934 resultados para Box constrained minimization
Resumo:
This paper describes a study of the theoretical and experimental behaviour of box-columns of varying b/t ratios under loadings of axial compression and torsion and their combinations. Details of the testing rigs and the testing methods, the results obtained such as the load-deflection curves and the interaction diagrams, and experimental observations regarding the behaviour of box-models and the types of local plastic mechanisms associated with each type of loading are presented. A simplified rigid-plastic analysis is carried out to study the collapse behaviour of box-columns under these loadings, based on the observed plastic mechanisms, and the results are compared with those of experiments.
Resumo:
Evidence suggests that both nascent and young firms (henceforth: “new firms”)—despite typically being small and resource-constrained—are sometimes able to innovate effectively. Such firms are seldom able to invest in lengthy and expensive development processes, which suggests that they may frequently rely instead on other pathways to generate innovativeness within the firm. In this paper, we develop and test arguments that “bricolage,” defined as making do by applying combinations of the resources at hand to new problems and opportunities, provides an important pathway to achieve innovation for new resource-constrained firms. Through bricolage, resource-constrained firms engage in the processes of “recombination” that are core to creating innovative outcomes. Based on a large longitudinal dataset, our results suggest that variations in the degree to which firms engage in bricolage behaviors can provide a broadly applicable explanation of innovativeness under resource constraints by new firms. We find no general support for our competing hypothesis that the positive effects may level off or even turn negative at high levels of bricolage..
Resumo:
This thesis examined the possible role of Y-box binding protein 1 (YBX1) in prostate cancer aggression and spread. Novel roles were uncovered for YBX1 in the regulation of several genes previously implicated in prostate cancer, as well as showing an effect for YBX1 in increasing tumour cell invasion and movement and reciprocal regulation of androgen-regulated gene networks. In addition, it was found that Y-box 1 regulated several other well-known cancer genes implicated in breast and other cancers. The work performed in this thesis has strengthened the foundations for pursuing YBX1 as a possible central target molecule in prostate cancer therapeutics.
Resumo:
To enhance the performance of the k-nearest neighbors approach in forecasting short-term traffic volume, this paper proposed and tested a two-step approach with the ability of forecasting multiple steps. In selecting k-nearest neighbors, a time constraint window is introduced, and then local minima of the distances between the state vectors are ranked to avoid overlappings among candidates. Moreover, to control extreme values’ undesirable impact, a novel algorithm with attractive analytical features is developed based on the principle component. The enhanced KNN method has been evaluated using the field data, and our comparison analysis shows that it outperformed the competing algorithms in most cases.
Resumo:
This paper presents an efficient algorithm for multi-objective distribution feeder reconfiguration based on Modified Honey Bee Mating Optimization (MHBMO) approach. The main objective of the Distribution feeder reconfiguration (DFR) is to minimize the real power loss, deviation of the nodes’ voltage. Because of the fact that the objectives are different and no commensurable, it is difficult to solve the problem by conventional approaches that may optimize a single objective. So the metahuristic algorithm has been applied to this problem. This paper describes the full algorithm to Objective functions paid, The results of simulations on a 32 bus distribution system is given and shown high accuracy and optimize the proposed algorithm in power loss minimization.
Resumo:
In this paper, we address the control design problem of positioning of over-actuated marine vehicles with control allocation. The proposed design is based on a combined position and velocity loops in a multi-variable anti-windup implementation together with a control allocation mapping. The vehicle modelling is considered with appropriate simplifications related to low-speed manoeuvring hydrodynamics and vehicle symmetry. The control design is considered together with a control allocation mapping. We derive analytical tuning rules based on requirements of closed-loop stability and performance. The anti- windup implementation of the controller is obtained by mapping the actuator-force constraint set into a constraint set for the generalized forces. This approach ensures that actuation capacity is not violated by constraining the generalized control forces; thus, the control allocation is simplified since it can be formulated as an unconstrained problem. The mapping can also be modified on-line based on actuator availability to provide actuator-failure accommodation. We provide a proof of the closed-loop stability and illustrate the performance using simulation scenarios for an open-frame underwater vehicle.
Resumo:
Most previous work on unconditionally secure multiparty computation has focused on computing over a finite field (or ring). Multiparty computation over other algebraic structures has not received much attention, but is an interesting topic whose study may provide new and improved tools for certain applications. At CRYPTO 2007, Desmedt et al introduced a construction for a passive-secure multiparty multiplication protocol for black-box groups, reducing it to a certain graph coloring problem, leaving as an open problem to achieve security against active attacks. We present the first n-party protocol for unconditionally secure multiparty computation over a black-box group which is secure under an active attack model, tolerating any adversary structure Δ satisfying the Q 3 property (in which no union of three subsets from Δ covers the whole player set), which is known to be necessary for achieving security in the active setting. Our protocol uses Maurer’s Verifiable Secret Sharing (VSS) but preserves the essential simplicity of the graph-based approach of Desmedt et al, which avoids each shareholder having to rerun the full VSS protocol after each local computation. A corollary of our result is a new active-secure protocol for general multiparty computation of an arbitrary Boolean circuit.
Resumo:
Despite the fact that Australia is a socially progressive country and boasts one of the largest Gender Dysphoria Clinics in the Southern Hemisphere, delivering services for almost four decades, Australian Governments fail to arrive at any consensus on the legal and human rights approaches to Trans*people. The subsequent lack of recognition does little more than increase the levels of frustration of and the continued discrimination to Trans*people, including adverse mental health problems, in this country. The purpose of this presentation is to provide an overview of the Australian systems that govern Trans*people and to identify how Trans*identities are manipulated in our Federal system of government; a system which offers little to protect the human rights of Trans*people. In order to contextualise the Australian situation, I commence with a brief description on the layers of government which will include how Australian Trans*people are currently protected under the law in those jurisdictions. I then present some of the impracticalities endured by the transitioning individual (single or married) including change of documentation and legal gender status before, during and after surgical transition for both those born on and off shore. This presentation will also include discussion of legislation that has been described by Trans*advocates as “Gesture”, “Cart before the Horse” and “Harmful”. I will conclude with a way forward by suggesting the development of a coordinated all of government approach in consultation with key stakeholders for “Trans* Friendly Legislation” to improve the human and legal rights, and ultimately the health and wellbeing of Australian Trans*identities.
Resumo:
Australia is a difficult market for horror movies. Particularly in recent years, Australia has been regarded as a graveyard for many horror films released theatrically. This is not to say that Australians have not enjoyed the occasional scary movie on the big screen. But what types of horror films have been popular with Australian audiences at the box-office remains poorly understood. Horror films revolve around monsters, the fear of death and the transgression of boundaries, and they aim to scare audiences through ‘gross-out’ or ‘creep-out’ factors (some combine both). The former refers to shocking and graphic portrayals of gore and violence – as seen in the sadistic torture of backpackers in Hostel (Eli Roth, 2005), which depicts limbs being hacked off and eyes being cut from nerve endings. The latter refers to the crafting of fear through mood and suspense without explicit bloodshed, achieved brilliantly in The Sixth Sense’s (M Night Shyamalan, 1999) chilling encounters with ‘dead people’. In creep-out films, it is often what viewers don’t see that is most disturbing. Using an analysis of the top fifty films each year at the Australian box office from 1992 to 2012, this article identifies the most successful horror movies over this period to ascertain what types of horror movies – with reference to creep-out and gross-out factors – have been most popular with domestic audiences.
Resumo:
In this research, we introduce an approach to enhance the discriminative capability of features by employing image-to-image variation minimization. In order to minimize image-to-image variation, we will estimate the cover image from the stego image by decompressing the stego image, transforming the decompressed image and recompressing back. Since the effect of the embedding operation in an image steganography is actually a noise adding process to the image, applying these three processes will smooth out the noise and hence the estimated cover image can be obtained.
Resumo:
An ubiquitous problem in control system design is that the system must operate subject to various constraints. Although the topic of constrained control has a long history in practice, there have been recent significant advances in the supporting theory. In this chapter, we give an introduction to constrained control. In particular, we describe contemporary work which shows that the constrained optimal control problem for discrete-time systems has an interesting geometric structure and a simple local solution. We also discuss issues associated with the output feedback solution to this class of problems, and the implication of these results in the closely related problem of anti-windup. As an application, we address the problem of rudder roll stabilization for ships.
Resumo:
In moderate to high sea states, the effectiveness of ship fin stabilizers can severely deteriorate due to nonlinear effects arising from unsteady hydrodynamic characteristics of the fins: dynamic stall. These nonlinear effects take the form of a hysteresis, and they become very significant when the effective angle of attack of the fins exceeds a certain threshold angle. Dynamic stall can result in a complete loss of control action depending on how much the fins exceed the threshold angle. When this is detected, it is common to reduce the gain of the controller that commands the fins. This approach is cautious and tends to reduce performance when the conditions leading to dynamic stall disappear. An alternative approach for preventing the effects while keeping high performance, consists of estimating the effective angle of attack and set a conservative constraint on it as part of the control objectives. In this paper, we investigate the latter approach, and propose the use of a model predictive control (MPC) to prevent the development of these nonlinear effects by considering constraints on both the mechanical angle of the fins and the effective angle of attack.
Resumo:
We address the problem of finite horizon optimal control of discrete-time linear systems with input constraints and uncertainty. The uncertainty for the problem analysed is related to incomplete state information (output feedback) and stochastic disturbances. We analyse the complexities associated with finding optimal solutions. We also consider two suboptimal strategies that could be employed for larger optimization horizons.
A low-complexity flight controller for Unmanned Aircraft Systems with constrained control allocation
Resumo:
In this paper, we propose a framework for joint allocation and constrained control design of flight controllers for Unmanned Aircraft Systems (UAS). The actuator configuration is used to map actuator constraint set into the space of the aircraft generalised forces. By constraining the demanded generalised forces, we ensure that the allocation problem is always feasible; and therefore, it can be solved without constraints. This leads to an allocation problem that does not require on-line numerical optimisation. Furthermore, since the controller handles the constraints, and there is no need to implement heuristics to inform the controller about actuator saturation. The latter is fundamental for avoiding Pilot Induced Oscillations (PIO) in remotely operated UAS due to the rate limit on the aircraft control surfaces.
Resumo:
With the growing size and variety of social media files on the web, it’s becoming critical to efficiently organize them into clusters for further processing. This paper presents a novel scalable constrained document clustering method that harnesses the power of search engines capable of dealing with large text data. Instead of calculating distance between the documents and all of the clusters’ centroids, a neighborhood of best cluster candidates is chosen using a document ranking scheme. To make the method faster and less memory dependable, the in-memory and in-database processing are combined in a semi-incremental manner. This method has been extensively tested in the social event detection application. Empirical analysis shows that the proposed method is efficient both in computation and memory usage while producing notable accuracy.