Spherical virtual space modeling using fisheye image was accomplished based on fisheye image mosaics and multi-viewpoint navigation was analyzed. Test results demonstrated that virtual browsing speed could be improved...
详细信息
Spherical virtual space modeling using fisheye image was accomplished based on fisheye image mosaics and multi-viewpoint navigation was analyzed. Test results demonstrated that virtual browsing speed could be improved by using re-projection technology and browsing effect could also be improved by using scaling technology. Finally immerse sense in virtual environment was enhanced and good result was gained.
This work presents the calibration, based on results of ocean basin tests, of numerical models of a deep-draft semi-submersible platform including mooring lines and risers. The models are generated with in-house Petro...
详细信息
The radial basis function (RBF), which is well known dynamic neural network, has been improved to easily apply in dynamic systems identification. However, the RBF weights and thresholds, which are trained by the gradi...
详细信息
The radial basis function (RBF), which is well known dynamic neural network, has been improved to easily apply in dynamic systems identification. However, the RBF weights and thresholds, which are trained by the gradient descent method, will be fixed after the training completing. The adaptive ability is bad. To improve RBF performance of dynamic identification, a self-adaptive particle swarm optimization (SAPSO), which is a stochastic search algorithm, is employed to train and adjust RBF structure parameter online. The simulation experiments show that SAPSO-NN has less adjustable parameters, faster convergence speed and higher precision in the nonlinear function identification.
In order to know the variation of the slope stability under external slide thrust, the soil load cell was preferred on the test platform of large-scale physical model to measure the stress in the slope body for the fi...
详细信息
In order to know the variation of the slope stability under external slide thrust, the soil load cell was preferred on the test platform of large-scale physical model to measure the stress in the slope body for the first time. Adopting the method of limit analysis of FEM by step load, the The external slide thrust was enhanced step by step with the method of limit analysis of FEM by step loads, the limit condition of the slope body stabilized on the certain work condition could be gained in a certain time to a certain size of the thrust. The results of the two analysis method were shown out as follows. As the slide thrust was enhanced step by step, the soil stress in slope body was enhanced increased steadily. When the external thrust was increased to a certain magnitude, the tendency in of development of the soil stress in the slope body was inflected varied, which disclosed the structural changes and the stability progress state changed from steadily state to failure in the inner body of the slope. From the curve of the soil stress vs. time, the time and the location that the slide surface formed could be determined. The method of limit analysis of FEM by step load could be used to estimate the shape of the slide surface. The shape computed by FEM was identical to the measurement by the soil load cell.
For most of the developing countries, socio-economic development is very often the first priority in national development agenda, thus there are very limited actions on climate change mitigation. Malaysia is one of th...
详细信息
For most of the developing countries, socio-economic development is very often the first priority in national development agenda, thus there are very limited actions on climate change mitigation. Malaysia is one of the fast growing developing countries in Asia. Although the Government recognises the importance of energy saving and emission control, there are still very limited policies to address climate change issues and so far no emission reduction target has been set. The main objectives of this study are thus to look into the long-term carbon budget and to examine the necessary energy budgets, based on the case study of the Iskandar Development Region (IDR). Attempts have been made to set the national emission budgets for Malaysia, and from there, city level carbon budgets for IDR were set. Subsequently, simulations using the System Dynamics based computer simulation model were carried out to estimate the necessary energy budgets to achieve carbon budgets for IDR.
作者:
Gaspar, FlorindoGomes, AugustoCruz, HelenaPolytechnic Institute of Leiria
School of Technology and Management Morro do Lena Alto do Vieiro 2411-901 Leiria Portugal IST
Technical University of Lisbon Department of Civil Engineering and Architecture Av. Rovisco Pals 1049-001 Lisboa Portugal LNEC
Structures Department Av. do Brasil 101 P-1700-066 Lisboa Portugal
This paper describes the results obtained on glued laminated timber beams of maritime pine, with and without preservative treatment, exposed to natural outdoor environment as well as to artificial weathering. The asse...
详细信息
ISBN:
(纸本)9781622761753
This paper describes the results obtained on glued laminated timber beams of maritime pine, with and without preservative treatment, exposed to natural outdoor environment as well as to artificial weathering. The assessment of glue lines' degradation due to ageing was investigated through the extraction and testing of core and block shear specimens, and delamination tests. The results highlight the different Performances of glulam made with various preservative treatments and cure temperatures, in terms of the measured delamination and shear strength after the ageing process. They also show that shear testing of drilled cores may be a promising tool in the assessment of glulam structures on site.
This work presents KUCAS (Known User Continuous Authentication System), a work-in-progress security system, that has a continuous authentication mechanism of users in software application. The KUCAS system makes use o...
详细信息
This work presents KUCAS (Known User Continuous Authentication System), a work-in-progress security system, that has a continuous authentication mechanism of users in software application. The KUCAS system makes use of environmental context information, users behavior analysis, the behavior theories of Skinner and the Mathematical Confidence of Dempster-Shafer Evidences Theory, that establishes trust levels to authenticate the user by his behavior analysis, during an application software, in a specific domain of the computer networks, in a period of time. The dynamics of enclosed management in this system compares the current behavior with the user's previous behaviors description and with the trust restrictions. In case of indications of changes in the user's behavior, the system provides the behavior analysis of the user using database restrictions information. If there are uncertainties and divergences, mechanisms of security and alert signals are triggered.
This paper presents a continuous authentication system based on user behavior analysis that makes use of environmental context information, users' behavior analysis and Neuro-Fuzzy Logic. This system must be able ...
详细信息
ISBN:
(纸本)9781424458790
This paper presents a continuous authentication system based on user behavior analysis that makes use of environmental context information, users' behavior analysis and Neuro-Fuzzy Logic. This system must be able to acquire information in context, making them into a computational environment. This information is the basis of user behavior. The System, based on the evidences of the behavior, establishes if it can trust the user or not. According to the user behavior, levels of trust are released, to access the application software. Weights are attributed in the fuzzyfication process, according to the rules that were previously established for the parameters which help to establish the evidences of behavioral trust, in its different degrees. The neuro-fuzzy logic allows that the user behavioral database be continuously updated, interacting with the fuzzyfication mechanism, so as to keep trust levels updated according to the user behavior, in a more accurate and faithful way.
A new algorithm based on Evolutionary Strategies is proposed for finding a robot manipulation path. Next scenario is considered: Given a learned Manipulation Path in the space of configurations, a real-time optimal pa...
详细信息
ISBN:
(纸本)9781424486687
A new algorithm based on Evolutionary Strategies is proposed for finding a robot manipulation path. Next scenario is considered: Given a learned Manipulation Path in the space of configurations, a real-time optimal path is calculated when mobile robot base is in a different position and orientation near to the original localization. The optimization problem is formulated as the minimization of the end-effector position and orientation error so as to ensure convergence towards the learnt path taking into account a time constraint. To solve the optimization problem an algorithm based on the basic Evolution Strategies (ES) scheme is used. ES is a stochastic direct search optimization method based on the evolution of a candidate solution population in an iterative process of mutation and selection. The algorithm avoids singularities since it does not require the use of the Jacobian matrix in the kinematic inversion. The methodology presented is validated in a simulation environment with the mobile manipulator MANFRED, developed in our lab.
暂无评论