This paper focuses on developing a simulation model for the analysis of transmission pipeline network system (TPNS) with detailed characteristics of compressor stations. Compressor station is the key element in the TPNS since it provides energy to keep the gas moving. The simulation model is used to create a system that simulates TPNS with different configurations to get pressure and flow parameters. The mathematical formulations for the TPNS simulation were derived from the principles of flow of fluid through pipe, mass balance and compressor characteristics. In order to determine the unknown pressure and flow parameters, a visual C++ code was developed based on Newton–Raphson solution technique. Using the parameters obtained, the model evaluates the energy consumption for various configurations in order to guide for the selection of optimal TPNS. Results from the evaluations of the model with the existing TPNS and comparison with the existing approaches showed that the developed simulation model enabled to determine the operational parameters with less than 10 iterations. Hence, the simulation model could assist in decisions regarding the design and operations of the TPNS. 相似文献
Radio Frequency Identification (RFID) based systems have been used in different applications in the Architecture, Engineering, Construction, Owner and Operator (AECOO) industry. Applications are mainly designed for specific lifecycle stage of the facility and serve the needs of only one of the stakeholders. This would increase the cost and the labor for adding and removing tags and eliminate the chance of using shared resources. In this paper, the usage of tags permanently attached to components is proposed where the memory of the tags is used during the lifecycle by different stakeholders for data storage and handover. A Building Information Model (BIM) database is used for tackling the interoperability issues allowing different users to access and share the data. To securely and efficiently store data on RFID tags in ifcXML format, multi-level encryption together with role-based access control is applied on the data stored on RFID tags. Each user is assigned a certain role and can only access the part of data for which he has authorization according to a predefined role and the Access Control Policy. To explore the technical feasibility of the proposed approach, a case study considering both facilities management and emergency management has been implemented and tested at Concordia University. 相似文献
Mobile Ad-hoc NETworks (MANET) are infrastructureless networks where self-configuring mobile nodes are connected by wireless
links. Because of its decentralized operation, these nodes rely on each other to store and forward packets. Video transmission
over MANETs is more challenging than over conventional wireless networks due to rapid topology changes and lack of central
administration. Most of the proposed MANET protocols assume that all nodes are working within a cooperative and friendly network
context. However, misbehaving nodes that exhibit abnormal behaviors can disrupt the network operation and affect the network
availability by refusing to cooperate to route packets due to their selfish or malicious behavior. In this paper, we examine
the effect of packet dropping attacks on video transmission over MANETs. We also study the effects of mitigation using intrusion
detection systems to MANET in presence of video traffic. To the best of our knowledge, this is the first attempt to study
multimedia over such environments. We propose a novel intrusion detection system, which is an adaptive acknowledgment scheme
(AACK) with the ability to detect misbehaved nodes and avoid them in other transmissions. The aim of AACK scheme is to overcome
watchdog weaknesses due to collisions and limited transmission power and also to improve TWOACK scheme. To demonstrate the
performance of our proposed scheme, simulation experiments are performed. The results of our experiments show that MPEG4 is
more suitable for our simulation environment than H264 video traffic. The simulation results show that AACK scheme provides
better network performance with less overhead than other schemes; it also shows that AACK outperforms both TWOACK and watchdog
in video transmission applications in the presence of misbehaving nodes. 相似文献
Recently, compressive sensing (CS) has offered a new framework whereby a signal can be recovered from a small number of noisy non-adaptive samples. This is now an active area of research in many image-processing applications, especially super-resolution. CS algorithms are widely known to be computationally expensive. This paper studies a real time super-resolution reconstruction method based on the compressive sampling matching pursuit (CoSaMP) algorithm for hyperspectral images. CoSaMP is an iterative compressive sensing method based on the orthogonal matching pursuit (OMP). Multi-spectral images record enormous volumes of data that are required in practical modern remote-sensing applications. A proposed implementation based on the graphical processing unit (GPU) has been developed for CoSaMP using computed unified device architecture (CUDA) and the cuBLAS library. The CoSaMP algorithm is divided into interdependent parts with respect to complexity and potential for parallelization. The proposed implementation is evaluated in terms of reconstruction error for different state-of-the-art super-resolution methods. Various experiments were conducted using real hyperspectral images collected by Earth Observing-1 (EO-1), and experimental results demonstrate the speeding up of the proposed GPU implementation and compare it to the sequential CPU implementation and state-of-the-art techniques. The speeding up of the GPU-based implementation is up to approximately 70 times faster than the corresponding optimized CPU. 相似文献
Handling objects with robotic soft fingers without considering the odds of slippage are not realistic. Grasping and manipulation algorithms have to be tested under such conditions for evaluating their robustness. In this paper, a dynamic analysis of rigid object manipulation with slippage control is studied using a two-link finger with soft hemispherical tip. Dependency on contact forces applied by a soft finger while grasping a rigid object is examined experimentally. A power-law model combined with a linear viscous damper is used to model the elastic behavior and damping effect of the soft tip, respectively. In order to obtain precise dynamic equations governing the system, two second-order differential equations with variable coefficients have been designed to describe the different possible states of the contact forces accordingly. A controller is designed based on the rigid fingertip model using the concept of feedback linearization for each phase of the system dynamics. Numerical simulations are used to evaluate the performance of the controller. The results reveal that the designed controller shows acceptable performance for both soft and rigid finger manipulation in reducing and canceling slippage. Furthermore, simulations indicate that the applied force in the soft finger manipulation is considerably less than the rigid “one.”. 相似文献
Saliency prediction models provide a probabilistic map of relative likelihood of an image or video region to attract the attention of the human visual system. Over the past decade, many computational saliency prediction models have been proposed for 2D images and videos. Considering that the human visual system has evolved in a natural 3D environment, it is only natural to want to design visual attention models for 3D content. Existing monocular saliency models are not able to accurately predict the attentive regions when applied to 3D image/video content, as they do not incorporate depth information. This paper explores stereoscopic video saliency prediction by exploiting both low-level attributes such as brightness, color, texture, orientation, motion, and depth, as well as high-level cues such as face, person, vehicle, animal, text, and horizon. Our model starts with a rough segmentation and quantifies several intuitive observations such as the effects of visual discomfort level, depth abruptness, motion acceleration, elements of surprise, size and compactness of the salient regions, and emphasizing only a few salient objects in a scene. A new fovea-based model of spatial distance between the image regions is adopted for considering local and global feature calculations. To efficiently fuse the conspicuity maps generated by our method to one single saliency map that is highly correlated with the eye-fixation data, a random forest based algorithm is utilized. The performance of the proposed saliency model is evaluated against the results of an eye-tracking experiment, which involved 24 subjects and an in-house database of 61 captured stereoscopic videos. Our stereo video database as well as the eye-tracking data are publicly available along with this paper. Experiment results show that the proposed saliency prediction method achieves competitive performance compared to the state-of-the-art approaches.
In this paper, we propose a novel Route Maintenance scheme for IEEE 802.11 wireless mesh networks. Despite lack of mobility and energy constraints, reactive routing protocols such as AODV and DSR suffer from frequent route breakages in 802.11 based infrastructure wireless mesh networks. In these networks, if any intermediate node fails to successfully transmit a packet to the next hop node after a certain number of retransmissions, the link layer reports a transmission problem to the network layer. Reactive routing protocols systematically consider this as a link breakage (and therefore a route breakage). Transmission failures can be caused by a number of factors e.g. interference or noise and can be transient in nature. Frequent route breakages result in significant performance degradation. The proposed mechanism considers multiple factors to differentiate between links with transient transmission problems from those links which have permanent transmission problems and takes a coherent decision on link breakage. The proposed mechanism is implemented in AODV for single-radio single-channel mesh network and an extension is incorporated in multi-radio multi-channel scenarios. Simulation results show substantial performance improvement compared to classical AODV and local route repair schemes. 相似文献
In this paper, we present an efficient method implemented on Graphics Processing Unit (GPU), DEMCMC-GPU, for multi-objective
continuous optimization problems. The DEMCMC-GPU kernel is the DEMCMC algorithm, which combines the attractive features of
Differential Evolution (DE) and Markov Chain Monte Carlo (MCMC) to evolve a population of Markov chains toward a diversified
set of solutions at the Pareto optimal front in the multi-objective search space. With parallel evolution of a population
of Markov chains, the DEMCMC algorithm is a natural fit for the GPU architecture. The implementation of DEMCMC-GPU on the
pre-Fermi architecture can lead to a ~25 speedup on a set of multi-objective benchmark function problems, compare to the CPU-only implementation of DEMCMC. By taking
advantage of new cache mechanism in the emerging NVIDIA Fermi GPU architecture, efficient sorting algorithm on GPU, and efficient
parallel pseudorandom number generators, the speedup of DEMCMC-GPU can be aggressively improved to ~100. 相似文献
Implementation of Enterprise Resource Planning systems (ERPs) is a complex and costly process, which usually results in serious failures. The majority of previous studies and research projects have been conducted in identifying ERP Critical Success Factors (CSFs) rather than Critical Failure Factors (CFFs). On the other hand, most studies have been devoted to developed countries, while in developing countries, many companies have moved towards using such systems. The majority of IT/IS management standards and guidelines have been developed by technologically-leading countries. But developing countries, which mostly confront with especial challenges, have a different condition from the implicit assumptions of leading countries. Iran is one of these countries that many of its ERP implementation projects led to failure. There is no comprehensive study that identifies ERP CFFs in Iranian industries. The main purpose of this study is to identify such factors and classify them to help other industries, consultants and implementers to prevent failures in the implementation of ERP projects. So, at first, with the semi structured interviews and literature reviews, 47 failure factors were identified. After that a questionnaire developed and sent to ERP project team members in Iranian industries that failed in their ERP projects. Robust Exploratory Factor Analysis (EFA) has been used for data analysis, which finally classified critical failure factors in seven groups named as vendor and consultant, human resources, managerial, project management, processes, organizational and technical. The results of this study have provided a very useful reference for scholars and managers to identify the relevant issues of ERP projects failure in developing countries. 相似文献