submitted by

**camineas**1 hour agoThis paper focuses on finding a satisfactory surgery scheduling to patients and efficiently managing scarce medical resources in laminar-flow operating theaters, which have distinct flow process and characteristics relative to general operating theaters and are widely used in China. The problem is solved in two phases. The first phase involves determining whether patients can be operated upon w...

submitted by

**FrancMatte**1 hour agoIn this paper, we establish a deep neural network using stacked Restricted Boltzmann Machines (RBMs) to analyze the difference images and detect changes between multitemporal synthetic aperture radar (SAR) images. Given the two multitemporal images, a difference image which shows difference degrees between corresponding pixels is generated. Then, RBMs are stacked to form a deep hierarchical neu...

submitted by

**blaigriinarongi**1 hour agoIn this paper, we present the application of neuro-fuzzy system—ANFIS for air conditioning systems to reduce electricity consumption. The current buildings have automation systems that provide data on lighting, electrical system, air conditioning system, etc. We studied the air conditioning system, in particular, to reduce energy consumption as air conditioning has a high consumption value. O...

submitted by

**farhanchemist**2 hours agoIn this study, analytical modeling and an analysis approach for asymmetric multi-segment rotor – bearing systems are presented. Timoshenko beam model which includes the effect of gyroscopic moments is employed for modeling rotor segments. Instead of applying FEM, sub-segment Frequency Response Functions (FRFs) are obtained analytically, and sub-segment FRFs obtained are coupled by using recep...

submitted by

**GeoffreyUl**2 hours agoBased on shape function method of moving least square fitting (SFM_MLSF), dynamic load is identified. The time domain of load is discretized and the local load is approximated by SFM under LSF. With this local domain moving, whole load is described. The response matrix is formed through assembling the responses of shape function loads in all local domains and the forward model is established. T...

submitted by

**genius1232**2 hours agoThe evaluation of probabilistic sensitivity requires scalar measures quantifying the difference between probability density functions. The efficient estimation of two such alternative measures (relative entropy and Hellinger distance) is investigated within the setting of a global sensitivity analysis. This analysis requires evaluation of these measures with respect to different marginal densit...

submitted by

**proteksotyo**2 hours agoThe identification of excitations on plates by an inverse method using local Finite Element modeling is studied. A dynamic condensation is proposed in order to eliminate Degrees Of Freedom not directly measurable like rotations. Before the condensation, the Craig–Bampton method can be optionally used to reduce the model (decrease of both computational and measurement times). Regularization ba...

submitted by

**GilbeJonah**2 hours agoRate-independent metal plasticity models are widely applied to many fields, where most of the models are only effective for small strain ranges. A modified Yoshida–Uemori model was previously proposed and validated by the author, which can well evaluate metal plasticity at strain ranges until fracture. The model is difficult to implement into finite element software due to its complicated for...

submitted by

**VictBennet**2 hours agoThis paper proposes an improved high precision direct integration method (I-HPDIM) and an absolute-response-oriented scheme of pseudo-excitation method (PEM) for nonstationary stochastic seismic analysis of large structures under tridirectional nonuniformly modulated spatial ground motions. The proposed approaches resolve the bottle-neck problem of conventional HPDIM and significantly improve c...

submitted by

**JetCol**2 hours agoMotivated by Fichera’s idea for regularizing the rank-deficiency model, we derive the free–free flexibility matrices by inverting the bordered stiffness matrix. The singular stiffness matrix of a free–free structure is expanded to a bordered matrix by adding n slack variables, where n is the nullity of the singular stiffness matrix. Besides, the corresponding n constraints are accompanied...

submitted by

**yoro**2 hours agoA modified aLE method combining a body conforming mesh and a topology changing algorithm is developed to simulate unsteady symmetric fluid problems with bodies in close proximity. By using this method, the advantages of the original aLE method are used, while the disadvantages are reduced or eliminated. a mesh topology changing algorithm is used to create a computational domain boundary, while ...

submitted by

**blaigriinarongi**2 hours agoThere is a range of large knowledge bases, such as Freebase and DBpedia, as well as linked data sets available on the web, but they typically lack lexical information stating how the properties and classes they comprise are realized lexically. Often only one label is attached, if at all, thus lacking rich linguistic information, e.g. about morphological forms, syntactic arguments or possible le...

submitted by

**ManueGuad**2 hours agoIn order to speed up similarity queries evaluation, index structures divide the target dataset into subsets aimed at finding the answer without examining the entire dataset. As the complexity of the data types handled by modern applications keeps growing, searching by similarity becomes increasingly interesting, what makes the Metric Space Theory as the theoretical base to build the structures ...

submitted by

**oreisonta**2 hours agoScientific literature reveals that the symbolic representation techniques underlying some formal methods are useful in verifying properties or synthesizing parts of large discrete event systems. They involve, however, encoding complex schemata and fine-tuning heuristic parameters in order to translate specific problems into efficient BDD- or SAT-based representations. This approach may be too c...

submitted by

**dlob77**2 hours agoIn a bounded analysis, arithmetic operators become partial, and a different semantics becomes necessary. One approach, mimicking programming languages, is for overflow to result in wrap-around. Although easy to implement, wrap-around produces unexpected counterexamples that do not correspond to cases that would arise in the unbounded setting. This paper describes a new approach, implemented in ...