943 resultados para Branch and bounds
Resumo:
In the Iberian Variscides several first order arcuate structures have been considered. In spite of being highly studied their characterization, formation mechanisms and even existence is still debatable. Themain Ibero-Armorican Arc (IAA) is essentially defined by a predominantNW–SE trend in the Iberian branch and an E–Wtrend in the Brittany one. However, in northern Spain it presents a 180° rotation, sometimes known as the Cantabrian Arc (CA). The relation between both arcs is controversial, being considered either as a single arc due to one tectonic event, or as the result of a polyphasic process. According to the last assumption, there is a later arcuate structure (CA), overlapping a previousmajor one (IAA). Whatever themodels, they must be able to explain the presence of a Variscan sinistral transpression in Iberia and a dextral one in Armorica, and a deformation spanning from the Devonian to the Upper Carboniferous. Another arcuate structure, in continuity with the CA, the Central-Iberian Arc (CIA) was recently proposed mainly based upon on magnetic anomalies, geometry of major folds and Ordovician paleocurrents. The critical review of the structural, stratigraphic and geophysical data supports both the IAA and the CA, but as independent structures. However, the presence of a CIA is highly questionable and could not be supported. The complex strain pattern of the IAA and the CA could be explained by a Devonian — Carboniferous polyphasic indentation of a Gondwana promontory. In thismodel the CA is essentially a thin-skinned arc,while the IAA has a more complex and longer evolution that has led to a thick-skinned first order structure. Nevertheless, both arcs are essentially the result of a lithospheric bending process during the Iberian Variscides.
Resumo:
The obtaining of a compact plant, with less vigor and high productivity, equivalent to a conventional plant, constitutes a strong tendency in the current horticulture, aiming at a raising of the fruit production at the same planted area. One of the techniques that have had success nowadays is the interstem use. This study was developed in a commercial orchard of Randon Agro Silvo Pastoril S.A. (RASIP), located in the Rio Grande do Sul state, Brazil. The purpose of this work was to evaluate the vegetative and productive development of apple trees of 'Imperial Gala' with different lengths of EM-9 interstem. The treatments consisted of five interstem lengths: 10, 15, 20, 25, 30 cm. In the seventh year of implantation the following parameters were evaluated: the height of the plant, the diameter of the 'Imperial Gala' 5 cm above the second graft point, the volume of the tree-head (height, width and length), the number of bud per branch, and the number of fruits per lineal centimeter of branch. Through this study it could be concluded that the greater interstem (30 cm) presented better indices with relation of vigor control. However, the number of fruits per lineal centimeter of branch with the interstem of 10 cm offered only significant superiority, when compared with the interstem of 30 cm. Using interstem technique allows to gather the benefits of the rootstock 'Marubakaido' and to control excessive vigour with the interstem EM-9.
Resumo:
As the acceptance and popularity of wireless networking technologies has proliferated, the security of the IEEE 802.11 wireless local area network (WLAN) has advanced in leaps and bounds. From tenuous beginnings, where the only safe way to deploy a WLAN was to assume it was hostile and employ higherlayer information security controls, to the current state of the art, all manner of improvements have been conceived and many implemented. This work investigates some of the remaining issues surrounding IEEE 802.11 WLAN operation. While the inherent issues in WLAN deployments and the problems of the original Wired Equivalent Privacy (WEP) provisions are well known and widely documented, there still exist a number of unresolved security issues. These include the security of management and control frames and the data link layer protocols themselves. This research introduces a novel proposal to enhance security at the link layer of IEEE 802.11 WLANs and then conducts detailed theoretical and empirical investigation and analysis of the eects of such proposals. This thesis �rst de�nes the state of the art in WLAN technology and deployment, including an overview of the current and emerging standards, the various threats, numerous vulnerabilities and current exploits. The IEEE 802.11i MAC security enhancements are discussed in detail, along with the likely outcomes of the IEEE 802.11 Task Group W1, looking into protected management frames. The problems of the remaining unprotected management frames, the unprotected control frames and the unprotected link layer headers are reviewed and a solution is hypothesised, to encrypt the entire MAC Protocol Data Unit (MPDU), including the MAC headers, not just the MAC Service Data Unit (MSDU) commonly performed by existing protocols. The proposal is not just to encrypt a copy of the headers while still using cleartext addresses to deliver the frame, as used by some existing protocols to support the integrity and authenticity of the headers, but to pass the entire MPDU only as ciphertext to also support the con�dentiality of the frame header information. This necessitates the decryption of every received frame using every available key before a station can determine if it is the intended recipient. As such, this raises serious concerns as to the viability of any such proposal due to the likely impact on throughput and scalability. The bulk of the research investigates the impacts of such proposals on the current WLAN protocols. Some possible variations to the proposal are also provided to enhance both utility and speed. The viability this proposal with respect to the eect on network throughput is then tested using a well known and respected network simulation tool, along with a number of analysis tools developed speci�cally for the data generated here. The simulator's operation is �rst validated against recognised test outputs, before a comprehensive set of control data is established, and then the proposal is tested and and compared against the controls. This detailed analysis of the various simulations should be of bene�t to other researchers who need to validate simulation results. The analysis of these tests indicate areas of immediate improvement and so the protocols are adjusted and a further series of experiments conducted. These �nal results are again analysed in detail and �nal appraisals provided.
Resumo:
In open railway access markets, a train service provider (TSP) negotiates with an infrastructure provider (IP) for track access rights. This negotiation has been modeled by a multi-agent system (MAS) in which the IP and TSP are represented by separate software agents. One task of the IP agent is to generate feasible (and preferably optimal) track access rights, subject to the constraints submitted by the TSP agent. This paper formulates an IP-TSP transaction and proposes a branch-and-bound algorithm for the IP agent to identify the optimal track access rights. Empirical simulation results show that the model is able to emulate rational agent behaviors. The simulation results also show good consistency between timetables attained from the proposed methods and those derived by the scheduling principles adopted in practice.
Resumo:
Online learning algorithms have recently risen to prominence due to their strong theoretical guarantees and an increasing number of practical applications for large-scale data analysis problems. In this paper, we analyze a class of online learning algorithms based on fixed potentials and nonlinearized losses, which yields algorithms with implicit update rules. We show how to efficiently compute these updates, and we prove regret bounds for the algorithms. We apply our formulation to several special cases where our approach has benefits over existing online learning methods. In particular, we provide improved algorithms and bounds for the online metric learning problem, and show improved robustness for online linear prediction problems. Results over a variety of data sets demonstrate the advantages of our framework.
Resumo:
This exhibition, as part of the Queensland Government Unlimited: Designing for the Asia Pacific Program, showcased the unleashed: queensland design on tour 2010 Exhibition and outcomes from the aligned goDesign Travelling Workshop Program for Regional Secondary School Students, delivered concurrently by the Design Institute of Australia Queensland Branch and QUT, between February and September 2010 in the six regional Queensland towns of Chinchilla, Mt Isa, Quilpie, Emerald, Gladstone and Bundaberg. Mirroring the delivery of the exhibition opening in the local gallery of each regional town, student design work produced during the workshop program was displayed alongside the award winning work of professional visual communication, interior and product designers and design students from the DIA qdos Awards Program of 2008 and 2009. The resulting linkages and connections made possible by the aligned programs, and the students’ creative product, based on their own interpretation of the local culture, environment, economy and politics of their town developed through a design process, were the subject of the exhibition, captured through photos and dialogues (digital and print format) and sketchbooks. The two programs and resulting final ‘retrospective’ exhibition, addressed the key objectives outlined in the Queensland Government Arts Queensland Design Strategy 2020 (2008-2012 Action plan), which focuses on the promotion of a better understanding of the value of good design across all of the state, by enhancing the collaboration between industry, the professional body for design, the government and the education sectors, and by providing opportunities for young people to engage in design. The exhibition highlighted the benefits for regional communities in being exposed to design exhibitions, and linking with tertiary educators and design practitioners to participate in design-based learning activities which broaden student understanding of their learning and subsequent career opportunities, by establishing a meaningful connection with real world issues of place, identity and sustainability.
Resumo:
With the advent of large-scale wind farms and their integration into electrical grids, more uncertainties, constraints and objectives must be considered in power system development. It is therefore necessary to introduce risk-control strategies into the planning of transmission systems connected with wind power generators. This paper presents a probability-based multi-objective model equipped with three risk-control strategies. The model is developed to evaluate and enhance the ability of the transmission system to protect against overload risks when wind power is integrated into the power system. The model involves: (i) defining the uncertainties associated with wind power generators with probability measures and calculating the probabilistic power flow with the combined use of cumulants and Gram-Charlier series; (ii) developing three risk-control strategies by specifying the smallest acceptable non-overload probability for each branch and the whole system, and specifying the non-overload margin for all branches in the whole system; (iii) formulating an overload risk index based on the non-overload probability and the non-overload margin defined; and (iv) developing a multi-objective transmission system expansion planning (TSEP) model with the objective functions composed of transmission investment and the overload risk index. The presented work represents a superior risk-control model for TSEP in terms of security, reliability and economy. The transmission expansion planning model with the three risk-control strategies demonstrates its feasibility in the case study using two typical power systems
Resumo:
Corals inhabit high energy environments where frequent disturbances result in physical damage to coralla, including fragmentation, as well as generating and mobilizing large sediment clasts. The branching growth form common in the Acropora genus makes it particularly susceptible to such disturbances and therefore useful for study of the fate of large sediment clasts. Living Acropora samples with natural, extraneous, broken coral branches incorporated on their living surface and dead Acropora skeletons containing embedded clasts of isolated branch sections of Acropora were observed and/or collected from the reef flat of Heron Reef, southern Great Barrier Reef and Bargara, Australia respectively. Here we report three different outcomes when pebble-sized coral branches became lodged on living coral colonies during sedimentation events in natural settings in Acropora: 1) Where live coral branches produced during a disturbance event come to rest on probable genetic clone-mate colonies they become rapidly stabilised leading to complete soft tissue and skeletal fusion; 2) Where the branch and underlying colony are not clone-mates, but may still be the same or similar species, the branches still may be stabilised rapidly by soft tissue, but then one species will overgrow the other; and 3) Where branches represent dead skeletal debris, they are treated like any foreign clast and are surrounded by clypeotheca and incorporated into the corallum by overgrowth. The retention of branch fragments on colonies in high energy reef flat settings may suggest an active role of coral polyps to recognise and fuse with each other. Also, in all cases the healing of disturbed tissue and subsequent skeletal growth is an adaptation important for protecting colonies from invasion by parasites and other benthos following disturbance events and may also serve to increase corallum strength. Knowledge of such adaptations is important in studies of coral behaviour during periods of environmental stress.
Resumo:
Purpose This article reports on a research project that explored social media best practice in the public library sector. Design/methodology/approach The primary research approach for the project was case study. Two organisations participated in case studies that involved interviews, document analysis, and social media observation. Findings The two case study organisations use social media effectively to facilitate participatory networks, however, there have been challenges surrounding its implementation in both organisations. Challenges include negotiating requirements of governing bodies and broader organisational environments, and managing staff reluctance around the implementations. As social media use continues to grow and libraries continue to take up new platforms, social media must be considered to be another service point of the virtual branch, and indeed, for the library service as a whole. This acceptance of social media as being core business is critical to the successful implementation of social media based activities. Practical implications The article provides an empirically grounded discussion of best practice and the conditions that support it. The findings are relevant for information organisations across all sectors and could inform the development of policy and practice in other organisations. This paper contributes to the broader dialogue around best practice in participatory service delivery and social media use in library and information organisations.
Resumo:
This paper considers two special cases of bottleneck grouped assignment problems when n jobs belong to m distinct categories (m < n). Solving these special problems through the available branch and bound algorithms will result in a heavy computational burden. Sequentially identifying nonopitmal variables, this paper provides more efficient methods for those cases. Propositions leading to the algorithms have been established. Numerical examples illustrate the respective algorithms.
Resumo:
An important challenge in forest industry is to get the appropriate raw material out from the forests to the wood processing industry. Growth and stem reconstruction simulators are therefore increasingly integrated in industrial conversion simulators, for linking the properties of wooden products to the three-dimensional structure of stems and their growing conditions. Static simulators predict the wood properties from stem dimensions at the end of a growth simulation period, whereas in dynamic approaches, the structural components, e.g. branches, are incremented along with the growth processes. The dynamic approach can be applied to stem reconstruction by predicting the three-dimensional stem structure from external tree variables (i.e. age, height) as a result of growth to the current state. In this study, a dynamic growth simulator, PipeQual, and a stem reconstruction simulator, RetroSTEM, are adapted to Norway spruce (Picea abies [L.] Karst.) to predict the three-dimensional structure of stems (tapers, branchiness, wood basic density) over time such that both simulators can be integrated in a sawing simulator. The parameterisation of the PipeQual and RetroSTEM simulators for Norway spruce relied on the theoretically based description of tree structure developing in the growth process and following certain conservative structural regularities while allowing for plasticity in the crown development. The crown expressed both regularity and plasticity in its development, as the vertical foliage density peaked regularly at about 5 m from the stem apex, varying below that with tree age and dominance position (Study I). Conservative stem structure was characterized in terms of (1) the pipe ratios between foliage mass and branch and stem cross-sectional areas at crown base, (2) the allometric relationship between foliage mass and crown length, (3) mean branch length relative to crown length and (4) form coefficients in branches and stem (Study II). The pipe ratio between branch and stem cross-sectional area at crown base, and mean branch length relative to the crown length may differ in trees before and after canopy closure, but the variation should be further analysed in stands of different ages and densities with varying site fertilities and climates. The predictions of the PipeQual and RetroSTEM simulators were evaluated by comparing the simulated values to measured ones (Study III, IV). Both simulators predicted stem taper and branch diameter at the individual tree level with a small bias. RetroSTEM predictions of wood density were accurate. For focusing on even more accurate predictions of stem diameters and branchiness along the stem, both simulators should be further improved by revising the following aspects in the simulators: the relationship between foliage and stem sapwood area in the upper stem, the error source in branch sizes, the crown base development and the height growth models in RetroSTEM. In Study V, the RetroSTEM simulator was integrated in the InnoSIM sawing simulator, and according to the pilot simulations, this turned out to be an efficient tool for readily producing stand scale information about stem sizes and structure when approximating the available assortments of wood products.
Resumo:
The usual assumption made in time minimising transportation problem is that the time for transporting a positive amount in a route is independent of the actual amount transported in that route. In this paper we make a more general and natural assumption that the time depends on the actual amount transported. We assume that the time function for each route is an increasing piecewise constant function. Four algorithms - (1) a threshold algorithm, (2) an upper bounding technique, (3) a primal dual approach, and (4) a branch and bound algorithm - are presented to solve the given problem. A method is also given to compute the minimum bottle-neck shipment corresponding to the optimal time. A numerical example is solved illustrating the algorithms presented in this paper.
Resumo:
This paper describes an algorithm for ``direct numerical integration'' of the initial value Differential-Algebraic Inequalities (DAI) in a time stepping fashion using a sequential quadratic programming (SQP) method solver for detecting and satisfying active path constraints at each time step. The activation of a path constraint generally increases the condition number of the active discretized differential algebraic equation's (DAE) Jacobian and this difficulty is addressed by a regularization property of the alpha method. The algorithm is locally stable when index 1 and index 2 active path constraints and bounds are active. Subject to available regularization it is seen to be stable for active index 3 active path constraints in the numerical examples. For the high index active path constraints, the algorithm uses a user-selectable parameter to perturb the smaller singular values of the Jacobian with a view to reducing the condition number so that the simulation can proceed. The algorithm can be used as a relatively cheaper estimation tool for trajectory and control planning and in the context of model predictive control solutions. It can also be used to generate initial guess values of optimization variables used as input to inequality path constrained dynamic optimization problems. The method is illustrated with examples from space vehicle trajectory and robot path planning.
Resumo:
An analytical expression for the LL(T) decomposition for the Gaussian Toeplitz matrix with elements T(ij) = [1/(2-pi)1/2-sigma] exp[-(i - j)2/2-sigma-2] is derived. An exact expression for the determinant and bounds on the eigenvalues follows. An analytical expression for the inverse T-1 is also derived.