Spelling suggestions: "subject:"cerification c.method"" "subject:"cerification 20method""
1 |
Evaluating the DBH Verification Method to Complex Buildings Designed According to New Zealand Compliance Documents C/AS1Han, Yuzhuo January 2011 (has links)
Performance-based fire engineering design is becoming a more common practice for fire safety design of large complex buildings and modifying existing buildings. However, different engineering assumptions and ambiguous acceptance criteria not only lead to inconsistent level of safety, but also cause inefficient Building Consent process and can result in expensive appeals.
In August 2006 the New Zealand Department of Building and Housing (DBH) has been developing a Verification Method (C/VM2) for demonstrating compliance with the Fire Safety requirements of the New Zealand Building Code (C Clauses).
This research evaluated the proposed C/VM2 on four complex buildings, including Multi-level Night Club, Hospital, Shopping Mall and Retail Warehouse. It has showed that the C/VM2 successfully implements a systematic and less ambiguous guidance for the future performance-based fire safety designs. However, continued analysis and development is necessary that a solely deterministic method may not be the best solution. A risk-based concept is suggested to be incorporated into the new generation of the C/VM2.
|
2 |
Verification Method for Time of Capture of a Rolling Shutter Image / Metod för Verifiering av Tidpunkt för Bilder Tagna med Rullande SlutareJohansson, Filip, Johansson, Alexander January 2023 (has links)
Modern automotive systems increasingly depend on camera sensors to gather safetycriticaldata used in driver-assisting features of the system. These features can consist offor example, lane-keeping assist and automatic braking where the sensors register objectswithin certain distances. When these camera sensors gather information, the time of theimage is critical for the calculation of speeds, distances, and size of any potential registeredobject in the frame. Limitations of bandwidth and computing in such vehicles creates aneed to use special cameras that do not capture the whole image simultaneously but insteadcapture the images piecewise. These cameras are called rolling shutter cameras. Thisputs pressure on defining when an image was captured when different parts of the imagewere captured at different points in time. For this thesis, this point in time is defined as thechronological middle point in between the camera starting to capture an image and when ithas collected the final part of it. This thesis performs a mapping-study to evaluate methodsto verify the timestamp of an image generated from rolling shutter cameras. Further, thisthesis proposes a new method using multiple digital clocks and presents its performanceusing a proof-of-concept implementation to prove the method’s ability to accurately representtime with sub-millisecond accuracy.
|
3 |
Automatic Reasoning Techniques for Non-Serializable Data-Intensive ApplicationsGowtham Kaki (7022108) 14 August 2019 (has links)
<div>
<div>
<div>
<p>The performance bottlenecks in modern data-intensive applications have induced
database implementors to forsake high-level abstractions and trade-off simplicity and
ease of reasoning for performance. Among the first casualties of this trade-off are the
well-known ACID guarantees, which simplify the reasoning about concurrent database
transactions. ACID semantics have become increasingly obsolete in practice due
to serializable isolation – an integral aspect of ACID, being exorbitantly expensive.
Databases, including the popular commercial offerings, default to weaker levels of
isolation where effects of concurrent transactions are visible to each other. Such weak
isolation guarantees, however, are extremely hard to reason about, and have led to
serious safety violations in real applications. The problem is further complicated
in a distributed setting with asynchronous state replications, where high availability
and low latency requirements compel large-scale web applications to embrace weaker
forms of consistency (e.g., eventual consistency) besides weak isolation. Given the
serious practical implications of safety violations in data-intensive applications, there
is a pressing need to extend the state-of-the-art in program verification to reach non-
serializable data-intensive applications operating in a weakly-consistent distributed
setting.
</p>
<p>This thesis sets out to do just that. It introduces new language abstractions, program logics, reasoning methods, and automated verification and synthesis techniques
that collectively allow programmers to reason about non-serializable data-intensive
applications in the same way as their serializable counterparts. The contributions
</p>
</div>
</div>
<div>
<div>
<p>xi
</p>
</div>
</div>
</div>
<div>
<div>
<div>
<p>made are broadly threefold. Firstly, the thesis introduces a uniform formal model to
reason about weakly isolated (non-serializable) transactions on a sequentially consistent (SC) relational database machine. A reasoning method that relates the semantics
of weak isolation to the semantics of the database program is presented, and an automation technique, implemented in a tool called ACIDifier is also described. The
second contribution of this thesis is a relaxation of the machine model from sequential
consistency to a specifiable level of weak consistency, and a generalization of the data
model from relational to schema-less or key-value. A specification language to express
weak consistency semantics at the machine level is described, and a bounded verification technique, implemented in a tool called Q9 is presented that bridges the gap
between consistency specifications and program semantics, thus allowing high-level
safety properties to be verified under arbitrary consistency levels. The final contribution of the thesis is a programming model inspired by version control systems that
guarantees correct-by-construction <i>replicated data types</i> (RDTs) for building complex distributed applications with arbitrarily-structured replicated state. A technique
based on decomposing inductively-defined data types into <i>characteristic relations</i> is
presented, which is used to reason about the semantics of the data type under state
replication, and eventually derive its correct-by-construction replicated variant automatically. An implementation of the programming model, called Quark, on top of
a content-addressable storage is described, and the practicality of the programming
model is demonstrated with help of various case studies.
</p>
</div>
</div>
</div>
|
4 |
Разработка проекта сайта о горном туризме : магистерская диссертация / Web-Site Project Development on Mountain TourismБоровкова, Н. М., Borovkova, N. M. January 2018 (has links)
Магистерская диссертация «Разработка проекта сайта о горном туризме» состоит из введения, двух глав – теоретической и практической, заключения, библиографического списка, включающего 73 наименования, и пяти приложений. Цель исследования – разработать проект информационного сайта о горном туризме, основываясь на данных, собранных в ходе анализа информационных сайтов о горном туризме и в результате работы с научными источниками. Объект исследования – информационные сайты о горном туризме. Предмет – структурно-содержательные и визуальные особенности информационных сайтов о горном туризме. Подобрано доменное имя ресурса. Сформирована концепция дизайна сайта. Подобран шрифт и цветовая палитра ресурса, разработан логотип. Обосновано решение использовать для реализации проекта CMS (WordPress) в качестве основной и конструктор Tilda Publishing для работы в разделе «Отчеты». Разработан прототип и два варианта макета стартовой страницы. При помощи конструктора сайтов разработана цифровая история. Отдельные положения проведенного исследования были представлены на VI Международной научно-практической интернет-конференции «Книжное дело: достижения, проблемы, перспективы» (Екатеринбург, 2017) и Международной научно-практической интернет-конференции «Язык. Текст. Книга» (Екатеринбург, 2018). / The Master's thesis "Web-Site Project Development on Mountain Tourism" consists of an introduction, two chapters - theoretical and practical, conclusion, reference comprising of 73 titles, and five annexes. The study purpose is to develop a draft information web-site on mountain tourism based on data collected during the analysis of information web-sites on mountain tourism and as a result of working with the scientific sources. The study object is the information web-sites on mountain tourism. The study subject is the structural and visual features of the information web-sites on mountain tourism. The domain name of the resource is chosen. The concept of the web-site design is formed. The font and color palette are chosen, and a logo for the resource is developed. The decision to use the CMS (WordPress) as the main for the project implementation and the Tilda Publishing designer to work in the "Reports" section is justified. A prototype and two versions of the layout of the start page are developed. A digital story with the help of the web-site designer is developed. Separate provisions of the study made were presented at the VI International Scientific and Practical Internet Conference "Book Business: Achievements, Problems, Prospects" (Yekaterinburg, 2017) and the International Scientific and Practical Internet Conference "Language. Text. Book" (Yekaterinburg, 2018).
|
Page generated in 0.0812 seconds