63 resultados para Artificial Information Models


Relevância:

30.00% 30.00%

Publicador:

Resumo:

The different quantum phases appearing in strongly correlated systems as well as their transitions are closely related to the entanglement shared between their constituents. In 1D systems, it is well established that the entanglement spectrum is linked to the symmetries that protect the different quantum phases. This relation extends even further at the phase transitions where a direct link associates the entanglement spectrum to the conformal field theory describing the former. For 2D systems much less is known. The lattice geometry becomes a crucial aspect to consider when studying entanglement and phase transitions. Here, we analyze the entanglement properties of triangular spin lattice models by also considering concepts borrowed from quantum information theory such as geometric entanglement.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Building Information Modelling (BIM) is growing in pace, not only in design and construction stages, but also in the analysis of facilities throughout their life cycle. With this continued growth and utilisation of BIM processes, comes the possibility to adopt such procedures, to accurately measure the energy efficiency of buildings, to accurately estimate their energy usage. To this end, the aim of this research is to investigate if the introduction of BIM Energy Performance Assessment in the form of software analysis, provides accurate results, when compared with actual energy consumption recorded. Through selective sampling, three domestic case studies are scrutinised, with baseline figures taken from existing energy providers, the results scrutinised and compared with calculations provided from two separate BIM energy analysis software packages. Of the numerous software packages available, criterion sampling is used to select two of the most prominent platforms available on the market today. The two packages selected for scrutiny are Integrated Environmental Solutions - Virtual Environment (IES-VE) and Green Building Studio (GBS). The results indicate that IES-VE estimated the energy use in region of ±8% in two out of three case studies while GBS estimated usage approximately ±5%. The findings indicate that the introduction of BIM energy performance assessment, using proprietary software analysis, is a viable alternative to manual calculations of building energy use, mainly due to the accuracy and speed of assessing, even the most complex models. Given the surge in accurate and detailed BIM models and the importance placed on the continued monitoring and control of buildings energy use within today’s environmentally conscious society, this provides an alternative means by which to accurately assess a buildings energy usage, in a quick and cost effective manner.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Three issues usually are associated with threat prevention intelligent surveillance systems. First, the fusion and interpretation of large scale incomplete heterogeneous information; second, the demand of effectively predicting suspects’ intention and ranking the potential threats posed by each suspect; third, strategies of allocating limited security resources (e.g., the dispatch of security team) to prevent a suspect’s further actions towards critical assets. However, in the literature, these three issues are seldomly considered together in a sensor network based intelligent surveillance framework. To address
this problem, in this paper, we propose a multi-level decision support framework for in-time reaction in intelligent surveillance. More specifically, based on a multi-criteria event modeling framework, we design a method to predict the most plausible intention of a suspect. Following this, a decision support model is proposed to rank each suspect based on their threat severity and to determine resource allocation strategies. Finally, formal properties are discussed to justify our framework.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We study the sensitivity of a MAP configuration of a discrete probabilistic graphical model with respect to perturbations of its parameters. These perturbations are global, in the sense that simultaneous perturbations of all the parameters (or any chosen subset of them) are allowed. Our main contribution is an exact algorithm that can check whether the MAP configuration is robust with respect to given perturbations. Its complexity is essentially the same as that of obtaining the MAP configuration itself, so it can be promptly used with minimal effort. We use our algorithm to identify the largest global perturbation that does not induce a change in the MAP configuration, and we successfully apply this robustness measure in two practical scenarios: the prediction of facial action units with posed images and the classification of multiple real public data sets. A strong correlation between the proposed robustness measure and accuracy is verified in both scenarios.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Depending on the representation setting, different combination rules have been proposed for fusing information from distinct sources. Moreover in each setting, different sets of axioms that combination rules should satisfy have been advocated, thus justifying the existence of alternative rules (usually motivated by situations where the behavior of other rules was found unsatisfactory). These sets of axioms are usually purely considered in their own settings, without in-depth analysis of common properties essential for all the settings. This paper introduces core properties that, once properly instantiated, are meaningful in different representation settings ranging from logic to imprecise probabilities. The following representation settings are especially considered: classical set representation, possibility theory, and evidence theory, the latter encompassing the two other ones as special cases. This unified discussion of combination rules across different settings is expected to provide a fresh look on some old but basic issues in information fusion.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Artificial neural network (ANN) methods are used to predict forest characteristics. The data source is the Southeast Alaska (SEAK) Grid Inventory, a ground survey compiled by the USDA Forest Service at several thousand sites. The main objective of this article is to predict characteristics at unsurveyed locations between grid sites. A secondary objective is to evaluate the relative performance of different ANNs. Data from the grid sites are used to train six ANNs: multilayer perceptron, fuzzy ARTMAP, probabilistic, generalized regression, radial basis function, and learning vector quantization. A classification and regression tree method is used for comparison. Topographic variables are used to construct models: latitude and longitude coordinates, elevation, slope, and aspect. The models classify three forest characteristics: crown closure, species land cover, and tree size/structure. Models are constructed using n-fold cross-validation. Predictive accuracy is calculated using a method that accounts for the influence of misclassification as well as measuring correct classifications. The probabilistic and generalized regression networks are found to be the most accurate. The predictions of the ANN models are compared with a classification of the Tongass national forest in southeast Alaska based on the interpretation of satellite imagery and are found to be of similar accuracy.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Game-theoretic security resource allocation problems have generated significant interest in the area of designing and developing security systems. These approaches traditionally utilize the Stackelberg game model for security resource scheduling in order to improve the protection of critical assets. The basic assumption in Stackelberg games is that a defender will act first, then an attacker will choose their best response after observing the defender’s strategy commitment (e.g., protecting a specific asset). Thus, it requires an attacker’s full or partial observation of a defender’s strategy. This assumption is unrealistic in real-time threat recognition and prevention. In this paper, we propose a new solution concept (i.e., a method to predict how a game will be played) for deriving the defender’s optimal strategy based on the principle of acceptable costs of minimax regret. Moreover, we demonstrate the advantages of this solution concept by analyzing its properties.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

viii
Executive Summary
The Pathways Project field studies were targeted at improving the understanding of contaminant transport along different hydrological pathways in Irish catchments, including their associated impacts on water quality and river ecology. The contaminants of interest were phosphorus, nitrogen and sediment. The working Pathways conceptual model included overland flow, interflow, shallow groundwater flow, and deep groundwater flow. This research informed the development of a set of Catchment Management Support Tools (CMSTs) comprising an Exploratory Tool, Catchment Characterization Tool (CCT) and Catchment Modelling Tool (CMT) as outlined in Pathways Project Final Reports Volumes 3 and 4.
In order to inform the CMST, four suitable study catchments were selected following an extensive selection process, namely the Mattock catchment, Co. Louth/Meath; Gortinlieve catchment, Co. Donegal; Nuenna catchment, Co. Kilkenny and the Glen Burn catchment, Co. Down. The Nuenna catchment is well drained as it is underlain by a regionally important karstified limestone aquifer with permeable limestone tills and gravels, while the other three catchments are underlain by poorly productive aquifers and low permeability clayey tills, and are poorly drained.
All catchments were instrumented, and groundwater, surface and near-surface water and aquatic ecology were monitored for a period of two years. Intensive water quality sampling during rainfall events was used to investigate the pathways delivering nutrients. The proportion of flow along each pathway was determined using chemical and physical hydrograph separation techniques, supported by numerical modelling.
The outcome of the field studies broadly supported the use of the initial four-pathway conceptual model used in the Pathways CMT (time-variant model). The artificial drainage network was found to be a significant contributing pathway in the poorly drained catchments, at low flows and during peak flows in wet antecedent conditions. The transition zone (TZ), i.e. the broken up weathered zone at the top of the bedrock, was also found to be an important pathway. It was observed to operate in two contrasting hydrogeological scenarios: in groundwater discharge zones the TZ can be regarded as being part of the shallow groundwater pathway, whereas in groundwater recharge zones it behaves more like interflow.
In the catchments overlying poorly productive aquifers, only a few fractures or fracture zones were found to be hydraulically active and the TZ, where present, was the main groundwater pathway. In the karstified Nuenna catchment, the springs, which are linked to conduits as well as to a diffuse fracture network, delivered the majority of the flow. These findings confirm the two-component groundwater contribution from bedrock but suggest that the size and nature of the hydraulically active fractures and the nature of the TZ are the dominant factors at the scale of a stream flow event.
Diffuse sources of nitrate were found to be typically delivered via the subsurface pathways, especially in the TZ and land drains in the poorly productive aquifer catchments, and via the bedrock groundwater in the Nuenna. Phosphorus was primarily transported via overland flow in both particulate and soluble forms. Where preferential flow paths existed in the soil and subsoil, soluble P, and to a lesser extent particulate P, were also transported via the TZ and in drains and ditches. Arable land was found to be the most important land use for
ix
the delivery of sediment, although channel bank and in-stream sources were the most significant in the Glen Burn catchment. Overland flow was found to be the predominant transport sediment pathway in the poorly productive catchments. These findings informed the development of the transport and attenuation equations used in the CCT and CMT. From an assessment of the relationship between physico-chemical and biological conditions, it is suggested that in the Nuenna, Glen Burn and Gortinlieve catchments, a relationship may exist between biological water quality and nitrogen concentrations, as well as with P. In the Nuenna, there was also a relationship between macroinvertebrate status and alkalinity.
Further research is recommended on the transport and delivery of phosphorus in groundwater, the transport and attenuation dynamics in the TZ in different hydrogeological settings and the relationship between macroinvertebrates and co-limiting factors. High resolution temporal and spatial sampling was found to be important for constraining the conceptual understanding of nutrient and sediment dynamics which should also be considered in future studies.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Titanium alloy exhibits an excellent combination of bio-compatibility, corrosion resistance, strength and toughness. The microstructure of an alloy influences the properties. The microstructures depend mainly on alloying elements, method of production, mechanical, and thermal treatments. The relationships between these variables and final properties of the alloy are complex, non-linear in nature, which is the biggest hurdle in developing proper correlations between them by conventional methods. So, we developed artificial neural networks (ANN) models for solving these complex phenomena in titanium alloys.

In the present work, ANN models were used for the analysis and prediction of the correlation between the process parameters, the alloying elements, microstructural features, beta transus temperature and mechanical properties in titanium alloys. Sensitivity analysis of trained neural network models were studied which resulted a better understanding of relationships between inputs and outputs. The model predictions and the analysis are well in agreement with the experimental results. The simulation results show that the average output-prediction error by models are less than 5% of the prediction range in more than 95% of the cases, which is quite acceptable for all metallurgical purposes.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In many CCTV and sensor network based intelligent surveillance systems, a number of attributes or criteria are used to individually evaluate the degree of potential threat of a suspect. The outcomes for these attributes are in general from analytical algorithms where data are often pervaded with uncertainty and incompleteness. As a result, such individual threat evaluations are often inconsistent, and individual evaluations can change as time elapses. Therefore, integrating heterogeneous threat evaluations with temporal influence to obtain a better overall evaluation is a challenging issue. So far, this issue has rarely be considered by existing event reasoning frameworks under uncertainty in sensor network based surveillance. In this paper, we first propose a weighted aggregation operator based on a set of principles that constraints the fusion of individual threat evaluations. Then, we propose a method to integrate the temporal influence on threat evaluation changes. Finally, we demonstrate the usefulness of our system with a decision support event modeling framework using an airport security surveillance scenario.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The objective of this study is to provide an alternative model approach, i.e., artificial neural network (ANN) model, to predict the compositional viscosity of binary mixtures of room temperature ionic liquids (in short as ILs) [C n-mim] [NTf 2] with n=4, 6, 8, 10 in methanol and ethanol over the entire range of molar fraction at a broad range of temperatures from T=293.0328.0K. The results show that the proposed ANN model provides alternative way to predict compositional viscosity successfully with highly improved accuracy and also show its potential to be extensively utilized to predict compositional viscosity over a wide range of temperatures and more complex viscosity compositions, i.e., more complex intermolecular interactions between components in which it would be hard or impossible to establish the analytical model. © 2010 IEEE.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

BACKGROUND: The free fatty acid receptors (FFAs), including FFA1 (orphan name: GPR40), FFA2 (GPR43) and FFA3 (GPR41) are G protein-coupled receptors (GPCRs) involved in energy and metabolic homeostasis. Understanding the structural basis of ligand binding at FFAs is an essential step toward designing potent and selective small molecule modulators.

RESULTS: We analyse earlier homology models of FFAs in light of the newly published FFA1 crystal structure co-crystallized with TAK-875, an ago-allosteric ligand, focusing on the architecture of the extracellular binding cavity and agonist-receptor interactions. The previous low-resolution homology models of FFAs were helpful in highlighting the location of the ligand binding site and the key residues for ligand anchoring. However, homology models were not accurate in establishing the nature of all ligand-receptor contacts and the precise ligand-binding mode. From analysis of structural models and mutagenesis, it appears that the position of helices 3, 4 and 5 is crucial in ligand docking. The FFA1-based homology models of FFA2 and FFA3 were constructed and used to compare the FFA subtypes. From docking studies we propose an alternative binding mode for orthosteric agonists at FFA1 and FFA2, involving the interhelical space between helices 4 and 5. This binding mode can explain mutagenesis results for residues at positions 4.56 and 5.42. The novel FFAs structural models highlight higher aromaticity of the FFA2 binding cavity and higher hydrophilicity of the FFA3 binding cavity. The role of the residues at the second extracellular loop used in mutagenesis is reanalysed. The third positively-charged residue in the binding cavity of FFAs, located in helix 2, is identified and predicted to coordinate allosteric modulators.

CONCLUSIONS: The novel structural models of FFAs provide information on specific modes of ligand binding at FFA subtypes and new suggestions for mutagenesis and ligand modification, guiding the development of novel orthosteric and allosteric chemical probes to validate the importance of FFAs in metabolic and inflammatory conditions. Using our FFA homology modelling experience, a strategy to model a GPCR, which is phylogenetically distant from GPCRs with the available crystal structures, is discussed.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Bridge construction responds to the need for environmentally friendly design of motorways and facilitates the passage through sensitive natural areas and the bypassing of urban areas. However, according to numerous research studies, bridge construction presents substantial budget overruns. Therefore, it is necessary early in the planning process for the decision makers to have reliable estimates of the final cost based on previously constructed projects. At the same time, the current European financial crisis reduces the available capital for investments and financial institutions are even less willing to finance transportation infrastructure. Consequently, it is even more necessary today to estimate the budget of high-cost construction projects -such as road bridges- with reasonable accuracy, in order for the state funds to be invested with lower risk and the projects to be designed with the highest possible efficiency. In this paper, a Bill-of-Quantities (BoQ) estimation tool for road bridges is developed in order to support the decisions made at the preliminary planning and design stages of highways. Specifically, a Feed-Forward Artificial Neural Network (ANN) with a hidden layer of 10 neurons is trained to predict the superstructure material quantities (concrete, pre-stressed steel and reinforcing steel) using the width of the deck, the adjusted length of span or cantilever and the type of the bridge as input variables. The training dataset includes actual data from 68 recently constructed concrete motorway bridges in Greece. According to the relevant metrics, the developed model captures very well the complex interrelations in the dataset and demonstrates strong generalisation capability. Furthermore, it outperforms the linear regression models developed for the same dataset. Therefore, the proposed cost estimation model stands as a useful and reliable tool for the construction industry as it enables planners to reach informed decisions for technical and economic planning of concrete bridge projects from their early implementation stages.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In the last decade, many side channel attacks have been published in academic literature detailing how to efficiently extract secret keys by mounting various attacks, such as differential or correlation power analysis, on cryptosystems. Among the most efficient and widely utilized leakage models involved in these attacks are the Hamming weight and distance models which give a simple, yet effective, approximation of the power consumption for many real-world systems. These leakage models reflect the number of bits switching, which is assumed proportional to the power consumption. However, the actual power consumption changing in the circuits is unlikely to be directly of that form. We, therefore, propose a non-linear leakage model by mapping the existing leakage model via a transform function, by which the changing power consumption is depicted more precisely, hence the attack efficiency can be improved considerably. This has the advantage of utilising a non-linear power model while retaining the simplicity of the Hamming weight or distance models. A modified attack architecture is then suggested to yield the correct key efficiently in practice. Finally, an empirical comparison of the attack results is presented.