905 resultados para Weaknesses


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Geophysical inversion is a theory that transforms the observation data into corresponding geophysical models. The goal of seismic inversion is not only wave velocity models, but also the fine structures and dynamic process of interior of the earth, expanding to more parameters such as density, aeolotropism, viscosity and so on. As is known to all, Inversion theory is divided to linear and non-linear inversion theories. In rencent 40 years linear inversion theory has formed into a complete and systematic theory and found extensive applications in practice. While there are still many urgent problems to be solved in non-linear inversion theory and practice. Based on wave equation, this dissertation has been mainly involved in the theoretical research of several non-linear inversion methods: waveform inversion, traveltime inversion and the joint inversion about two methods. The objective of gradient waveform inversion is to find a geologic model, thus synthetic seismograms generated by this geologic model are best fitted to observed seismograms. Contrasting with other inverse methods, waveform inversion uses all characteristics of waveform and has high resolution capacity. But waveform inversion is an interface by interface method. An artificial parameter limit should be provided in each inversion iteration. In addition, waveform information will tend to get stuck in local minima if the starting model is too far from the actual model. Based on velocity scanning in traditional seismic data processing, a layer-by-layer waveform inversion method is developed in this dissertation to deal with weaknesses of waveform inversion. Wave equation is used to calculate the traveltime and derivative (perturbation of traveltime with respect to velocity) in wave-equation traveltime inversion (WT). Unlike traditional ray-based travetime inversion, WT has many advantages. No ray tracing or traveltime picking and no high frequency assumption is necessary and good result can be got while starting model is far from real model. But, comparing with waveform inversion, WT has low resolution. Waveform inversion and WT have complementary advantages and similar algorithm, which proves that the joint inversion is a better inversion method. And another key point which this dissertation emphasizes is how to give fullest play to their complementary advantages on the premise of no increase of storage spaces and amount of calculation. Numerical tests are implemented to prove the feasibility of inversion methods mentioned above in this dissertation. Especially for gradient waveform inversion, field data are inversed. This field data are acquired by our group in Wali park and Shunyi district. Real data processing shows there are many problems for waveform inversion to deal with real data. The matching of synthetic seismograms with observed seismograms and noise cancellation are two primary problems. In conclusion, on the foundation of the former experiences, this dissertation has implemented waveform inversions on the basis of acoustic wave equation and elastic wave equation, traveltime inversion on the basis of acoustic wave equation and traditional combined waveform traveltime inversion. Besides the traditional analysis of inversion theory, there are two innovations: layer by layer inversion of seimic reflection data inversion and rapid method for acoustic wave-equation joint inversion.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

During the exploration of fractured reservoirs, worldwide difficult problems will be encountered: how to locate the fractured zones, how to quantitatively determine the azimuth, density, and distribution of the fractures, and how to compute the permeability and porosity of the fractures. In an endeavor to solve these problems, the fractured shale reservoir in SiKou area of ShengLi oil field was chosen as a study area. A study of seismic predictive theory and methods for solving problems encountered in fractured reservoir exploration are examined herein. Building on widely used current fractured reservoir exploration techniques, new seismic theories and methods focusing on wave propagation principles in anisotropic medium are proposed. Additionally, integrated new seismic data acquisition and processing methods are proposed. Based on research and application of RVA and WA methods from earlier research, a new method of acoustic impedance varying with azimuth (IPVA) creatively is put forth. Lastly combining drilling data, well log data, and geologic data, an integrated seismic predictive method for cracked reservoir bed was formed. A summary of the six parts of research work of this paper is outlined below. In part one, conventional geologic and geophysical prediction methods etc. for cracked reservoir exploration are examined, and the weaknesses of these approaches discussed. In part two, seismic wave propagation principles in cracked reservoirs are studied. The wave equation of seismic velocity and attenuation factor in three kinds of fracture mediums is induced, and the azimuth anisotropy of velocity and attenuation in fracture mediums is determined. In part three, building on the research and application of AVA and WA methods by a former researcher, a new method of acoustic impedance creatively varying with azimuth (IPVA) is introduced. A practical software package utilizing this technique is also introduced. In part four, Base on previously discussed theory, first a large full azimuth 3d seismic data (70km~2) was designed and acquired. Next, the volume was processed with conventional processing sequence. Then AVA, WA, and IPVA processing was applied, and finally the azimuth and density of the fractures were quantitatively determined by an integrated method. Predictions were supported by well data that indicate the approach is highly reliable. in part five, geological conditions contributing to cracked reservoir bed formation are analyzed in the LuoJia area resulting in the discovery that the main fractured zones are related to fault distribution in the basin, that also control the accumulation of the oil and gas, the generation mechanisms and types of fractured shale reservoirs are studied. Lastly, by using full 3D seismic attributes, azimuth and density of cracked reservoir zones are successfully quantitative predicted. Using an integrated approach that incorporates seismic, geologic and well log data, the best two fractured oil prospects in LouJia area are proposed. These results herein represent a break through in seismic technology, integrated seismic predictive theory, and production technology for fractured reservoirs. The approach fills a void that can be applied both inside China, and internationally. Importantly, this technique opens a new exploration play in the ShengLi oil field that while difficult has substantial potential. Properly applied, this approach could play an important role toward stabilizing the oil field' production. In addition, this technique could be extended fracture exploration in other oil fields producing substantial economic reward.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Saliency Network proposed by Shashua and Ullman is a well-known approach to the problem of extracting salient curves from images while performing gap completion. This paper analyzes the Saliency Network. The Saliency Network is attractive for several reasons. First, the network generally prefers long and smooth curves over short or wiggly ones. While computing saliencies, the network also fills in gaps with smooth completions and tolerates noise. Finally, the network is locally connected, and its size is proportional to the size of the image. Nevertheless, our analysis reveals certain weaknesses with the method. In particular, we show cases in which the most salient element does not lie on the perceptually most salient curve. Furthermore, in some cases the saliency measure changes its preferences when curves are scaled uniformly. Also, we show that for certain fragmented curves the measure prefers large gaps over a few small gaps of the same total size. In addition, we analyze the time complexity required by the method. We show that the number of steps required for convergence in serial implementations is quadratic in the size of the network, and in parallel implementations is linear in the size of the network. We discuss problems due to coarse sampling of the range of possible orientations. We show that with proper sampling the complexity of the network becomes cubic in the size of the network. Finally, we consider the possibility of using the Saliency Network for grouping. We show that the Saliency Network recovers the most salient curve efficiently, but it has problems with identifying any salient curve other than the most salient one.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We formulate and interpret several multi-modal registration methods in the context of a unified statistical and information theoretic framework. A unified interpretation clarifies the implicit assumptions of each method yielding a better understanding of their relative strengths and weaknesses. Additionally, we discuss a generative statistical model from which we derive a novel analysis tool, the "auto-information function", as a means of assessing and exploiting the common spatial dependencies inherent in multi-modal imagery. We analytically derive useful properties of the "auto-information" as well as verify them empirically on multi-modal imagery. Among the useful aspects of the "auto-information function" is that it can be computed from imaging modalities independently and it allows one to decompose the search space of registration problems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This report describes a paradigm for combining associational and causal reasoning to achieve efficient and robust problem-solving behavior. The Generate, Test and Debug (GTD) paradigm generates initial hypotheses using associational (heuristic) rules. The tester verifies hypotheses, supplying the debugger with causal explanations for bugs found if the test fails. The debugger uses domain-independent causal reasoning techniques to repair hypotheses, analyzing domain models and the causal explanations produced by the tester to determine how to replace faulty assumptions made by the generator. We analyze the strengths and weaknesses of associational and causal reasoning techniques, and present a theory of debugging plans and interpretations. The GTD paradigm has been implemented and tested in the domains of geologic interpretation, the blocks world, and Tower of Hanoi problems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Academic feedback is taken here as the reporting to student writers of the strengths and weaknesses of their submitted draft work, while academic feedforward refers to constructive advice regarding possible strengthening of students’ next work. Both originate from a tutor’s initial judgement of a student’s work. Feedback and feedforward on work showing need for improvement are problematic in a Confucian Heritage Culture. Even gently constructive advice within a programme seeking evidence for assessment of critical thinking may lead to perception of hurtful criticism by Taiwanese students. Some could withdraw from class activity accordingly. So the writers adjusted their response style. They now choose between different approaches featuring tutorial feedback or feedforward, depending on the standard of work being judged. When individual postings feature poor critical thinking, the writers opt for private messages concentrating on constructive feedforward. For better postings, they provide positive feedback with reasons for their judgements, and summarise to the class these exemplars of generic strengths in critical thinking. They also offer private prompting when they see scope for further enrichment of an able student’s critical thinking. This might also be a useful practice when tutoring solely in the West. (192 words) Keywords: Confucian Heritage Culture, public feedback, private feedforward, assessment

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Oficjalne kredyty ratunkowe dla niektórych krajów w strefie euro nie mogą zastąpić tam reform, które – poprawiając sytuację gospodarczą – pozwolą odzyskać owym krajom zaufanie rynków finansowych. W literaturze wymienia się dwie główne strukturalne słabości wspólnej waluty (euro): 1. Jednolita polityka pieniądza nie jest w stanie uwzględnić odmienności sytuacji poszczególnych krajów, a wspólny pieniądz nie pozwala na dewaluację w obrębie strefy euro; 2. Strefa euro istnieje bez „unii politycznej”. Artykuł analizuje zasadność tych tez.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

El estudio determina las características de la Economía Solidaria, desde la perspectiva de los movimientos sociales, en el marco del análisis de las auditorías de REASNavarra. Se contextualizan mediante revisión bibliográfica las características, tanto de la Economía Social y Solidaria (ESS) como de la Economía Social, y se contrasta con el caso particular de Navarra (España). Para el análisis de dichas auditorías se utilizó un enfoque metodológico longitudinal, resultando del mismo una “foto” representativa del comportamiento de las empresas de REAS-Navarra a lo largo de los años (2009, 2011 y 2013). El estudio concluye que REAS-Navarra, si bien cumple con criterios defendidos desde la Economía Solidaria, presenta debilidades en cuanto a la metodología utilizada para auditar sus empresas, y de los resultados del análisis de las auditorías sociales se desprenden dudas respecto al nivel de autonomía y democracia en estas empresas, lo que puede significar un riesgo para su continuidad.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Este Trabajo Fin de Máster (TFM) propone la elaboración de una memoria proyecto de la unidad de hospitalización A de un centro monográfico de Cirugía Ortopédica y Traumatología (COT) integrado en un hospital general de nivel terciario. Se trata de una memoria con carácter retrospectivo que abarca desde Enero de 2013 hasta Diciembre de 2015. Una memoria que recoge un análisis de la situación junto con todos los aspectos de la nueva organización de la unidad y con propuestas de mejora futuras. Se realiza un análisis externo del modelo organizativo del sistema sanitario regional, del hospital general, de su centro monográfico de COT y de la unidad la cual está integrada en el mismo. El análisis interno ha supuesto una descripción pormenorizada de la unidad, tanto de espacio físico y recursos materiales como de recursos humanos y actividad asistencial junto con los cambios realizados en este periodo y las necesidades que se objetivan para los próximos años y que formarán el eje principal de la parte del proyecto de la presente memoria. Tras ambos análisis se realiza una matriz DAFO, método de ordenación de la información en cuatro categorías básicas: Debilidad, Amenaza, Fortaleza y Oportunidad, a partir del cual se iniciará un proceso de identificación de propuestas de mejora de cara a plantear acciones que se deberían poner en marcha para aprovechar las oportunidades detectadas y permitieran prepararse contra las amenazas teniendo conciencia de las debilidades y fortalezas.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Wydział Nauk Politycznych i Dziennikarstwa

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper explores the problem of protecting a site on the Internet against hostile external Java applets while allowing trusted internal applets to run. With careful implementation, a site can be made resistant to current Java security weaknesses as well as those yet to be discovered. In addition, we describe a new attack on certain sophisticated firewalls that is most effectively realized as a Java applet.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

With web caching and cache-related services like CDNs and edge services playing an increasingly significant role in the modern internet, the problem of the weak consistency and coherence provisions in current web protocols is becoming increasingly significant and drawing the attention of the standards community [LCD01]. Toward this end, we present definitions of consistency and coherence for web-like environments, that is, distributed client-server information systems where the semantics of interactions with resource are more general than the read/write operations found in memory hierarchies and distributed file systems. We then present a brief review of proposed mechanisms which strengthen the consistency of caches in the web, focusing upon their conceptual contributions and their weaknesses in real-world practice. These insights motivate a new mechanism, which we call "Basis Token Consistency" or BTC; when implemented at the server, this mechanism allows any client (independent of the presence and conformity of any intermediaries) to maintain a self-consistent view of the server's state. This is accomplished by annotating responses with additional per-resource application information which allows client caches to recognize the obsolescence of currently cached entities and identify responses from other caches which are already stale in light of what has already been seen. The mechanism requires no deviation from the existing client-server communication model, and does not require servers to maintain any additional per-client state. We discuss how our mechanism could be integrated into a fragment-assembling Content Management System (CMS), and present a simulation-driven performance comparison between the BTC algorithm and the use of the Time-To-Live (TTL) heuristic.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Financial time series convey the decisions and actions of a population of human actors over time. Econometric and regressive models have been developed in the past decades for analyzing these time series. More recently, biologically inspired artificial neural network models have been shown to overcome some of the main challenges of traditional techniques by better exploiting the non-linear, non-stationary, and oscillatory nature of noisy, chaotic human interactions. This review paper explores the options, benefits, and weaknesses of the various forms of artificial neural networks as compared with regression techniques in the field of financial time series analysis.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The human urge to represent the three-dimensional world using two-dimensional pictorial representations dates back at least to Paleolithic times. Artists from ancient to modern times have struggled to understand how a few contours or color patches on a flat surface can induce mental representations of a three-dimensional scene. This article summarizes some of the recent breakthroughs in scientifically understanding how the brain sees that shed light on these struggles. These breakthroughs illustrate how various artists have intuitively understand paradoxical properties about how the brain sees, and have used that understanding to create great art. These paradoxical properties arise from how the brain forms the units of conscious visual perception; namely, representations of three-dimensional boundaries and surfaces. Boundaries and surfaces are computed in parallel cortical processing streams that obey computationally complementary properties. These streams interact at multiple levels to overcome their complementary weaknesses and to transform their complementary properties into consistent percepts. The article describes how properties of complementary consistency have guided the creation of many great works of art.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A notable feature of the surveillance case law of the European Court of Human Rights has been the tendency of the Court to focus on the “in accordance with the law” aspect of the Article 8 ECHR inquiry. This focus has been the subject of some criticism, but the impact of this approach on the manner in which domestic surveillance legislation has been formulated in the Party States has received little scholarly attention. This thesis addresses that gap in the literature through its consideration of the Interception of Postal Packets and Telecommunications Messages (Regulation) Act, 1993 and the Criminal Justice (Surveillance) Act, 2009. While both Acts provide several of the safeguards endorsed by the European Court of Human Rights, this thesis finds that they suffer from a number of crucial weaknesses that undermine the protection of privacy. This thesis demonstrates how the focus of the European Court of Human Rights on the “in accordance with the law” test has resulted in some positive legislative change. Notwithstanding this fact, it is maintained that the legality approach has gained prominence at the expense of a full consideration of the “necessary in a democratic society” inquiry. This has resulted in superficial legislative responses at the domestic level, including from the Irish government. Notably, through the examination of a number of more recent cases, this project discerns a significant alteration in the interpretive approach adopted by the European Court of Human Rights regarding the application of the necessity test. The implications of this development are considered and the outlook for Irish surveillance legislation is assessed.