927 resultados para Mutual Intersecting
Resumo:
This work acquaints with a program for interactive computer training to students on the subject "Mutual intersecting of pyramids in axonometry ”. Our software is a set of three modules, which we call "student", "teacher" and "autopilot". It gives the final solution of the problem, the traceability of various significant moments in its solution and 3D-image of the finished composition of the two intersecting polyhedra, stripped of the working lines and subjected to rotation and translation.
Resumo:
In this paper, we propose an unsupervised segmentation approach, named "n-gram mutual information", or NGMI, which is used to segment Chinese documents into n-character words or phrases, using language statistics drawn from the Chinese Wikipedia corpus. The approach alleviates the tremendous effort that is required in preparing and maintaining the manually segmented Chinese text for training purposes, and manually maintaining ever expanding lexicons. Previously, mutual information was used to achieve automated segmentation into 2-character words. The NGMI approach extends the approach to handle longer n-character words. Experiments with heterogeneous documents from the Chinese Wikipedia collection show good results.
Resumo:
Improved public awareness and strong sentiments towards environmental issues will continue to create increasing demand for sustainable housing (SH) in the coming years. Despite this potential, the up-take rate of sustainable housing in new build and through home renovation is not as high as expected within the housing industry. This is in contrast to the influx of emerging building technologies, new materials and innovative designs seen in exemplar homes built worldwide. How we should use the increasing awareness of SH and emerging technologies as an impetus to change the un-sustainable designs and practices of the building industry is high on the agenda of the government and majority of the stakeholders involved. This warrants the study of multifaceted strategies that meet the needs of multiple stakeholders and integrated seamlessly into housing development processes. Specifically, the different perceptions, roles and incentives of stakeholders, who inevitably need to ensure their benefits and commercial returns, should be highlighted and acted upon. ----- This paper discusses the preliminary findings of a research project that aims to promote SH implementation by identifying and materializing the mutual benefits among key stakeholders. The aim is to be achieved through questionnaire surveys, structural equation modelling, interviews and case studies with seven major stakeholders within the Australian housing industry. This research identifies the influence and relationship of relevant factors, investigates preferences, similarities and differences between stakeholders on perceived benefits and in turn explores the mutual-benefit strategy package that facilitates decision making towards sustainable housing development.
Resumo:
RFID has been widely used in today's commercial and supply chain industry, due to the significant advantages it offers and the relatively low production cost. However, this ubiquitous technology has inherent problems in security and privacy. This calls for the development of simple, efficient and cost effective mechanisms against a variety of security threats. This paper proposes a two-step authentication protocol based on the randomized hash-lock scheme proposed by S. Weis in 2003. By introducing additional measures during the authentication process, this new protocol proves to enhance the security of RFID significantly, and protects the passive tags from almost all major attacks, including tag cloning, replay, full-disclosure, tracking, and eavesdropping. Furthermore, no significant changes to the tags is required to implement this protocol, and the low complexity level of the randomized hash-lock algorithm is retained.
Resumo:
The term “cloud computing” has emerged as a major ICT trend and has been acknowledged by respected industry survey organizations as a key technology and market development theme for the industry and ICT users in 2010. However, one of the major challenges that faces the cloud computing concept and its global acceptance is how to secure and protect the data and processes that are the property of the user. The security of the cloud computing environment is a new research area requiring further development by both the academic and industrial research communities. Today, there are many diverse and uncoordinated efforts underway to address security issues in cloud computing and, especially, the identity management issues. This paper introduces an architecture for a new approach to necessary “mutual protection” in the cloud computing environment, based upon a concept of mutual trust and the specification of definable profiles in vector matrix form. The architecture aims to achieve better, more generic and flexible authentication, authorization and control, based on a concept of mutuality, within that cloud computing environment.