23 research outputs found

    Optimized shunting with mixed-usage tracks

    Get PDF
    We consider the planning of railway freight classification at hump yards, where the problem involves the formation of departing freight train blocks from arriving trains subject to scheduling and capacity constraints. The hump yard layout considered consists of arrival tracks of sufficient length at an arrival yard, a hump, classification tracks of non-uniform and possibly non-sufficient length at a classification yard, and departure tracks of sufficient length. To increase yard capacity, freight cars arriving early can be stored temporarily on specific mixed-usage tracks. The entire hump yard planning process is covered in this paper, and heuristics for arrival and departure track assignment, as well as hump scheduling, have been included to provide the neccessary input data. However, the central problem considered is the classification track allocation problem. This problem has previously been modeled using direct mixed integer programming models, but this approach did not yield lower bounds of sufficient quality to prove optimality. Later attempts focused on a column generation approach based on branch-and-price that could solve problem instances of industrial size. Building upon the column generation approach we introduce a direct arc-based integer programming model, where the arcs are precedence relations between blocks on the same classification track. Further, the most promising models are adapted for rolling-horizon planning. We evaluate the methods on historical data from the Hallsberg shunting yard in Sweden. The results show that the new arc-based model performs as well as the column generation approach. It returns an optimal schedule within the execution time limit for all instances but from one, and executes as fast as the column generation approach. Further, the short execution times of the column generation approach and the arc-indexed model make them suitable for rolling-horizon planning, while the direct mixed integer program proved to be too slow for this. Extended analysis of the results shows that mixing was only required if the maximum number of concurrent trains on the classification yard exceeds 29 (there are 32 available tracks), and that after this point the number of extra car roll-ins increases heavily

    Intelligent cameral control for graphical environments

    Get PDF
    Thesis (Ph. D.)--Massachusetts Institute of Technology, Program in Media Arts & Sciences, 1994.Includes bibliographical references (leaves 194-207).by Steven Mark Drucker.Ph.D

    Cybersecurity Planning Insight: CSCD (Cyber Security and Cyber Defense) Control: Framework For Strategic Direction and Governance

    Get PDF
    Dissertation presented as the partial requirement for obtaining a Master's degree in Information Management, specialization in Information Systems and Technologies ManagementIn this recent time, the importance of cybersecurity and cyber defense is sky-high. Everyone uses different devices, IT infrastructures, and applications for various purposes at school, office, home, hospitals everywhere. With the enlightenment of technology, the nature of cyber-attack has been changed dramatically, and that is why the number of cyber-attacks have been increased. Enterprises face billions of Euros loss from such incidents; even the data loss and operational hazard may have a devastating impact not only on the service, security, privacy, brand image but also upon overall business. A constrictive and realistic CSCD (cyber security and cyber defense) strategy along with the proper implementation of it, can safeguard the enterprises and strongly from cyber attacks. In this paper, we prepare an improved CSCD control framework based on several hundreds of scientific papers and frameworks. Moreover, we identify different aspects and strategic elements by holistic CSCD control risk assessment and data analysis for preparing CSCD strategy and planning of different levels of organizations to maintain effective CSCD governance and cyber resilience

    Immersive Telepresence: A framework for training and rehearsal in a postdigital age

    Get PDF

    Bonding Over Distances: Building Social Presence Using Mixed Reality for Transnational Families

    Get PDF
    Sparked by the frustrations experienced in transnational family communication and inspired by an interest in exploring the potentials of a mixed reality (MR) future landscape, this study investigates the primary research question: how can we use mixed reality to build social presence for transnational family communication? This study reviews literature and contextual works from relevant fields, including presence and social presence, mixed reality, transnational relationships (inter-family and human-space relationships), and technology for social presence for transnational families. Then, the researcher situates this study at the intersection of the before mentioned categories. Utilizing the Research through Design methodology and paired user testing methods, this study describes 4 iterative MR prototypes for building social presence for transnational families, highlighting each prototype’s relation to a secondary research question, exploration goals, features, performance evaluation, and takeaways for the next iteration. Then, it documents and analyzes data collected from in-depth user testing sessions with 6 transnational family pairs totaling 12 participants, each with one member living locally (in Toronto), and the other overseas. The quantitative and qualitative data were collected from different components of the user testing, including observation notes from paired-up live connection sessions for collaborative tasks, interviews, and online surveys. This study contributes to theory at the overlapping fields of social presence, mixed reality research, transnational family relationship, and human-space relationship. The mixed reality prototypes, design frameworks, and evaluation criteria for designing mixed reality spaces to build social presence for transnational families also provide significance to design practice

    Spherical mosaic construction using physical analogy for consistent image alignment

    Get PDF
    The research contained in this thesis is an investigation into mosaic construction. Mosaic techniques are used to obtain images with a large field of view by assembling a sequence of smaller individual overlapping images. In existing methods of mosaic construction only successive images are aligned. Accumulation of small alignment errors occur, and in the case of the image path returning to a previous position in the mosaic, a significant mismatch between nonconsecutive images will result (looping path problem). A new method for consistently aligning all the images in a mosaic is proposed in this thesis. This is achieved by distribution of the small alignment errors. Each image is allowed to modify its position relative to its neighbour images in the mosaic by a small amount with respect to the computed registration. Two images recorded by a rotating ideal camera are related by the same transformation that relates the camera's sensor plane at the time the images were captured. When two images overlap, the intensity values in both images coincide through the intersection line of the sensor planes. This intersection line has the property that the images can be seamlessly joined through that line. An analogy between the images and the physical world is proposed to solve the looping path problem. The images correspond to rigid objects, and these are linked with forces which pull them towards the right positions with respect to their neighbours. That is, every pair of overlapping images are "hinged" through their corresponding intersection line. Aided by another constraint named the spherical constraint, this network of selforganising images has the ability of distributing itself on the surface of a sphere. As a direct result of the new concepts developed in this research work, spherical mosaics (i.e. mosaics with unlimited horizontal and vertical field of view) can be created

    AESTHETIC PERCEPTION AND MOTIVATION MODEL FOR FORMAL AND INFORMAL VISUAL ENVIRONMENTS

    Get PDF
    Researchers claim that aesthetic qualities of Formal Learning Visual Environments (FL YEs) have a persuasive role in intensifying learning motivation. Unfortunately, designers seem to overlook the necessity of aesthetic designing of FL YEs that could sustain Learners' Learning Motivation (LLM). The existing literature on aesthetic designing of FL YEs primarily focuses upon environment perspective and users' perspective. The existing studies, however, do not take into account, Learners' Aesthetic Perceptions (LAPs) in Informal Visual Environments (!YEs) which may also influence upon LLM. Recent research in this domain suggests that IVEs are producing learners' with a new profile of cognitive skills, such as visual-spatial intelligence and enhanced aesthetic perceptions. It is thus argued that LAPs formed in IVEs may result in establishment of new schemas (set of aesthetic expectations) and make learners' perceptually selective in judging aesthetics

    Analysis of Apollo 8 Photography and Visual Observations

    Get PDF
    Apollo 8 observations of lunar topograph

    Privacy in the age of facebook : discourse, architecture, consequences

    Get PDF
    Most academic and journalistic discussions of privacy on Facebook have centred on users, rather than the company behind the site. The result is an overwhelming focus on the perceived shortcomings of users with respect to irresponsible privacy behaviours, rather than an examination of the potential role that Facebook Inc. may have in encouraging such behaviours. Aiming to counterbalance this common technologically deterministic perspective, this thesis deploys a multi-layered ethnographic approach in service of a deep and nuanced analysis of privacy on Facebook. This approach not only looks at both the users and creators of Facebook, it examines Facebook Inc. in the context of historical, cultural and discursive perspectives.Specifically, this thesis details how the company's privacy policy and design decisions are guided not simply by profit, but by a belief system which which encourages "radical transparency" (Kirkpatrick, 2010) and is at odds with conventional understandings of privacy. In turn, drawing on Fiske's model of popular culture, users "make do" with the limited privacy choices afforded them by the site, while at the same time attempting to maximise its social utility. As this dynamic demonstrates, Facebook Inc. plays a critical, yet often overlooked role in shaping privacy norms and behaviours through site policies and architecture. Taken together, the layers of this thesis provide greater insight into user behaviour with respect to privacy, and, more broadly, demonstrate the importance of including critical analyses of social media companies in examinations of privacy culture

    Proceedings of the 1993 Conference on Intelligent Computer-Aided Training and Virtual Environment Technology, Volume 1

    Get PDF
    These proceedings are organized in the same manner as the conference's contributed sessions, with the papers grouped by topic area. These areas are as follows: VE (virtual environment) training for Space Flight, Virtual Environment Hardware, Knowledge Aquisition for ICAT (Intelligent Computer-Aided Training) & VE, Multimedia in ICAT Systems, VE in Training & Education (1 & 2), Virtual Environment Software (1 & 2), Models in ICAT systems, ICAT Commercial Applications, ICAT Architectures & Authoring Systems, ICAT Education & Medical Applications, Assessing VE for Training, VE & Human Systems (1 & 2), ICAT Theory & Natural Language, ICAT Applications in the Military, VE Applications in Engineering, Knowledge Acquisition for ICAT, and ICAT Applications in Aerospace
    corecore