Search results for "ComputerApplications_COMPUTERSINOTHERSYSTEMS"
showing 10 items of 254 documents
Transverse-momentum-dependent Multiplicities of Charged Hadrons in Muon-Deuteron Deep Inelastic Scattering
2017
A semi-inclusive measurement of charged hadron multiplicities in deep inelastic muon scattering off an isoscalar target was performed using data collected by the COMPASS Collaboration at CERN. The following kinematic domain is covered by the data: photon virtuality $Q^{2}>1$ (GeV/$c$)$^2$, invariant mass of the hadronic system $W > 5$ GeV/$c^2$, Bjorken scaling variable in the range $0.003 < x < 0.4$, fraction of the virtual photon energy carried by the hadron in the range $0.2 < z < 0.8$, square of the hadron transverse momentum with respect to the virtual photon direction in the range 0.02 (GeV/$c)^2 < P_{\rm{hT}}^{2} < 3$ (GeV/$c$)$^2$. The multiplicities are pres…
Pollutant Emissions in Ports: A Comprehensive Review
2021
In recent decades, maritime transport demand has increased along with world population and global trades. This is associated with higher pollution levels, including the emissions of GHG and other polluting gases. Ports are important elements within maritime transport and contribute themselves to pollutant emissions. This paper aims to offer a comprehensive yet technical review of the latest related technologies, explaining and covering aspects that link ports with emissions, i.e., analyzing, monitoring, assessing, and mitigating emissions in ports. This has been achieved through a robust scientific analysis of very recent and significant research studies, to offer an up-to-date and reliable…
Unmanned aerial system imagery and photogrammetric canopy height data in area-based estimation of forest variables
2015
In this paper we examine the feasibility of data from unmanned aerial vehicle (UAV)-borne aerial imagery in stand-level forest inventory. As airborne sensor platforms, UAVs offer advantages cost and flexibility over traditional manned aircraft in forest remote sensing applications in small areas, but they lack range and endurance in larger areas. On the other hand, advances in the processing of digital stereo photography make it possible to produce three-dimensional (3D) forest canopy data on the basis of images acquired using simple lightweight digital camera sensors. In this study, an aerial image orthomosaic and 3D photogrammetric canopy height data were derived from the images acquired …
THE TOPOLOGY OF BASIN BOUNDARIES IN A CLASS OF THREE-DIMENSIONAL DYNAMICAL SYSTEMS
1996
We will develop new methods to determine the topology of the basin boundary in a class of three-dimensional dynamical systems. One approach is to approximate the basin boundary by backward integration. Unfortunately, there are dynamical systems where it is hard to approximate the basin boundary by a numerical backward integration algorithm. We will introduce topological methods which will provide new information about the structure of the basin boundary. The topological invariants which we will use can be numerically computed.
Soccer analyses by means of artificial neural networks, automatic pass recognition and Voronoi-cells: An approach of measuring tactical success.
2015
Success in a soccer match is usually measured by goals. However, in order to yield goals, successful tactical pre-processing is necessary. If analyzing a match with the focus on “success”, promising tactical activities including vertical passes with control win in the opponent’s penalty area have to be the focus. Whether or not a pass is able to crack the opponent’s defence depends on the tactical formations of both the opponent’s defence and the own offence group.
A musical reading of a contemporary installation and back: mathematical investigations of patterns in Qwalala
2021
Mathematical music theory helps us investigate musical compositions in mathematical terms. Some hints can be extended towards the visual arts. Mathematical approaches can also help formalize a "translation" from the visual domain to the auditory one and vice versa. Thus, a visual artwork can be mathematically investigated, then translated into music. The final, refined musical rendition can be compared to the initial visual idea. Can an artistic idea be preserved through these changes of media? Can a non-trivial pattern be envisaged in an artwork, and then still be identified after the change of medium? Here, we consider a contemporary installation and an ensemble musical piece derived from…
Towards Efficient Control of Mobile Network-Enabled UAVs
2019
| openaire: EC/H2020/815191/EU//PriMO-5G The efficient control of mobile network-enabled unmanned aerial vehicles (UAVs) is targeted in this paper. In particular, a downlink scenario is considered, in which control messages are sent to UAVs via cellular base stations (BSs). Unlike terrestrial user equipment (UEs), UAVs perceive a large number of BSs, which can lead to increased interference causing poor or even unacceptable throughput. This paper proposes a framework for efficient control of UAVs. First, a communication model is introduced for flying UAVs taking into account interference, path loss and fast fading. The characteristics of UAVs make such model different compared to traditiona…
Hidden Pursuits: Evaluating Gaze-selection via Pursuits when the Stimuli's Trajectory is Partially Hidden
2018
The idea behind gaze interaction using Pursuits is to leverage the human's smooth pursuit eye movements performed when following moving targets. However, humans can also anticipate where a moving target would reappear if it temporarily hides from their view. In this work, we investigate how well users can select targets using Pursuits in cases where the target's trajectory is partially invisible (HiddenPursuits): e.g., can users select a moving target that temporarily hides behind another object? Although HiddenPursuits was not studied in the context of interaction before, understanding how well users can perform HiddenPursuits presents numerous opportunities, particularly for small interfa…
Artificial Intelligence in Protecting Smart Building’s Cloud Service Infrastructure from Cyberattacks
2020
Gathering and utilizing stored data is gaining popularity and has become a crucial component of smart building infrastructure. The data collected can be stored, for example, into private, public, or hybrid cloud service infrastructure or distributed service by utilizing data platforms. The stored data can be used when implementing services, such as building automation (BAS). Cloud services, IoT sensors, and data platforms can face several kinds of cybersecurity attack vectors such as adversarial, AI-based, DoS/DDoS, insider attacks. If a perpetrator can penetrate the defenses of a data platform, she can cause significant harm to the system. For example, the perpetrator can disrupt a buildin…
Off-line Programming and simulation for automatic robot control software generation
2007
In this paper an off-line programming approach for welding robots is presented. The approach is based on the integration of a software tool for robot simulation and an user-friendly interface for automatic generation of the control program. The user can graphically arrange the components in a robotic work-cell and simulate the movements and operations of robotic arms before converting motions and operating sequences in controller-specific tasks. This methodology guarantees high level of flexibility of the robotic system when high variety of work-pieces needs to be welded. The approach has been implemented and tested in a real welding work-cell.