Academic literature on the topic 'Implicit layers'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Implicit layers.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Implicit layers"

1

Huang, Zhongzhan, Senwei Liang, Mingfu Liang, and Haizhao Yang. "DIANet: Dense-and-Implicit Attention Network." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 04 (April 3, 2020): 4206–14. http://dx.doi.org/10.1609/aaai.v34i04.5842.

Full text
Abstract:
Attention networks have successfully boosted the performance in various vision problems. Previous works lay emphasis on designing a new attention module and individually plug them into the networks. Our paper proposes a novel-and-simple framework that shares an attention module throughout different network layers to encourage the integration of layer-wise information and this parameter-sharing module is referred to as Dense-and-Implicit-Attention (DIA) unit. Many choices of modules can be used in the DIA unit. Since Long Short Term Memory (LSTM) has a capacity of capturing long-distance dependency, we focus on the case when the DIA unit is the modified LSTM (called DIA-LSTM). Experiments on benchmark datasets show that the DIA-LSTM unit is capable of emphasizing layer-wise feature interrelation and leads to significant improvement of image classification accuracy. We further empirically show that the DIA-LSTM has a strong regularization ability on stabilizing the training of deep networks by the experiments with the removal of skip connections (He et al. 2016a) or Batch Normalization (Ioffe and Szegedy 2015) in the whole residual network.
APA, Harvard, Vancouver, ISO, and other styles
2

Tuval, Israel, Dan Givoli, and Ehud Behar. "Hybrid asymptotic-numerical modeling of thin layers for dynamic thermal analysis of structures." International Journal of Numerical Methods for Heat & Fluid Flow 26, no. 3/4 (May 3, 2016): 818–53. http://dx.doi.org/10.1108/hff-11-2014-0336.

Full text
Abstract:
Purpose – The purpose of this paper is to propose a computational model for thin layers, for problems of linear time-dependent heat conduction. The thin layer is replaced by a zero-thickness interface. The advantage of the new model is that it saves the need to construct and use a fine mesh inside the layer and in regions adjacent to it, and thus leads to a reduction in the computational effort associated with implicit or explicit finite element schemes. Design/methodology/approach – Special asymptotic models have been proposed for linear heat transfer and linear elasticity, to handle thin layers. In these models the thin layer is replaced by an interface with zero thickness, and specific jump conditions are imposed on this interface in order to represent the special effect of the layer. One such asymptotic interface model is the first-order Bövik-Benveniste model. In a paper by Sussmann et al., this model was incorporated in a FE formulation for linear steady-state heat conduction problems, and was shown to yield an accurate and efficient computational scheme. Here, this work is extended to the time-dependent case. Findings – As shown here, and demonstrated by numerical examples, the new model offers a cost-effective way of handling thin layers in linear time-dependent heat conduction problems. The hybrid asymptotic-FE scheme can be used with either implicit or explicit time stepping. Since the formulation can easily be symmetrized by one of several techniques, the lack of self-adjointness of the original formulation does not hinder an accurate and efficient solution. Originality/value – Most of the literature on asymptotic models for thin layers, replacing the layer by an interface, is analytic in nature. The proposed model is presented in a computational context, fitting naturally into a finite element framework, with both implicit and explicit time stepping, while saving the need for expensive mesh construction inside the layer and in its vicinity.
APA, Harvard, Vancouver, ISO, and other styles
3

Geiger, Philipp, and Christoph-Nikolas Straehle. "Learning Game-Theoretic Models of Multiagent Trajectories Using Implicit Layers." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 6 (May 18, 2021): 4950–58. http://dx.doi.org/10.1609/aaai.v35i6.16628.

Full text
Abstract:
For prediction of interacting agents' trajectories, we propose an end-to-end trainable architecture that hybridizes neural nets with game-theoretic reasoning, has interpretable intermediate representations, and transfers to downstream decision making. It uses a net that reveals preferences from the agents' past joint trajectory, and a differentiable implicit layer that maps these preferences to local Nash equilibria, forming the modes of the predicted future trajectory. Additionally, it learns an equilibrium refinement concept. For tractability, we introduce a new class of continuous potential games and an equilibrium-separating partition of the action space. We provide theoretical results for explicit gradients and soundness. In experiments, we evaluate our approach on two real-world data sets, where we predict highway drivers' merging trajectories, and on a simple decision-making transfer task.
APA, Harvard, Vancouver, ISO, and other styles
4

Tierens, Wouter, and Daniel De Zutter. "Implicit Local Refinement for Evanescent Layers Combined With Classical FDTD." IEEE Microwave and Wireless Components Letters 23, no. 5 (May 2013): 225–27. http://dx.doi.org/10.1109/lmwc.2013.2253090.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Laurent, Gautier. "Iterative Thickness Regularization of Stratigraphic Layers in Discrete Implicit Modeling." Mathematical Geosciences 48, no. 7 (June 14, 2016): 811–33. http://dx.doi.org/10.1007/s11004-016-9637-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zhao, Huan, Jie Cao, Mingquan Xu, and Jian Lu. "Variational neural decoder for abstractive text summarization." Computer Science and Information Systems 17, no. 2 (2020): 537–52. http://dx.doi.org/10.2298/csis200131012z.

Full text
Abstract:
In the conventional sequence-to-sequence (seq2seq) model for abstractive summarization, the internal transformation structure of recurrent neural networks (RNNs) is completely determined. Therefore, the learned semantic information is far from enough to represent all semantic details and context dependencies, resulting in a redundant summary and poor consistency. In this paper, we propose a variational neural decoder text summarization model (VND). The model introduces a series of implicit variables by combining variational RNN and variational autoencoder, which is used to capture complex semantic representation at each step of decoding. It includes a standard RNN layer and a variational RNN layer [5]. These two network layers respectively generate a deterministic hidden state and a random hidden state. We use these two RNN layers to establish the dependence between implicit variables between adjacent time steps. In this way, the model structure can better capture the complex semantics and the strong dependence between the adjacent time steps when outputting the summary, thereby improving the performance of generating the summary. The experimental results show that, on the text summary LCSTS and English Gigaword dataset, our model has a significant improvement over the baseline model.
APA, Harvard, Vancouver, ISO, and other styles
7

Lin, Baihan. "Regularity Normalization: Neuroscience-Inspired Unsupervised Attention across Neural Network Layers." Entropy 24, no. 1 (December 28, 2021): 59. http://dx.doi.org/10.3390/e24010059.

Full text
Abstract:
Inspired by the adaptation phenomenon of neuronal firing, we propose the regularity normalization (RN) as an unsupervised attention mechanism (UAM) which computes the statistical regularity in the implicit space of neural networks under the Minimum Description Length (MDL) principle. Treating the neural network optimization process as a partially observable model selection problem, the regularity normalization constrains the implicit space by a normalization factor, the universal code length. We compute this universal code incrementally across neural network layers and demonstrate the flexibility to include data priors such as top-down attention and other oracle information. Empirically, our approach outperforms existing normalization methods in tackling limited, imbalanced and non-stationary input distribution in image classification, classic control, procedurally-generated reinforcement learning, generative modeling, handwriting generation and question answering tasks with various neural network architectures. Lastly, the unsupervised attention mechanisms is a useful probing tool for neural networks by tracking the dependency and critical learning stages across layers and recurrent time steps of deep networks.
APA, Harvard, Vancouver, ISO, and other styles
8

Smolarkiewicz, Piotr K., Len G. Margolin, and Andrzej A. Wyszogrodzki. "Implicit Large-Eddy Simulation in Meteorology: From Boundary Layers to Climate." Journal of Fluids Engineering 129, no. 12 (July 21, 2007): 1533–39. http://dx.doi.org/10.1115/1.2801678.

Full text
Abstract:
The dynamics of the atmosphere and oceans pose a severe challenge to the numerical modeler, due in large part to the broad range of scales of length and time that are encompassed. Modern numerical methods based on nonoscillatory finite volume (NFV) approximations provide a simple and effective means for mitigating this challenge by reproducing the large scale behavior of turbulent flows with no need for explicit subgrid-scale models. In this paper, we describe the remarkable properties of a particular NFV model, multidimensional positive definite advection transport algorithm, and highlight its application to a variety of meteorological and turbulent flows.
APA, Harvard, Vancouver, ISO, and other styles
9

Pruett, C. David. "A semi-implicit method for internal boundary layers in compressible flows." Computer Methods in Applied Mechanics and Engineering 137, no. 3-4 (November 1996): 379–93. http://dx.doi.org/10.1016/s0045-7825(96)01074-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Reshniak, Viktor, and Clayton G. Webster. "Robust Learning with Implicit Residual Networks." Machine Learning and Knowledge Extraction 3, no. 1 (December 31, 2020): 34–55. http://dx.doi.org/10.3390/make3010003.

Full text
Abstract:
In this effort, we propose a new deep architecture utilizing residual blocks inspired by implicit discretization schemes. As opposed to the standard feed-forward networks, the outputs of the proposed implicit residual blocks are defined as the fixed points of the appropriately chosen nonlinear transformations. We show that this choice leads to the improved stability of both forward and backward propagations, has a favorable impact on the generalization power, and allows for control the robustness of the network with only a few hyperparameters. In addition, the proposed reformulation of ResNet does not introduce new parameters and can potentially lead to a reduction in the number of required layers due to improved forward stability. Finally, we derive the memory-efficient training algorithm, propose a stochastic regularization technique, and provide numerical results in support of our findings.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Implicit layers"

1

Demay, Charles. "Modélisation et simulation d'écoulements transitoires diphasiques eau-air dans les circuits hydrauliques." Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAM100/document.

Full text
Abstract:
Ce travail est consacré à la modélisation mathématique et numérique des écoulements eau-air en conduite qui interviennent notamment dans les centrales de production d’électricité ou les réseaux d’eaux usées. On s’intéresse particulièrement aux écoulements mixtes caractérisés par la présence de régimes stratifiés pilotés par des ondes gravitaires lentes, de régimes en charge ou secs (conduite remplie d’eau ou d’air) pilotés par des ondes acoustiques rapides, et de poches d’air piégées. Une modélisation précise de ces écoulements est nécessaire afin de garantir le bon fonctionnement du circuit hydraulique sous-jacent. Alors que la plupart des modèles disponibles dans la littérature se concentrent sur la phase eau en négligeant la présence de l’air, un modèle bicouche compressible prenant en compte les interactions eau-air est proposé dans cette thèse. Sa construction réside dans l’intégration des équations d’Euler barotropes sur la hauteur de chaque phase et dans l’application de la contrainte hydrostatique sur le gradient de pression de l’eau. Le modèle obtenu est hyperbolique et satisfait une inégalité d’entropie en plus d’autres propriétés mathématiques notables, telles que l’unicité des relations de saut ou la positivité des hauteurs et densités de chaque phase. Au niveau discret, la simulation d’écoulements mixtes avec le modèle bicouche compressible soulève plusieurs défis en raison de la disparité des vitesses d’ondes caractérisant chaque régime, des processus de relaxation rapide sous-jacents, et de la disparition de l’une des phases dans les régimes en charge ou sec. Une méthode à pas fractionnaires implicite-explicite est alors développée en s’appuyant sur la relaxation rapide en pression et sur le mimétisme avec les équations de Saint-Venant pour la dynamique lente de la phase eau. En particulier, une approche par relaxation permet d’obtenir une stabilisation du schéma en fonction du régime d’écoulement. Plusieurs cas tests sont traités et démontrent la capacité du modèle proposé à gérer des écoulements mixtes incluant la présence de poches d’air piégées
The present work is dedicated to the mathematical and numerical modelling of transient air-water flows in pipes which occur in piping systems of several industrial areas such as nuclear or hydroelectric power plants or sewage pipelines. It deals more specifically with the so-called mixed flows which involve stratified regimes driven by slow gravity waves, pressurized or dry regimes (pipe full of water or air) driven by fast acoustic waves and entrapped air pockets. An accurate modelling of these flows is necessary to guarantee the operability of the related hydraulic system. While most of available models in the literature focus on the water phase neglecting the air phase, a compressible two-layer model which accounts for air-water interactions is proposed herein. The derivation process relies on a depth averaging of the isentropic Euler set of equations for both phases where the hydrostatic constraint is applied on the water pressure gradient. The resulting system is hyperbolic and satisfies an entropy inequality in addition to other significant mathematical properties, including the uniqueness of jump conditions and the positivity of heights and densities for each layer. Regarding the discrete level, the simulation of mixed flows with the compressible two-layer model raises key challenges due to the discrepancy of wave speeds characterizing each regime combined with the fast underlying relaxation processes and with phase vanishing when the flow becomes pressurized or dry. Thus, an implicit-explicit fractional step method is derived. It relies on the fast pressure relaxation in addition to a mimetic approach with the shallow water equations for the slow dynamics of the water phase. In particular, a relaxation method provides stabilization terms activated according to the flow regime. Several test cases are performed and attest the ability of the compressible two-layer model to deal with mixed flows in pipes involving air pocket entrapment
APA, Harvard, Vancouver, ISO, and other styles
2

Ha, Rick Wan Kei. "A Sleep-Scheduling-Based Cross-Layer Design Approach for Application-Specific Wireless Sensor Networks." Thesis, University of Waterloo, 2006. http://hdl.handle.net/10012/918.

Full text
Abstract:
The pervasiveness and operational autonomy of mesh-based wireless sensor networks (WSNs) make them an ideal candidate in offering sustained monitoring functions at reasonable cost over a wide area. To extend the functional lifetime of battery-operated sensor nodes, stringent sleep scheduling strategies with communication duty cycles running at sub-1% range are expected to be adopted. Although ultra-low communication duty cycles can cast a detrimental impact on sensing coverage and network connectivity, its effects can be mitigated with adaptive sleep scheduling, node deployment redundancy and multipath routing within the mesh WSN topology. This work proposes a cross-layer organizational approach based on sleep scheduling, called Sense-Sleep Trees (SS-Trees), that aims to harmonize the various engineering issues and provides a method to extend monitoring capabilities and operational lifetime of mesh-based WSNs engaged in wide-area surveillance applications. Various practical considerations such as sensing coverage requirements, duty cycling, transmission range assignment, data messaging, and protocol signalling are incorporated to demonstrate and evaluate the feasibility of the proposed design approach.
APA, Harvard, Vancouver, ISO, and other styles
3

Wu, Shu-Xian, and 吳書璿. "Study of Convolutional Perfectly Matched Layer For Alternating-Direction Implicit Finite-Difference." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/6u4m5p.

Full text
Abstract:
碩士
中華大學
電機工程學系碩士班
101
These unconditionally stable implicit finite-difference time-domain methods use split time-stepping schemes that involve two and more substep computations. As a result, they require more memory and CPU time than the conventional FDTD method. To overcome this shortcoming, the one-step leapfrog ADI FDTD method, was proposed where no mid time-step computations of the field quantities are needed. Therefore, the associated computational efficiency has been improved to the level very similar to that of the conventional FDTD method. In fact, the one-step leapfrog ADI-FDTD method has been proven to have the highest computational efficiency among the most commonly seen unconditionally stable implicit time-stepping numerical methods. A new CPML formulation for the recent improved one-step leapfrog ADI-FDTD method is proposed. In particular, it has the same form as the PML formulations for the conventional FDTD and does not need to compute associated auxiliary quantities in two steps but all in one full time step. Therefore, it is more consistent with the one-step nature of the leapfrog ADI-FDTD formulation.
APA, Harvard, Vancouver, ISO, and other styles
4

Chen, Hsin-Yu, and 陳新育. "Nemo: A New Implicit Connection Graph-Based Gridless Router with Multi-Layer Planes and Pseudo-Tile Propagation." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/56450206679083813229.

Full text
Abstract:
碩士
國立交通大學
資訊科學系所
94
This study presents a new multilayer implicit connection graph-based gridless router called NEMO. Unlike the first implicit connection graph-based router that embeds all routing layers onto a routing plane, NEMO constructs a routing plane for each routing layer. Furthermore, each routing plane is composed of tiles, not an array of grid points as well as their connecting edges, and, consequently, the complexity of routing problem decreases. Each grid then exactly represents one tile (its left bottom corner), and grid maze becomes tile propagation; moreover, to further speedup in path searching, continuous space tiles are combined as a pseudo maximum horizontally or vertically stripped tile. Experimental results indicate that NEMO conducts point-to-point path searching on about 10 times faster than the implicit connection graph-based router. Full-chip routing by NEMO also outperforms all multi-level gridless routing with about twofold to fivefold speedup.
APA, Harvard, Vancouver, ISO, and other styles
5

HA, DUY AN, and 河惟安. "Efficient Authentication of Resource-Constrained IoT Devices based on ECQV Implicit Certification Algorithm and Datagram Transport Layer Security (DTLS) Protocol." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/81819469752798560149.

Full text
Abstract:
碩士
國立交通大學
電機資訊國際學程
105
IoT applications often work with sensitive data and are made up of a large number of constrained devices. These characters require that IoT applications must have a robust and scalable security solution. In this case, public-key cryptography can be the best choice if the cost of computation is acceptable for the constrained devices. For that reason, this work will introduce a low-cost public-key cryptography solution for the constrained devices. The solution is developed base on elliptic curve cryptography and Datagram Transport Layer Security (DTLS) protocol. The elliptic curve cryptography, combined with Elliptic Curve Qu-Vanstone (ECQV) implicit certificate, will offer a public-key cryptography solution with low-cost of computation and bandwidth for IoT applications, and by using the standard protocol DTLS, the solution can be accepted widely. The solution is a security protocol consisting of two phases. The first phase is registration phase in which a constrained node need to execute enrolment procedure to authenticate and get an ECQV implicit certificate from the certificate authority of the IoT system. The obtained ECQV implicit certificate is then used for performing authentication and key exchange scheme in the second phase, this phase is called secure key establishment phase. To prove the feasibility of the solution, an implementation of the protocol has been done based on an embedded SSL library – wolfSSL, and an evaluation of execution time of the implementation is also conducted to assess the efficiency of the solution.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Implicit layers"

1

M, Llorente Ignacio, Salas M. D, and Institute for Computer Applications in Science and Engineering., eds. Semicoarsening and implicit smoothers for the simulation of a flat plate at yaw. Hampton, VA: ICASE, NASA Langley Research Center, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kirkland, N. Bryant. Herodotus and Imperial Greek Literature. Oxford University PressNew York, 2022. http://dx.doi.org/10.1093/oso/9780197583517.001.0001.

Full text
Abstract:
Abstract This book is the first monograph devoted to the reception of Herodotus among Imperial Greek writers. Using a broad reception model and focused largely on texts outside of historiography proper, the book analyzes the entanglements of criticism and imitation in select works by Dionysius of Halicarnassus, Plutarch, Dio Chrysostom, Lucian, and Pausanias. It offers a new angle on Herodotus’s intellectual afterlife, channeled through evocations both explicit and implicit in literary criticism, the moral essay, public oration, satire, and periegetic literature. The book shifts focus from reputation only—what ancient authors explicitly had to say about Herodotus—toward the kinetic interrelation between Herodotus’s reputation and his active reworking across genre and mode. It demonstrates how Herodotus was strategically construed and often implicitly summoned—as fabulist, classicist, moralizer, and evasive intellectual—and how such Herodotean presences played to the wider purposes of Imperial writers. Herodotus became a touchstone for writers concerned with a nimbus of questions that the Histories first helped to articulate. Imperial Greeks found Herodotus useful in puzzling through questions of authorial persona, mimesis, the relationship between aesthetic and ethical criticism, the self, and the contingent definitions of Hellenism under Rome. Ultimately, the book widens an incomplete reception history and reads bi-focally, examining how attention to the presence of Herodotus in various texts unveils new layers of meaning in those works, while also showing how ancient receptions offer insight into the Histories.
APA, Harvard, Vancouver, ISO, and other styles
3

Numerical studies of boundary-layer receptivity: A progress report. [Washington, DC: National Aeronautics and Space Administration, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

United States. National Aeronautics and Space Administration., ed. Numerical studies of boundary-layer receptivity: A progress report. [Washington, DC: National Aeronautics and Space Administration, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Brownstein, Michael. Introduction. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190633721.003.0001.

Full text
Abstract:
Heroes are often admired for their ability to act without having “one thought too many,” as Bernard Williams put it. Likewise, the unhesitating decisions of masterful athletes and artists are part of their fascination. Examples like these make clear that spontaneity can represent an ideal. However, recent literature in empirical psychology has shown how vulnerable our spontaneous inclinations can be to bias, shortsightedness, and irrationality. How can we make sense of these different roles that spontaneity plays in our lives? This chapter describes several case studies of both the “virtues” and “vices” of spontaneity. It lays out the arguments to come in the book in support of the claim that understanding both the virtues and vices of spontaneity requires understanding the implicit mind. The concept of “implicitness” is itself discussed, and a roadmap for the book is provided.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Implicit layers"

1

Butuzov, Valentin Fëdorovich, Nikolai N. Nefedov, Oleh E. Omel’chenko, Lutz Recke, and Klaus R. Schneider. "An Implicit Function Theorem and Applications to Nonsmooth Boundary Layers." In Patterns of Dynamics, 111–27. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64173-7_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hainry, Emmanuel, Bruce M. Kapron, Jean-Yves Marion, and Romain Péchoux. "Complete and tractable machine-independent characterizations of second-order polytime." In Lecture Notes in Computer Science, 368–88. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-99253-8_19.

Full text
Abstract:
AbstractThe class of Basic Feasible Functionals $$\mathtt{BFF}$$ BFF is the second-order counterpart of the class of first-order functions computable in polynomial time. We present several implicit characterizations of $$\mathtt{BFF}$$ BFF based on a typed programming language of terms. These terms may perform calls to imperative procedures, which are not recursive. The type discipline has two layers: the terms follow a standard simply-typed discipline and the procedures follow a standard tier-based type discipline. $$\mathtt{BFF}$$ BFF consists exactly of the second-order functionals that are computed by typable and terminating programs. The completeness of this characterization surprisingly still holds in the absence of lambda-abstraction. Moreover, the termination requirement can be specified as a completeness-preserving instance, which can be decided in time quadratic in the size of the program. As typing is decidable in polynomial time, we obtain the first tractable (i.e., decidable in polynomial time), sound, complete, and implicit characterization of $$\mathtt{BFF}$$ BFF , thus solving a problem opened for more than 20 years.
APA, Harvard, Vancouver, ISO, and other styles
3

Degrez, G., and D. Vandromme. "Implicit Navier-Stokes Calculations of Transonic Shock/Turbulent Boundary-Layer Interactions." In Turbulent Shear-Layer/Shock-Wave Interactions, 53–64. Berlin, Heidelberg: Springer Berlin Heidelberg, 1986. http://dx.doi.org/10.1007/978-3-642-82770-9_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Vicente Cruz, R., E. Lamballais, and R. Perrin. "Implicit Wall-Layer Modelling in Turbulent Pipe Flow." In ERCOFTAC Series, 425–31. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42822-8_56.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Leyland, Pénélope. "Hypersonic Shock-Wave/Boundary Layer Interactions with an Implicit Navier-Stokes Solver." In Shock Waves @ Marseille I, 347–52. Berlin, Heidelberg: Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/978-3-642-78829-1_56.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Anusha, Kompalli, and Ambidi Naveena. "An Enhanced Trust Based Fuzzy Implicit Cross-Layer Protocol for Wireless Sensor Networks." In Lecture Notes in Networks and Systems, 1015–28. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-0146-3_98.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chen, ZhenLi, Antoine Devesa, Stefan Hickel, Christian Stemmer, and Nikolaus A. Adams. "A Wall Model Based on Simplified Thin Boundary Layer Equations for Implicit Large Eddy Simulation of Turbulent Channel Flow." In Notes on Numerical Fluid Mechanics and Multidisciplinary Design, 59–66. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14243-7_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Borrel, M., P. D’Espiney, and C. Jouet. "Three-Dimensional Thin-Layer and Space-Marching Navier-Stokes Computations Using an Implicit Muscl Approach: Comparison with Experiments and Euler Computations." In Proceedings of the Ninth GAMM-Conference on Numerical Methods in Fluid Mechanics, 213–22. Wiesbaden: Vieweg+Teubner Verlag, 1992. http://dx.doi.org/10.1007/978-3-663-13974-4_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Humphris, Imogen, Lummina G. Horlings, and Iain Biggs. "‘Getting Deep into Things’: Deep Mapping in a ‘Vacant’ Landscape." In Co-Creativity and Engaged Scholarship, 357–90. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-84248-2_12.

Full text
Abstract:
AbstractAreas in cities typically denoted as ‘Vacant and Derelict Land’ are frequently presented in policy documents as absent of meaning and awaiting development. However, visits to many of these sites offer evidence of abundant citizen activity occurring outside of planning policy. Dog walkers, DIY skatepark builders, pigeon fanciers and reminiscing former factory workers, for example, can all be found inscribing their own narratives, in palimpsest like fashion, upon these landscapes. This spatio-temporally bound and layered mix of contested meanings extend beyond representational capacity offered by traditional cartographic methods as employed in policy decision-making. Such a failure to represent these ecologies of citizen-led practices often results in their erasure at the point of formal redevelopment. In this chapter, we explore how one alternative approach may respond to these challenges of representation through a case study project in Glasgow, Scotland. Deep mapping is an ethnographically informed, arts research practice, drawing Cifford Geertz’s notion of ‘thick description’ into a visual-performative realm and seeking to extend beyond the thin map by creating multifaceted and open-ended descriptions of place. As such, deep maps are not only investigations into place but of equal concern are the processes by which representations of place are generated. Implicit in this are questions about the role of the researcher as initiator, gatherer, archivist or artist and the intertwining between the place and the self. As a methodological approach that embraces multiplicity and favours the ‘politicized, passionate, and partisan’ over the totalizing objectivity of traditional maps, deep mapping offers a potential to give voice to marginalized, micro-narratives existing in tension with one another and within dominant meta-narratives but also triggers new questions over inclusivity. This methodologically focused chapter explores the ways in which an ethnographically informed, arts research practice may offer alternative insight into spaces of non-aligned narratives. The results from this investigation will offer new framings of spaces within the urban landscape conventionally represented as vacant or empty and generate perspectives on how art research methods may provide valuable investigative tools for decision-makers working in such contexts. The deep mapping work is available to view at http://www.govandeepmap.com.
APA, Harvard, Vancouver, ISO, and other styles
10

Tungom, Chia E., Xianfeng Ding, Lin Wang, Changyuan Zhou, Jiawei Chen, Xingxing Cheng, and Ji Yuan. "Applied Decision Focused Learning: An End-to-End Decision System for Task Allocation." In Frontiers in Artificial Intelligence and Applications. IOS Press, 2022. http://dx.doi.org/10.3233/faia220374.

Full text
Abstract:
Continuous timely repair and replacement of infrastructures, equipment and utilities play an important role in maintaining the smooth-running of a city or local community. Thereby, to help individuals and businesses go about their daily activities with ease, it is vital to develop a proper method for automatically identifying and assigning capable workers for tasks. This paper defines the community management service task allocation problem as CMS-TAP and hence an end-to-end “recommendation + allocation” network, i.e. a task recommender and allocation optimization network (denoted as TROpt-NET), is then developed for handling such problem. TROpt-NET consists of two layers, namely one for predicting worker ability and the other for allocating tasks which are TR Layer and TA Layer, corresponding to “recommendation” and “allocation” of tasks. Different from operations research approaches where workers are assigned to jobs based on their pre-labelled skills and fixed locations, we propose a task recommender and allocation optimization network. The TR layer is a task recommender system designed to learn implicit worker abilities for different tasks using Neural Collaborative Filtering (NCF) by mining a historical dataset of worker task completion. Whereas in the TA layer a differential optimization approach for allocation is used because of its differentiable property and ability to allow for backpropagation to the prediction layer. In this study, we first formulate the CMS-TAP problem as a recommendation +optimization problem and then propose and end-to-end network architecture that tackles the problem in a real-world setting. TROpt-NET curbs uncertainty and assumptions in optimization by learning to more accurately approximate worker ability across different tasks. Additionally, the network can learn implicit worker abilities enabling optimal utilization of workers across a wide range of tasks, which is often ignored in task allocation problems. We find that normalizing worker ability across all tasks improves the implicit learning capability of the network and that good approximations don’t always lead to optimal allocation but learning allocations by backpropagating through recommendations improves the allocation objective. Offline experiments on a real-world large-scale dataset demonstrate the effectiveness of our proposed TROpt-NET.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Implicit layers"

1

Michalkiewicz, Mateusz, Jhony Kaesemodel Pontes, Dominic Jack, Mahsa Baktashmotlagh, and Anders Eriksson. "Implicit Surface Representations As Layers in Neural Networks." In 2019 IEEE/CVF International Conference on Computer Vision (ICCV). IEEE, 2019. http://dx.doi.org/10.1109/iccv.2019.00484.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Houba, Tomas, Arnob das Gupta, Subrata Roy, and Ryan C. Gosse. "Implicit Large Eddy Simulation for High-Speed Turbulent Boundary Layers." In 2018 AIAA Aerospace Sciences Meeting. Reston, Virginia: American Institute of Aeronautics and Astronautics, 2018. http://dx.doi.org/10.2514/6.2018-1302.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Weirs, W., Debra Olejniczak, and Graham Candler. "An implicit essentially nonoscillatory method for the direct simulation of supersonic turbulent boundary layers." In 36th AIAA Aerospace Sciences Meeting and Exhibit. Reston, Virigina: American Institute of Aeronautics and Astronautics, 1998. http://dx.doi.org/10.2514/6.1998-129.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Verdy, C., H. Riad, O. Raviart, S. Abboudl, C. Coddet, D. Cornu, and J. M. De Monicault. "High Heat Flux Thermal Cycling of Multi-Layered Deposits Using a HVOF Gun: Modelisation and Experiments." In ITSC 1998, edited by Christian Coddet. ASM International, 1998. http://dx.doi.org/10.31399/asm.cp.itsc1998p1571.

Full text
Abstract:
Abstract The aim of this work was to determine the behavior of multi-layered structures under high heat fluxes. A direct simulation by the implicit finite difference method was used to predict the transient temperature distribution in each layer of the multimaterial. The influence of the thickness of layers was also studied. Experimentally, high heat fluxes were produced using a HVOF gun operated with a methane-oxygen mixture and internally cooled samples. Multi-layered deposits were vacuum plasma sprayed onto a copper block containing coolant channels for a circulation of water. Transient and static tests were performed with heat fluxes up to 100 MW/m2 and durations of a few minutes to several hours.
APA, Harvard, Vancouver, ISO, and other styles
5

Waindim, Mbu, and Datta V. Gaitonde. "Results and Analysis of Implicit Large Eddy Simulations of Equilibrium Spatially Developing Turbulent Boundary Layers at Multiple Mach Numbers." In ASME 2014 4th Joint US-European Fluids Engineering Division Summer Meeting collocated with the ASME 2014 12th International Conference on Nanochannels, Microchannels, and Minichannels. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/fedsm2014-21391.

Full text
Abstract:
Equilibrium turbulent flat plate boundary layers with time invariant statistics were obtained at Mach numbers 1.7, 2.3, and 2.9. These are to be used as the initial condition for Large Eddy Simulations (LES) or Direct Numerical Simulations (DNS) of shock wave/turbulent boundary layer interactions utilizing a body force-based method. The results obtained are supplemented by an analysis of the mean and statistical properties of the respective boundary layers. The spanwise extent of the domain required to allow adequate decorrelation between the centerline and the boundaries is investigated by extensively probing the flowfields obtained. This is done to quantify the coherent structures of the turbulent flow. Specifically, two point correlations and integral length scales are used to investigate spanwise decorrelation distances in an attempt to pick a computational domain which is large enough to permit decorrelation downstream but small enough to minimize computational costs. It is shown that by examining the precursor events in the upstream region, namely the generalized stability criterion, it is possible to provide estimates for the force field parameters necessary for transition for a given flow, with only a small portion of the domain in the neighborhood of the trip. The technique is made even more efficient by investigating the possibility of determining these parameters using a two-dimensional simulation. Additionally, the three flow fields obtained are surveyed to confirm that they are suitable for subsequent SBLI simulations. We check that (i)they possess the expected turbulent characteristics and (ii)there is no signature of the tripping mechanism.
APA, Harvard, Vancouver, ISO, and other styles
6

Guo, Yuchen, Guiguang Ding, Jungong Han, Sicheng Zhao, and Bin Wang. "Implicit Non-linear Similarity Scoring for Recognizing Unseen Classes." In Twenty-Seventh International Joint Conference on Artificial Intelligence {IJCAI-18}. California: International Joint Conferences on Artificial Intelligence Organization, 2018. http://dx.doi.org/10.24963/ijcai.2018/680.

Full text
Abstract:
Recognizing unseen classes is an important task for real-world applications, due to: 1) it is common that some classes in reality have no labeled image exemplar for training; and 2) novel classes emerge rapidly. Recently, to address this task many zero-shot learning (ZSL) approaches have been proposed where explicit linear scores, like inner product score, are employed to measure the similarity between a class and an image. We argue that explicit linear scoring (ELS) seems too weak to capture complicated image-class correspondence. We propose a simple yet effective framework, called Implicit Non-linear Similarity Scoring (ICINESS). In particular, we train a scoring network which uses image and class features as input, fuses them by hidden layers, and outputs the similarity. Based on the universal approximation theorem, it can approximate the true similarity function between images and classes if a proper structure is used in an implicit non-linear way, which is more flexible and powerful. With ICINESS framework, we implement ZSL algorithms by shallow and deep networks, which yield consistently superior results.
APA, Harvard, Vancouver, ISO, and other styles
7

Storti, Duane, Chad Redl, Mark Ganter, George Turkiyyah, and Tony Woo. "Encapsulated Transmission of Part Specifications for Distributed Solid Freeform Fabrication." In ASME 1999 Design Engineering Technical Conferences. American Society of Mechanical Engineers, 1999. http://dx.doi.org/10.1115/detc99/dac-8600.

Full text
Abstract:
Abstract This paper describes an approach to the transmission of part specifications for distributed solid freeform fabrication. We consider an approach motivated by recent advances in software development associated with object oriented programming style and data encapsulation. Rather than insisting on translation of part specifications to a standard format, we specify a set of public methods necessary for solid freeform fabrication (SFF) or layered manufacturing (LM). By specifying public members and methods that provide fabrication systems with all the information needed to build parts, SFF systems can build parts based on models constructed in any modeling environment for which the methods are available. As an example, we consider a candidate set of methods required by a simple layered fabrication system, and we discuss an implementation of those methods for a modeling format, implicit solid modeling, that has not previously been directly supported by SFF systems. Since for any modeling system, SFF relies on the construction of the layers or slices through the part, we pay particular attention to describing a slicing implementation for implicit solids.
APA, Harvard, Vancouver, ISO, and other styles
8

Mensah, Patrick F., Omer Soysal, Guoqiang Li, Amitava Jana, and Michael A. Stubblefield. "Transient Two-Dimensional Numerical Modeling of Asymmetric Curing Process." In ASME 2002 Engineering Technology Conference on Energy. ASMEDC, 2002. http://dx.doi.org/10.1115/etce2002/cmda-29073.

Full text
Abstract:
Modeling of a heat-activated coupling process of fiberglass reinforced epoxy composite pipe with a copper nickel 90/10 (Cu 90% Ni 10%) alloy pipe was investigated in this study. A nonlinear-coupled two-dimensional heat diffusion model was used to capture the essentials of in-situ thermal transport during the curing process through the thickness of the prepreg wrapping layers. The resulting nonlinear boundary value problem was solved using an Alternating Direction Implicit (ADI) finite difference model (FDM). Transient temperature distributions and degree of cure were predicted for the prepreg layers with and without a heating source at the side of the alloy pipe. A reasonable agreement was found between the predicted temperatures and the experimental results. Measures to improve the curing quality of prepreg layers were discussed based on the modeling results.
APA, Harvard, Vancouver, ISO, and other styles
9

Leroy, Jean-Marc, Timothe´e Perdrizet, Vincent Le Corre, and Pascal Estrier. "Stress Assessment in Armour Layers of Flexible Risers." In ASME 2010 29th International Conference on Ocean, Offshore and Arctic Engineering. ASMEDC, 2010. http://dx.doi.org/10.1115/omae2010-20932.

Full text
Abstract:
The accurate modeling of offshore flexible risers behaviour remains a great challenge because of (i) their complex internal structure, (ii) the variable nature of the loads along the pipe (tension, curvature, internal and external pressures), (iii) and the interactions with structures used to limit the pipe curvature. Technip and IFP have been codeveloping for many years models dedicated to stresses calculation in the armour wires, to assess the flexible lifetime. These models must account for a large number of potential inner contacts (contacts between upper and lower layers, lateral contacts between adjacent armour wires in the same layer) as well as external contacts (bend stiffener, arch, bellmouth or other curvature limitation setup). The paper presents a comparison between 3 models with different level of complexity and realism. The first one is a in house model, whereas the two others were developed on the basis of the commercial FE code Abaqus. The first model, Life6, is based on some simplified assumptions in particular the fact that periodic solutions are assumed (given constant curvature in the pipe) and uses analytical solutions of equilibrium of wires on a torus (the bend pipe). The effect of non uniform curvature (in particular end-fitting proximity) is not considered in this model. The second model, namely 3D/Periodic model, is still based on a periodic assumption, but can cope with severe loadings (such as large curvature of the pipe or compression) leading to specific wires contact interactions. Abaqus Standard (Implicit scheme) is used. The third model, called 3D/Explicit model, is a full length model, as it includes end fittings effects, outer structure (like stiffener) interactions and any curvatures variations along the pipe. All contacts interactions are considered. The number of DOFs involved in the analysis requires the use of an explicit integration scheme (Abaqus Explicit) running on a parallel platform. These models are cross validated on a dedicated case study that consisted of a pressurized pipe cyclically bent with constant curvature. The validation of the model results is very satisfying even when lateral contacts between wires occur. Finally, a comparison of the 3D/Explicit model results with experimental data is presented. This model provides a very good estimation of the flexible behavior and of the end fitting effects.
APA, Harvard, Vancouver, ISO, and other styles
10

Wu, Chin H., and Chih-Chieh Young. "Efficient Non-Hydrostatic Modeling for Free Surface Waves in Deep and Shallow Water." In ASME 2009 28th International Conference on Ocean, Offshore and Arctic Engineering. ASMEDC, 2009. http://dx.doi.org/10.1115/omae2009-79894.

Full text
Abstract:
A novel approach that introduces the Boussinesq-type like equations into an implicit non-hydrostatic model, free of irrotational flow assumption, is presented. The basic concept is to obtain an analytical-based form of pressure distribution at the top layer by matching the reference velocity under a virtual grid system with the one under a non-hydrostatic model grid system. Locations of the references velocities are tuned to optimize the linear wave dispersion property in the model. Efficiency of this non-hydrostatic model with Boussinesq-type equations (NHM-BTE) is critically examined through several free-surface wave examples. Overall model results show that NHM-BTE using only a few vertical layers (i.e., two ∼ four) is capable of accurately simulating highly dispersive wave motion and wave transformation over irregular bathymetry.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Implicit layers"

1

Thompson, Stephen, Brigitte Rohwerder, and Clement Arockiasamy. Freedom of Religious Belief and People with Disabilities: A Case Study of People with Disabilities from Religious Minorities in Chennai, India. Institute of Development Studies (IDS), June 2021. http://dx.doi.org/10.19088/creid.2021.003.

Full text
Abstract:
India has a unique and complex religious history, with faith and spirituality playing an important role in everyday life. Hinduism is the majority religion, and there are many minority religions. India also has a complicated class system and entrenched gender structures. Disability is another important identity. Many of these factors determine people’s experiences of social inclusion or exclusion. This paper explores how these intersecting identities influence the experience of inequality and marginalisation, with a particular focus on people with disabilities from minority religious backgrounds. A participatory qualitative methodology was employed in Chennai, to gather case studies that describe in-depth experiences of participants. Our findings show that many factors that make up a person’s identity intersect in India and impact how someone is included or excluded by society, with religious minority affiliation, caste, disability status, and gender all having the potential to add layers of marginalisation. These various identity factors, and how individuals and society react to them, impact on how people experience their social existence. Identity factors that form the basis for discrimination can be either visible or invisible, and discrimination may be explicit or implicit. Despite various legal and human rights frameworks at the national and international level that aim to prevent marginalisation, discrimination based on these factors is still prevalent in India. While some tokenistic interventions and schemes are in place to overcome marginalisation, such initiatives often only focus on one factor of identity, rather than considering intersecting factors. People with disabilities continue to experience exclusion in all aspects of their lives. Discrimination can exist both between, as well as within, religious communities, and is particularly prevalent in formal environments. Caste-based exclusion continues to be a major problem in India. The current socioeconomic environment and political climate can be seen to perpetuate marginalisation based on these factors. However, when people are included in society, regardless of belonging to a religious minority, having a disability, or being a certain caste, the impact on their life can be very positive.
APA, Harvard, Vancouver, ISO, and other styles
2

MacCall, Benjamin T., Yansen Wang, and Wen-Yih Sun. A New Semi-Implicit Time Integration Scheme for the Time-Dependent Atmospheric Boundary Layer Environment (ABLE) Model. Fort Belvoir, VA: Defense Technical Information Center, September 2015. http://dx.doi.org/10.21236/ada621279.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lewis, Dustin, and Naz Modirzadeh. Taking into Account the Potential Effects of Counterterrorism Measures on Humanitarian and Medical Activities: Elements of an Analytical Framework for States Grounded in Respect for International Law. Harvard Law School Program on International Law and Armed Conflict, May 2021. http://dx.doi.org/10.54813/qbot8406.

Full text
Abstract:
For at least a decade, States, humanitarian bodies, and civil-society actors have raised concerns about how certain counterterrorism measures can prevent or impede humanitarian and medical activities in armed conflicts. In 2019, the issue drew the attention of the world’s preeminent body charged with maintaining or restoring international peace and security: the United Nations Security Council. In two resolutions — Resolution 2462 (2019) and Resolution 2482 (2019) — adopted that year, the Security Council urged States to take into account the potential effects of certain counterterrorism measures on exclusively humanitarian activities, including medical activities, that are carried out by impartial humanitarian actors in a manner consistent with international humanitarian law (IHL). By implicitly recognizing that measures adopted to achieve one policy objective (countering terrorism) can impair or prevent another policy objective (safeguarding humanitarian and medical activities), the Security Council elevated taking into account the potential effects of certain counterterrorism measures on exclusively humanitarian activities to an issue implicating international peace and security. In this legal briefing, we aim to support the development of an analytical framework through which a State may seek to devise and administer a system to take into account the potential effects of counterterrorism measures on humanitarian and medical activities. Our primary intended audience includes the people involved in creating or administering a “take into account” system and in developing relevant laws and policies. Our analysis zooms in on Resolution 2462 (2019) and Resolution 2482 (2019) and focuses on grounding the framework in respect for international law, notably the U.N. Charter and IHL. In section 1, we introduce the impetus, objectives, and structure of the briefing. In our view, a thorough legal analysis of the relevant resolutions in their wider context is a crucial element to laying the conditions conducive to the development and administration of an effective “take into account” system. Further, the stakes and timeliness of the issue, the Security Council’s implicit recognition of a potential tension between measures adopted to achieve different policy objectives, and the relatively scant salient direct practice and scholarship on elements pertinent to “take into account” systems also compelled us to engage in original legal analysis, with a focus on public international law and IHL. In section 2, as a primer for readers unfamiliar with the core issues, we briefly outline humanitarian and medical activities and counterterrorism measures. Then we highlight a range of possible effects of the latter on the former. Concerning armed conflict, humanitarian activities aim primarily to provide relief to and protection for people affected by the conflict whose needs are unmet, whereas medical activities aim primarily to provide care for wounded and sick persons, including the enemy. Meanwhile, for at least several decades, States have sought to prevent and suppress acts of terrorism and punish those who commit, attempt to commit, or otherwise support acts of terrorism. Under the rubric of countering terrorism, States have taken an increasingly broad and diverse array of actions at the global, regional, and national levels. A growing body of qualitative and quantitative evidence documents how certain measures designed and applied to counter terrorism can impede or prevent humanitarian and medical activities in armed conflicts. In a nutshell, counterterrorism measures may lead to diminished or complete lack of access by humanitarian and medical actors to the persons affected by an armed conflict that is also characterized as a counterterrorism context, or those measures may adversely affect the scope, amount, or quality of humanitarian and medical services provided to such persons. The diverse array of detrimental effects of certain counterterrorism measures on humanitarian and medical activities may be grouped into several cross-cutting categories, including operational, financial, security, legal, and reputational effects. In section 3, we explain some of the key legal aspects of humanitarian and medical activities and counterterrorism measures. States have developed IHL as the primary body of international law applicable to acts and omissions connected with an armed conflict. IHL lays down several rights and obligations relating to a broad spectrum of humanitarian and medical activities pertaining to armed conflicts. A violation of an applicable IHL provision related to humanitarian or medical activities may engage the international legal responsibility of a State or an individual. Meanwhile, at the international level, there is no single, comprehensive body of counterterrorism laws. However, States have developed a collection of treaties to pursue specific anti-terrorism objectives. Further, for its part, the Security Council has assumed an increasingly prominent role in countering terrorism, including by adopting decisions that U.N. Member States must accept and carry out under the U.N. Charter. Some counterterrorism measures are designed and applied in a manner that implicitly or expressly “carves out” particular safeguards — typically in the form of limited exceptions or exemptions — for certain humanitarian or medical activities or actors. Yet most counterterrorism measures do not include such safeguards. In section 4, which constitutes the bulk of our original legal analysis, we closely evaluate the two resolutions in which the Security Council urged States to take into account the effects of (certain) counterterrorism measures on humanitarian and medical activities. We set the stage by summarizing some aspects of the legal relations between Security Council acts and IHL provisions pertaining to humanitarian and medical activities. We then analyze the status, consequences, and content of several substantive elements of the resolutions and what they may entail for States seeking to counter terrorism and safeguard humanitarian and medical activities. Among the elements that we evaluate are: the Security Council’s new notion of a prohibited financial “benefit” for terrorists as it may relate to humanitarian and medical activities; the Council’s demand that States comply with IHL obligations while countering terrorism; and the constituent parts of the Council’s notion of a “take into account” system. In section 5, we set out some potential elements of an analytical framework through which a State may seek to develop and administer its “take into account” system in line with Resolution 2462 (2019) and Resolution 2482 (2019). In terms of its object and purpose, a “take into account” system may aim to secure respect for international law, notably the U.N. Charter and IHL pertaining to humanitarian and medical activities. In addition, the system may seek to safeguard humanitarian and medical activities in armed conflicts that also qualify as counterterrorism contexts. We also identify two sets of preconditions arguably necessary for a State to anticipate and address relevant potential effects through the development and execution of its “take into account” system. Finally, we suggest three sets of attributes that a “take into account” system may need to embody to achieve its aims: utilizing a State-wide approach, focusing on potential effects, and including default principles and rules to help guide implementation. In section 6, we briefly conclude. In our view, jointly pursuing the policy objectives of countering terrorism and safeguarding humanitarian and medical activities presents several opportunities, challenges, and complexities. International law does not necessarily provide ready-made answers to all of the difficult questions in this area. Yet devising and executing a “take into account” system provides a State significant opportunities to safeguard humanitarian and medical activities and counter terrorism while securing greater respect for international law.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography