11,695 research outputs found
Recommended from our members
Linking human-building interactions in shared offices with personality traits
Occupant behavior influences office building energy performance. The level of human-building interactions (HBIs) in shared offices strongly influences building energy use and occupant well-being. This study explored the link between occupant personality types and their behaviors of sharing energy and environment control systems and interactions with their colleagues. Inspired by the Five-Factor Model (FFM), we classified HBI behaviors into four dimensions: willingness to share control, knowledge of control, group decision behavior, and adaptive strategies. These four variables can be mapped to the four personality traits proposed by the FFM: agreeableness, openness, extraversion, and conscientiousness. Our cluster analysis identified six behavioral patterns: average (17.7%), reserved (15.3%), environmentally friendly (16.6%), role model (24.2%), self-centered (17.2%), and mechanist (9.0%). We further applied association rules, a widely utilized machine learning technique, to discover how demographics, building-related contextual factors, and perception-attitudinal factors influence HBI behaviors. Country, control feature accessibility, and group dynamics were found to be the three most influential factors that determine occupants’ HBI behaviors. The study provides insights about building design and operation, as well as policy to promote socially and environmentally desirable HBI behaviors in a shared office environment
Statistical analysis driven optimized deep learning system for intrusion detection
Attackers have developed ever more sophisticated and intelligent ways to hack
information and communication technology systems. The extent of damage an
individual hacker can carry out upon infiltrating a system is well understood.
A potentially catastrophic scenario can be envisaged where a nation-state
intercepting encrypted financial data gets hacked. Thus, intelligent
cybersecurity systems have become inevitably important for improved protection
against malicious threats. However, as malware attacks continue to dramatically
increase in volume and complexity, it has become ever more challenging for
traditional analytic tools to detect and mitigate threat. Furthermore, a huge
amount of data produced by large networks has made the recognition task even
more complicated and challenging. In this work, we propose an innovative
statistical analysis driven optimized deep learning system for intrusion
detection. The proposed intrusion detection system (IDS) extracts optimized and
more correlated features using big data visualization and statistical analysis
methods (human-in-the-loop), followed by a deep autoencoder for potential
threat detection. Specifically, a pre-processing module eliminates the outliers
and converts categorical variables into one-hot-encoded vectors. The feature
extraction module discard features with null values and selects the most
significant features as input to the deep autoencoder model (trained in a
greedy-wise manner). The NSL-KDD dataset from the Canadian Institute for
Cybersecurity is used as a benchmark to evaluate the feasibility and
effectiveness of the proposed architecture. Simulation results demonstrate the
potential of our proposed system and its outperformance as compared to existing
state-of-the-art methods and recently published novel approaches. Ongoing work
includes further optimization and real-time evaluation of our proposed IDS.Comment: To appear in the 9th International Conference on Brain Inspired
Cognitive Systems (BICS 2018
Next-to-leading order QCD predictions for W+W+jj production at the LHC
Because the LHC is a proton-proton collider, sizable production of two
positively charged W-bosons in association with two jets is possible. This
process leads to a distinct signature of same sign high-pt leptons, missing
energy and jets. We compute the NLO QCD corrections to the QCD-mediated part of
pp -> W+W+jj. These corrections reduce the dependence of the production
cross-section on the renormalization and factorization scale to about +- 10
percent. We find that a large number of W+W+jj events contain a relatively hard
third jet. The presence of this jet should help to either pick up the W+W+jj
signal or to reject it as an unwanted background.Comment: 15 pages, 5 (lovely) figures, v3 accepted for publication in JHEP,
corrects tables in appendi
Project-Based Methodology to Lecture on Web Frameworks Applied to the Management of Health-Related Data
The management and processing of the data generated by
healthcare systems is getting more and more attention because of the
digitalization of a traditionally analogical sector such as healthcare.
Various data management frameworks and solutions have emerged to
face some of the multiple challenges present in this environment, includ ing: (a) Data privacy and security; (b) Inter-operability between het erogeneous systems; and (c) Usability and readability of health-related
sensitive information.
In this paper, the authors share their experience on lecturing on how
to address such issues by developing web-based software from several
points of views: (a) Healthcare professional needs and requirements in
terms of usability, accessibility and easiness; (b) Technical requirements
and knowledge required to develop all the layers of a fully functional
example of a micro health information system; and (c) Technical require ments to share and distribute the data required by several agents of the
healthcare environment, focusing on the adoption of international stan dards such as HL7; (d) Perform of all operations in a secure, available
and reliable way.
It is concluded that the application of Flipped Teaching among with
Project-based Learning may have a very positive impact on both in
grades and drop rates for late-years (junior and senior) courses within
the Health Engineering bachelor’s degrees
Monodromy--like Relations for Finite Loop Amplitudes
We investigate the existence of relations for finite one-loop amplitudes in
Yang-Mills theory. Using a diagrammatic formalism and a remarkable connection
between tree and loop level, we deduce sequences of amplitude relations for any
number of external legs.Comment: 24 pages, 6 figures, v2 typos corrected, reference adde
金剛石鉆進能量與花崗巖地層風化程度的關系
Based on experimental data from a drilling process monitoring system instrumented with a hydraulic rotary drill rig in fill-weathered granite formation, the diamond penetrating energy was analyzed. The result shows that the distribution of the penetrating energy in fill-weathered granite formation agrees with that in common weathered granite formation. A negative correlation between the viscous energy, kinetic energy, total penetrating energy and the weathered degree of granite existed, and a positive correlation between the thrust force energy and the weathered degree was presented, which indicates that there is a well response between the penetrating energy and the weathered degree of rock. However, the kinetic energy, thrust force energy and viscous energy are limited in identification of formation because of different effects in various drilling modes. The specific energy of diamond drilling (SEDD) increased with the weathered degree of rock and the values of SEDD can be classified into corresponding range according to the weathered degree of rock. It is shown that the SEDD in rotary drilling is apparently less than the specific energy of percussive drilling (SEPD) in both fill soil and very strongly weathered granite formation. Reversely, the SEDD is much more than the SEPD in lightly weathered hard rock.link_to_subscribed_fulltex
Feynman rules for the rational part of the Electroweak 1-loop amplitudes
We present the complete set of Feynman rules producing the rational terms of
kind R_2 needed to perform any 1-loop calculation in the Electroweak Standard
Model. Our results are given both in the 't Hooft-Veltman and in the Four
Dimensional Helicity regularization schemes. We also verified, by using both
the 't Hooft-Feynman gauge and the Background Field Method, a huge set of Ward
identities -up to 4-points- for the complete rational part of the Electroweak
amplitudes. This provides a stringent check of our results and, as a
by-product, an explicit test of the gauge invariance of the Four Dimensional
Helicity regularization scheme in the complete Standard Model at 1-loop. The
formulae presented in this paper provide the last missing piece for completely
automatizing, in the framework of the OPP method, the 1-loop calculations in
the SU(3) X SU(2) X U(1) Standard Model.Comment: Many thanks to Huasheng Shao for having recomputed, independently of
us, all of the effective vertices. Thanks to his help and by
comparing with an independent computation we performed in a general
gauge, we could fix, in the present version, the following formulae: the
vertex in Eq. (3.6), the vertex in Eq. (3.8),
Eqs (3.16), (3.17) and (3.18
Interface identification in weathered granite strata based on a instrumented drilling system
A hydraulic rotary drill instrumented with a drilling process monitoring system (DPM) was used for site investigation in Hong Kong weathered granite foundation engineering. The penetrating parameters such as effective thrust force, rotational speed, flushing pressure, penetrating rate and displacement of the bit were monitored in real time. A varied slope was defined as a significant index for identification of dominative and subsidiary interfaces in the granite site. The result from t-test shows that the confidence of the DPM in identification of the geotechnical interfaces is 99%. Besides, the analysis of variation of the penetrating parameters at the interfaces indicates that there are different fluctuations at the interfaces in the curves of the parameters with borehole depth. The response degree of effective thrust force and penetrating rate to the variation of rock strength at the interfaces is 81.82% alone.link_to_subscribed_fulltex
On BCFW shifts of integrands and integrals
In this article a first step is made towards the extension of
Britto-Cachazo-Feng-Witten (BCFW) tree level on-shell recursion relations to
integrands and integrals of scattering amplitudes to arbitrary loop order.
Surprisingly, it is shown that the large BCFW shift limit of the integrands has
the same structure as the corresponding tree level amplitude in any minimally
coupled Yang-Mills theory in four or more dimensions. This implies that these
integrands can be reconstructed from a subset of their `single cuts'. The main
tool is powercounting Feynman graphs in a special lightcone gauge choice
employed earlier at tree level by Arkani-Hamed and Kaplan. The relation between
shifts of integrands and shifts of its integrals is investigated explicitly at
one loop. Two particular sources of discrepancy between the integral and
integrand are identified related to UV and IR divergences. This is
cross-checked with known results for helicity equal amplitudes at one loop. The
nature of the on-shell residue at each of the single-cut singularities of the
integrand is commented upon. Several natural conjectures and opportunities for
further research present themselves.Comment: 43 pages, 6 figures, v2: minor improvement in exposition, typos
fixed, bibliography update
Theory and approach of identification of ground interfaces based on rock drillability index
Rock drillability index is a very key parameter in selection of drill bit type and determination of productivity in petroleum, mining and geology. Unfortunately, there are many limits in the current definition as well as experimental methods. Drillability is redefined and a new concept of drillability index is brought out from analysis. Under the new concept, the drillability index is defined as penetration rate under specific energy. Based on the coupling relationship among effective thrust, rotation speed, penetration rate and drillability index, a calculation formula is established. Besides, the sensitivity of the drillability index in identification of ground layer is analyzed and its physical signification is expatiated also. The result shows that the new index overcomes the blind area in the traditional concept and can be used in continuous identification of ground layer along borehole profile.link_to_subscribed_fulltex
- …