13,134 research outputs found
Recommended from our members
Linking human-building interactions in shared offices with personality traits
Occupant behavior influences office building energy performance. The level of human-building interactions (HBIs) in shared offices strongly influences building energy use and occupant well-being. This study explored the link between occupant personality types and their behaviors of sharing energy and environment control systems and interactions with their colleagues. Inspired by the Five-Factor Model (FFM), we classified HBI behaviors into four dimensions: willingness to share control, knowledge of control, group decision behavior, and adaptive strategies. These four variables can be mapped to the four personality traits proposed by the FFM: agreeableness, openness, extraversion, and conscientiousness. Our cluster analysis identified six behavioral patterns: average (17.7%), reserved (15.3%), environmentally friendly (16.6%), role model (24.2%), self-centered (17.2%), and mechanist (9.0%). We further applied association rules, a widely utilized machine learning technique, to discover how demographics, building-related contextual factors, and perception-attitudinal factors influence HBI behaviors. Country, control feature accessibility, and group dynamics were found to be the three most influential factors that determine occupants’ HBI behaviors. The study provides insights about building design and operation, as well as policy to promote socially and environmentally desirable HBI behaviors in a shared office environment
金剛石鉆進能量與花崗巖地層風化程度的關系
Based on experimental data from a drilling process monitoring system instrumented with a hydraulic rotary drill rig in fill-weathered granite formation, the diamond penetrating energy was analyzed. The result shows that the distribution of the penetrating energy in fill-weathered granite formation agrees with that in common weathered granite formation. A negative correlation between the viscous energy, kinetic energy, total penetrating energy and the weathered degree of granite existed, and a positive correlation between the thrust force energy and the weathered degree was presented, which indicates that there is a well response between the penetrating energy and the weathered degree of rock. However, the kinetic energy, thrust force energy and viscous energy are limited in identification of formation because of different effects in various drilling modes. The specific energy of diamond drilling (SEDD) increased with the weathered degree of rock and the values of SEDD can be classified into corresponding range according to the weathered degree of rock. It is shown that the SEDD in rotary drilling is apparently less than the specific energy of percussive drilling (SEPD) in both fill soil and very strongly weathered granite formation. Reversely, the SEDD is much more than the SEPD in lightly weathered hard rock.link_to_subscribed_fulltex
Feynman rules for the rational part of the Electroweak 1-loop amplitudes
We present the complete set of Feynman rules producing the rational terms of
kind R_2 needed to perform any 1-loop calculation in the Electroweak Standard
Model. Our results are given both in the 't Hooft-Veltman and in the Four
Dimensional Helicity regularization schemes. We also verified, by using both
the 't Hooft-Feynman gauge and the Background Field Method, a huge set of Ward
identities -up to 4-points- for the complete rational part of the Electroweak
amplitudes. This provides a stringent check of our results and, as a
by-product, an explicit test of the gauge invariance of the Four Dimensional
Helicity regularization scheme in the complete Standard Model at 1-loop. The
formulae presented in this paper provide the last missing piece for completely
automatizing, in the framework of the OPP method, the 1-loop calculations in
the SU(3) X SU(2) X U(1) Standard Model.Comment: Many thanks to Huasheng Shao for having recomputed, independently of
us, all of the effective vertices. Thanks to his help and by
comparing with an independent computation we performed in a general
gauge, we could fix, in the present version, the following formulae: the
vertex in Eq. (3.6), the vertex in Eq. (3.8),
Eqs (3.16), (3.17) and (3.18
Statistical analysis driven optimized deep learning system for intrusion detection
Attackers have developed ever more sophisticated and intelligent ways to hack
information and communication technology systems. The extent of damage an
individual hacker can carry out upon infiltrating a system is well understood.
A potentially catastrophic scenario can be envisaged where a nation-state
intercepting encrypted financial data gets hacked. Thus, intelligent
cybersecurity systems have become inevitably important for improved protection
against malicious threats. However, as malware attacks continue to dramatically
increase in volume and complexity, it has become ever more challenging for
traditional analytic tools to detect and mitigate threat. Furthermore, a huge
amount of data produced by large networks has made the recognition task even
more complicated and challenging. In this work, we propose an innovative
statistical analysis driven optimized deep learning system for intrusion
detection. The proposed intrusion detection system (IDS) extracts optimized and
more correlated features using big data visualization and statistical analysis
methods (human-in-the-loop), followed by a deep autoencoder for potential
threat detection. Specifically, a pre-processing module eliminates the outliers
and converts categorical variables into one-hot-encoded vectors. The feature
extraction module discard features with null values and selects the most
significant features as input to the deep autoencoder model (trained in a
greedy-wise manner). The NSL-KDD dataset from the Canadian Institute for
Cybersecurity is used as a benchmark to evaluate the feasibility and
effectiveness of the proposed architecture. Simulation results demonstrate the
potential of our proposed system and its outperformance as compared to existing
state-of-the-art methods and recently published novel approaches. Ongoing work
includes further optimization and real-time evaluation of our proposed IDS.Comment: To appear in the 9th International Conference on Brain Inspired
Cognitive Systems (BICS 2018
On BCFW shifts of integrands and integrals
In this article a first step is made towards the extension of
Britto-Cachazo-Feng-Witten (BCFW) tree level on-shell recursion relations to
integrands and integrals of scattering amplitudes to arbitrary loop order.
Surprisingly, it is shown that the large BCFW shift limit of the integrands has
the same structure as the corresponding tree level amplitude in any minimally
coupled Yang-Mills theory in four or more dimensions. This implies that these
integrands can be reconstructed from a subset of their `single cuts'. The main
tool is powercounting Feynman graphs in a special lightcone gauge choice
employed earlier at tree level by Arkani-Hamed and Kaplan. The relation between
shifts of integrands and shifts of its integrals is investigated explicitly at
one loop. Two particular sources of discrepancy between the integral and
integrand are identified related to UV and IR divergences. This is
cross-checked with known results for helicity equal amplitudes at one loop. The
nature of the on-shell residue at each of the single-cut singularities of the
integrand is commented upon. Several natural conjectures and opportunities for
further research present themselves.Comment: 43 pages, 6 figures, v2: minor improvement in exposition, typos
fixed, bibliography update
Theory and approach of identification of ground interfaces based on rock drillability index
Rock drillability index is a very key parameter in selection of drill bit type and determination of productivity in petroleum, mining and geology. Unfortunately, there are many limits in the current definition as well as experimental methods. Drillability is redefined and a new concept of drillability index is brought out from analysis. Under the new concept, the drillability index is defined as penetration rate under specific energy. Based on the coupling relationship among effective thrust, rotation speed, penetration rate and drillability index, a calculation formula is established. Besides, the sensitivity of the drillability index in identification of ground layer is analyzed and its physical signification is expatiated also. The result shows that the new index overcomes the blind area in the traditional concept and can be used in continuous identification of ground layer along borehole profile.link_to_subscribed_fulltex
Monodromy--like Relations for Finite Loop Amplitudes
We investigate the existence of relations for finite one-loop amplitudes in
Yang-Mills theory. Using a diagrammatic formalism and a remarkable connection
between tree and loop level, we deduce sequences of amplitude relations for any
number of external legs.Comment: 24 pages, 6 figures, v2 typos corrected, reference adde
On the Numerical Evaluation of Loop Integrals With Mellin-Barnes Representations
An improved method is presented for the numerical evaluation of multi-loop
integrals in dimensional regularization. The technique is based on
Mellin-Barnes representations, which have been used earlier to develop
algorithms for the extraction of ultraviolet and infrared divergencies. The
coefficients of these singularities and the non-singular part can be integrated
numerically. However, the numerical integration often does not converge for
diagrams with massive propagators and physical branch cuts. In this work,
several steps are proposed which substantially improve the behavior of the
numerical integrals. The efficacy of the method is demonstrated by calculating
several two-loop examples, some of which have not been known before.Comment: 13 pp. LaTe
Interface identification in weathered granite strata based on a instrumented drilling system
A hydraulic rotary drill instrumented with a drilling process monitoring system (DPM) was used for site investigation in Hong Kong weathered granite foundation engineering. The penetrating parameters such as effective thrust force, rotational speed, flushing pressure, penetrating rate and displacement of the bit were monitored in real time. A varied slope was defined as a significant index for identification of dominative and subsidiary interfaces in the granite site. The result from t-test shows that the confidence of the DPM in identification of the geotechnical interfaces is 99%. Besides, the analysis of variation of the penetrating parameters at the interfaces indicates that there are different fluctuations at the interfaces in the curves of the parameters with borehole depth. The response degree of effective thrust force and penetrating rate to the variation of rock strength at the interfaces is 81.82% alone.link_to_subscribed_fulltex
Rational Terms in Theories with Matter
We study rational remainders associated with gluon amplitudes in gauge
theories coupled to matter in arbitrary representations. We find that these
terms depend on only a small number of invariants of the matter-representation
called indices. In particular, rational remainders can depend on the second and
fourth order indices only. Using this, we find an infinite class of
non-supersymmetric theories in which rational remainders vanish for gluon
amplitudes. This class includes all the "next-to-simplest" quantum field
theories of arXiv:0910.0930. This provides new examples of amplitudes in which
rational remainders vanish even though naive power counting would suggest their
presence.Comment: 10+4 pages. (v2) typos corrected, references adde
- …
