123 resultados para feature descriptor
Resumo:
Non-technical losses (NTL) identification and prediction are important tasks for many utilities. Data from customer information system (CIS) can be used for NTL analysis. However, in order to accurately and efficiently perform NTL analysis, the original data from CIS need to be pre-processed before any detailed NTL analysis can be carried out. In this paper, we propose a feature selection based method for CIS data pre-processing in order to extract the most relevant information for further analysis such as clustering and classifications. By removing irrelevant and redundant features, feature selection is an essential step in data mining process in finding optimal subset of features to improve the quality of result by giving faster time processing, higher accuracy and simpler results with fewer features. Detailed feature selection analysis is presented in the paper. Both time-domain and load shape data are compared based on the accuracy, consistency and statistical dependencies between features.
Resumo:
Software simulation models are computer programs that need to be verified and debugged like any other software. In previous work, a method for error isolation in simulation models has been proposed. The method relies on a set of feature matrices that can be used to determine which part of the model implementation is responsible for deviations in the output of the model. Currrently these feature matrices have to be generated by hand from the model implementation, which is a tedious and error-prone task. In this paper, a method based on mutation analysis, as well as prototype tool support for the verification of the manually generated feature matrices is presented. The application of the method and tool to a model for wastewater treatment shows that the feature matrices can be verified effectively using a minimal number of mutants.
Resumo:
The software implementation of the emergency shutdown feature in a major radiotherapy system was analyzed, using a directed form of code review based on module dependences. Dependences between modules are labelled by particular assumptions; this allows one to trace through the code, and identify those fragments responsible for critical features. An `assumption tree' is constructed in parallel, showing the assumptions which each module makes about others. The root of the assumption tree is the critical feature of interest, and its leaves represent assumptions which, if not valid, might cause the critical feature to fail. The analysis revealed some unexpected assumptions that motivated improvements to the code.
Resumo:
Leadlight windows with stained glass feature panes and timber muntins over french doors with matching leadlight sidelights.
Resumo:
Arched head leadlight and casement windows with stained glass feature panes and timber muntins. View through window from interior.
Resumo:
Arched head leadlight window with stained glass feature panes and timber muntins.
Resumo:
Glow-worms are the larvae of a fly from the family Keroplatidae. Their closest relatives are the “fungus flies” that seek out mushrooms for their larvae to consume. Glow-worms have gone out on an evolutionary limb, albeit a successful one. They have lost their association with fungi and have instead become carnivorous. The unique feature of glow-worms is their ability to bioluminesce—to produce light.
Resumo:
Reaching to interact with an object requires a compromise between the speed of the limb movement and the required end-point accuracy. The time it takes one hand to move to a target in a simple aiming task can be predicted reliably from Fitts' law, which states that movement time is a function of a combined measure of amplitude and accuracy constraints (the index of difficulty, ID). It has been assumed previously that Fitts' law is violated in bimanual aiming movements to targets of unequal ID. We present data from two experiments to show that this assumption is incorrect: if the attention demands of a bimanual aiming task are constant then the movements are well described by a Fitts' law relationship. Movement time therefore depends not only on ID but on other task conditions, which is a basic feature of Fitts' law. In a third experiment we show that eye movements are an important determinant of the attention demands in a bimanual aiming task. The results from the third experiment extend the findings of the first two experiments and show that bimanual aiming often relies on the strategic co-ordination of separate actions into a seamless behaviour. A number of the task specific strategies employed by the adult human nervous system were elucidated in the third experiment. The general strategic pattern observed in the hand trajectories was reflected by the pattern of eye movements recorded during the experiment. The results from all three experiments demonstrate that eye movements must be considered as an important constraint in bimanual aiming tasks.
Remembering sport history: Narrative, social memory and the origins of the rugby league in Australia
Resumo:
This study examines the historiography of the origins of rugby league in Australia. By accepting the inclusive nature of representation of the past as found in social memory theory, a wide range of sources ranging from histories written by academics to annuals, yearbooks and newspaper books are consulted. These sources reveal that there are several competing and conflicting accounts of the emergence of rugby league in Australia. These divergent accounts are used to facilitate a discussion of the role of narrative in sport history This article argues that narrative is an integral, not optional, feature of the production of history and that the historography of the origins of rugby league highlight the problematic nature of objectivity in history and the unavoidable, impositionalist role of the historian.
Resumo:
View to north and east facing wings, along circulation path to the roof feature connection between wings.
Resumo:
This paper reports on a system for automated agent negotiation, based on a formal and executable approach to capture the behavior of parties involved in a negotiation. It uses the JADE agent framework, and its major distinctive feature is the use of declarative negotiation strategies. The negotiation strategies are expressed in a declarative rules language, defeasible logic, and are applied using the implemented system DR-DEVICE. The key ideas and the overall system architecture are described, and a particular negotiation case is presented in detail.
Resumo:
A narrow absorption feature in an atomic or molecular gas (such as iodine or methane) is used as the frequency reference in many stabilized lasers. As part of the stabilization scheme an optical frequency dither is applied to the laser. In optical heterodyne experiments, this dither is transferred to the RF beat signal, reducing the spectral power density and hence the signal to noise ratio over that in the absence of dither. We removed the dither by mixing the raw beat signal with a dithered local oscillator signal. When the dither waveform is matched to that of the reference laser the output signal from the mixer is rendered dither free. Application of this method to a Winters iodine-stabilized helium-neon laser reduced the bandwidth of the beat signal from 6 MHz to 390 kHz, thereby lowering the detection threshold from 5 pW of laser power to 3 pW. In addition, a simple signal detection model is developed which predicts similar threshold reductions.