Search results for "Database"
showing 10 items of 2136 documents
Some determinants of the migration of professional manpower.
1975
Abstract Determinants of migration of professional manpower are investigated using data from a 1970 survey of immigrants to the United States. From a respondent’s stated “intent to stay” in the United States and five other characteristics a six-dimensional contingency table is formed. We find a well-fitting log-linear model for this table. Thus, we establish the importance of selected determinants of migration and present a table of predicted rates of intent to stay in the United States
A General Mathematical Formulation for Winding Layout Arrangement of Electrical Machines
2018
Winding design methods have been a subject of research for many years of the past century. Many methods have been developed, each one characterized by some advantages and drawbacks. Nowadays, the star of slots is the most widespread design tool for electrical machine windings. In this context, this paper presents a simple and effective procedure to determine the distribution of the slot EMFs over the phases and of the winding configuration in all possible typologies of electrical machines equipped with symmetrical windings. The result of this procedure gives a Winding Distribution Table (WDT), which can be used to define coils and coil groups connections and also to simply implement winding…
Heuristic algorithms for a storage location assignment problem in a chaotic warehouse
2014
The extensive application of emerging technologies is revolutionizing warehouse management. These technologies facilitate working with complex and powerful warehouse management models in which products do not have assigned fixed locations (random storage). Random storage allows the utilization of the available space to be optimized. In this context, and motivated by a real problem, this article presents a model that looks for the optimal allocation of goods in order to maximize the storage space availability within the restrictions of the warehouse. For the proposed model a construction method, a local search algorithm and different metaheuristics have been developed. The introduced algorit…
Reliable Planar Object Pose Estimation in Light Fields From Best Subaperture Camera Pairs
2018
International audience; A light-field camera can obtain richer information about a scene than a usual camera. This property offers a lot of potential for robot vision. In this paper, we present a method for pose estimation of a planar object with a light-field camera. The light-field camera can be regarded as a set of sub-aperture cameras. Although any combination of them can theoretically be used for the pose estimation, the accuracy depends on the combination. We show that the estimated pose error can be reduced by selecting the best pair of sub-aperture cameras. We have evaluated the accuracy of our approach with real experiments using a light-field camera in front of planar targets held…
On utilizing an enhanced object partitioning scheme to optimize self-organizing lists-on-lists
2020
With the advent of “Big Data” as a field, in and of itself, there are at least three fundamentally new questions that have emerged, namely the Artificially Intelligence (AI)-based algorithms required, the hardware to process the data, and the methods to store and access the data efficiently. This paper (The work of the second author was partially supported by NSERC, the Natural Sciences and Engineering Council of Canada. We are very grateful for the feedback from the anonymous Referees of the original submission. Their input significantly improved the quality of this final version.) presents some novel schemes for the last of the three areas. There have been thousands of papers written rega…
PLC security and critical infrastructure protection
2013
Programmable Logic Controllers (PLCs) are the most important components embedded in Industrial Control Systems (ICSs). ICSs have achieved highest standards in terms of efficiency and performance. As a result of that, higher portion of infrastructure in industries has been automated for the comfort of human beings. Therefore, protection of such systems is crucial. It is important to investigate the vulnerabilities of ICSs in order to solve the threats and attacks against critical infrastructure to protect human lives and assets. PLC is the basic building block of an ICS. If PLCs are exploited, overall system will be exposed to the threat. Many believed that PLCs are secured devices due to it…
A comparative study of partitioning methods for crowd simulations
2010
The simulation of large crowds of autonomous agents with realistic behavior is still a challenge for several computer research communities. In order to handle large crowds, some scalable architectures have been proposed. Nevertheless, the effective use of distributed systems requires the use of partitioning methods that can properly distribute the workload generated by agents among the existing distributed resources. In this paper, we analyze the use of irregular shape regions (convex hulls) for solving the partitioning problem. We have compared a partitioning method based on convex hulls with two techniques that use rectangular regions. The performance evaluation results show that the conv…
Decentralized Coordination System for Multiple AGVs in a Structured Environment
2011
Abstract In this paper, we propose a decentralized coordination algorithm for safe and efficient management of a group of mobile robots following predefined paths in a dynamic industrial environment. The proposed algorithm is based on shared resources and proved to guarantee ordered traffic flows avoiding collisions and deadlocks. In consistency with the model of distributed robotic systems (DRS), no centralized mechanism, synchronized clock, shared memory or ground support is needed. A local inter-robot communication is required among a small number of spatially adjacent robotic units.
Teacher coping profiles in relation to teacher well-being : a mixed method approach
2021
The aim was to investigate teachers’ coping profiles and their relations to teacher well-being. Questionnaire data was collected from 107 Finnish teachers. Theory-driven content analysis of teachers’ responses revealed three coping categories: problem-focused, emotion-focused and mixed problem- and emotion-focused. Next, teachers were categorized into four coping profiles by using latent profile analysis: Low-coping users (21%), Problem-focused-coping users (15%), High-coping users (12%) and Emotion-focused-coping users (52%). Low-coping-user teachers reported less stress and fewer depressive symptoms and sleep problems compared to Emotion-focused-coping users. Using a compact amount of cop…
Lambda+, the renewal of the Lambda Architecture: Category Theory to the rescue
2021
Designing software architectures for Big Data is a complex task that has to take into consideration multiple parameters, such as the expected functionalities, the properties that are untradeable, or the suitable technologies. Patterns are abstractions that guide the design of architectures to reach the requirements. One of the famous patterns is the Lambda Architecture, which proposes real-time computations with correctness and fault-tolerance guarantees. But the Lambda has also been highly criticized, mostly because of its complexity and because the real-time and correctness properties are each effective in a different layer but not in the overall architecture. Furthermore, its use cases a…