924 resultados para LOGGING SCENARIOS


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The distribution, systematics and ecology of Bactrocera tryoni, the Queensland fruit fly are reviewed. Bactrocera tryoni is a member of the B. tryoni complex of species, which currently includes four named species, viz. B. tryoni s.s., B. neohumeralis, B. melas and B. aquilonis. The species status of B. melas and B. aquilonis are unclear (they may be junior synonyms of B. tryoni) and their validity, or otherwise, needs to be confirmed as a matter of urgency. While Queensland fruit fly is regarded as a tropical species, it cannot be assumed that its distribution will spread further south under climate change scenarios. Increasing aridity and hot dry summers, as well as more complex, indirect interactions resulting from elevated CO2, make predicting the future distribution and abundance of B. tryoni difficult. The ecology of B. tryoni is reviewed with respect to current control approaches (with the exception of Sterile Insect Technique which is covered in a companion paper). We conclude that there are major gaps in the knowledge required to implement most non-insecticide based management approaches. Priority areas for future research include host plant interactions, protein and cue-lure foraging and use, spatial dynamics, development of new monitoring tools, investigating the use of natural enemies and better integration of fruit flies into general horticultural IPM systems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we present a control strategy design technique for an autonomous underwater vehicle based on solutions to the motion planning problem derived from differential geometric methods. The motion planning problem is motivated by the practical application of surveying the hull of a ship for implications of harbor and port security. In recent years, engineers and researchers have been collaborating on automating ship hull inspections by employing autonomous vehicles. Despite the progresses made, human intervention is still necessary at this stage. To increase the functionality of these autonomous systems, we focus on developing model-based control strategies for the survey missions around challenging regions, such as the bulbous bow region of a ship. Recent advances in differential geometry have given rise to the field of geometric control theory. This has proven to be an effective framework for control strategy design for mechanical systems, and has recently been extended to applications for underwater vehicles. Advantages of geometric control theory include the exploitation of symmetries and nonlinearities inherent to the system. Here, we examine the posed inspection problem from a path planning viewpoint, applying recently developed techniques from the field of differential geometric control theory to design the control strategies that steer the vehicle along the prescribed path. Three potential scenarios for surveying a ship?s bulbous bow region are motivated for path planning applications. For each scenario, we compute the control strategy and implement it onto a test-bed vehicle. Experimental results are analyzed and compared with theoretical predictions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

An autonomous underwater vehicle (AUV) is expected to operate in an ocean in the presence of poorly known disturbance forces and moments. The uncertainties of the environment makes it difficult to apply open-loop control scheme for the motion planning of the vehicle. The objective of this paper is to develop a robust feedback trajectory tracking control scheme for an AUV that can track a prescribed trajectory amidst such disturbances. We solve a general problem of feedback trajectory tracking of an AUV in SE(3). The feedback control scheme is derived using Lyapunov-type analysis. The results obtained from numerical simulations confirm the asymptotic tracking properties of the feedback control law. We apply the feedback control scheme to different mission scenarios, with the disturbances being initial errors in the state of the AUV.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Autonomous underwater vehicles (AUVs) are increasingly used, both in military and civilian applications. These vehicles are limited mainly by the intelligence we give them and the life of their batteries. Research is active to extend vehicle autonomy in both aspects. Our intent is to give the vehicle the ability to adapt its behavior under different mission scenarios (emergency maneuvers versus long duration monitoring). This involves a search for optimal trajectories minimizing time, energy or a combination of both. Despite some success stories in AUV control, optimal control is still a very underdeveloped area. Adaptive control research has contributed to cost minimization problems, but vehicle design has been the driving force for advancement in optimal control research. We look to advance the development of optimal control theory by expanding the motions along which AUVs travel. Traditionally, AUVs have taken the role of performing the long data gathering mission in the open ocean with little to no interaction with their surroundings, MacIver et al. (2004). The AUV is used to find the shipwreck, and the remotely operated vehicle (ROV) handles the exploration up close. AUV mission profiles of this sort are best suited through the use of a torpedo shaped AUV, Bertram and Alvarez (2006), since straight lines and minimal (0 deg - 30 deg) angular displacements are all that are necessary to perform the transects and grid lines for these applications. However, the torpedo shape AUV lacks the ability to perform low-speed maneuvers in cluttered environments, such as autonomous exploration close to the seabed and around obstacles, MacIver et al. (2004). Thus, we consider an agile vehicle capable of movement in six degrees of freedom without any preference of direction.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Internet presents a constantly evolving frontier for criminology and policing, especially in relation to online predators – paedophiles operating within the Internet for safer access to children, child pornography and networking opportunities with other online predators. The goals of this qualitative study are to undertake behavioural research – identify personality types and archetypes of online predators and compare and contrast them with behavioural profiles and other psychological research on offline paedophiles and sex offenders. It is also an endeavour to gather intelligence on the technological utilisation of online predators and conduct observational research on the social structures of online predator communities. These goals were achieved through the covert monitoring and logging of public activity within four Internet Relay Chat(rooms) (IRC) themed around child sexual abuse and which were located on the Undernet network. Five days of monitoring was conducted on these four chatrooms between Wednesday 1 to Sunday 5 April 2009; this raw data was collated and analysed. The analysis identified four personality types – the gentleman predator, the sadist, the businessman and the pretender – and eight archetypes consisting of the groomers, dealers, negotiators, roleplayers, networkers, chat requestors, posters and travellers. The characteristics and traits of these personality types and archetypes, which were extracted from the literature dealing with offline paedophiles and sex offenders, are detailed and contrasted against the online sexual predators identified within the chatrooms, revealing many similarities and interesting differences particularly with the businessman and pretender personality types. These personality types and archetypes were illustrated by selecting users who displayed the appropriate characteristics and tracking them through the four chatrooms, revealing intelligence data on the use of proxies servers – especially via the Tor software – and other security strategies such as Undernet’s host masking service. Name and age changes, which is used as a potential sexual grooming tactic was also revealed through the use of Analyst’s Notebook software and information on ISP information revealed the likelihood that many online predators were not using any safety mechanism and relying on the anonymity of the Internet. The activities of these online predators were analysed, especially in regards to child sexual grooming and the ‘posting’ of child pornography, which revealed a few of the methods in which online predators utilised new Internet technologies to sexually groom and abuse children – using technologies such as instant messengers, webcams and microphones – as well as store and disseminate illegal materials on image sharing websites and peer-to-peer software such as Gigatribe. Analysis of the social structures of the chatrooms was also carried out and the community functions and characteristics of each chatroom explored. The findings of this research have indicated several opportunities for further research. As a result of this research, recommendations are given on policy, prevention and response strategies with regards to online predators.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a method of voice activity detection (VAD) suitable for high noise scenarios, based on the fusion of two complementary systems. The first system uses a proposed non-Gaussianity score (NGS) feature based on normal probability testing. The second system employs a histogram distance score (HDS) feature that detects changes in the signal through conducting a template-based similarity measure between adjacent frames. The decision outputs by the two systems are then merged using an open-by-reconstruction fusion stage. Accuracy of the proposed method was compared to several baseline VAD methods on a database created using real recordings of a variety of high-noise environments.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Future air traffic management concepts often involve the proposal of automated separation management algorithms that replaces human air traffic controllers. This paper proposes a new type of automated separation management algorithm (based on the satisficing approach) that utilizes inter-aircraft communication and a track file manager (or bank of Kalman filters) that is capable of resolving conflicts during periods of communication failure. The proposed separation management algorithm is tested in a range of flight scenarios involving during periods of communication failure, in both simulation and flight test (flight tests were conducted as part of the Smart Skies project). The intention of the conducted flight tests was to investigate the benefits of using inter-aircraft communication to provide an extra layer of safety protection in support air traffic management during periods of failure of the communication network. These benefits were confirmed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Estimating potential health risks associated with recycled (reused) water is highly complex given the multiple factors affecting water quality. We take a conceptual model, which represents the factors and pathways by which recycled water may pose a risk of contracting gastroenteritis, convert the conceptual model to a Bayesian net, and quantify the model using one expert’s opinion. This allows us to make various predictions as to the risks posed under various scenarios. Bayesian nets provide an additional way of modeling the determinants of recycled water quality and elucidating their relative influence on a given disease outcome. The important contribution to Bayesian net methodology is that all model predictions, whether risk or relative risk estimates, are expressed as credible intervals.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In today's technological age, fraud has become more complicated, and increasingly more difficult to detect, especially when it is collusive in nature. Different fraud surveys showed that the median loss from collusive fraud is much greater than fraud perpetrated by a single person. Despite its prevalence and potentially devastating effects, collusion is commonly overlooked as an organizational risk. Internal auditors often fail to proactively consider collusion in their fraud assessment and detection efforts. In this paper, we consider fraud scenarios with collusion. We present six potentially collusive fraudulent behaviors and show their detection process in an ERP system. We have enhanced our fraud detection framework to utilize aggregation of different sources of logs in order to detect communication and have further enhanced it to render it system-agnostic thus achieving portability and making it generally applicable to all ERP systems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

One of the research focuses in the integer least squares problem is the decorrelation technique to reduce the number of integer parameter search candidates and improve the efficiency of the integer parameter search method. It remains as a challenging issue for determining carrier phase ambiguities and plays a critical role in the future of GNSS high precise positioning area. Currently, there are three main decorrelation techniques being employed: the integer Gaussian decorrelation, the Lenstra–Lenstra–Lovász (LLL) algorithm and the inverse integer Cholesky decorrelation (IICD) method. Although the performance of these three state-of-the-art methods have been proved and demonstrated, there is still a potential for further improvements. To measure the performance of decorrelation techniques, the condition number is usually used as the criterion. Additionally, the number of grid points in the search space can be directly utilized as a performance measure as it denotes the size of search space. However, a smaller initial volume of the search ellipsoid does not always represent a smaller number of candidates. This research has proposed a modified inverse integer Cholesky decorrelation (MIICD) method which improves the decorrelation performance over the other three techniques. The decorrelation performance of these methods was evaluated based on the condition number of the decorrelation matrix, the number of search candidates and the initial volume of search space. Additionally, the success rate of decorrelated ambiguities was calculated for all different methods to investigate the performance of ambiguity validation. The performance of different decorrelation methods was tested and compared using both simulation and real data. The simulation experiment scenarios employ the isotropic probabilistic model using a predetermined eigenvalue and without any geometry or weighting system constraints. MIICD method outperformed other three methods with conditioning improvements over LAMBDA method by 78.33% and 81.67% without and with eigenvalue constraint respectively. The real data experiment scenarios involve both the single constellation system case and dual constellations system case. Experimental results demonstrate that by comparing with LAMBDA, MIICD method can significantly improve the efficiency of reducing the condition number by 78.65% and 97.78% in the case of single constellation and dual constellations respectively. It also shows improvements in the number of search candidate points by 98.92% and 100% in single constellation case and dual constellations case.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a method of voice activity detection (VAD) for high noise scenarios, using a noise robust voiced speech detection feature. The developed method is based on the fusion of two systems. The first system utilises the maximum peak of the normalised time-domain autocorrelation function (MaxPeak). The second zone system uses a novel combination of cross-correlation and zero-crossing rate of the normalised autocorrelation to approximate a measure of signal pitch and periodicity (CrossCorr) that is hypothesised to be noise robust. The score outputs by the two systems are then merged using weighted sum fusion to create the proposed autocorrelation zero-crossing rate (AZR) VAD. Accuracy of AZR was compared to state of the art and standardised VAD methods and was shown to outperform the best performing system with an average relative improvement of 24.8% in half-total error rate (HTER) on the QUT-NOISE-TIMIT database created using real recordings from high-noise environments.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Algebuckina Waterhole exists as a permanent waterhole near a north-south dirt road and an old trainline on the Oodnadatta Track - lines that once opened up the arid lands of central South Australia but are now bypassed. It also exists as the final and largest freshwater waterhole at the end of the Neales River system. It is a critical biodiversity site, a cultural place and a working environment. It is seen to need a resilient management plan that encompasses diverse interests and impacts. Its managers sense that the theories and practices emerging out of landscape disciplinary systems may be of help. Work-in-progress research towards a management methodology are presented through posing scenarios on how landscape thinking and design, informed by an emergent textual and visual lexicon for water landscapes, can intersect with scientific fieldwork to produce useful and transferable outcomes for Algebuckina.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper reveals the interior landscapes of selected contemporary Australian films, such as The Caterpillar Wish and Bad Boy Bubby, to develop a number of thematic influences on the manner in which domestic and private lives are constructed through filmic imagination. The research uncovers the conditions that contribute to particular scenographic representations of the humble interiors that act as both backdrop and performer to subtle and often troubled narratives. Such readings are informed by the theoretical works of writer Gertrude Stein, among others, who explore the relationships between the scenographic third dimension and the fourth dimensional performance in the representation of narrative space. A further theoretical thread lies in Giuliana Bruno’s work on the tension between private and public filmic space, which is explored through the public outing of intensely private spaces generated through narratives framed by the specificities of found interiors. Beyond the interrogation of qualities of imagined filmic space is the condition whereby locations, once transformed by the event of movie making are consequently forever revised. These altered conditions subsequently reinvest the lives of those who return to the location with layered narratives of occupation. Situationally, the now reconverted interior performs as contributor to subsequent private inhabitation, even if only as imagined space. The possibility here is that the qualities of the original may be superimposed and recontextualised to invest post-produced interiors with the qualities of the other space as imagined. This reading of film space explores new theoretical design scenarios for imagined and everyday interior landscapes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Pedestrian movement is known to cause significant effects on indoor MIMO channels. In this paper, a statistical characterization of the indoor MIMO-OFDM channel subject ot pedestrian movement is reported. The experiment used 4 sending and 4 receiving antennas and 114 sub-carriers at 5.2 GHz. Measurement scenarios varied from zero to ten pedestrians walking randomly between transmitter (tx) and receiver (Rx) arrays. The empirical cumulative distribution function (CDF) of the received fading envelope fits the Ricean distribution with K factors ranging from 7dB to 15 dB, for the 10 pedestrians and vacant scenarios respectively. In general, as the number of pedestrians increase, the CDF slope tends to decrease proportionally. Furthermore, as the number of pedestrians increase, increasing multipath contribution, the dynamic range of channel capacity increases proportionally. These results are consistent with measurement results obtained in controlled scenarios for a fixed narrowband Single-Input Single-Output (SISO) link at 5.2 GHz in previous work. The described empirical characterization provides an insight into the prediction of human-body shadowing effects for indoor MIMO-OFDM channels at 5.2 GHz.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A key concern in the field of contemporary fashion/textiles design is the emergence of ‘fast fashion’: best explained as "buy it Friday, wear it Saturday and throw it away on Sunday" (O'Loughlin, 2007). In this contemporary retail atmosphere of “pile it high: sell it cheap” and “quick to market”, even designer goods have achieved a throwaway status. This modern culture of consumerism is the antithesis of sustainability and is proving a dilemma surrounding sustainable practice for designers and producers in the disciplines (de Blas, 2010). Design researchers including those in textiles/fashion have begun to explore what is a key question in the 21st century in order to create a vision and reason for their disciplines: Can products be designed to have added value to the consumer and hence contribute to a more sustainable industry? Fashion Textiles Design has much to answer for in contributing to the problems of unsustainable practices on a global scale in design, production and waste. However, designers within this field also have great potential to contribute to practical ‘real world’ solutions. ----- ----- This paper provides an overview of some of the design and technological developments from the fashion/textiles industry, endorsing a model where designers and technicians use their transferrable skills for wellbeing rather than desire. Smart materials in the form of responsive and adaptive fibres and fabrics combined with electro active devices, and ICT are increasingly shaping many aspects of society particularly in the leisure industry and interactive consumer products are ever more visible in healthcare. Combinations of biocompatible delivery devices with bio sensing elements can create analyse, sense and actuate early warning and monitoring systems which can be linked to data logging and patient records via intelligent networks. Patient sympathetic, ‘smart’ fashion/textiles applications based on interdisciplinary expertise utilising textiles design and technology is emerging. An analysis of a series of case studies demonstrates the potential of fashion textiles design practitioners to exploit the concept of value adding through technological garment and textiles applications and enhancement for health and wellbeing and in doing so contribute to a more sustainable future fashion/textiles design industry.