927 resultados para implementation method


Relevância:

60.00% 60.00%

Publicador:

Resumo:

The principle of common but differentiated responsibility (CBDR) will play a role in the 2020 Climate Regime. This Article starts by examining differential treatment within the international legal order, finding that it is ethically and practically difficult to implement an international climate instrument based on formal equality. There is evidence of state parties accepting differential responsibilities in a number of areas within the international legal order and the embedding of CBDR in the United Nations Framework Convention on Climate Change (UNFCCC), means that that differential commitments will lie at the heart of the 2020 climate regime. The UNFCCC applies the implementation method of differentiation, while the Kyoto Protocol applies both the obligation and implementation method of differentiation. It is suggested that the implementation model will be the differentiation model retained in the 2020 climate agreement. The Parties’ submissions under the Durban Platform are considered in order to gain an understanding of their positions on CBDR. While there are areas of contention including the role of principles in shaping obligations and the ongoing legal status of Annex I and Non-Annex I distinction, there is broad consensus among the parties in favour of differentiation by implementation with developed and major economies undertaking Quantified Emission Limitation and Reduction Objectives (economy wide targets) and developing countries that are not major economies undertaking sectoral targets.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

针对船载综合信息显示系统在实体船舶内开发不方便的问题,提出了一种半实物仿真系统的设计与实现方法。结合"科学三号"海洋科学考察船的综合信息显示系统的设计和开发过程,从体系结构、信息流程和实现方法3个方面对半实物仿真系统的设计和实现过程进行了探索。实践结果表明,这种半实物仿真系统一方面可以为实际系统的体系结构、信息流程设计提供支持,另一方面可以为实际系统应用软件的开发提供较为真实的环境,有效的缩短开发时间和降低开发风险。

Relevância:

60.00% 60.00%

Publicador:

Resumo:

介绍了一种超高压输电线路巡检机器人控制系统的设计与实现方法.根据巡检作业任务的要求,采用遥控与局部自主相结合的控制模式实现巡检机器人沿线行走及跨越障碍.设计了巡检机器人有限状态机模型,实现了机器人遥控与局部自主控制的有机结合.采用基于激光传感器定位的方法实现了巡检机器人的自主越障控制.实验结果表明,该机器人可实现沿线行走及自主跨越障碍,从而验证了控制系统设计的有效性与合理性.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

为了充分发挥智能机器人的自主性和人的主观能动性,实现通过网络遥操作非结构化环境下的智能机器人,提出了一种基于Agent的网络遥操作机器人控制系统结构,分析了控制系统中各部分的功能,给出了系统中各个Agent的实现方法。该控制方法已通过仿人形机器人的遥操作控制实验得到了验证。

Relevância:

60.00% 60.00%

Publicador:

Resumo:

文章提出了一种基于五自由度机电系统的测控系统设计方法,并从机械系统构成、测控系统结构及软硬件设计方面论述了系统实现技术。针对系统特定的功能要求,文章详细介绍了位姿组合测量和各位姿自由度控制的测控方法,并应用模块化设计和数据流分析方法进行软硬件设计。通过实验进行系统特性分析,得到运行参数指标。实验证明这种设计方法和实现技术合理可行。

Relevância:

60.00% 60.00%

Publicador:

Resumo:

提出了一种用于AUV视景仿真的海洋环境中海底地形和海流的虚拟实现方法。海底地形不但考虑了离散点电子海图数据,而且也将某些特征数据考虑在内,从而生成相对精度较高的海底地形。海洋中的海流采用两个层次的方法进行模拟:建立海流数据库方法以及水动力软件计算方法。该方法的研究对于AUV自主地形导航技术以及避碰策略等研究具有极为重要的意义,并且上述方法生成的海洋环境已经在AUV数字仿真平台中得到了应用。

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Extensive use of the Internet coupled with the marvelous growth in e-commerce and m-commerce has created a huge demand for information security. The Secure Socket Layer (SSL) protocol is the most widely used security protocol in the Internet which meets this demand. It provides protection against eaves droppings, tampering and forgery. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL. But recent attacks against RC4 and HMAC have raised questions in the confidence on these algorithms. Hence two novel cryptographic algorithms MAJE4 and MACJER-320 have been proposed as substitutes for them. The focus of this work is to demonstrate the performance of these new algorithms and suggest them as dependable alternatives to satisfy the need of security services in SSL. The performance evaluation has been done by using practical implementation method.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Extensive use of the Internet coupled with the marvelous growth in e-commerce and m-commerce has created a huge demand for information security. The Secure Socket Layer (SSL) protocol is the most widely used security protocol in the Internet which meets this demand. It provides protection against eaves droppings, tampering and forgery. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL. But recent attacks against RC4 and HMAC have raised questions in the confidence on these algorithms. Hence two novel cryptographic algorithms MAJE4 and MACJER-320 have been proposed as substitutes for them. The focus of this work is to demonstrate the performance of these new algorithms and suggest them as dependable alternatives to satisfy the need of security services in SSL. The performance evaluation has been done by using practical implementation method.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

One of the scarcest resources in the wireless communication system is the limited frequency spectrum. Many wireless communication systems are hindered by the bandwidth limitation and are not able to provide high speed communication. However, Ultra-wideband (UWB) communication promises a high speed communication because of its very wide bandwidth of 7.5GHz (3.1GHz-10.6GHz). The unprecedented bandwidth promises many advantages for the 21st century wireless communication system. However, UWB has many hardware challenges, such as a very high speed sampling rate requirement for analog to digital conversion, channel estimation, and implementation challenges. In this thesis, a new method is proposed using compressed sensing (CS), a mathematical concept of sub-Nyquist rate sampling, to reduce the hardware complexity of the system. The method takes advantage of the unique signal structure of the UWB symbol. Also, a new digital implementation method for CS based UWB is proposed. Lastly, a comparative study is done of the CS-UWB hardware implementation methods. Simulation results show that the application of compressed sensing using the proposed method significantly reduces the number of hardware complexity compared to the conventional method of using compressed sensing based UWB receiver.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Second Life (SL) is an ideal platform for language learning. It is called a Multi-User Virtual Environment, where users can have varieties of learning experiences in life-like environments. Numerous attempts have been made to use SL as a platform for language teaching and the possibility of SL as a means to promote conversational interactions has been reported. However, the research so far has largely focused on simply using SL without further augmentations for communication between learners or between teachers and learners in a school-like environment. Conversely, not enough attention has been paid to its controllability which builds on the embedded functions in SL. This study, based on the latest theories of second language acquisition, especially on the Task Based Language Teaching and the Interaction Hypothesis, proposes to design and implement an automatized interactive task space (AITS) where robotic agents work as interlocutors of learners. This paper presents a design that incorporates the SLA theories into SL and the implementation method of the design to construct AITS, fulfilling the controllability of SL. It also presents the result of the evaluation experiment conducted on the constructed AITS.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Dissertação (mestrado)—Universidade de Brasília, Faculdade de Ciências da Saúde, Programa de Pós-Graduação em Saúde Coletiva, 2016.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Any government deciding to invoke widespread change in its higher education sector through implementation of new policies impacts on every institution and all staff and students, often in both the time taken up and the heightened emotions caused. The central phenomenon that this study addresses is the process and consequences of policy changes in higher education in Australia. The aim of this article is to record the research design through the perspective (evaluation research), theoretical framework (program evaluation) and methods (content analysis, descriptive statistical analysis and bibliometric analysis) applied to the investigation of the 2003 federal government higher education reform package. This approach allows both the intended and unintended consequences arising from the policy implementation of three national initiatives focused on learning and teaching in higher education in Australia to surface. As a result, this program evaluation, also known in some disciplines as policy implementation analysis, will demonstrate the applicability of illuminative evaluation as a methodology and reinforce how program evaluation will assist and advise future government reform and policy implementation, and will serve as a legacy for future evaluative research.Any government deciding to invoke widespread change in its higher education sector through implementation of new policies impacts on every institution and all staff and students, often in both the time taken up and the heightened emotions caused. The central phenomenon that this study addresses is the process and consequences of policy changes in higher education in Australia. The aim of this article is to record the research design through the perspective (evaluation research), theoretical framework (program evaluation) and methods (content analysis, descriptive statistical analysis and bibliometric analysis) applied to the investigation of the 2003 federal government higher education reform package. This approach allows both the intended and unintended consequences arising from the policy implementation of three national initiatives focused on learning and teaching in higher education in Australia to surface. As a result, this program evaluation, also known in some disciplines as policy implementation analysis, will demonstrate the applicability of illuminative evaluation as a methodology and reinforce how program evaluation will assist and advise future government reform and policy implementation, and will serve as a legacy for future evaluative research.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This paper discusses the parallel implementation of the solution of a set of linear equations using the Alternative Quadrant Interlocking Factorisation Methods (AQIF), on a star topology. Both the AQIF and LU decomposition methods are mapped onto star topology on an IBM SP2 system, with MPI as the internode communicator. Performance parameters such as speedup, efficiency have been obtained through experimental and theoretical means. The studies demonstrate (i) a mismatch of 15% between the theoretical and experimental results, (ii) scalability of the AQIF algorithm, and (iii) faster executing AQIF algorithm.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The method of stress characteristics has been employed to compute the end-bearing capacity of driven piles. The dependency of the soil internal friction angle on the stress level has been incorporated to achieve more realistic predictions for the end-bearing capacity of piles. The validity of the assumption of the superposition principle while using the bearing capacity equation based on soil plasticity concepts, when applied to deep foundations, has been examined. Fourteen pile case histories were compiled with cone penetration tests (CPT) performed in the vicinity of different pile locations. The end-bearing capacity of the piles was computed using different methods, namely, static analysis, effective stress approach, direct CPT, and the proposed approach. The comparison between predictions made by different methods and measured records shows that the stress-level-based method of stress characteristics compares better with experimental data. Finally, the end-bearing capacity of driven piles in sand was expressed in terms of a general expression with the addition of a new factor that accounts for different factors contributing to the bearing capacity. The influence of the soil nonassociative flow rule has also been included to achieve more realistic results.