456 resultados para UNKNOWN INPUTS


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the previous phase of this project, 2002-059-B Case-Based Reasoning in Construction and Infrastructure Projects, demonstration software was developed using a case-base reasoning engine to access a number of sources of information on lifetime of metallic building components. One source of information was data from the Queensland Department of Public Housing relating to maintenance operations over a number of years. Maintenance information is seen as being a particularly useful source of data about service life of building components as it relates to actual performance of materials in the working environment. If a building is constructed in 1984 and the maintenance records indicate that the guttering was replaced in 2006, then the service life of the gutters was 22 years in that environment. This phase of the project aims to look more deeply at the Department of Housing data, as an example of maintenance records, and formulate methods for using this data to inform the knowledge of service lifetimes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This research aims to increase understanding of and delivery to qualitative (or intangible) outcomes and impacts of major economic infrastructure projects (i.e. bridges, roads, water infrastructure and the like), and the role of stakeholder engagement in this process.-------- Recent doctoral research completed at the Queensland University of Technology by the author investigated how the principles of corporate responsibility are applied in the construction sector. This related specifically to major economic infrastructure projects (hereafter referred to as major projects), with particular regard to urban transportation projects. One outcome of this past research was a value-mapping framework which enables organisations to track project outcomes to pre-existing corporate objectives, and report on these throughout the project life-cycle. Two recommendations for future research from that work formed the basis for this current research: • How can qualitative measurables be better integrated into decision-making on major economic infrastructure projects? • How can non-contractual stakeholders be more effectively engaged with on these projects? The link between these two areas may relate to the stakeholders’ role in qualitative indicator identification and measurement. This is a key point for future investigation.---------- The aim of this research is thus to further investigate these two areas, with the intent of (i) better defining the research direction; (ii) identifying potential research partners; and (iii) identify possible sources of future funding.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Colours Unknown was originally published online by Bradt Travel Guides in July, 2009. On February 7th, 2010, it was published nationally in the Sunday Telegraph, the Sunday Mail Brisbane, the Sunday Mail Adelaide, the Sunday Tasmanian and the Sunday Herald Sun. The piece won the unpublished section of the 2009 Independent on Sunday and Bradt Travel Guides Travel Writing Competition - an international writing prize based in London.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An autonomous underwater vehicle (AUV) is expected to operate in an ocean in the presence of poorly known disturbance forces and moments. The uncertainties of the environment makes it difficult to apply open-loop control scheme for the motion planning of the vehicle. The objective of this paper is to develop a robust feedback trajectory tracking control scheme for an AUV that can track a prescribed trajectory amidst such disturbances. We solve a general problem of feedback trajectory tracking of an AUV in SE(3). The feedback control scheme is derived using Lyapunov-type analysis. The results obtained from numerical simulations confirm the asymptotic tracking properties of the feedback control law. We apply the feedback control scheme to different mission scenarios, with the disturbances being initial errors in the state of the AUV.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Intrinsically photosensitive retinal ganglion cells (ipRGC) signal environmental light level to the central circadian clock and contribute to the pupil light reflex. It is unknown if ipRGC activity is subject to extrinsic (central) or intrinsic (retinal) network-mediated circadian modulation during light entrainment and phase shifting. Eleven younger persons (18–30 years) with no ophthalmological, medical or sleep disorders participated. The activity of the inner (ipRGC) and outer retina (cone photoreceptors) was assessed hourly using the pupil light reflex during a 24 h period of constant environmental illumination (10 lux). Exogenous circadian cues of activity, sleep, posture, caffeine, ambient temperature, caloric intake and ambient illumination were controlled. Dim-light melatonin onset (DLMO) was determined from salivary melatonin assay at hourly intervals, and participant melatonin onset values were set to 14 h to adjust clock time to circadian time. Here we demonstrate in humans that the ipRGC controlled post-illumination pupil response has a circadian rhythm independent of external light cues. This circadian variation precedes melatonin onset and the minimum ipRGC driven pupil response occurs post melatonin onset. Outer retinal photoreceptor contributions to the inner retinal ipRGC driven post-illumination pupil response also show circadian variation whereas direct outer retinal cone inputs to the pupil light reflex do not, indicating that intrinsically photosensitive (melanopsin) retinal ganglion cells mediate this circadian variation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

When industry meets a conservation area, animals or plants from outside may hitch a lift and potentially wreak havoc. How can you be sure of catching the intruders – or at least 80% sure? A government directive instructed Frith Jarrad, Peter Whittle, Susan Barrett and Kerrie Mengersen to come up with a statistically measurable scheme.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Intrinsically photosensitive retinal ganglion cells (ipRGCs) in the eye transmit the environmental light level, projecting to the suprachiasmatic nucleus (SCN) (Berson, Dunn & Takao, 2002; Hattar, Liao, Takao, Berson & Yau, 2002), the location of the circadian biological clock, and the olivary pretectal nucleus (OPN) of the pretectum, the start of the pupil reflex pathway (Hattar, Liao, Takao, Berson & Yau, 2002; Dacey, Liao, Peterson, Robinson, Smith, Pokorny, Yau & Gamlin, 2005). The SCN synchronizes the circadian rhythm, a cycle of biological processes coordinated to the solar day, and drives the sleep/wake cycle by controlling the release of melatonin from the pineal gland (Claustrat, Brun & Chazot, 2005). Encoded photic input from ipRGCs to the OPN also contributes to the pupil light reflex (PLR), the constriction and recovery of the pupil in response to light. IpRGCs control the post-illumination component of the PLR, the partial pupil constriction maintained for > 30 sec after a stimulus offset (Gamlin, McDougal, Pokorny, Smith, Yau & Dacey, 2007; Kankipati, Girkin & Gamlin, 2010; Markwell, Feigl & Zele, 2010). It is unknown if intrinsic ipRGC and cone-mediated inputs to ipRGCs show circadian variation in their photon-counting activity under constant illumination. If ipRGCs demonstrate circadian variation of the pupil response under constant illumination in vivo, when in vitro ipRGC activity does not (Weng, Wong & Berson, 2009), this would support central control of the ipRGC circadian activity. A preliminary experiment was conducted to determine the spectral sensitivity of the ipRGC post-illumination pupil response under the experimental conditions, confirming the successful isolation of the ipRGC response (Gamlin, et al., 2007) for the circadian experiment. In this main experiment, we demonstrate that ipRGC photon-counting activity has a circadian rhythm under constant experimental conditions, while direct rod and cone contributions to the PLR do not. Intrinsic ipRGC contributions to the post-illumination pupil response decreased 2:46 h prior to melatonin onset for our group model, with the peak ipRGC attenuation occurring 1:25 h after melatonin onset. Our results suggest a centrally controlled evening decrease in ipRGC activity, independent of environmental light, which is temporally synchronized (demonstrates a temporal phase-advanced relationship) to the SCN mediated release of melatonin. In the future the ipRGC post-illumination pupil response could be developed as a fast, non-invasive measure of circadian rhythm. This study establishes a basis for future investigation of cortical feedback mechanisms that modulate ipRGC activity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A new algorithm for extracting features from images for object recognition is described. The algorithm uses higher order spectra to provide desirable invariance properties, to provide noise immunity, and to incorporate nonlinearity into the feature extraction procedure thereby allowing the use of simple classifiers. An image can be reduced to a set of 1D functions via the Radon transform, or alternatively, the Fourier transform of each 1D projection can be obtained from a radial slice of the 2D Fourier transform of the image according to the Fourier slice theorem. A triple product of Fourier coefficients, referred to as the deterministic bispectrum, is computed for each 1D function and is integrated along radial lines in bifrequency space. Phases of the integrated bispectra are shown to be translation- and scale-invariant. Rotation invariance is achieved by a regrouping of these invariants at a constant radius followed by a second stage of invariant extraction. Rotation invariance is thus converted to translation invariance in the second step. Results using synthetic and actual images show that isolated, compact clusters are formed in feature space. These clusters are linearly separable, indicating that the nonlinearity required in the mapping from the input space to the classification space is incorporated well into the feature extraction stage. The use of higher order spectra results in good noise immunity, as verified with synthetic and real images. Classification of images using the higher order spectra-based algorithm compares favorably to classification using the method of moment invariants

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A new approach to pattern recognition using invariant parameters based on higher order spectra is presented. In particular, invariant parameters derived from the bispectrum are used to classify one-dimensional shapes. The bispectrum, which is translation invariant, is integrated along straight lines passing through the origin in bifrequency space. The phase of the integrated bispectrum is shown to be scale and amplification invariant, as well. A minimal set of these invariants is selected as the feature vector for pattern classification, and a minimum distance classifier using a statistical distance measure is used to classify test patterns. The classification technique is shown to distinguish two similar, but different bolts given their one-dimensional profiles. Pattern recognition using higher order spectral invariants is fast, suited for parallel implementation, and has high immunity to additive Gaussian noise. Simulation results show very high classification accuracy, even for low signal-to-noise ratios.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this freestanding sculpture, domestic ‘in-wall’ speakers are mounted in custom-built cabinets. The speakers play a calming stock music soundtrack. The cabinets are faced with photographic mural wallpaper of a stereotypical waterfall scene. This work examines how we construct, represent and deploy notions of nature in our contemporary lives. It mixes the languages of furniture design, landscape photography and sculpture. Drawing on Zygmunt Bauman’s theoretical work on “liquid modernity”, this work questions how and where we find space for contemplation and reflection in a contemporary context increasingly defined by temporary social bonds and consumer choices.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose: IpRGCs mediate non-image forming functions including photoentrainment and the pupil light reflex (PLR). Temporal summation increases visual sensitivity and decreases temporal resolution for image forming vision, but the summation properties of nonimage forming vision are unknown. We investigated the temporal summation of inner (ipRGC) and outer (rod/cone) retinal inputs to the PLR. Method: The consensual PLR of the left eye was measured in six participants with normal vision using a Maxwellian view infrared pupillometer. Temporal summation was investigated using a double-pulse protocol (100 ms stimulus pairs; 0–1024 ms inter-stimulus interval, ISI) presented to the dilated fellow right eye (Tropicamide 1%). Stimulus lights (blue λmax = 460 nm; red λmax = 638 nm) biased activity to inneror outer retinal inputs to non-image forming vision. Temporal summation was measured suprathreshold (15.2 log photons.cm−2.s−1 at the cornea) and subthreshold (11.4 log photons.cm−2.s−1 at the cornea). Results: RM-ANOVAs showed the suprathreshold and subthreshold 6 second post illumination pupil response (PIPR: expressed as percentage baseline diameter) did not significantly vary for red or blue stimuli (p > .05). The PIPR for a subthreshold red 16 ms double-pulse control condition did not significantly differ with ISI (p > .05). The maximum constriction amplitude for red and blue 100 ms double- pulse stimuli did not significantly vary with ISI (p > .05). Conclusion: The non-significant changes in suprathreshold PIPR and subthreshold maximum pupil constriction indicate that inner retinal ipRGC inputs and outer retinal photoreceptor inputs to the PLR do not show temporal summation. The results suggest a fundamental difference between the temporal summation characteristics of image forming and non-image forming vision.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. This approach is more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message, and in a separate pass providing integrity protection by generating a Message Authentication Code (MAC). AE using symmetric ciphers can be provided by either stream ciphers with built in authentication mechanisms or block ciphers using appropriate modes of operation. However, stream ciphers have the potential for higher performance and smaller footprint in hardware and/or software than block ciphers. This property makes stream ciphers suitable for resource constrained environments, where storage and computational power are limited. There have been several recent stream cipher proposals that claim to provide AE. These ciphers can be analysed using existing techniques that consider confidentiality or integrity separately; however currently there is no existing framework for the analysis of AE stream ciphers that analyses these two properties simultaneously. This thesis introduces a novel framework for the analysis of AE using stream cipher algorithms. This thesis analyzes the mechanisms for providing confidentiality and for providing integrity in AE algorithms using stream ciphers. There is a greater emphasis on the analysis of the integrity mechanisms, as there is little in the public literature on this, in the context of authenticated encryption. The thesis has four main contributions as follows. The first contribution is the design of a framework that can be used to classify AE stream ciphers based on three characteristics. The first classification applies Bellare and Namprempre's work on the the order in which encryption and authentication processes take place. The second classification is based on the method used for accumulating the input message (either directly or indirectly) into the into the internal states of the cipher to generate a MAC. The third classification is based on whether the sequence that is used to provide encryption and authentication is generated using a single key and initial vector, or two keys and two initial vectors. The second contribution is the application of an existing algebraic method to analyse the confidentiality algorithms of two AE stream ciphers; namely SSS and ZUC. The algebraic method is based on considering the nonlinear filter (NLF) of these ciphers as a combiner with memory. This method enables us to construct equations for the NLF that relate the (inputs, outputs and memory of the combiner) to the output keystream. We show that both of these ciphers are secure from this type of algebraic attack. We conclude that using a keydependent SBox in the NLF twice, and using two different SBoxes in the NLF of ZUC, prevents this type of algebraic attack. The third contribution is a new general matrix based model for MAC generation where the input message is injected directly into the internal state. This model describes the accumulation process when the input message is injected directly into the internal state of a nonlinear filter generator. We show that three recently proposed AE stream ciphers can be considered as instances of this model; namely SSS, NLSv2 and SOBER-128. Our model is more general than a previous investigations into direct injection. Possible forgery attacks against this model are investigated. It is shown that using a nonlinear filter in the accumulation process of the input message when either the input message or the initial states of the register is unknown prevents forgery attacks based on collisions. The last contribution is a new general matrix based model for MAC generation where the input message is injected indirectly into the internal state. This model uses the input message as a controller to accumulate a keystream sequence into an accumulation register. We show that three current AE stream ciphers can be considered as instances of this model; namely ZUC, Grain-128a and Sfinks. We establish the conditions under which the model is susceptible to forgery and side-channel attacks.