Qualification of physical and engineering risks: Experience in the quantification of engineering risks

This paper concentrates mainly on the quantification of selected risks in industrial activities and with those events that might harm the public - possibly in large numbers - rather than those at work. The paper gives my opinion of the state of the art of risk identification and assessment, discusses techniques which are used and gives examples and references to assessments in nuclear plant, chemical plant and transport, the handling of liquefied petroleum products and others. Some assessments are exploratory, others carried out in great depth. The paper discusses the purpose of assessment, its uncertainties, its value, and pointers to further development.

Author(s):  
Sebastian Hoppe Nesgaard Jensen ◽  
Mads Emil Brix Doest ◽  
Henrik Aanæs ◽  
Alessio Del Bue

AbstractNon-rigid structure from motion (nrsfm), is a long standing and central problem in computer vision and its solution is necessary for obtaining 3D information from multiple images when the scene is dynamic. A main issue regarding the further development of this important computer vision topic, is the lack of high quality data sets. We here address this issue by presenting a data set created for this purpose, which is made publicly available, and considerably larger than the previous state of the art. To validate the applicability of this data set, and provide an investigation into the state of the art of nrsfm, including potential directions forward, we here present a benchmark and a scrupulous evaluation using this data set. This benchmark evaluates 18 different methods with available code that reasonably spans the state of the art in sparse nrsfm. This new public data set and evaluation protocol will provide benchmark tools for further development in this challenging field.


Author(s):  
Judith Good

In 2011, the author published an article that looked at the state of the art in novice programming environments. At the time, there had been an increase in the number of programming environments that were freely available for use by novice programmers, particularly children and young people. What was interesting was that they offered a relatively sophisticated set of development and support features within motivating and engaging environments, where programming could be seen as a means to a creative end, rather than an end in itself. Furthermore, these environments incorporated support for the social and collaborative aspects of learning. The article considered five environments—Scratch, Alice, Looking Glass, Greenfoot, and Flip—examining their characteristics and investigating the opportunities they might offer to educators and learners alike. It also considered the broader implications of such environments for both teaching and research. In this chapter, the author revisits the same five environments, looking at how they have changed in the intervening years. She considers their evolution in relation to changes in the field more broadly (e.g., an increased focus on “programming for all”) and reflects on the implications for teaching, as well as research and further development.


2017 ◽  
Vol 9 (3) ◽  
pp. 58-72 ◽  
Author(s):  
Guangyu Wang ◽  
Xiaotian Wu ◽  
WeiQi Yan

The security issue of currency has attracted awareness from the public. De-spite the development of applying various anti-counterfeit methods on currency notes, cheaters are able to produce illegal copies and circulate them in market without being detected. By reviewing related work in currency security, the focus of this paper is on conducting a comparative study of feature extraction and classification algorithms of currency notes authentication. We extract various computational features from the dataset consisting of US dollar (USD), Chinese Yuan (CNY) and New Zealand Dollar (NZD) and apply the classification algorithms to currency identification. Our contributions are to find and implement various algorithms from the existing literatures and choose the best approaches for use.


2018 ◽  
pp. 252-269
Author(s):  
Guangyu Wang ◽  
Xiaotian Wu ◽  
WeiQi Yan

The security issue of currency has attracted awareness from the public. De-spite the development of applying various anti-counterfeit methods on currency notes, cheaters are able to produce illegal copies and circulate them in market without being detected. By reviewing related work in currency security, the focus of this paper is on conducting a comparative study of feature extraction and classification algorithms of currency notes authentication. We extract various computational features from the dataset consisting of US dollar (USD), Chinese Yuan (CNY) and New Zealand Dollar (NZD) and apply the classification algorithms to currency identification. Our contributions are to find and implement various algorithms from the existing literatures and choose the best approaches for use.


1979 ◽  
Vol 43 (4) ◽  
pp. 55-68 ◽  
Author(s):  
Vijay Mahajan ◽  
Eitan Muller

This paper assesses the state-of-the-art of the diffusion models of new product acceptance. A number of issues related to the further development and validation of these models are discussed.


2018 ◽  
Vol 3 (1) ◽  
pp. 821 ◽  
Author(s):  
Antony García ◽  
Yessica Sáez ◽  
José Muñoz ◽  
Ignacio Chang ◽  
Héctor Montes Franceschi

This article presents the state of the art on the use of radiofrequency communication for the detection of objects and vehicles in motion, through the interaction between transmitter and receiver devices using ISM (Industrial, Scientific and Medical) bands. By quantifying parameters such as the absence or presence of signals and their intensity, it is possible to approximate the distance between an emitting device and a receiver, localized in the vehicle and a fixed point, respectively . The study of the methodologies used in this article aims to develop a system oriented to guide people with visual disabilities in the public transportation system, taking advantage of the main characteristics of radiofrequency communication: low cost, easy implementation and full compatibility with electronic boards built on embedded systems.Keywords: radiofrequency, ISM bands, detection of vehicles in motion, support for visual disability people, ETA


Author(s):  
Cláudia Ribeiro

This chapter provides an overview of the state of the art concerning the application of ICTs in parliaments and of the main problems identified when considering engaging the public through ICTs. Using the Portuguese Parliament as a case study, the chapter analyzes some effective approaches using ICTs to involve citizens and to support the dialogue regarding the legislative process. The conclusion emerging from the chapter is that the use of ICTs is not enough to get citizens to trust the parliament and to maintain their involvement. Parliaments need to follow a strategic and coherent plan that considers other questions apart from technology and goes beyond making documents available to the public. Parliaments need to ensure that their information systems provide both information and communication and meet the criteria of clarity, accuracy, timeliness, completeness, and the provision of feedback.


2021 ◽  
pp. 1-13
Author(s):  
Deguang Chen ◽  
Ziping Ma ◽  
Lin Wei ◽  
Yanbin Zhu ◽  
Jinlin Ma ◽  
...  

Text-based reading comprehension models have great research significance and market value and are one of the main directions of natural language processing. Reading comprehension models of single-span answers have recently attracted more attention and achieved significant results. In contrast, multi-span answer models for reading comprehension have been less investigated and their performances need improvement. To address this issue, in this paper, we propose a text-based multi-span network for reading comprehension, ALBERT_SBoundary, and build a multi-span answer corpus, MultiSpan_NMU. We also conduct extensive experiments on the public multi-span corpus, MultiSpan_DROP, and our multi-span answer corpus, MultiSpan_NMU, and compare the proposed method with the state-of-the-art. The experimental results show that our proposed method achieves F1 scores of 84.10 and 92.88 on MultiSpan_DROP and MultiSpan_NMU datasets, respectively, while it also has fewer parameters and a shorter training time.


1994 ◽  
Vol 160 ◽  
pp. 467-470
Author(s):  
Andrea Milani ◽  
Edward Bowell ◽  
Zoran Knežević ◽  
Anne Lemaitre ◽  
Alessandro Morbidelli ◽  
...  

We have assembled the asteroid proper elements computed by different authors, using different methods, and for different regions of the asteroid belt. Asteroids on planet crossing orbits are not yet included. The use of very different algorithms is dictated by the dynamics of the different regions. For the asteroids of the main belt, having semimajor axes between 2.1 and 3.8 AU, and with proper eccentricity and sine of inclination less than 0.3, proper elements are computed by a fully analytical iterative theory developed by Milani and Knežević (1990,1992,1994; hereafter M&K). For high inclination and/or eccentricity main-belt asteroids, having 1.8 < a < 3.8 AU and either e or sin I larger than 0.24, proper elements are computed by a semianalytical theory developed by Lemaitre and Morbidelli (1994; hereafter L&M). For Trojans, proper elements are computed by a synthetic theory (that is, from the output of a numerical integration for a few Myr) by Milani (1993). For the Hilda asteroids in the 3: 2 resonance, proper elements have been computed by a synthetic theory by Schubart (1982, 1991). For a discussion of the state of the art in the computation of proper elements, see Knežević and Milani, this volume; for Trojans, see Milani, this volume; for some other cases (e.g. proper elements for resonant asteroids), see Froeschlé and Morbidelli, this volume. When and if new proper elements will be available for other asteroids, they will be added to the public domain file, together with updates and upgrades of the existing catalogues.


Sign in / Sign up

Export Citation Format

Share Document