scholarly journals The Mass–Metallicity Relation at z ∼ 0.8: Redshift Evolution and Parameter Dependency

2019 ◽  
Vol 886 (1) ◽  
pp. 31 ◽  
Author(s):  
Chi Huang ◽  
Hu Zou ◽  
Xu Kong ◽  
Johan Comparat ◽  
Zesen Lin ◽  
...  
Keyword(s):  
2007 ◽  
Vol 27 (2) ◽  
pp. 209-233 ◽  
Author(s):  
Enrique López Droguett ◽  
Ali Mosleh

In accelerated lifetime testing (ALT) the assumption of stress-independent spread in life is commonly used and accepted because the resulting models are typically easier to use and data or past experience suggest that such a constrain is sometimes valid. However in many situations and with a variety of products the spread in life does depend on stress, i.e., the failure mechanism is not the same for all stress levels. In this paper the assessment of product time to failure at service conditions from ALT with stress-dependent spread is addressed by formulating a Bayesian framework where the time to failure follows a Weibull distribution, scale parameter dependency on stress is given by the Power Law, and two cases for the dependency between shape parameter and stress are discussed: linear relationship and, in order to allow a comparative analysis, stress-independent shape parameter. A previously published dataset is used to illustrate the procedure.


2017 ◽  
Vol 9 (6) ◽  
Author(s):  
Leila Notash

For under-constrained and redundant parallel manipulators, the actuator inputs are studied with bounded variations in parameters and data. Problem is formulated within the context of force analysis. Discrete and analytical methods for interval linear systems are presented, categorized, and implemented to identify the solution set, as well as the minimum 2-norm least-squares solution set. The notions of parameter dependency and solution subsets are considered. The hyperplanes that bound the solution in each orthant characterize the solution set of manipulators. While the parameterized form of the interval entries of the Jacobian matrix and wrench produce the minimum 2-norm least-squares solution for the under-constrained and over-constrained systems of real matrices and vectors within the interval Jacobian matrix and wrench vector, respectively. Example manipulators are used to present the application of methods for identifying the solution and minimum norm solution sets for actuator forces/torques.


2019 ◽  
Vol 34 (7) ◽  
pp. 6697-6705 ◽  
Author(s):  
Ehsan Daryabeigi ◽  
Ahmad Mirzaei ◽  
Hossein Abootorabi Zarchi ◽  
Sadegh Vaez-Zadeh

2020 ◽  
Vol 2020 ◽  
pp. 1-11
Author(s):  
Sungtae Kim ◽  
Taeyong Park ◽  
Geochang Jeon ◽  
Jeong Hyun Yi

Mobile apps are booming with the expansion of mobile devices such as smartphones, tablet PCs, smartwatches, and IoT devices. As the capabilities of mobile apps and the types of personal information required to run apps have diversified, the need for increased security has grown. In particular, Android apps are vulnerable to repackaging attacks, so various code protection techniques such as obfuscation and packing have been applied. However, apps protected with these techniques can also be disabled with static and dynamic analyses. In recent years, instead of using such application level protection techniques, a number of approaches have been adopted to monitor the behavior of apps at the platform level. However, in these cases, not only incompatibility of system software due to platform modification, but also self-control functionality cannot be provided at the user level and is very inconvenient. Therefore, in this paper we propose an app protection scheme that can split a part of the app code, store it in a separate IoT device, and self-control the split code through the partial app. In the proposed scheme, the partial app is executed only when it matches the split code stored in the IoT device. It does not require complicated encryption techniques to protect the code like the existing schemes. It also provides solutions to the parameter dependency and register reallocation issues that must be considered when implementing the proposed code splitting scheme. Finally, we present and analyze the results of experimenting the proposed scheme on real devices.


Author(s):  
Makoto Yasuda ◽  

The Tsallis entropy is a q-parameter extension of the Shannon entropy. By maximizing it within the framework of fuzzy c-means, statistical mechanical membership functions can be derived. We propose a clustering algorithm that includes the membership function and deterministic annealing. One of the major issues for this method is the determination of an appropriate values for q and an initial annealing temperature for a given data distribution. Accordingly, in our previous study, we investigated the relationship between q and the annealing temperature. We quantitatively compared the area of the membership function for various values of q and for various temperatures. The results showed that the effect of q on the area was nearly the inverse of that of the temperature. In this paper, we analytically investigate this relationship by directly integrating the membership function, and the inversely proportional relationship between q and the temperature is approximately confirmed. Based on this relationship, a q-incrementation deterministic annealing fuzzy c-means (FCM) algorithm is developed. Experiments are performed, and it is confirmed that the algorithm works properly. However, it is also confirmed that differences in the shape of the membership function of the annealing method and that of the q-incrementation method are remained.


Sign in / Sign up

Export Citation Format

Share Document