To analyze a biological system it is necessary to find out new mathematical models allowing to explain the evolution of the system in a dynamic context or to dread doing of a simple manner the complex situations where...
详细信息
To analyze a biological system it is necessary to find out new mathematical models allowing to explain the evolution of the system in a dynamic context or to dread doing of a simple manner the complex situations where the human experience overtakes the mathematical reasoning. computers have been used since the 1940 to simulate the kinetics of biochemical reactions. Using a pathway structure and a kinetic scheme, the time of reaction and the admissible steady states can be computed. The majority of kinetic models are described by coupled differential equations and simulators implement the appropriate methods to solve these systems. Our goal is to analyze, to understand and to modeling these systems of reactions and the mechanisms that govern them, so as to better apprehend the behavior of cells.
This paper describes a simple system that can be used for autonomous demand-side management in a load site such as a home or commercial facility. The system identifies the operation of individual loads using transient...
详细信息
This paper describes a simple system that can be used for autonomous demand-side management in a load site such as a home or commercial facility. The system identifies the operation of individual loads using transient patterns observed in the voltage waveform measured at an electric service outlet. The theoretical foundation of the measurement process is introduced, and a preprocessor that computes short-time estimates of the spectral content of the voltage waveform is described. The paper presents several example measurements demonstrating the ability of the system to obtain estimates of the spectral content of the voltage waveform.
3D models are a new kind of cross-media resource which can be frequently seen in the network. Since the amount of them is very huge now, content-based retrieval can help to recognize a certain object or retrieve simil...
详细信息
3D models are a new kind of cross-media resource which can be frequently seen in the network. Since the amount of them is very huge now, content-based retrieval can help to recognize a certain object or retrieve similar ones from the giant database. This paper presents a new method for deriving 3D moment invariants and uses them as shape descriptors for the representation of 3D models. They are insensitive to surface noise and can be used in pervasive environment conveniently. We also illustrate how to build up experimental system and simulate 3D shape retrieval in wireless environment
This paper discusses the importance of the enabling resources (otherwise identified as enabling capacity or enabling capabilities) to the successful development of systems. It proposes the Producing System as a mechan...
This paper discusses the importance of the enabling resources (otherwise identified as enabling capacity or enabling capabilities) to the successful development of systems. It proposes the Producing System as a mechan...
Reliable multicast protocols are an important class of protocols for reliably disseminating information from a sender to multiple receivers in the face of node and link failures. A tree-based reliable multicast protoc...
详细信息
Reliable multicast protocols are an important class of protocols for reliably disseminating information from a sender to multiple receivers in the face of node and link failures. A tree-based reliable multicast protocol (TRAM) provides scalable reliable multicast by grouping receivers in hierarchical repair groups and using a selective acknowledgment mechanism. We present an improvement to TRAM to minimize the resource utilization at intermediate hosts and to localize the effect of slow or malicious receivers on normal receivers. We present an evaluation of TRAM and TRAM++ on a campus-wide WAN without errors and with message errors. The evaluation brings out that, given a constraint on the buffer availability at intermediate hosts, TRAM++ can tolerate the constraint at the expense of increasing the end-to-end latency for the normal receivers by only 3.2% compared to TRAM in error-free cases. When slow or faulty receivers are present, TRAM++ is able to provide the same uninterrupted quality of service to the normal nodes while localizing the effect of the faulty ones without incurring any additional memory overhead.
The accuracy of concrete strength inspection has a great influence on the safety evaluation of the building. In order to increase the accuracy, Fuzzy Neural Network (FNN) was built up to evaluate concrete stmngth: It ...
详细信息
ISBN:
(纸本)0780382730
The accuracy of concrete strength inspection has a great influence on the safety evaluation of the building. In order to increase the accuracy, Fuzzy Neural Network (FNN) was built up to evaluate concrete stmngth: It takes full advantage of the characteristics of the common concrete testing methods: drill and rebound, and the abilities of FNN including automatic learning, generation and fuzzy logic inference. The experiment shows that the max relative error of the predicted results is 1.12%, which is satisfied with the requirements of the engineering. The method effieieatly maps the complex non-linear relationship between the drill values and the rebound values, and provides a efficient way for the concrete strength inspection and evaluation.
We present a comparison between different warning strategies for onboard rumble strips in order to prevent road departure events. We compare time-to-lane-crossing (TLC) approach and some implementations of variable ru...
详细信息
We present a comparison between different warning strategies for onboard rumble strips in order to prevent road departure events. We compare time-to-lane-crossing (TLC) approach and some implementations of variable rumble strip (VRBS). The framework of this study is the AWAKE European research project and the PREDIT French research program. The value of such a system is demonstrated by some field experiments and its validation by medical and self-diagnoses.
A control flow fault occurs when a processor fetches and executes an incorrect next instruction. Executable assertions, i.e., special instructions that check some invariant properties of a program, provide a powerful ...
详细信息
暂无评论