We present the first step of a research aimed at automating a driven interactive 3D modeling of an existing architectural object. The method is based on oriented multi-image spherical panoramas produced by stitching techniques. The photogrammetric process has two steps: the creation of a semi-automatic process to find homolog points in two panoramas; the creation of parametric definitions for an interactive modeling creating points, segments, and surfaces based on the plotted points in the first step. By connecting these two steps, the creation of the model will be automatic, as we indicate the necessary points in just one panoramic photo. The principals of multi-view geometry and epipolar geometry were applied to simplify the calculation in the first step in order to create an automatic identification of the correspondent points in the other panorama. The epipolar geometry is described by both analytical and graphical programming, implementing in the first case a C++ application and in the second case a Rhinoceros and Grasshopper application. A case study of the Ponte Rotto in Rome (Italy) is presented. 相似文献
Formal methods are very useful in the software industry and are becoming of paramount importance in practical engineering techniques. They involve the design and modeling of various system aspects expressed usually through different paradigms. These different formalisms make the verification of global developed systems more difficult.
Objective
In this paper, we propose to combine two modeling formalisms, in order to express both functional and security timed requirements of a system to obtain all the requirements expressed in a unique formalism.
Method
First, the system behavior is specified according to its functional requirements using Timed Extended Finite State Machine (TEFSM) formalism. Second, this model is augmented by applying a set of dedicated algorithms to integrate timed security requirements specified in Nomad language. This language is adapted to express security properties such as permissions, prohibitions and obligations with time considerations.
Results
The proposed algorithms produce a global TEFSM specification of the system that includes both its functional and security timed requirements.
Conclusion
It is concluded that it is possible to merge several requirement aspects described with different formalisms into a global specification that can be used for several purposes such as code generation, specification correctness proof, model checking or automatic test generation. In this paper, we applied our approach to a France Telecom Travel service to demonstrate its scalability and feasibility. 相似文献
The assembly flowshop scheduling problem has been addressed recently in the literature. There are many problems that can be modeled as assembly flowshop scheduling problems including queries scheduling on distributed database systems and computer manufacturing. The problem has been addressed with respect to either makespan or total completion time criterion in the literature. In this paper, we address the problem with respect to a due date-based performance measure, i.e., maximum lateness. We formulate the problem and obtain a dominance relation. Moreover, we propose three heuristics for the problem: particle swarm optimization (PSO), Tabu search, and EDD. PSO has been used in the areas of function optimization, artificial neural network training, and fuzzy system control in the literature. In this paper, we show how it can be used for scheduling problems. We have conducted extensive computational experiments to compare the three heuristics along with a random solution. The computational analysis indicates that Tabu outperforms the others for the case when the due dates range is relatively wide. It also indicates that the PSO significantly outperforms the others for difficult problems, i.e., tight due dates. Moreover, for difficult problems, the developed dominance relation helps reduce error by 65%. 相似文献
Scientometrics - This study investigates the research performance of the Iraqi public and private universities using the Scopus citation database. The investigation consists of three stages. The... 相似文献
In this study, the effects of material thickness and processing method on the degradation rate and the changes in the mechanical properties of poly(lactic-co-glycolic acid) material during simulated physiological degradation were investigated. Two types of poly(lactic-co-glycolic acid) materials were considered: 0.12?mm solvent-cast films and 1?mm compression-moulded plates. The experimental results presented in this study were compared to the experimental results of Shirazi et al. (Acta Biomaterialia 10(11):4695–703, 2014) for 0.25?mm solvent-cast films. These experimental observations were used to validate the computational modelling predictions of Shirazi et al. (J Mech Behav Biomed Mater 54: 48–59, 2016) on critical diffusion length scale and also to refine the model parameters. The specific material processing methods considered here did not have a significant effect on the degradation rate and the changes in mechanical properties during degradation; however, they influenced the initial molecular weight and they determined the stiffness and hardness of the poly(lactic-co-glycolic acid) material. The experimental observations strongly supported the computational modelling predictions that showed no significant difference in the degradation rate and the changes in the elastic modulus of poly(lactic-co-glycolic acid) films for thicknesses larger than 100?μm. 相似文献
A persisting major challenge for optical network operators is to meet the various availability requirements of the different subscribed services through the deployment of effective protection strategies. Priority-aware shared protection is a promising scheme that has been proposed in the open literature as a potential approach to tackling this challenge. However, the priority-aware protection strategy is rigid in the sense that it privileges the high priority connections regardless of the low priority ones. Hence, this letter proposes to improve priority-aware protection by introducing the mutation probability parameter. This parameter expresses the likelihood that a highpriority connection be relegated temporarily to a lower priority level during recovery. In this way, the mutation-based protection strategy offers optical operators the possibility to increase the availability of their low-priority clients without violating the availability requirements of their high-priority ones. Performance of this novel protection strategy is analyzed in this letter by precisely calculating the connection availabilities resulting from its deployment. 相似文献
It is critical to develop an appropriate dye degrading technique to preserve the natural environment and human health owing to the dangerous water pollution caused by effluent dyes. So, in this work, a ZSM-5/TiO2/Ni photocatalyst was synthesized as a novel composite and used for degrading methylene blue dye in the solution. The sol–gel approach was used to immobilize titanium dioxide nanoparticles on the ZSM-5 surface, and the resulting photocatalyst was then modified using nickel nanoparticles to improve its photocatalytic performance. The nanocomposite was characterized using different tools such as FE-SEM, EDX, XRD, FT-IR, TGA, and UV–Vis spectrophotometer. The XRD confirmed that the synthesized composite has the characteristic TiO2 peaks. FE-SEM images of ZSM-5 exhibited rough, uneven, and jagged surfaces. A distinct shift in the morphology of the surface resulted when titanium dioxide was fully immobilized on the surface of ZSM-5. Shape complexity and surface roughness of the particles are elevated in the case of the ZSM-5/TiO2/Ni nanocomposite. The maximum % degradation of 50 mL of 15 mg/L of methylene blue dye is 99.17% and achieved at pH?=?8, irradiation time?=?140 min, and photocatalyst dosage?=?0.05 g. The synthesized composite can be regenerated and reused several times without losing its efficacy.