36 resultados para GLOBALLY HYPERBOLIC SPACETIMES

em Cambridge University Engineering Department Publications Database


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Managing product information for product items during their whole lifetime is challenging, especially during their usage and end-of-life phases. A major challenge is how to keep a link between the product item and its associated information, which may be stored in backend systems of different organisations. In this paper, we analyse and compare three approaches for addressing this task, i.e. the EPC Network, DIALOG and WWAI. Copyright © 2006 IFAC.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Managing product information for product items during their whole lifetime is challenging, especially during their usage and end-of-life phases. A major challenge is how to keep a link between the product item and its associated information that may be stored in backend systems of different organizations. This chapter analyses and compares three approaches for addressing this task-that is, the electronic product code (EPC) Network, DIALOG, and World Wide Article Information (WWAI). The EPC network has three key strengths with respect to Product lifecycle management (PLM): First, it is an internationally accepted standard that is supported by a world-wide standards body (GSI). Second, the lookup mechanism helps to insulate the data on the tag from change. Third, because it is becoming widespread and that this tag can also be used for PLM. WWAI is more technically sophisticated than the other approaches. The DIALOG approach might be the most general purpose one of the three because it places few restrictions on the format of the data on the tag. © 2006 Copyright © 2006 Elsevier Ltd. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Wireless Sensor Networks (WSNs) which utilise IEEE 802.15.4 technology operate primarily in the 2.4 GHz globally compatible ISM band. However, the wireless propagation channel in this crowded band is notoriously variable and unpredictable, and it has a significant impact on the coverage range and quality of the radio links between the wireless nodes. Therefore, the use of Frequency Diversity (FD) has potential to ameliorate this situation. In this paper, the possible benefits of using FD in a tunnel environment have been quantified by performing accurate propagation measurements using modified and calibrated off-the-shelf 802.15.4 based sensor motes in the disused Aldwych underground railway tunnel. The objective of this investigation is to characterise the performance of FD in this confined environment. Cross correlation coefficients are calculated from samples of the received power on a number of frequency channels gathered during the field measurements. The low measured values of the cross correlation coefficients indicate that applying FD at 2.4 GHz will improve link performance in a WSN deployed in a tunnel. This finding closely matches results obtained by running a computational simulation of the tunnel radio propagation using a 2D Finite-Difference Time-Domain (FDTD) method. ©2009 IEEE.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a volumetric formulation for the multi-view stereo problem which is amenable to a computationally tractable global optimisation using Graph-cuts. Our approach is to seek the optimal partitioning of 3D space into two regions labelled as "object" and "empty" under a cost functional consisting of the following two terms: (1) A term that forces the boundary between the two regions to pass through photo-consistent locations and (2) a ballooning term that inflates the "object" region. To take account of the effect of occlusion on the first term we use an occlusion robust photo-consistency metric based on Normalised Cross Correlation, which does not assume any geometric knowledge about the reconstructed object. The globally optimal 3D partitioning can be obtained as the minimum cut solution of a weighted graph.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

VODIS II, a research system in which recognition is based on the conventional one-pass connected-word algorithm extended in two ways, is described. Syntactic constraints can now be applied directly via context-free-grammar rules, and the algorithm generates a lattice of candidate word matches rather than a single globally optimal sequence. This lattice is then processed by a chart parser and an intelligent dialogue controller to obtain the most plausible interpretations of the input. A key feature of the VODIS II architecture is that the concept of an abstract word model allows the system to be used with different pattern-matching technologies and hardware. The current system implements the word models on a real-time dynamic-time-warping recognizer.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Piezoelectric systems are viewed as a promising approach to energy harvesting from environmental vibrations. The energy harvested from real vibration sources is usually difficult to estimate analytically. Therefore, it is hard to optimise the associated energy harvesting system. This work investigates the optimisation of a piezoelectric cantilever system using a genetic algorithm based approach with numerical simulations. The genetic algorithm globally considers the effects of each parameter to produce an optimal frequency response to scavenge more energy from the real vibrations while the conventional sinusoidal based method can only optimise the resistive load for a given resonant frequency. Experimental acceleration data from the vibrations of a vehicle-excited manhole cover demonstrates that the optimised harvester automatically selects the right frequency and also synchronously optimises the damper and the resistive load. This method shows great potential for optimizing the energy harvesting systems with real vibration data. ©2009 IEEE.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Accurate and efficient computation of the nearest wall distance d (or level set) is important for many areas of computational science/engineering. Differential equation-based distance/ level set algorithms, such as the hyperbolic-natured Eikonal equation, have demonstrated valuable computational efficiency. Here, in the context, as an 'auxiliary' equation to the main flow equations, the Eikonal equation is solved efficiently with two different finite volume approaches (the cell vertex and cell-centered). Application of the distance solution is studied for various geometries. Moreover, a procedure using the differential field to obtain the medial axis transform (MAT) for different geometries is presented. The latter provides a skeleton representation of geometric models that has many useful analysis properties. As an alternative approach to the pure geometric methods (e.g. the Voronoi approach), the current d-MAT procedure bypasses many difficulties that are usually encountered by pure geometric methods, especially in three dimensional space. It is also shown that the d-MAT approach provides the potential to sculpt/control the MAT form for specialized solution purposes. Copyright © 2010 by the American Institute of Aeronautics and Astronautics, Inc.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There is growing interest in Discovery Services for locating RFID and supply chain data between companies globally, to obtain product lifecycle information for individual objects. Discovery Services are heralded as a means to find serial-level data from previously unknown parties, however more realistically they provide a means to reduce the communications load on the information services, the network and the requesting client application. Attempts to design a standardised Discovery Service will not succeed unless security is considered in every aspect of the design. In this paper we clearly show that security cannot be bolted-on in the form of access control, although this is also required. The basic communication model of the Discovery Service critically affects who shares what data with whom, and what level of trust is required between the interacting parties. © 2009 IEEE.