The design of high-rise buildings often necessitates ground excavation, where buildings are in close proximity to the construction, thus there is a potential for damage to these structures. This paper studies an efficient user-friendly framework for dealing with uncertainties in a deep excavation in layers of cemented coarse grained soil located in Tehran, Iran by non-deterministic Random Set (RS) method. In order to enhance the acceptability of the method among engineers, a pertinent code was written in FISH language of FLAC2D software which enables the designers to run all simulations simultaneously, without cumbersome procedure of changing input variables in every individual analysis. This could drastically decrease the computational effort and cost imposed to the project, which is of great importance especially to the owners. The results are presented in terms of probability of occurrence and most likely values of the horizontal displacement at top of the wall at every stage of construction. Moreover, a methodology for assessing the credibility of the uncertainty model is presented using a quality indicator. It was concluded that performing RS analysis before the beginning of every stage could cause great economical savings, while improving the safety of the project. 相似文献
HIGHT is a lightweight block cipher introduced in CHES 2006 by Hong et al as a block cipher suitable for low‐resource applications. In this paper, we propose improved impossible differential and biclique attacks on HIGHT block cipher both exploiting the permutation‐based property of the cipher's key schedule algorithm as well as its low diffusion. For impossible differential attack, we found a new 17‐round impossible differential characteristic that enables us to propose a new 27‐round impossible differential attack. The total time complexity of the attack is 2120.4 where an amount of 259.3 chosen plaintext‐ciphertext pairs and 2107.4 memory are required. We also instantiate a new biclique cryptanalysis of HIGHT, which is based on the new idea of splitting each of the forward and backward keys into 2 parts where the computations associated to each one are performed independently. The time complexity and data complexity of this attack are 2125.7 and 242, respectively. To the best of our knowledge, this is the fastest biclique attack on full‐round HIGHT. 相似文献
Journal of Failure Analysis and Prevention - Several codes have proposed guidelines to prevent progressive collapse. Although most of these standards are in progress, few recommendations for... 相似文献
Engineering with Computers - In the current study, various evolutionary artificial intelligence and machine learning models namely, optimized artificial neural network (ANN), genetic algorithm... 相似文献
Edges are key components of any visual scene to the extent that we can recognise objects merely by their silhouettes. The human visual system captures edge information through neurons in the visual cortex that are sensitive to both intensity discontinuities and particular orientations. The “classical approach” assumes that these cells are only responsive to the stimulus present within their receptive fields, however, recent studies demonstrate that surrounding regions and inter-areal feedback connections influence their responses significantly. In this work we propose a biologically-inspired edge detection model in which orientation selective neurons are represented through the first derivative of a Gaussian function resembling double-opponent cells in the primary visual cortex (V1). In our model we account for four kinds of receptive field surround, i.e. full, far, iso- and orthogonal-orientation, whose contributions are contrast-dependant. The output signal from V1 is pooled in its perpendicular direction by larger V2 neurons employing a contrast-variant centre-surround kernel. We further introduce a feedback connection from higher-level visual areas to the lower ones. The results of our model on three benchmark datasets show a big improvement compared to the current non-learning and biologically-inspired state-of-the-art algorithms while being competitive to the learning-based methods. 相似文献
As power consumption results in greenhouse gas emissions and energy costs for operators, analyzing power consumption in wireless networks and portable devices is of crutial importance. Due to environmental effects resulted from energy generation and exploitation as well as the cost of surging energy, energy-aware wireless systems attract unprecedented attention. Cognitive Radio (CR) is one of the optimal solutions that allows for energy savings on both the networks and devices. Thus, cognitive radio contributes to increase spectral and energy efficiency as well as reduction in power consumption. In addition, energy consumption of the CR technologies as intelligent technology should be considered to realize the green networks objective. In this article, we look into energy efficiency of the cognitive wireless network paradigms. Moreover, energy efficiency analysis and modelling in these systems are specifically focused on achieving green communications objectives. However, CRs by altering all elements of wireless data communications are considered in this paper, and the energy-efficient operation and energy efficiency enabler perspectives of CRs are also analyzed.
Most of the researches on error rate analysis of direct sequence spread spectrum (DSSS-CDMA) systems assume that the synchronization is perfect. However, in practice, the synchronization is often imperfect due to various effects of channel parameters such as noise and fading. The degree of imperfection further increases due to jamming attacks. The present study, therefore, derives new expressions to compute the probability of error in DSSS-CDMA systems under imperfect synchronisation. It is assumed that the channel is wideband and is subjected to various jamming attacks. A new parameter, called as probability of successful synchronization, was introduced which includes the effects of both the probability of false alarm and detection under fast and slow jammers. Monte Carlo simulations were conducted in MATLAB to establish the validity of the derived mathematical expressions.
Intravascular ultrasound (IVUS) is clinically available for visualizing coronary arteries. However, it suffers from acoustic shadow areas and ring-down artifacts as two of the common issues in IVUS images. This paper introduces an approach which can overcome these limitations. As shadow areas were displayed behind hard plaques in the IVUS grayscale images, calcified plaques were first segmented by using Otsu threshold. Then, active contour, histogram matching, and local histogram matching are implemented. In addition, a new modified circle Hough transform is introduced to remove the ring-down artifacts from IVUS images. In order to evaluate the efficacy of this new method in detection of shadow and ring-down regions, 300 IVUS images are considered. Sensitivity of 89% and specificity of 92% are achieved from a comparison in revelation of calcium along with shadow in the proposed method and virtual histology images. Also, area differences of \(5.83 \pm 3.3\) and \(5.65 \pm 2.83\) are obtained, respectively, for ring-down and shadow domain when compared to measures performed manually by a clinical expert. 相似文献
The influence of surface roughness on the efficiency of a cyclic potentiodynamic passivation (CPP) method employed to increase the general and pitting corrosion resistance of 316LVM stainless steel was investigated. The results show that a decrease in surface roughness of both the surface on which the passive film was formed naturally and by the CPP method, results in an increase in general corrosion resistance of the material, while for the CPP-modified surface, a notable increase in pitting corrosion resistance was also observed. It was further demonstrated that the CPP method is highly effective in increasing the general and pitting corrosion resistance of 316LVM, and that its efficiency does not depend on the surface roughness. 相似文献
This article offers a detailed comparison of the transition elements described by P.P. Lynn and A.R. Ingraffea [International Journal for Numerical Methods in Engineering12,1031–1036] and C. Manu[Engineering Fracture Mechanics24,509–512]. The source of a numerical phenomenon in using Manu's transitionelement (TE) is explained. The effect of eight-noded TEs with differentquarter-point elements (QPE) on the calculated stress intensity factors (SIFs) isinvestigated. Strain at the crack tip is shown to be singular for any ray emanating from the crack tip within an eight-noded TE, but strain has bothr–1/2andr–1singularities, withr–1/2dominating for large TEs. Semi-transition elements (STEs) are defined and shown to have a marginal effect on the calculated SIFs. Nine-nodedtransition elements are formulated whose strain singularity is shown to be the same as that of eight-noded TEs. Then the effect of eight-noded and nine-noded TEs with collapsed triangular QPEs, and rectangular and nonrectangular quadrilateral eight-noded and nine-noded QPEs, is studied, and nine-noded TEs are shown to behave exactly like eight-noded TEs with rectangular eight-noded and nine-noded QPEs and to behave almost the same with other QPEs. The layered transition elements proposed by V. Murti and S.Valliapan [Engineering Fracture Mechanics25, 237–258] areformulated correctly. The effect of layered transition elements is shown by two numerical examples. 相似文献