2 resultados para Threshold Access Structures


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Composites are fast becoming a cost effective option when considering the design of engineering structures in a broad range of applications. If the strength to weight benefits of these material systems can be exploited and challenges in developing lower cost manufacturing methods overcome, then the advanced composite systems will play a bigger role in the diverse range of sectors outside the aerospace industry where they have been used for decades.
This paper presents physical testing results that showcase the advantages of GRP (Glass Reinforced Plastics), such as the ability to endure loading with minimal deformation. The testing involved is a cross comparison of GRP grating vs. GRP encapsulated foam core. Resulting data gained within this paper will then be coupled with design optimization (utilising model simulation) to bring forward layup alterations to meet the specified load classifications involved.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In order to address the increasing compromise of user privacy on mobile devices, a Fuzzy Logic based implicit authentication scheme is proposed in this paper. The proposed scheme computes an aggregate score based on selected features and a threshold in real-time based on current and historic data depicting user routine. The tuned fuzzy system is then applied to the aggregated score and the threshold to determine the trust level of the current user. The proposed fuzzy-integrated implicit authentication scheme is designed to: operate adaptively and completely in the background, require minimal training period, enable high system accuracy while provide timely detection of abnormal activity. In this paper, we explore Fuzzy Logic based authentication in depth. Gaussian and triangle-based membership functions are investigated and compared using real data over several weeks from different Android phone users. The presented results show that our proposed Fuzzy Logic approach is a highly effective, and viable scheme for lightweight real-time implicit authentication on mobile devices.