One of the principle conditions of a wave attractor appearance is a periodic external forcing. Real forcing in natural basins caused by tidal interaction is more complex than a monochromatic which is usually used in i...
详细信息
This paper considers local scour around a pipeline under turbulent *** Navier-Stokes equations are solved with a shear stress turbulence *** original bed deformation equation based on an analytical sediment transport ...
详细信息
This paper considers local scour around a pipeline under turbulent *** Navier-Stokes equations are solved with a shear stress turbulence *** original bed deformation equation based on an analytical sediment transport model is used to describe the changes in the bottom *** proposed sediment transport equation is based on Coulomb’s friction law for granular flow,Prandtl’s friction law for turbulent flow,and agrees with a large number of phenomenological formulas by other authors.A numerical algorithm for solving the mathematical model of bed surface erosion is implemented in *** simulations of the problem show that under the influence of turbulent flow generated at the pipeline streamline,a characteristic bottom wave of low steepness appears,the parameters of which asymptotically agree with the experimental *** on the analysis of experimental and numerical studies of the considered case,an assumption about the self-similar behavior of the bed surface evolution is *** on this assumption,a new method of constructing the self-similar dependence of the bed surface on time and space coordinates is *** the proposed approach,the average values of tangential bottom stresses are determined for a number of self-similar bottom surface shapes,and then the rates of change of bottom wave lengths and amplitudes are calculated using the proposed analytical model.A comparison with experimental data and numerical calculations shows that the solution error does not exceed a few percent and the computational time is reduced by up to 30 times.
Nowadays, concurrency control for XML data is a big research problem. There are a number of researchers working on this problem, but most of the proposed methods are based on the two-phase locking protocol, which pote...
详细信息
ISBN:
(纸本)9783540752875
Nowadays, concurrency control for XML data is a big research problem. There are a number of researchers working on this problem, but most of the proposed methods are based on the two-phase locking protocol, which potentially leads to a high blocking rates in data-intensive XML-applications. In this paper we present and evaluate SXDGL, a new snapshot based concurrency control protocol for XML data. SXDGL completely eliminates data contention between read-only and update transactions. Moreover, SXDGL takes into account the hierarchical structure and semantics of XML data model determining conflicts between concurrent XML-operations of update transactions. The conducted evaluation shows significant benefits of SXDGL for processing concurrent transactions in data-intensive XML-applications.
The S.A. Lebedev institute developed operating system for the AS-6 distributed computing system (OS AS-6) in the 1970s. The OS AS-6 consisted of peer operating systems of separate machines making up the AS-6 computer ...
详细信息
Recommender systems apply statistical and knowledge discovery techniques to the problem of making recommendations during live user interaction. This paper describes a novel approach of building recommender systems for...
详细信息
Recommender systems apply statistical and knowledge discovery techniques to the problem of making recommendations during live user interaction. This paper describes a novel approach of building recommender systems for the Web with the aid of usergenerated content. Recently certain communities of Internet users have engaged in creating high quality peer reviewed content for the Web. In our approach we are planning to extract the semantics of such user-generated content and to use these semantics to make more useful recommendations.
The article describes the method for constructing sequences of user actions that are optimized for manual execution, based on the model in the form of a diagram of states and transitions. Scenarios for such implementa...
详细信息
Different modelling techniques intended to deal with complexity of modern IMA systems are widely used now. Models can be used to help developers to lay out relevant information structurally. They can also be used to p...
详细信息
The paper is dedicated to theoretical research of spatial indexing methods in conformity to three dimensional scenes arising in CAD/CAM systems, robotics, virtual and augmented reality applications. Special attention ...
详细信息
Real world data is not stationary and thus models must be monitored in production. One way to be sure in a model’s performance is regular testing. If the labels are not available, the task of minimizing the labeling ...
An important limitation of existing adversarial attacks on real-world object detectors lies in their threat model: adversarial patch-based methods often produce suspicious images while image generation approaches do n...
详细信息
暂无评论