Machine learning has been extensively used in diverse healthcare settings since the 21st century. Statistical models are proven to be powerful in detecting early disease symptoms and could potentially aid decision-mak...
详细信息
This paper presents the method to perform the sensitivity analysis of demand responsive transit demand to the parking pricing policies using micro simulation. Both the disutility of parking search cruising and parking...
详细信息
This paper presents the method to perform the sensitivity analysis of demand responsive transit demand to the parking pricing policies using micro simulation. Both the disutility of parking search cruising and parking fees are considered in the mode choice model. The preliminary results suggest that parking pricing policies may affect the DRT demand, reduce the overall congestion and vehicles kilometers travelled by car. In the St. Petersburg scenario up to 50% of DRT users, that have switched from the car, have previously parked the car in the city center, mostly for the prolonged time period (4 to 8 hours). (C) 2020 The Authors. Published by Elsevier B.V.
At present, the research on the safety risk of prefabricated construction mostly regards the risk factors as independent points, and there is little research on the interaction between the risk factors. Firstly, this ...
ISBN:
(纸本)9781450385046
At present, the research on the safety risk of prefabricated construction mostly regards the risk factors as independent points, and there is little research on the interaction between the risk factors. Firstly, this paper identifies and classifies the safety risk factors of prefabricated building construction from the two-dimensional perspective of safety risk dimension and safety accident, and establishes the 1-model network of the relationship between construction safety risk factors and the 2-model network model of construction safety risk and safety accident by using social network analysis (SNA); Secondly, combined with 1-mode network block model analysis, overall network density analysis and 2-mode network centrality analysis, the core risk factors are identified, the key relationship of security risk is obtained by analyzing the middle centrality of 1-mode network line, and the Countermeasures for the core risk and key relationship are further put forward; Finally, combined with computersimulation technology, the effect of risk control is tested. According to the computermodeling and simulation technology, the results show that controlling the core risk factors and blocking the transmission of key risk relationships can reduce the complexity of the whole risk network. This model can effectively improve the safety degree of prefabricated construction project and reduce the occurrence of safety accidents.
Frequent visit of doctors during pandemicis not recommended due to COVID-19 scenario. Internet of Things (IoT) based sensors can be used to measure andto do certain tests at home. The blockchain-based strategy promise...
详细信息
Application of numerical integration methods with automatic step determination in modeling relay control systems poses a number of difficulties, which makes it reasonable to ground a choice of a fixed step size. Tradi...
详细信息
ISBN:
(纸本)9781728155661
Application of numerical integration methods with automatic step determination in modeling relay control systems poses a number of difficulties, which makes it reasonable to ground a choice of a fixed step size. Traditional criteria are based on the correlation of the step with the minimum time constant of the control object. They do not provide an unambiguous choice of the step necessary for reliable modeling of sliding modes. The solution to this problem was obtained by redefining the minimum time constant of the control system, taking into account the features of the functioning of electric drives.
The process of modeling and optimization of machine management system with computer numerical control and its findings are given. The production process is presented as IDEF3 diagram in BPwin system, structural and si...
详细信息
ISBN:
(纸本)9783030392253;9783030392246
The process of modeling and optimization of machine management system with computer numerical control and its findings are given. The production process is presented as IDEF3 diagram in BPwin system, structural and simulationmodeling is shown in Arena system. Mathematical model has been constructed in accordance with simulationmodeling findings, by which optimization has been carried out and formulae for calculation of optimized factor values on objective factor values have been obtained. In the present study, we consider a complex system whose behavior is characterized by set of various time-dependent factors. Some of these factors can characterize the external influences on the system, whereas other factors contain information generated by system. We demonstrate that time dependence of these factors can be reproduced by the nonlinear regression model. This allows us to predict a possible behavior of the system and to identify the so-called significant factors that have a significant impact on the behavior of the system. To demonstrate validity of the method, we apply it to analyze the data characterizing a manufacturing company.
In this paper, an equivalent fuzzy financial dynamic system model is established by using T-S fuzzy modeling method. According to Lyapunov stability theory, a fuzzy feedback controller is designed to realize chaos ***...
详细信息
simulationmodeling for the safe use of a technical system on based a probability-based algorithm with constraints has been presented. The probability-based algorithm consists of task decomposition and forming a trans...
详细信息
Decades ago, conventional energy resources had a growing environmental and economic crisis. in this regard, renewable energy resources are needed to address these *** of them is a source of spiritual energy. Internal ...
详细信息
ISBN:
(数字)9798350395556
ISBN:
(纸本)9798350395563
Decades ago, conventional energy resources had a growing environmental and economic crisis. in this regard, renewable energy resources are needed to address these *** of them is a source of spiritual energy. Internal Loop (HIL) computer systems the simpler and less expensive method allows you to test the software and the hardware that controls the working of generator. This process was executed within Labeview based applications using an Advantech-USB-4704-AE Data acquisition card. This paper will set out all aspects of systems and operations as well as WTE control strategies namely Pitch control and MPPT. Electrical subassemblies are at high risk of operating damage, generator transmission faults are reported and investigated using terminal voltage. The main problem that researchers face with regard to turbine is the large limited area, the required turbine length and maintenance problems. The results show that the turbine tree is operated at its highest potential while reducing the load on the turbine with a strong type of wind speed. These changes are made to the human turbine naturally, so it analyses the turbine on a small scale using a new turbine technology tree. without the real need for WT's turbine simulator are often analysed.
We present an efficient and realistic geometric acoustic simulation approach for generating and augmenting training data in speech-related machine learning tasks. Our physically-based acoustic simulation method is cap...
详细信息
ISBN:
(纸本)9781509066315
We present an efficient and realistic geometric acoustic simulation approach for generating and augmenting training data in speech-related machine learning tasks. Our physically-based acoustic simulation method is capable of modeling occlusion, specular and diffuse reflections of sound in complicated acoustic environments, whereas the classical image method can only model specular reflections in simple room settings. We show that by using our synthetic training data, the same neural networks gain significant performance improvement on real test sets in far-field speech recognition by 1.58% and keyword spotting by 21%, without fine-tuning using real impulse responses.
暂无评论