previous paragraph
Recently Published Documents


TOTAL DOCUMENTS

21
(FIVE YEARS 7)

H-INDEX

2
(FIVE YEARS 0)

Sensors ◽  
2021 ◽  
Vol 21 (24) ◽  
pp. 8202
Author(s):  
Alberto Tellaeche Iglesias ◽  
Ignacio Fidalgo Astorquia ◽  
Juan Ignacio Vázquez Gómez ◽  
Surajit Saikia

The use of gestures is one of the main forms of human machine interaction (HMI) in many fields, from advanced robotics industrial setups, to multimedia devices at home. Almost every gesture detection system uses computer vision as the fundamental technology, with the already well-known problems of image processing: changes in lighting conditions, partial occlusions, variations in color, among others. To solve all these potential issues, deep learning techniques have been proven to be very effective. This research proposes a hand gesture recognition system based on convolutional neural networks and color images that is robust against environmental variations, has a real time performance in embedded systems, and solves the principal problems presented in the previous paragraph. A new CNN network has been specifically designed with a small architecture in terms of number of layers and total number of neurons to be used in computationally limited devices. The obtained results achieve a percentage of success of 96.92% on average, a better score than those obtained by previous algorithms discussed in the state of the art.


2021 ◽  
Author(s):  
Catalin Teodoriu ◽  
Opeyemi Bello ◽  
R. R. Vasquez ◽  
Ryan M. Melander ◽  
Yosafat Esquitin

Abstract Well construction has relied on two main elements, casing and cement, to achieve the well goals while maintaining the highest possible well integrity. Can cementless well construction achieve similar goals? This paper is investigating the various well construction concepts proposed over the years and will analyze the cement's ability to withstand long term well loads. First, a review of various well construction concepts such as slimhole, conventional, pre-salt and horizontal wells. We will normalize the casing to cement thickness ratio by validating and proposing a simple mathematical calculation for establishing this ratio. Our calculations have shown that in the case of slimhole well concept, the thin cement sheath cannot serve as a strong well barrier as defined by current standards, and thus a new solution might be necessary. The second part will look at current new trends in wellbore construction that include external casing packers and other solutions such as metallic wellbore isolation solutions. Hydraulically expanded metal packers are a robust and reliable alternative to cement. They are each mounted to a casing joint and can be rotated while running in hole. They have a proven deployment track record of high diametrical expansion, conforming to the wellbore geometry, while isolating differential pressures more than 15,000psi. Exploration of load carrying capabilities will be completed using Finite Element Analysis (FEA), simulating the different well scenarios as described in the previous paragraph. This will enable us to establish which well types can use this novel technology for the replacement of cement. The paper will conclude with one possible solution that could be used to mitigate cement problems by shifting the well construction concept to a cementless new era. Also, understanding that the cement manufacturing process is highly CO2 intensive, emissions per well could be reduced through the newly proposed concept.


2021 ◽  
Author(s):  
Jacinto Santamaría-Peña ◽  
Elena Palacios-Ruiz ◽  
Teresa Santamaría-Palacios

The use of medium/high-density LIDAR (Light Detection And Ranging) data for land modelling and DTM (Digital TerrainModel) is becoming more widespread. This level of detail is difficult to achieve with other means or materials. However,the horizontal and vertical geometric accuracy of the LIDAR points obtained, although high, is not homogeneous.Horizontally you can reach precisions around 30-50 cm, while the vertical precision is rarely greater than 10-15 cm. Theresult of LIDAR flights, are clouds of points very close to each other (30-60 cm) with significant elevation variations, evenif the terrain is flat. And this makes the triangulated models TIN (Triangulated Irregular Network) obtained from such LIDARdata especially chaotic. Since contour lines are generated directly from such triangulated models, their appearance showsexcessive noise, with excessively broken and rapidly closed on themselves. Getting smoothed contour liness, withoutdecreasing accuracy, is a challenge for terrain model software. In addition, triangulated models obtained from LIDAR dataare the basis for future slope maps of the land. And for the same reason explained in the previous paragraph, these slopemaps generated from high or medium density LIDAR point clouds are especially heterogeneous. Achieving uniformity andgreater adjustment to reality by reducing the natural noise of LIDAR data is another added challenge. In this paper, theproblem of excessive noise from LIDAR data of high (around 8 points/m2) and medium density (around 2 points/m2) in thegeneration of contour lines and terrain slope maps is raised and solutions are proposed to reduce this noise. All this, in thearea of specific software for the management of TIN models and GIS (Geographic Information System) and adapting thealternatives proposed by these programmes.


Hikma ◽  
2020 ◽  
Vol 19 (2) ◽  
pp. 55-90
Author(s):  
Antonio José de Vicente-Yagüe Jara ◽  
Eva del Amor Collado

Resumen: El objetivo del presente estudio es llevar a cabo un análisis de los culturemas que aparecen en la literatura de Stephen King y de los procedimientos de traducción utilizados por los traductores de sus obras al francés y al español para traducir esos elementos culturales. Debido a la gran cantidad de obras que ha escrito King, nos hemos visto obligados a reducir nuestro corpus de estudio a tres novelas: It, The Shining y Pet Sematary.Para llevar a cabo el análisis del corpus, hemos recopilado, clasificado y estudiado un total de trescientos culturemas: cien de It, cien de The Shining y cien de Pet Sematary. Antes de elaborar dicho análisis, hemos recordado la clasificación de culturemas propuesta por Newmark (1992) y, partiendo de esa base, hemos seleccionado dos categorías específicas para poder darle un enfoque más concreto a nuestro trabajo: «Cultura material» y «Organizaciones, costumbres, actividades, procedimientos y conceptos». De esta manera, dentro de cada obra, hemos seleccionado cincuenta culturemas para cada una de las categorías.Finalmente, hemos realizado un estudio cuantitativo de los procedimientos de traducción que más se han utilizado en francés y en español dentro de cada una de las categorías mencionadas anteriormente. Este análisis nos ha permitido presentar de forma gráfica el porcentaje de uso de cada procedimiento y llegar así a una serie de conclusiones. Abstract: The aim of this paper is to carry out an analysis of the different cultural terms that appear in the works of Stephen King and to study which are the most common translation procedures used when translating cultural terms into two different languages: Spanish and French, since the source language is English. Due to the huge amount of works written by King, we had to select only three novels: It, The Shining and Pet Sematary.In order to carry out the analysis of our corpus, we have compiled, classified and studied a total of three hundred cultural terms: one hundred from It, one hundred from The Shining and one hundred from Pet Sematary. In this regard, it is important to outline that, in the theoretical framework, we explained the classification of cultural terms proposed by Newmark (1992) and, on this basis, we have selected two specific categories in order to give a more concrete approach to our work: “Material culture” and “Organizations, customs, activities, procedures and concepts”. Thus, within each work we have selected fifty cultural terms for each category.Finally, we also wanted to carry out a quantitative study of the translation procedures most commonly used in French and Spanish within each of the categories mentioned in the previous paragraph. This analysis has allowed us to graphically present the percentage of use of each procedure and thus establish a series of conclusions.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Kasper Abcouwer ◽  
Emiel van Loon

PurposeLow read rates are a general problem in library inventories. The purpose of this study is to examine the factors that contribute to the success of library inventory by means of a radio-frequency identification (RFID) inventory taker. The factors investigated were tag position, tag orientation, book thickness, tag density (related to thickness of a sequence of books) and position on the shelf.Design/methodology/approachA total of 210 books were placed in eight random permutations on three fixed book shelves. For each configuration, the RFID tags were read forty times. The resulting data were analysed by means of a generalized linear model, relating the combined contribution of tag position, tag orientation, book thickness and position on the bookshelf to the read rate.FindingsThe tags positioned directly next to the spine were always read, but those near the opening of the book (far from the spine and inventory reader) were not always read. Considering only books with tags near the opening, tag orientation and position on the shelf appeared not to be related to the read rate, while book thickness, thickness over three books and spine tag density appeared to have a small positive contribution to the read rate.Practical implicationsLow read rates during a library inventory can be prevented by placing the tags near the book spine – the other book specific factors (listed in the previous paragraph) are of little influence. When not scanned during a first sweep, repeated scanning can increase the read rate with 0.15.Originality/valueThis paper is one of the first to analyse the influence of tag location and book specific factors on the read rate of RFID tags in library books. The experimental approach sets an example for future work.


2020 ◽  
Vol 5 (1) ◽  
pp. 36
Author(s):  
Arief Ikhwan Wicaksono ◽  
Rama Sahtyawan ◽  
Agung Priyanto

Wireless mesh networking provides a solution to the problem of network distribution that has been constrained by cable networks and wireless networks that are not directly related to other wireless networks. Some of the advantages of wireless mesh technology include extended coverages, robustness, self-configuration, easy maintenance, and low cost. Based on the problems described in the previous paragraph, this research will analyze the performance of two wireless mesh distribution methods using several topology scenarios which will later be considered to affect the quality of network distribution WDS Mesh distribution methods that will be compared in this study are WDS Mesh with Mesh Interface, and WDS Mesh with Bridge Interface. Evaluation of the two methods will be conducted periodically to get the results of the analysis which will be used to do re-configuring to maximize the features and advantages of mesh technology in maintaining reliable network quality.


Author(s):  
Dian Paramita Br Perangin-angin

The authenticity of a digital file is something that must be able to be guaranteed its existence, considering that there are so many devices that can be used to carry out manipulation of the digital file. One of the digital files discussed in this study is an audio file with MP3 file extension. Please note that MP3 audio files are now very easy to obtain, even very easy to manipulate and insert objects in, so we need a safety technique to maintain the authenticity of the audio file. Overcoming the problem that has been explained in the previous paragraph, the appropriate security technique used is the hash cryptographic technique, by applying the CRC 32 algorithm. The application of CRC 32 aims to generate hash codes from MP3 audio files that can be used as key codes for authentication (key authenticity) of MP3 audio files. The results of this study are a representation of the technical explanation of the application of the CRC 32 algorithm in generating MP3 audio file hash codes, which the CRC 32 algorithm is applied to applications that have been designed and built using the help of MATLAB software version 6.1.Keywords: File Authenticity, Audio File, CRC 32, MATLAB 6.1


2018 ◽  
Vol 1 (1) ◽  
pp. 143-154
Author(s):  
Francesco Gandellini

Abstract This paper intends to offer a new assessment of the “Ontological Difference” (OD), one of Martin Heidegger’s mainstays, in the light of the metaphysical view called “dialetheism”. In the first paragraph I briefly summarize the main argument of Heidegger’s contradiction of Being, where OD is present as a premise. In the second paragraph I introduce dialetheism, indicate two kinds of dialetheic solutions to the paradox and explain why they face comeback troubles from OD. The third paragraph is devoted to a review of Heidegger’s uses of OD and underlines the crucial role of negation in it. In the fourth paragraph I investigate the philosopher’s account of negation and show similarities with the account provided by the paraconsistent logic called “Logic of Paradox”. The fifth paragraph puts forward two possible readings of OD, the first based on the classical notion of negation and the second on the notion of negation pointed out in the previous paragraph. The second reading is proved suitable for dialetheists and in accordance with the exegesis of some textual passages from Heidegger’s late works.


2015 ◽  
Vol 18 (1) ◽  
pp. 53-61
Author(s):  
Colin Buchanan

A title such as this hardly suggests one is breaking new ground. But I edge into print on the subject, stirred by the interesting Speaker's Lecture given by the outgoing Second Estates Commissioner, Sir Tony Baldry, in December 2014, and published in the May 2015 edition of this Journal. It reads as the enthusiastic, even romantic, expression of the State–Church relationship by an almost doctrinaire establishmentarian; and I use the word ‘doctrinaire’ deliberately, for I have spent a lifetime of bumping up against leaders of both Church and State, from Enoch Powell to George Carey (let alone Derek Pattinson and Philip Mawer), who exude a firm conviction that the establishment of the Church of England is entrenched somewhere in the Apostles' Creed. Sir Tony continues in this tradition as he serenely asserts ‘We come then to the reign of Henry VIII. I think the important point here is that the Church of England is the creation of Parliament.’ But would not Augustine, Anselm and the drafters of Magna Carta (who are cited in Baldry's previous paragraph) all be turning in their graves? And what apoplexy would have come upon Newman, Pusey and Keble to have learned that their Church was thus created? Or, more to the point, is the ecclesiastical action of Parliament in the days when church and nation were co-terminous of any relevance to whether and how an unbelieving Parliament should hold control of a Christian body today? However, it is his brief section on ‘Parliament and Anglican liturgy’ which prompted the present submission.


none both, while a defender of endurance will say that the plasticine first constitutes a pot, then a bust. Since constitution is not identity, we may therefore say that the plasticine, pot and bust are pairwise non-identical.5 We cannot argue that since pot and bust have exactly the same parts, they must be the same thing by the mereological principle that if the parts of x are the same as the parts of y, then x = y. First, if the plasticine constitutes the pot, any part of the pot will be constitutedby some part of the plasticine, but will not be identical to that part. Later, the plasticine part in question will constitute a part of the bust. Since constitution is not identity, we may therefore say that no part of the pot is identical to any part of the plasticine, so we cannot identify a part of the pot with a part of the bust via identity with a part of the plasticine. Still, this leaves it open that a pot-part is ‘straight-ofF identical to the bust-part made of the same plasticine, and hence by mereology, that pot and bust are identical. But Wiggins-style strategies again apply. Objects are not mere things, they are things of specific sorts; we can think of the unsubscripted identity symbol in ‘x = y’ as being introduced by existential quantification: ‘x = y’ means that for some sort F, x is the same F as y [Wiggins 1980, pp. 15, 38]. So pot and bust are the same what? If we say they are the same sum of parts, we relativize identity, since they are evidently not the same artifact. What we must do is distinguish sums of parts and artifacts. In the example, there are two sums of parts x and y (the pot parts and the bust parts) and if x and y have the same parts, as was left open by the previous paragraph, x and y are the same sum of parts. But we can deny that x is a pot and y is a bust. In other words, the proper conclusion to draw is that no pot is the same thing as any mereological sum of pot-parts and no bust the same thing as any sum of bust-parts. Some other relation, such as constitution, holds between ordinary things and the mereological sums of their parts. Hence we again avoid the conclusion that the pot and the bust are the same thing. If this discussion is right, the two examples are ineffective as


Sign in / Sign up

Export Citation Format

Share Document