94 resultados para Zwingli, Ulrich, 1484-1531.
Resumo:
In this paper we describe the dynamic simulation of an 18 degrees of freedom hexapod robot with the objective of developing control algorithms for smooth, efficient and robust walking in irregular terrain. This is to be achieved by using force sensors in addition to the conventional joint angle sensors as proprioceptors. The reaction forces on the feet of the robot provide the necessary information on the robots interaction with the terrain. As a first step we validate the simulator by implementing movement control by joint torques using PID controllers. As an unexpected by-product we find that it is simple to achieve robust walking behaviour on even terrain for a hexapod with the help of PID controllers and by specifying a trajectory of only a few joint configurations.
Resumo:
Systems, methods and articles for determining anomalous user activity are disclosed. Data representing a transaction activity corresponding to a plurality of user transactions can be received and user transactions can be grouped according to types of user transactions. The transaction activity can be determined to be anomalous in relation to the grouped user transactions based on a predetermined parameter.
Resumo:
A business capability, or simply a “capability,” Defines what a business does. It does not communicate or expose where, why, or how something is done. Specifically, the business capability is “a particular ability or capacity that a business may possess or exchange to achieve a specific purpose or outcome.Figure13 provides an external view of a capability by highlighting the fact that a business capability is related to the business in many ways (William Ulrich and Michael Rosen, 2011).
Resumo:
Purpose: The purpose of this study was to calculate mechanical properties of tough skinned vegetables as a part of Finite Element Modelling (FEM) and simulation of tissue damage during mechanical peeling of tough skinned vegetables. Design/methodology: There are some previous studies on mechanical properties of fruits and vegetables however, behaviour of tissue under different processing operations will be different. In this study indentation test was performed on Peel, Flesh and Unpeeled samples of pumpkin as a tough skinned vegetable. Additionally, the test performed in three different loading rates for peel: 1.25, 10, 20 mm/min and 20 mm/min for flesh and unpeeled samples respectively. The spherical end indenter with 8mm diameter used for the experimental tests. Samples prepare from defect free and ripped pumpkin purchased from local shops in Brisbane, Australia. Humidity and temperature were 20-55% and 20-250C respectively. Findings: Consequently, force deformation and stress and strain of samples were calculated and shown in presented figures. Relative contribution (%) of skin to different mechanical properties is computed and compared with data available from literature. According the results, peel samples had the highest value of rupture force (291N) and as well as highest value of firmness (1411Nm-1). Research limitations/implications: The proposed study focused on one type of tough skinned vegetables and one variety of pumpkin however, more tests will give better understandings of behaviours of tissue. Additionally, the behaviours of peel, unpeeled and flesh samples in different speed of loading will provide more details of tissue damages during mechanical loading. Originality/value: Mechanical properties of pumpkin tissue calculated using the results of indentation test, specifically the behaviours of peel, flesh and unpeeled samples were explored which is a new approach in Finite Element Modelling (FEM) of food processes. Keywords: Finite Element Modelling (FEM), relative contribution, firmness, toughness and rupture force.
Resumo:
Many computationally intensive scientific applications involve repetitive floating point operations other than addition and multiplication which may present a significant performance bottleneck due to the relatively large latency or low throughput involved in executing such arithmetic primitives on commod- ity processors. A promising alternative is to execute such primitives on Field Programmable Gate Array (FPGA) hardware acting as an application-specific custom co-processor in a high performance reconfig- urable computing platform. The use of FPGAs can provide advantages such as fine-grain parallelism but issues relating to code development in a hardware description language and efficient data transfer to and from the FPGA chip can present significant application development challenges. In this paper, we discuss our practical experiences in developing a selection of floating point hardware designs to be implemented using FPGAs. Our designs include some basic mathemati cal library functions which can be implemented for user defined precisions suitable for novel applications requiring non-standard floating point represen- tation. We discuss the details of our designs along with results from performance and accuracy analysis tests.
Resumo:
Copoly(2-oxazoline)s, prepared by cationic ring-opening polymerization of 2-(dec-9-enyl)-2-oxazoline with either 2-methyl-2-oxazoline or 2-ethyl-2-oxazoline, have been crosslinked with small dithiol molecules under UV-irradiation to form homogeneous networks. In-situ monitoring of the crosslinking reaction by photo-rheology revealed network formation within minutes. The degree of swelling in water was found to be tunable by the hydrophilicity of the starting macromers and the proportion of alkene side arms. Furthermore, degradable hydrogels have been prepared based on a hydrolytically cleavable dithiol crosslinker.
Resumo:
The Sudbury Basin is a non-cylindrical fold basin occupying the central portion of the Sudbury Impact Structure. The impact structure lends itself excellently to explore the structural evolution of continental crust containing a circular region of long-term weakness. In a series of scaled analogue experiments various model crustal configurations were shortened horizontally at a constant rate. In mechanically weakened crust, model basins formed that mimic several first-order structural characteristics of the Sudbury Basin: (1) asymmetric, non-cylindrical folding of the Basin, (2) structures indicating concentric shortening around lateral basin termini and (3) the presence of a zone of strain concentration near the hinge zones of model basins. Geometrically and kinematically this zone corresponds to the South Range Shear Zone of the Sudbury Basin. According to our experiments, this shear zone is a direct mechanical consequence of basin formation, rather than the result of thrusting following folding. Overall, the models highlight the structurally anomalous character of the Sudbury Basin within the Paleoproterozoic Eastern Penokean Orogen. In particular, our models suggest that the Basin formed by pure shear thickening of crust, whereas transpressive deformation prevailed elsewhere in the orogen. The model basin is deformed by thickening and non-cylindrical synformal buckling, while conjugate transpressive shear zones propagated away from its lateral tips. This is consistent with pure shear deformation of a weak circular inclusion in a strong matrix. The models suggest that the Sudbury Basin formed as a consequence of long-term weakening of the upper crust by meteorite impact.
Resumo:
The cause of upper-crustal segmentation into rhomb-shaped, shear zone-bound domains associated with contractional sedimentary basins in hot, wide orogens is not well understood. Here we use scaled multilayered analogue experiments to investigate the role of an orogen-parallel crustal-strength gradient on the formation of such structures. We show that the aspect ratio and size of domains, the sinuous character and abundance of transpressional shear zones vary with the integrated mechanical strength of crust. Upper-crustal deformation patterns and the degree of strain localization in the experiments are controlled by the ratio between the brittle and ductile strength in the model crust as well as gradients in tectonic and buoyancy forces. The experimental results match the first-order kinematic and structural characteristics of the southern Central Andes and provide insight on the dynamics of underlying deformation patterns in hot, wide orogens.
Resumo:
The increase of online services, such as eBanks, WebMails, in which users are verified by a username and password, is increasingly exploited by Identity Theft procedures. Identity Theft is a fraud, in which someone pretends to be someone else is order to steal money or get other benefits. To overcome the problem of Identity Theft an additional security layer is required. Within the last decades the option of verifying users based on their keystroke dynamics was proposed during login verification. Thus, the imposter has to be able to type in a similar way to the real user in addition to having the username and password. However, verifying users upon login is not enough, since a logged station/mobile is vulnerable for imposters when the user leaves her machine. Thus, verifying users continuously based on their activities is required. Within the last decade there is a growing interest and use of biometrics tools, however, these are often costly and require additional hardware. Behavioral biometrics, in which users are verified, based on their keyboard and mouse activities, present potentially a good solution. In this paper we discuss the problem of Identity Theft and propose behavioral biometrics as a solution. We survey existing studies and list the challenges and propose solutions.
Resumo:
Securing IT infrastructures of our modern lives is a challenging task because of their increasing complexity, scale and agile nature. Monolithic approaches such as using stand-alone firewalls and IDS devices for protecting the perimeter cannot cope with complex malwares and multistep attacks. Collaborative security emerges as a promising approach. But, research results in collaborative security are not mature, yet, and they require continuous evaluation and testing. In this work, we present CIDE, a Collaborative Intrusion Detection Extension for the network security simulation platform ( NeSSi 2 ). Built-in functionalities include dynamic group formation based on node preferences, group-internal communication, group management and an approach for handling the infection process for malware-based attacks. The CIDE simulation environment provides functionalities for easy implementation of collaborating nodes in large-scale setups. We evaluate the group communication mechanism on the one hand and provide a case study and evaluate our collaborative security evaluation platform in a signature exchange scenario on the other.