67 resultados para Anastomosis grouping

em Queensland University of Technology - ePrints Archive


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Distributed pipeline assets systems are crucial to society. The deterioration of these assets and the optimal allocation of limited budget for their maintenance correspond to crucial challenges for water utility managers. Decision makers should be assisted with optimal solutions to select the best maintenance plan concerning available resources and management strategies. Much research effort has been dedicated to the development of optimal strategies for maintenance of water pipes. Most of the maintenance strategies are intended for scheduling individual water pipe. Consideration of optimal group scheduling replacement jobs for groups of pipes or other linear assets has so far not received much attention in literature. It is a common practice that replacement planners select two or three pipes manually with ambiguous criteria to group into one replacement job. This is obviously not the best solution for job grouping and may not be cost effective, especially when total cost can be up to multiple million dollars. In this paper, an optimal group scheduling scheme with three decision criteria for distributed pipeline assets maintenance decision is proposed. A Maintenance Grouping Optimization (MGO) model with multiple criteria is developed. An immediate challenge of such modeling is to deal with scalability of vast combinatorial solution space. To address this issue, a modified genetic algorithm is developed together with a Judgment Matrix. This Judgment Matrix is corresponding to various combinations of pipe replacement schedules. An industrial case study based on a section of a real water distribution network was conducted to test the new model. The results of the case study show that new schedule generated a significant cost reduction compared with the schedule without grouping pipes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recently, Software as a Service (SaaS) in Cloud computing, has become more and more significant among software users and providers. To offer a SaaS with flexible functions at a low cost, SaaS providers have focused on the decomposition of the SaaS functionalities, or known as composite SaaS. This approach has introduced new challenges in SaaS resource management in data centres. One of the challenges is managing the resources allocated to the composite SaaS. Due to the dynamic environment of a Cloud data centre, resources that have been initially allocated to SaaS components may be overloaded or wasted. As such, reconfiguration for the components’ placement is triggered to maintain the performance of the composite SaaS. However, existing approaches often ignore the communication or dependencies between SaaS components in their implementation. In a composite SaaS, it is important to include these elements, as they will directly affect the performance of the SaaS. This paper will propose a Grouping Genetic Algorithm (GGA) for multiple composite SaaS application component clustering in Cloud computing that will address this gap. To the best of our knowledge, this is the first attempt to handle multiple composite SaaS reconfiguration placement in a dynamic Cloud environment. The experimental results demonstrate the feasibility and the scalability of the GGA.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Software as a Service (SaaS) in Cloud is getting more and more significant among software users and providers recently. A SaaS that is delivered as composite application has many benefits including reduced delivery costs, flexible offers of the SaaS functions and decreased subscription cost for users. However, this approach has introduced a new problem in managing the resources allocated to the composite SaaS. The resource allocation that has been done at the initial stage may be overloaded or wasted due to the dynamic environment of a Cloud. A typical data center resource management usually triggers a placement reconfiguration for the SaaS in order to maintain its performance as well as to minimize the resource used. Existing approaches for this problem often ignore the underlying dependencies between SaaS components. In addition, the reconfiguration also has to comply with SaaS constraints in terms of its resource requirements, placement requirement as well as its SLA. To tackle the problem, this paper proposes a penalty-based Grouping Genetic Algorithm for multiple composite SaaS components clustering in Cloud. The main objective is to minimize the resource used by the SaaS by clustering its component without violating any constraint. Experimental results demonstrate the feasibility and the scalability of the proposed algorithm.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Grouping users in social networks is an important process that improves matching and recommendation activities in social networks. The data mining methods of clustering can be used in grouping the users in social networks. However, the existing general purpose clustering algorithms perform poorly on the social network data due to the special nature of users' data in social networks. One main reason is the constraints that need to be considered in grouping users in social networks. Another reason is the need of capturing large amount of information about users which imposes computational complexity to an algorithm. In this paper, we propose a scalable and effective constraint-based clustering algorithm based on a global similarity measure that takes into consideration the users' constraints and their importance in social networks. Each constraint's importance is calculated based on the occurrence of this constraint in the dataset. Performance of the algorithm is demonstrated on a dataset obtained from an online dating website using internal and external evaluation measures. Results show that the proposed algorithm is able to increases the accuracy of matching users in social networks by 10% in comparison to other algorithms.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

MapReduce is a computation model for processing large data sets in parallel on large clusters of machines, in a reliable, fault-tolerant manner. A MapReduce computation is broken down into a number of map tasks and reduce tasks, which are performed by so called mappers and reducers, respectively. The placement of the mappers and reducers on the machines directly affects the performance and cost of the MapReduce computation. From the computational point of view, the mappers/reducers placement problem is a generation of the classical bin packing problem, which is NPcomplete. Thus, in this paper we propose a new grouping genetic algorithm for the mappers/reducers placement problem in cloud computing. Compared with the original one, our grouping genetic algorithm uses an innovative coding scheme and also eliminates the inversion operator which is an essential operator in the original grouping genetic algorithm. The new grouping genetic algorithm is evaluated by experiments and the experimental results show that it is much more efficient than four popular algorithms for the problem, including the original grouping genetic algorithm.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article describes the theoretical underpinning and development of a measurement instrument that provides teachers with a tool to observe the personal creativity characteristics of individual students. The instrument was developed by compiling a list of characteristics derived from the literature to be indicative of the personal characteristics of creative people. The list was then reduced by grouping like characteristics to 9 cognitive and dispositional traits that were considered appropriate for elementary students. The 9-item instrument was then administered in 24 classrooms to 520 Year 6 and Year 7 students. Factor analysis using maximum likelihood extraction with an oblimin rotation revealed a single factor with an eigenvalue greater than 1 and accounting for 63% of the variance. All 9 items on this factor loaded at .72 or greater. The results indicated that the Creativity Checklist has very high internal consistency and is a reliable measurement instrument (a = .93).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose: In the present work we consider our (in progress) spectroscopy study of zinc and iron phosphates under the influence external high pressure to determine zinc ion change coordination from tetrahedral to octahedral (or hexahedral) structure.----- Design/methodology/approach: The standard equipment is the optical high pressure cell with diamond (DAC). The DAC is assembled and then vibrational or electronic spectra are collected by mounting the cell in an infrared, Raman, EXAFS or UV-visible spectrometer.----- Findings: Mechanism by which zinc and iron methaphosphate material is transformed to glassy meta-phosphate is enhancing mechanical properties of tribofilm. The two decades of intensive study demonstrates that Zn (II) and Fe (III) ions participate to cross-link network under friction, hardening the phosphate.----- Research limitations/implications: Transition metal atoms with d orbital have flexible coordination numbers, for example zinc acts as a cross-linking agent increasing hardness, by changing coordination from tetrahedral to octahedral. Perhaps the external pressure effect on the [Zn–(O-P-)4 ] complex causes a transformation to an [Zn –(O-P-)6] grouping.----- Originality/value: This paper analyses high-pressure spectroscopy which has been applied for the investigation of 3D transition metal ions in solids. When studying pressure effects on coordination compounds structure, we can expect changes in ground electronic state (spin-crossovers), electronic spectra due to structural distortions (piezochromism), and changes in the ligand field causing shifts in the electronic transitions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The molecular and metal profile fingerprints were obtained from a complex substance, Atractylis chinensis DC—a traditional Chinese medicine (TCM), with the use of the high performance liquid chromatography (HPLC) and inductively coupled plasma atomic emission spectroscopy (ICP-AES) techniques. This substance was used in this work as an example of a complex biological material, which has found application as a TCM. Such TCM samples are traditionally processed by the Bran, Cut, Fried and Swill methods, and were collected from five provinces in China. The data matrices obtained from the two types of analysis produced two principal component biplots, which showed that the HPLC fingerprint data were discriminated on the basis of the methods for processing the raw TCM, while the metal analysis grouped according to the geographical origin. When the two data matrices were combined into a one two-way matrix, the resulting biplot showed a clear separation on the basis of the HPLC fingerprints. Importantly, within each different grouping the objects separated according to their geographical origin, and they ranked approximately in the same order in each group. This result suggested that by using such an approach, it is possible to derive improved characterisation of the complex TCM materials on the basis of the two kinds of analytical data. In addition, two supervised pattern recognition methods, K-nearest neighbors (KNNs) method, and linear discriminant analysis (LDA), were successfully applied to the individual data matrices—thus, supporting the PCA approach.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The School Based Youth Health Nurse Program was established in 1999 by the Queensland Government to fund school nurse positions in Queensland state high schools. Schools were required to apply for a School Based Youth Health Nurse during a five-phase recruitment process, managed by the health districts, and rolled out over four years. The only mandatory selection criterion for the position of School Based Youth Health Nurse was registration as a General Nurse and most School Based Youth Health Nurses are allocated to two state high schools. Currently, there are approximately 115 Full Time Equivalent School Based Youth Health Nurse positions across all Queensland state high schools. The literature review revealed an abundance of information about school nursing. Most of the literature came from the United Kingdom and the United States, who have a different model of school nursing to school based youth health nursing. However, there is literature to suggest school nursing is gradually moving from a disease-focused approach to a social view of health. The noticeable number of articles about, for example, drug and alcohol, mental health, and contemporary sexual health issues, is evidence of this change. Additionally, there is a significant the volume of literature about partnerships and collaboration, much of which is about health education, team teaching and how school nurses and schools do health business together. The surfacing of this literature is a good indication that school nursing is aligning with the broader national health priority areas. More particularly, the literature exposed a small but relevant and current body of research, predominantly from Queensland, about school based youth health nursing. However, there remain significant gaps in the knowledge about school based youth health nursing. In particular, there is a deficit about how School Based Youth Heath Nurses understand the experience of school based youth health nursing. This research aimed to reveal the meaning of the experience of school based youth health nursing. The research question was How do School Based Youth Health Nurses’ understand the experience of school based youth health nursing? This enquiry was instigated because the researcher, who had a positive experience of school based youth health nursing, considered it important to validate other School Based Youth Health Nurses’ experiences. Consequently, a comprehensive use of qualitative research was considered the most appropriate manner to explore this research question. Within this qualitative paradigm, the research framework consists of the epistemology of social constructionism, the theoretical perspective of interpretivism and the approach of phenomenography. After ethical approval was gained, purposeful and snowball sampling was used to recruit a sample of 16 participants. In-depth interviews, which were voluntary, confidential and anonymous, were mostly conducted in public venues and lasted from 40-75 minutes. The researcher also kept a researchers journal as another form of data collection. Data analysis was guided by Dahlgren and Fallsbergs’ (1991, p. 152) seven phases of data analysis which includes familiarization, condensation, comparison, grouping, articulating, labelling and contrasting. The most important finding in this research is the outcome space, which represents the entirety of the experience of school based youth health nursing. The outcome space consists of two components: inside the school environment and outside the school environment. Metaphorically and considered as whole-in-themselves, these two components are not discreet but intertwined with each other. The outcome space consists of eight categories. Each category of description is comprised of several sub-categories of description but as a whole, is a conception of school based youth health nursing. The eight conceptions of school based youth health nursing are: 1. The conception of school based youth health nursing as out there all by yourself. 2. The conception of school based youth health nursing as no real backup. 3. The conception of school based youth health nursing as confronted by many barriers. 4. The conception of school based youth health nursing as hectic and full-on. 5. The conception of school based youth health nursing as working together. 6. The conception of school based youth health nursing as belonging to school. 7. The conception of school based youth health nursing as treated the same as others. 8. The conception of school based youth health nursing as the reason it’s all worthwhile. These eight conceptions of school based youth health nursing are logically related and form a staged hierarchical relationship because they are not equally dependent on each other. The conceptions of school based youth health nursing are grouped according to negative, negative and positive and positive conceptions of school based youth health nursing. The conceptions of school based youth health nursing build on each other, from the bottom upwards, to reach the authorized, or the most desired, conception of school based youth health nursing. This research adds to the knowledge about school nursing in general but especially about school based youth health nursing specifically. Furthermore, this research has operational and strategic implications, highlighted in the negative conceptions of school based youth health nursing, for the School Based Youth Health Nurse Program. The researcher suggests the School Based Youth Health Nurse Program, as a priority, address the operational issues The researcher recommends a range of actions to tackle issues and problems associated with accommodation and information, consultations and referral pathways, confidentiality, health promotion and education, professional development, line management and School Based Youth Health Nurse Program support and school management and community. Strategically, the researcher proposes a variety of actions to address strategic issues, such as the School Based Youth Health Nurse Program vision, model and policy and practice framework, recruitment and retention rates and evaluation. Additionally, the researcher believes the findings of this research have the capacity to spawn a myriad of future research projects. The researcher has identified the most important areas for future research as confidentiality, information, qualifications and health outcomes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Monitoring Internet traffic is critical in order to acquire a good understanding of threats to computer and network security and in designing efficient computer security systems. Researchers and network administrators have applied several approaches to monitoring traffic for malicious content. These techniques include monitoring network components, aggregating IDS alerts, and monitoring unused IP address spaces. Another method for monitoring and analyzing malicious traffic, which has been widely tried and accepted, is the use of honeypots. Honeypots are very valuable security resources for gathering artefacts associated with a variety of Internet attack activities. As honeypots run no production services, any contact with them is considered potentially malicious or suspicious by definition. This unique characteristic of the honeypot reduces the amount of collected traffic and makes it a more valuable source of information than other existing techniques. Currently, there is insufficient research in the honeypot data analysis field. To date, most of the work on honeypots has been devoted to the design of new honeypots or optimizing the current ones. Approaches for analyzing data collected from honeypots, especially low-interaction honeypots, are presently immature, while analysis techniques are manual and focus mainly on identifying existing attacks. This research addresses the need for developing more advanced techniques for analyzing Internet traffic data collected from low-interaction honeypots. We believe that characterizing honeypot traffic will improve the security of networks and, if the honeypot data is handled in time, give early signs of new vulnerabilities or breakouts of new automated malicious codes, such as worms. The outcomes of this research include: • Identification of repeated use of attack tools and attack processes through grouping activities that exhibit similar packet inter-arrival time distributions using the cliquing algorithm; • Application of principal component analysis to detect the structure of attackers’ activities present in low-interaction honeypots and to visualize attackers’ behaviors; • Detection of new attacks in low-interaction honeypot traffic through the use of the principal component’s residual space and the square prediction error statistic; • Real-time detection of new attacks using recursive principal component analysis; • A proof of concept implementation for honeypot traffic analysis and real time monitoring.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Digital collections are growing exponentially in size as the information age takes a firm grip on all aspects of society. As a result Information Retrieval (IR) has become an increasingly important area of research. It promises to provide new and more effective ways for users to find information relevant to their search intentions. Document clustering is one of the many tools in the IR toolbox and is far from being perfected. It groups documents that share common features. This grouping allows a user to quickly identify relevant information. If these groups are misleading then valuable information can accidentally be ignored. There- fore, the study and analysis of the quality of document clustering is important. With more and more digital information available, the performance of these algorithms is also of interest. An algorithm with a time complexity of O(n2) can quickly become impractical when clustering a corpus containing millions of documents. Therefore, the investigation of algorithms and data structures to perform clustering in an efficient manner is vital to its success as an IR tool. Document classification is another tool frequently used in the IR field. It predicts categories of new documents based on an existing database of (doc- ument, category) pairs. Support Vector Machines (SVM) have been found to be effective when classifying text documents. As the algorithms for classifica- tion are both efficient and of high quality, the largest gains can be made from improvements to representation. Document representations are vital for both clustering and classification. Representations exploit the content and structure of documents. Dimensionality reduction can improve the effectiveness of existing representations in terms of quality and run-time performance. Research into these areas is another way to improve the efficiency and quality of clustering and classification results. Evaluating document clustering is a difficult task. Intrinsic measures of quality such as distortion only indicate how well an algorithm minimised a sim- ilarity function in a particular vector space. Intrinsic comparisons are inherently limited by the given representation and are not comparable between different representations. Extrinsic measures of quality compare a clustering solution to a “ground truth” solution. This allows comparison between different approaches. As the “ground truth” is created by humans it can suffer from the fact that not every human interprets a topic in the same manner. Whether a document belongs to a particular topic or not can be subjective.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Seated shot-putters rely on a customized assistive device called a throwing frame. Currently, the construction of each individual throwing frame is mainly driven by an empirical approach. One way to refine the conception is to improve the basic understanding of performance of seated shot-putters. The relationship between performance and throwing technique has been well described. Remarkably, the relationship between performance and throwing frame characteristics has received limited attention. The primary objective of this study was to present a cataloguing of characteristics of throwing frames used by seated shot-putters. This cataloguing consisted of defining and grouping 26 characteristics into three main categories (i.e., whole body, foot and upper limb specific characteristics) and seven sub-categories. The secondary objective of this study was to provide raw characterisations of the throwing frames for a group of athletes who participated in a world-class event. The characterisation consisted of describing the characteristics of each throwing frame. Potential relationships between characteristics, performance and classification were also identified. The cataloguing was achieved using a 6-step heuristic approach, involving expert opinions and the analysis of 215 attempts produced by 55 male athletes during the 2006 IPC Athletics World Championships. The distribution of samples across characteristics suggested a relevant level of comprehensiveness for the proposed cataloguing. The raw data, the profile of best athletes and the frequency of characteristics provided key benchmark information for construction of a throwing frame as well as coaching, classification and officiating. Analysis of data sets relating to characteristics, performance and classification were inconclusive.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: International data on child maltreatment are largely derived from child protection agencies, and predominantly report only substantiated cases of child maltreatment. This approach underestimates the incidence of maltreatment and makes inter-jurisdictional comparisons difficult. There has been a growing recognition of the importance of health professionals in identifying, documenting and reporting suspected child maltreatment. This study aimed to describe the issues around case identification using coded morbidity data, outline methods for selecting and grouping relevant codes, and illustrate patterns of maltreatment identified. Methods: A comprehensive review of the ICD-10-AM classification system was undertaken, including review of index terms, a free text search of tabular volumes, and a review of coding standards pertaining to child maltreatment coding. Identified codes were further categorised into maltreatment types including physical abuse, sexual abuse, emotional or psychological abuse, and neglect. Using these code groupings, one year of Australian hospitalisation data for children under 18 years of age was examined to quantify the proportion of patients identified and to explore the characteristics of cases assigned maltreatment-related codes. Results: Less than 0.5% of children hospitalised in Australia between 2005 and 2006 had a maltreatment code assigned, almost 4% of children with a principal diagnosis of a mental and behavioural disorder and over 1% of children with an injury or poisoning as the principal diagnosis had a maltreatment code assigned. The patterns of children assigned with definitive T74 codes varied by sex and age group. For males selected as having a maltreatment-related presentation, physical abuse was most commonly coded (62.6% of maltreatment cases) while for females selected as having a maltreatment-related presentation, sexual abuse was the most commonly assigned form of maltreatment (52.9% of maltreatment cases). Conclusion: This study has demonstrated that hospital data could provide valuable information for routine monitoring and surveillance of child maltreatment, even in the absence of population-based linked data sources. With national and international calls for a public health response to child maltreatment, better understanding of, investment in and utilisation of our core national routinely collected data sources will enhance the evidence-base needed to support an appropriate response to children at risk.