43 research outputs found

    Model Updating Procedure to Enhance Structural Analysis in FE Code NOSA-ITACA

    Get PDF
    This paper describes a model updating procedure implemented in NOSA-ITACA, a finite-element (FE) code for the structural analysis of masonry constructions of historical interest. The procedure, aimed at matching experimental frequencies and mode shapes, allows for fine-tuning the calculations of the free parameters in the model. The numerical method is briefly described, and some issues related to its robustness are addressed. The procedure is then applied to a simple case study and two historical structures in Tuscany, the Clock Tower in Lucca and the Maddalena Bridge in Borgo a Mozzano

    Wireless Sensor Network Deployment for Monitoring Soil Moisture Dynamics at the Field Scale

    Get PDF
    AbstractWe describe the deployment of a Wireless Sensor Network (WSN), composed of 135 soil moisture and 27 temperature sensors, in an apple tree orchard of about 5000 m2, located in the municipality of Cles, a small town in the Alpine region, northeastern Italy. The orchard is divided into three parcels each one subjected to a different irrigation schedule. The objective of the present work is to monitor soil moisture dynamics in the top soil to a detail, in both space and time, suitable to analyze the interplay between soil moisture dynamics and plant physiology. The deployment consists of 27 locations (verticals) connected by a multi hop WSN, each one equipped with 5 soil moisture sensors deployed at the depths of 10, 20, 30, 50 and 80 cm, and a temperature sensor at the depth of 20 cm. The proposed monitoring system is based on totally independent sensor nodes, which allow both real time and historic data management and are connected through an input/output interface to a WSN platform. Meteorological data are monitored by a weather station located at a distance of approximately 100 m from the experimental site.Great care has been posed to calibration of the capacitance sensors, both in the laboratory, with soil samples, and on site, after deployment, in order to minimize the noise caused by small oscillations in the input voltage and uncertainty in the calibration curves. In this work we report the results of a preliminary analysis on the data collected during the growing season 2009. We observed that the WSN greatly facilitates the collection of detailed measurements of soil moisture, thereby increasing the amount of information useful for exploring hydrological processes, but they should be used with care since the accuracy of collected data depends critically on the capability of the system to maintain constant the input voltage and on the reliability of calibration curves. Finally, we studied the spatial and temporal distribution of soil moisture in all the irrigated parcels, and explored how different irrigation schedules influence orchard's production

    Model parameter estimation using Bayesian and deterministic approaches: the case study of the Maddalena Bridge

    Get PDF
    Finite element modeling has become common practice for assessing the structural health of historic constructions. However, because of the uncertainties typically affecting our knowledge of the geometrical dimensions, material properties and boundary conditions, numerical models can fail to predict the static and dynamic behavior of such structures. In order to achieve more reliable predictions, important information can be obtained measuring the structural response under ambient vibrations. This wholly non-destructive technique allows obtaining very accurate information on the structure’s dynamic properties (Brincker and Ventura (2015)). Moreover, when experimental data is coupled with a finite element model, an estimate of the boundary conditions and the mechanical properties of the constituent materials can also be obtained via model updating procedures. This work presents two different model updating procedures. The first relies on construction of local parametric reduced-order models embedded in a trust region scheme to minimize the distance between the natural frequencies experimentally determined and the corresponding numerically evaluated ones (Girardi et al. (2018)). The second has been developed within a Bayesian statistical framework and uses both frequencies and mode shapes (Yuen (2015)). Both algorithms are used in conjunction with the NOSA-ITACA code for calculation of the eigenfrequencies and eigenvectors. These procedures are illustrated in the case study of the medieval Maddalena Bridge in Borgo a Mozzano (Italy). Experimental data, frequencies and mode shapes, acquired in 2015 (Azzara et al. (2017)) have enabled calibration of the bridge’s constituent materials and boundary condition

    The Need for Compliance Verification in Collaborative Business Processes

    Get PDF
    Compliance constrains processes to adhere to rules, standards, laws and regulations. Non-compliance subjects enterprises to litigation and financial fines. Collaborative business processes cross organizational and regional borders implying that internal and cross regional regulations must be complied with. To protect customs’ data, European enterprises must comply with the EU data privacy regulation (general data protection regulation - GDPR) and each member state’s data protection laws. An example of non-compliance with GDPR is Facebook, it is accused for breaching subscriber trust. Compliance verification is thus essential to deploy and implement collaborative business process systems. It ensures that processes are checked for conformance to compliance requirements throughout their life cycle. In this paper we take a proactive approach aiming to discuss the need for design time preventative compliance verification as opposed to after effect runtime detective approach. We use a real-world case to show how compliance needs to be analyzed and show the benefits of applying compliance check at the process design stag

    The Need for Compliance Verification in Collaborative Business Processes

    Get PDF
    Compliance constrains processes to adhere to rules, standards, laws and regulations. Non-compliance subjects enterprises to litigation and financial fines. Collaborative business processes cross organizational and regional borders implying that internal and cross regional regulations must be complied with. To protect customs’ data, European enterprises must comply with the EU data privacy regulation (general data protection regulation - GDPR) and each member state’s data protection laws. An example of non-compliance with GDPR is Facebook, it is accused for breaching subscriber trust. Compliance verification is thus essential to deploy and implement collaborative business process systems. It ensures that processes are checked for conformance to compliance requirements throughout their life cycle. In this paper we take a proactive approach aiming to discuss the need for design time preventative compliance verification as opposed to after effect runtime detective approach. We use a real-world case to show how compliance needs to be analyzed and show the benefits of applying compliance check at the process design stag

    A class of quasi-sparse companion pencils

    Get PDF
    In this paper, we introduce a general class of quasi-sparse potential companion pencils for arbitrary square matrix polynomials over an arbitrary field, which extends the class introduced in [B. Eastman, I.-J. Kim, B. L. Shader, K.N. Vander Meulen, Companion matrix patterns. Linear Algebra Appl. 436 (2014) 255-272] for monic scalar polynomials. We provide a canonical form, up to permutation, for companion pencils in this class. We also relate these companion pencils with other relevant families of companion linearizations known so far. Finally, we determine the number of different sparse companion pencils in the class, up to permutation.This work has been partially supported by theMinisterio de EconomĂ­a y Competitividad of Spain through grants MTM2015-68805-REDT and MTM2015-65798-P

    Verification and Compliance in Collaborative Processes

    Get PDF
    Evidently, COVID-19 has changed our lives and is likely to make a lasting impact on our economic development and our industry and services. With the ongoing process of digital transformation in industry and services, Collaborative Networks (CNs) is required to be more efficient, productive, flexible, resilient and sustainable according to change of situations and related rules applied afterwards. Although the CN area is relatively young, it requires the previous research to be extended, i.e. business process management from dealing with processes within a single organization into processes across different organizations. In this paper, we review current business process verification and compliance research. Different tools approaches and limitations of them are compared. The further research issues and potential solutions of business process verification and compliance check are discussed in the context of CNs

    A Socio-Technical and Co-Evolutionary Framework for Reducing Human-Related Risks in Cyber Security and Cybercrime Ecosystems

    Get PDF
    The focus on cyber security as an interaction between technical elements and humans has typically confined consideration of the latter to practical issues of implementation, conventionally those of `human performance factors' of vigilance etc., 'raising awareness' and/or 'incentivization' of people and organizations to participate and adapt their behavior. But this is far too narrow a view that seriously constrains the ability of cyber security as a whole to adapt and evolve to keep up with adaptive, innovative attackers in a rapidly-changing technological, business and social landscape, in which personal preferences of users are also dynamically evolving. While there is isolated research across different research areas, we noticed the lack of a \emph{holistic} framework combining a range of applicable theoretical concepts (e.g., cultural co-evolution such as technological arms races, opportunity management, behavioral and business models) and technological solutions on reducing human-related risks in the cyber security and cybercrime ecosystems, which involve multiple groups of human actors including offenders, victims, preventers and promoters. This paper reports our ongoing work in developing such a socio-technical framework 1) to allow a more comprehensive understanding of human-related risks within cyber security and cybercrime ecosystems and 2) to support the design of more effective approaches to engaging individuals and organizations in the reduction of such risks. We are in the process of instantiating this framework to encourage behavioral changes in two use cases that capture diverse and complicated socio-technical interactions in cyber-physical systems
    corecore