883 resultados para intelligent tutoring systems, student modelling, individualised feedback, rapid application development, Microsoft Access
Resumo:
En route speed reduction can be used for air traffic flow management (ATFM), e.g., delaying aircraft while airborne or realizing metering at an arrival fix. In previous publications, the authors identified the flight conditions that maximize the airborne delay without incurring extra fuel consumption with respect to the nominal (not delayed) flight. In this paper, the effect of wind on this strategy is studied, and the sensitivity to wind forecast errors is also assessed. A case study done in Chicago O’Hare airport (ORD) is presented, showing that wind has a significant effect on the airborne delay that can be realized and that, in some cases, even tailwinds might lead to an increase in the maximum amount of airborne delay. The values of airborne delay are representative enough to suggest that this speed reduction technique might be useful in a real operational scenario. Moreover, the speed reduction strategy is more robust than nominal operations against fuel consumption in the presence of wind forecast uncertainties.
Resumo:
Little attention in literature so far has been given to the impact of feedback on organizational development and change. As well as the impact of feedback on the innovation power of organizations. The capacity of innovation of organizations however may be seen as a crucial capacity of organizations to survive in competitive markets. Prior studies towards the impacts of feedback have more often analyzed formal and informal feedback separately, other than analyzing them together in one study. This master thesis develops and explores a model to assess the possible impact of both formal and informal feedback on the capacity of innovation within organizations. The master thesis is the closing assignment of a Master Study Management at the Open Universiteit Nederland. The general question of the single-case study is: What is the impact of formal and informal feedback on the capacity of innovation of companies? The explored model in the study is a combination of the model of Lawson and Samson (2001) about the capacity of innovation and the framework model of Pitkänen and Lukka (2011) about formal and informal feedback. The single-case study is performed at Yellowbrick, a Dutch company which offers consumers an online parking service, suitable for the use on smartphones. The single-case study is performed twofold by semi-structured interviews and a survey. Although conclusions may not be generalized, because of the limitations of the study and the particularly small investigated group, some findings may be suitable for further investigation. In the study was found that feedback has an impact on the capacity of innovation. Formal feedback scored higher than informal feedback when asked about the impact on the capacity of innovation. The study also found multiple ‘new’ kinds of feedback used by organizations, other than the more ‘traditional’ forms of feedback, such as team meetings and bilateral meetings. Further on was analyzed that when employees find themselves more involved in the process of an innovation, they also seem to score the organization higher on the capacity of this innovation.
Resumo:
Motivated by environmental protection concerns, monitoring the flue gas of thermal power plant is now often mandatory due to the need to ensure that emission levels stay within safe limits. Optical based gas sensing systems are increasingly employed for this purpose, with regression techniques used to relate gas optical absorption spectra to the concentrations of specific gas components of interest (NOx, SO2 etc.). Accurately predicting gas concentrations from absorption spectra remains a challenging problem due to the presence of nonlinearities in the relationships and the high-dimensional and correlated nature of the spectral data. This article proposes a generalized fuzzy linguistic model (GFLM) to address this challenge. The GFLM is made up of a series of “If-Then” fuzzy rules. The absorption spectra are input variables in the rule antecedent. The rule consequent is a general nonlinear polynomial function of the absorption spectra. Model parameters are estimated using least squares and gradient descent optimization algorithms. The performance of GFLM is compared with other traditional prediction models, such as partial least squares, support vector machines, multilayer perceptron neural networks and radial basis function networks, for two real flue gas spectral datasets: one from a coal-fired power plant and one from a gas-fired power plant. The experimental results show that the generalized fuzzy linguistic model has good predictive ability, and is competitive with alternative approaches, while having the added advantage of providing an interpretable model.
Resumo:
Motivated by environmental protection concerns, monitoring the flue gas of thermal power plant is now often mandatory due to the need to ensure that emission levels stay within safe limits. Optical based gas sensing systems are increasingly employed for this purpose, with regression techniques used to relate gas optical absorption spectra to the concentrations of specific gas components of interest (NOx, SO2 etc.). Accurately predicting gas concentrations from absorption spectra remains a challenging problem due to the presence of nonlinearities in the relationships and the high-dimensional and correlated nature of the spectral data. This article proposes a generalized fuzzy linguistic model (GFLM) to address this challenge. The GFLM is made up of a series of “If-Then” fuzzy rules. The absorption spectra are input variables in the rule antecedent. The rule consequent is a general nonlinear polynomial function of the absorption spectra. Model parameters are estimated using least squares and gradient descent optimization algorithms. The performance of GFLM is compared with other traditional prediction models, such as partial least squares, support vector machines, multilayer perceptron neural networks and radial basis function networks, for two real flue gas spectral datasets: one from a coal-fired power plant and one from a gas-fired power plant. The experimental results show that the generalized fuzzy linguistic model has good predictive ability, and is competitive with alternative approaches, while having the added advantage of providing an interpretable model.
Resumo:
Crossroads 2000 was the second biennial transportation research conference cosponsored by the Center for Transportation Research and Education (CTRE) at Iowa State University and the Iowa Department of Transportation. This proceedings is the set of papers presented at the conference. Twenty-five categories of papers were presented in five concurrent sessions. Reflecting the increasingly critical role of intelligent transportation systems (ITS) in maintaining and enhancing transportation safety and efficiency, one category in each concurrent session addressed an area of ITS. However, papers were included from all areas of interest, ranging from transportation infrastructure design to transportation policy. The proceedings contains 58 papers.
Resumo:
Thesis (Master's)--University of Washington, 2016-08
Resumo:
Background to the Momentum project : PSS1 (Sept 2014 - July 2016): funded by HEFCE to promote Postgraduate Education and Employability. A discussion of group demographics, student experience, employer feedback, and enterprise creation through the establishment of the University of Worcester Business Incubator. The presentation concludes with a number of lessons learned from the project.
Resumo:
The paper describes the strategies for Congestion and Incident Management (CIM) on the basis of Automatic Congestion and Incident Detection (ACID) that COSMOS will develop, implement in SCOOT, UTOPIA and MOTION, and validate and demonstrate in London, Piraeus and Torino. Four levels of operation were defined for CIM: strategies, tactics, tools and realisation. The strategies for CIM form the top level of this hierarchy. They have to reflect the strategic requirements of the system operators. The tactics are the means that can be employed by the strategies to achieve particular goals in particular situations. The tools that are used by the tactics relate to the elements of the signal plan and the ways in which they can be modified. Strategies, tactics and tools are generally common to all three systems, while the realisation of individual strategies and tactical decisions, through the use of particular common sets of tools, will generally be system specific. For the covering abstract, see IRRD 490001.
Resumo:
Over the last decade, a new idea challenging the classical self-non-self viewpoint has become popular amongst immunologists. It is called the Danger Theory. In this conceptual paper, we look at this theory from the perspective of Artificial Immune System practitioners. An overview of the Danger Theory is presented with particular emphasis on analogies in the Artificial Immune Systems world. A number of potential application areas are then used to provide a framing for a critical assessment of the concept, and its relevance for Artificial Immune Systems.
Resumo:
INTRODUCTION In recent years computer systems have become increasingly complex and consequently the challenge of protecting these systems has become increasingly difficult. Various techniques have been implemented to counteract the misuse of computer systems in the form of firewalls, antivirus software and intrusion detection systems. The complexity of networks and dynamic nature of computer systems leaves current methods with significant room for improvement. Computer scientists have recently drawn inspiration from mechanisms found in biological systems and, in the context of computer security, have focused on the human immune system (HIS). The human immune system provides an example of a robust, distributed system that provides a high level of protection from constant attacks. By examining the precise mechanisms of the human immune system, it is hoped the paradigm will improve the performance of real intrusion detection systems. This paper presents an introduction to recent developments in the field of immunology. It discusses the incorporation of a novel immunological paradigm, Danger Theory, and how this concept is inspiring artificial immune systems (AIS). Applications within the context of computer security are outlined drawing direct reference to the underlying principles of Danger Theory and finally, the current state of intrusion detection systems is discussed and improvements suggested.
Resumo:
Ultrasonic tomography is a powerful tool for identifying defects within an object or structure. This method can be applied on structures where x-ray tomography is impractical due to size, low contrast, or safety concerns. By taking many ultrasonic pulse velocity (UPV) readings through the object, an image of the internal velocity variations can be constructed. Air-coupled UPV can allow for more automated and rapid collection of data for tomography of concrete. This research aims to integrate recent developments in air-coupled ultrasonic measurements with advanced tomography technology and apply them to concrete structures. First, non-contact and semi-contact sensor systems are developed for making rapid and accurate UPV measurements through PVC and concrete test samples. A customized tomographic reconstruction program is developed to provide full control over the imaging process including full and reduced spectrum tomographs with percent error and ray density calculations. Finite element models are also used to determine optimal measurement configurations and analysis procedures for efficient data collection and processing. Non-contact UPV is then implemented to image various inclusions within 6 inch (152 mm) PVC and concrete cylinders. Although there is some difficulty in identifying high velocity inclusions, reconstruction error values were in the range of 1.1-1.7% for PVC and 3.6% for concrete. Based upon the success of those tests, further data are collected using non-contact, semi-contact, and full contact measurements to image 12 inch (305 mm) square concrete cross-sections with 1 inch (25 mm) reinforcing bars and 2 inch (51 mm) square embedded damage regions. Due to higher noise levels in collected signals, tomographs of these larger specimens show reconstruction error values in the range of 10-18%. Finally, issues related to the application of these techniques to full-scale concrete structures are discussed.
Resumo:
INTRODUCTION In recent years computer systems have become increasingly complex and consequently the challenge of protecting these systems has become increasingly difficult. Various techniques have been implemented to counteract the misuse of computer systems in the form of firewalls, antivirus software and intrusion detection systems. The complexity of networks and dynamic nature of computer systems leaves current methods with significant room for improvement. Computer scientists have recently drawn inspiration from mechanisms found in biological systems and, in the context of computer security, have focused on the human immune system (HIS). The human immune system provides an example of a robust, distributed system that provides a high level of protection from constant attacks. By examining the precise mechanisms of the human immune system, it is hoped the paradigm will improve the performance of real intrusion detection systems. This paper presents an introduction to recent developments in the field of immunology. It discusses the incorporation of a novel immunological paradigm, Danger Theory, and how this concept is inspiring artificial immune systems (AIS). Applications within the context of computer security are outlined drawing direct reference to the underlying principles of Danger Theory and finally, the current state of intrusion detection systems is discussed and improvements suggested.
Resumo:
Over the last decade, a new idea challenging the classical self-non-self viewpoint has become popular amongst immunologists. It is called the Danger Theory. In this conceptual paper, we look at this theory from the perspective of Artificial Immune System practitioners. An overview of the Danger Theory is presented with particular emphasis on analogies in the Artificial Immune Systems world. A number of potential application areas are then used to provide a framing for a critical assessment of the concept, and its relevance for Artificial Immune Systems.
Resumo:
Over the last decade, a new idea challenging the classical self-non-self viewpoint has become popular amongst immunologists. It is called the Danger Theory. In this conceptual paper, we look at this theory from the perspective of Artificial Immune System practitioners. An overview of the Danger Theory is presented with particular emphasis on analogies in the Artificial Immune Systems world. A number of potential application areas are then used to provide a framing for a critical assessment of the concept, and its relevance for Artificial Immune Systems. Notes: Uwe Aickelin, Department of Computing, University of Bradford, Bradford, BD7 1DP
Resumo:
In this thesis, we present a quantitative approach using probabilistic verification techniques for the analysis of reliability, availability, maintainability, and safety (RAMS) properties of satellite systems. The subject of our research is satellites used in mission critical industrial applications. A strong case for using probabilistic model checking to support RAMS analysis of satellite systems is made by our verification results. This study is intended to build a foundation to help reliability engineers with a basic background in model checking to apply probabilistic model checking to small satellite systems. We make two major contributions. One of these is the approach of RAMS analysis to satellite systems. In the past, RAMS analysis has been extensively applied to the field of electrical and electronics engineering. It allows system designers and reliability engineers to predict the likelihood of failures from the indication of historical or current operational data. There is a high potential for the application of RAMS analysis in the field of space science and engineering. However, there is a lack of standardisation and suitable procedures for the correct study of RAMS characteristics for satellite systems. This thesis considers the promising application of RAMS analysis to the case of satellite design, use, and maintenance, focusing on its system segments. Data collection and verification procedures are discussed, and a number of considerations are also presented on how to predict the probability of failure. Our second contribution is leveraging the power of probabilistic model checking to analyse satellite systems. We present techniques for analysing satellite systems that differ from the more common quantitative approaches based on traditional simulation and testing. These techniques have not been applied in this context before. We present the use of probabilistic techniques via a suite of detailed examples, together with their analysis. Our presentation is done in an incremental manner: in terms of complexity of application domains and system models, and a detailed PRISM model of each scenario. We also provide results from practical work together with a discussion about future improvements.