Search results for "Data type"
showing 10 items of 1183 documents
Condition Assessment of Norwegian Bridge Elements Using Existing Damage Records
2020
The Norwegian Public Roads Administration (NPRA) has recorded bridge element damages in a database for all the bridges it manages since the 1990s. This paper presents a comparison of three methods to establish element condition based on damage records. The methods consist in a non-parametric procedure based on the worst damage registered in the element, linear regression considering also bridge and road characteristics data and classification through an artificial neural network. The methods are assessed using a set of 159 bridges inspected in 2016. The results show that diagnostics of bridge element condition can reach high accuracy by using an artificial neural network classifier and taki…
Trust management in tactical coalition software defined networks
2018
This paper reports from ongoing efforts related to trust management in tactical Software Defined Networks (SDN) when used with mobile nodes in a coalition operation. We analyze the problem space and suggests a set of security and contructional requirements, as well as an analysis on how existing technology may contribute to a solution. The proposed architecture serves as a guide for current and future experimentation on trust management and protection in SDN. The paper also reports from experimental investigations into the utility of these technology elements for the present purpose.
The min-max close-enough arc routing problem
2022
Abstract Here we introduce the Min-Max Close-Enough Arc Routing Problem, where a fleet of vehicles must serve a set of customers while trying to balance the length of the routes. The vehicles do not need to visit the customers, since they can serve them from a distance by traversing arcs that are “close enough” to the customers. We present two formulations of the problem and propose a branch-and-cut and a branch-and-price algorithm based on the respective formulations. A heuristic algorithm used to provide good upper bounds to the exact procedures is also presented. Extensive computational experiments to compare the performance of the algorithms are carried out.
Development of a Design Procedure for Bending Operations
1999
Springback can be considered as one of the most important shape defect in sheet stamping. Such effect results relevant even when simple bending operations are taken into account. In the paper the authors present a design procedure able to provide the proper value of the punch stroke to be applied in order to compensate for elastic springback. In particular two approaches have been followed: firstly an inverse design technique has been utilized in order to find out the response function governing the investigated phenomenon; furthermore neural network techniques have been applied in order to represent the logical link between the input data and the aimed output, i.e. the proper punch stroke …
Solution Using Clustering Methods
1987
The main aim of this analysis is to find out typical morphologies from the multivariate and longitudinal data set on growing children and to describe the morphological evolution of the found groups of girls. The finding out of typical morphologies is, in our opinion, strictly linked to the search of structures in the individuals and in the variables.
PROTEIN SECONDARY STRUCTURE PREDICTION: HOW TO IMPROVE ACCURACY BY INTEGRATION
2006
In this paper a technique to improve protein secondary structure prediction is proposed. The approach is based on the idea of combining the results of a set of prediction tools, choosing the most correct parts of each prediction. The correctness of the resulting prediction is measured referring to accuracy parameters used in several editions of CASP. Experimental evaluations validating the proposed approach are also reported.
Low Dose-Rate, High Total Dose Set-Up for Rad-Hard CMOS I/O Circuits Testing
2017
In this paper, the planning of low dose-rate, high total dose testing campaign for I/O circuits is reported. In particular, the paper describes all development steps, starting from the rad-hard I/O circuits design and the implementation of the test-chip, which is meant to allow comparative testing between rad-hard and standard devices. The designed experimental setup permits in situ measurements, therefore the circuits behavior can be remotely monitored for very long periods. This feature enables low dose-rate testing up to very high dose.
The norm of the characteristic function of a set in the John‐Nirenberg space of exponent p
2020
Geometric rigidity of a class of fractal sets
2017
We study geometric rigidity of a class of fractals, which is slightly larger than the collection of self-conformal sets. Namely, using a new method, we shall prove that a set of this class is contained in a smooth submanifold or is totally spread out. (© 2006 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim)
Derived length and character degrees of solvable groups
2003
We prove that the derived length of a solvable group is bounded in terms of certain invariants associated to the set of character degrees and improve some of the known bounds. We also bound the derived length of a Sylow p-subgroup of a solvable group by the number of different p-parts of the character degrees of the whole group.