9 resultados para graph analysis

em Repositório Institucional UNESP - Universidade Estadual Paulista "Julio de Mesquita Filho"


Relevância:

70.00% 70.00%

Publicador:

Resumo:

This study examined a new conservation tillage tool, the rotary paraplow. Emphasis was placed on evaluating the tool's conservation potential using dimensionless graph analysis. The dynamic conditions of the soil were investigated in terms of physical soil properties. Having determined the variables to be measured, dimensional analysis was used to plan the experiments. Two variations were considered for each dependent variable (linear speed, working depth, and rotation velocity), totaling eight treatments, allotting in each an experimental strip with five data collection points. This arrangement totaled 16 experimental strips, with 80 data collection points for all variables. The rotary paraplow generates a trapezoidal furrow for planting with a very wide bottom and narrower at the top. The volumetric subsoiling action generates cracks on the sides of the band. Because of their specific geometry the blades of rotary paraplow generate a soil failure according to its natural crack angle, optimizing the energy use, while preserving the natural soil properties. Results showed the conservation character of the rotary paraplow, capable of breaking up clods for planting without changing the original physical soil properties.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This article introduces the software program called EthoSeq, which is designed to extract probabilistic behavioral sequences (tree-generated sequences, or TGSs) from observational data and to prepare a TGS-species matrix for phylogenetic analysis. The program uses Graph Theory algorithms to automatically detect behavioral patterns within the observational sessions. It includes filtering tools to adjust the search procedure to user-specified statistical needs. Preliminary analyses of data sets, such as grooming sequences in birds and foraging tactics in spiders, uncover a large number of TGSs which together yield single phylogenetic trees. An example of the use of the program is our analysis of felid grooming sequences, in which we have obtained 1,386 felid grooming TGSs for seven species, resulting in a single phylogeny. These results show that behavior is definitely useful in phylogenetic analysis. EthoSeq simplifies and automates such analyses, uncovers much of the hidden patterns of long behavioral sequences, and prepares this data for further analysis with standard phylogenetic programs. We hope it will encourage many empirical studies on the evolution of behavior.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Given that the total amount of losses in a distribution system is known, with a reliable methodology for the technical loss calculation, the non-technical losses can be obtained by subtraction. A usual method of calculation technical losses in the electric utilities uses two important factors: load factor and the loss factor. The load factor is usually obtained with energy and demand measurements, whereas, to compute the loss factor it is necessary the learning of demand and energy loss, which are not, in general, prone of direct measurements. In this work, a statistical analysis of this relationship using the curves of a sampling of consumers in a specific company is presented. These curves will be summarized in different bands of coefficient k. Then, it will be possible determine where each group of consumer has its major concentration of points. ©2008 IEEE.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A method for context-sensitive analysis of binaries that may have obfuscated procedure call and return operations is presented. Such binaries may use operators to directly manipulate stack instead of using native call and ret instructions to achieve equivalent behavior. Since definition of context-sensitivity and algorithms for context-sensitive analysis have thus far been based on the specific semantics associated to procedure call and return operations, classic interprocedural analyses cannot be used reliably for analyzing programs in which these operations cannot be discerned. A new notion of context-sensitivity is introduced that is based on the state of the stack at any instruction. While changes in 'calling'-context are associated with transfer of control, and hence can be reasoned in terms of paths in an interprocedural control flow graph (ICFG), the same is not true of changes in 'stack'-context. An abstract interpretation based framework is developed to reason about stack-contexts and to derive analogues of call-strings based methods for the context-sensitive analysis using stack-context. The method presented is used to create a context-sensitive version of Venable et al.'s algorithm for detecting obfuscated calls. Experimental results show that the context-sensitive version of the algorithm generates more precise results and is also computationally more efficient than its context-insensitive counterpart. Copyright © 2010 ACM.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Since Sharir and Pnueli, algorithms for context-sensitivity have been defined in terms of 'valid' paths in an interprocedural flow graph. The definition of valid paths requires atomic call and ret statements, and encapsulated procedures. Thus, the resulting algorithms are not directly applicable when behavior similar to call and ret instructions may be realized using non-atomic statements, or when procedures do not have rigid boundaries, such as with programs in low level languages like assembly or RTL. We present a framework for context-sensitive analysis that requires neither atomic call and ret instructions, nor encapsulated procedures. The framework presented decouples the transfer of control semantics and the context manipulation semantics of statements. A new definition of context-sensitivity, called stack contexts, is developed. A stack context, which is defined using trace semantics, is more general than Sharir and Pnueli's interprocedural path based calling-context. An abstract interpretation based framework is developed to reason about stack-contexts and to derive analogues of calling-context based algorithms using stack-context. The framework presented is suitable for deriving algorithms for analyzing binary programs, such as malware, that employ obfuscations with the deliberate intent of defeating automated analysis. The framework is used to create a context-sensitive version of Venable et al.'s algorithm for analyzing x86 binaries without requiring that a binary conforms to a standard compilation model for maintaining procedures, calls, and returns. Experimental results show that a context-sensitive analysis using stack-context performs just as well for programs where the use of Sharir and Pnueli's calling-context produces correct approximations. However, if those programs are transformed to use call obfuscations, a contextsensitive analysis using stack-context still provides the same, correct results and without any additional overhead. © Springer Science+Business Media, LLC 2011.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Thermal faceprint has been paramount in the last years. Since we can handle with face recognition using images acquired in the infrared spectrum, an unique individual's signature can be obtained through the blood vessels network of the face. In this work, we propose a novel framework for thermal faceprint extraction using a collection of graph-based techniques, which were never used to this task up to date. A robust method of thermal face segmentation is also presented. The experiments, which were conducted over the UND Collection C dataset, have showed promising results. © 2011 Springer-Verlag.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Objective: This study evaluated the effects of root canal obturation employing lateral compaction technique and spreader load of 1.5 kg on the incidence of complete (CVRF) or incomplete vertical root fractures (IVRF). Material and Methods: Twenty-seven distal roots of extracted human mandibular molars were used. All root canals were prepared by biomechanical step-back technique and obturated by lateral compaction technique. The prepared roots were distributed into two groups: G1- experimental (n = 17) and G2- control (n = 10). During obturation, load of 1.5 kg was applied to a size # 30 finger spreader. Pre- and post-obturation images of the coronal portion of the roots were captured by inverted digital microscopy and analyzed by one trained examiner. Data were evaluated by Fisher’s test (p < 0.05) using GrapH Pad Prism 5.0. Results: No roots exhibited CVRF. All fractures observed before and after obturation were IVRF or “other defects”. In G2 (control group), there was no increase of IVRF number. Interestingly, G1 presented an increase in the IVRF number to 70.59% in the 12 teeth out of 17 teeth studied. The statistical analysis showed that the mean of IVRF increased significantly in G1 when compared to G2 (p < 0.05). Conclusion: The application of a 1.5 kg spreader load during lateral compaction technique does not produce complete vertical root fractures, but may produce incomplete fractures or “other defects”.