to a NIDS signature, att...
详细信息
A common way to elude a signature-based NIDS is to transform an attack instance that the NIDS recognizes into another instance that it misses. For example, to avoid matching the attack payload to a NIDS signature, attackers split the payload into several TCP packets or hide it between benign messages. We observe that different attack instances can be derived from each other using simple transformations. We model these transformations as inference rules in a natural-deduction system. Starting from an exemplary attack instance, we use an inference engine to automatically generate all possible instances derived by a set of rules. the result is a simple yet powerful tool capable of both generating attack instances for NIDS testing and determining whether a given sequence of packets is an attack. In several testing phases using different sets of rules, our tool exposed serious vulnerabilities in Snort - a widely deployed NIDS. Attackers acquainted withthese vulnerabilities would have been able to construct instances that elude Snort for any TCP-based attack, any Web-CGI attack, and any attack whose signature is a certain type of regular expression.
暂无评论