992 resultados para ideal time


Relevância:

60.00% 60.00%

Publicador:

Resumo:

Given the short- and long-term health implications associated with overweight and obesity plus the likelihood of overweight or obesity to continue into adulthood, addressing the causes of overweight and obesity in childhood is a significant public health concern. One underlying cause of overweight and obesity is insufficient physical activity. The Department of Health and Aging recommends children engage in at least 60 minutes of moderate to vigorous physical activity (MVPA) per day; however, these recommendations are met less frequently with increasing age, and girls less often meet these recommendations than boys. School lunch times have been identified as an ideal time for maximizing children’s physical activity (PA), but studies have shown variable levels of PA among children during this time and research indicates that during school lunch times, girls are consistently less active than boys. Understanding influences on girls’ participation in PA during this time may help to increase levels of PA for this demographic. Two South Australian schools, one government and one independent, were included in the sample. Four focus groups (three or four participants per group: total 13 participants) focusing on girls’ perceptions of PA during the lunch break were conducted. Transcripts and field notes were analyzed using a social constructionist framework and thematic content analysis. The expectation to participate in activities considered “gender appropriate”, maturation, and bullying/teasing were identified as explicit barriers to participation in lunch time play. Other important barriers included a “girls’” school uniform and feelings of inadequate competency. The ability to renegotiate gender stereotypes, a unisex school uniform, and perceived high competency were important facilitators of lunch time PA. Low levels of lunch time PA evident in many young adolescent girls may be due to many complex social factors. Therefore, these barriers may need to be addressed before any environmental interventions are likely to be effective.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Neuropsychiatric Symptoms (NPS) are ubiquitous in dementia and are often treated pharmacologically. The objectives of this study were to describe the use of psychotropic, anti-cholinergic, and deliriogenic medications and to identify the prevalence of polypharmacy and psychotropic polypharmacy, among older hospitalized patients in Ireland, with and without dementia. All older patients (≥ 70 years old) that had elective or emergency admissions to six Irish study hospitals were eligible for inclusion in a longitudinal observational study. Of 676 eligible patients, 598 patients were recruited and diagnosed as having dementia, or not, by medical experts. These 598 patients were assessed for delirium, medication use, co-morbidity, functional ability, and nutritional status. We conducted a retrospective cross-sectional analysis of medication data on admission for 583/598 patients with complete medication data, and controlled for age, sex, and co-morbidity. Of 149 patients diagnosed with dementia, only 53 had a previous diagnosis. At hospital admission, 458/583 patients experienced polypharmacy (≥ 5 medications). People with dementia (PwD) were significantly more likely to be prescribed at least one psychotropic medication than patients without dementia (99/147 vs. 182/436; p < 0.001). PwD were also more likely to experience psychotropic polypharmacy (≥ two psychotropics) than those without dementia (54/147 vs. 61/436; p < 0.001). There were no significant differences in the prescribing patterns of anti-cholinergics (23/147 vs. 42/436; p = 0.18) or deliriogenics (79/147 vs. 235/436; p = 0.62). Polypharmacy and psychotropic drug use is highly prevalent in older Irish hospitalized patients, especially in PwD. Hospital admission presents an ideal time for medication reviews in PwD.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This paper provides a generalisation of the structural time series version of the Almost Ideal Demand System (AIDS) that allows for time-varying coefficients (TVC/AIDS) in the presence of cross-equation constraints. An empirical appraisal of the TVC/AIDS is made using a dynamic AIDS with trending intercept as the baseline model with a data set from the Italian Household Budget Survey (1986-2001). The assessment is based on four criteria: adherence to theoretical constraints, statistical diagnostics on residuals, forecasting performance and economic meaningfulness. No clear evidence is found for superior performance of the TVC/AIDS, apart from improved short-term forecasts.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The theoretical E-curve for the laminar flow of non-Newtonian fluids in circular tubes may not be accurate for real tubular systems with diffusion, mechanical vibration, wall roughness, pipe fittings, curves, coils, or corrugated walls. Deviations from the idealized laminar flow reactor (LFR) cannot be well represented using the axial dispersion or the tanks-in-series models of residence time distribution (RTD). In this work, four RTD models derived from non-ideal velocity profiles in segregated tube flow are proposed. They were used to represent the RTD of three tubular systems working with Newtonian and pseudoplastic fluids. Other RTD models were considered for comparison. The proposed models provided good adjustments, and it was possible to determine the active volumes. It is expected that these models can be useful for the analysis of LFR or for the evaluation of continuous thermal processing of viscous foods.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Ascribed to Samuel Gott by S. K. Jones (in the Library, 3d ser., no. 3, v. 1, July 1910)

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper, two ideal formation models of serrated chips, the symmetric formation model and the unilateral right-angle formation model, have been established for the first time. Based on the ideal models and related adiabatic shear theory of serrated chip formation, the theoretical relationship among average tooth pitch, average tooth height and chip thickness are obtained. Further, the theoretical relation of the passivation coefficient of chip's sawtooth and the chip thickness compression ratio is deduced as well. The comparison between these theoretical prediction curves and experimental data shows good agreement, which well validates the robustness of the ideal chip formation models and the correctness of the theoretical deducing analysis. The proposed ideal models may have provided a simple but effective theoretical basis for succeeding research on serrated chip morphology. Finally, the influences of most principal cutting factors on serrated chip formation are discussed on the basis of a series of finite element simulation results for practical advices of controlling serrated chips in engineering application.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In power hardware in the loop (PHIL) simulations, a real-time simulated power system is interfaced to a piece of hardware, usually called hardware under test (HuT). A PHIL test can be realized using several simulation tools. Among them Real Time Digital Simulator (RTDS) is an ideal tool to perform complex power system simulations in near real-time. Stable operation of the entire system, along with the accuracy of simulation results are the main concerns regarding a PHIL simulation. In this paper, a simulated power network on RTDS will be interfaced to HuT through a voltage source converter (VSC). Issues around stability and other interface problems are studied and a new method to stabilize some unstable PHIL cases is proposed. PHIL simulation results in PSCAD and RSCAD are presented.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The mining industry presents us with a number of ideal applications for sensor based machine control because of the unstructured environment that exists within each mine. The aim of the research presented here is to increase the productivity of existing large compliant mining machines by retrofitting with enhanced sensing and control technology. The current research focusses on the automatic control of the swing motion cycle of a dragline and an automated roof bolting system. We have achieved: * closed-loop swing control of an one-tenth scale model dragline; * single degree of freedom closed-loop visual control of an electro-hydraulic manipulator in the lab developed from standard components.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this article, the problem of two Unmanned Aerial Vehicles (UAVs) cooperatively searching an unknown region is addressed. The search region is discretized into hexagonal cells and each cell is assumed to possess an uncertainty value. The UAVs have to cooperatively search these cells taking limited endurance, sensor and communication range constraints into account. Due to limited endurance, the UAVs need to return to the base station for refuelling and also need to select a base station when multiple base stations are present. This article proposes a route planning algorithm that takes endurance time constraints into account and uses game theoretical strategies to reduce the uncertainty. The route planning algorithm selects only those cells that ensure the agent will return to any one of the available bases. A set of paths are formed using these cells which the game theoretical strategies use to select a path that yields maximum uncertainty reduction. We explore non-cooperative Nash, cooperative and security strategies from game theory to enhance the search effectiveness. Monte-Carlo simulations are carried out which show the superiority of the game theoretical strategies over greedy strategy for different look ahead step length paths. Within the game theoretical strategies, non-cooperative Nash and cooperative strategy perform similarly in an ideal case, but Nash strategy performs better than the cooperative strategy when the perceived information is different. We also propose a heuristic based on partitioning of the search space into sectors to reduce computational overhead without performance degradation.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A linear time approximate maximum likelihood decoding algorithm on tail-biting trellises is presented, that requires exactly two rounds on the trellis. This is an adaptation of an algorithm proposed earlier with the advantage that it reduces the time complexity from O(m log m) to O(m) where m is the number of nodes in the tail-biting trellis. A necessary condition for the output of the algorithm to differ from the output of the ideal ML decoder is deduced and simulation results on an AWGN channel using tail-biting trellises for two rate 1/2 convolutional codes with memory 4 and 6 respectively, are reported.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Many real-time database applications arise in electronic financial services, safety-critical installations and military systems where enforcing security is crucial to the success of the enterprise. For real-time database systems supporting applications with firm deadlines, we investigate here the performance implications, in terms of killed transactions, of guaranteeing multilevel secrecy. In particular, we focus on the concurrency control (CC) aspects of this issue. Our main contributions are the following: First, we identify which among the previously proposed real-time CC protocols are capable of providing covert-channel-free security. Second, using a detailed simulation model, we profile the real-time performance of a representative set of these secure CC protocols for a variety of security-classified workloads and system configurations. Our experiments show that a prioritized optimistic CC protocol, OPT-WAIT, provides the best overall performance. Third, we propose and evaluate a novel "dual-CC" approach that allows the real-time database system to simultaneously use different CC mechanisms for guaranteeing security and for improving real-time performance. By appropriately choosing these different mechanisms, concurrency control protocols that provide even better performance than OPT-WAIT are designed. Finally, we propose and evaluate GUARD, an adaptive admission-control policy designed to provide fairness with respect to the distribution of killed transactions across security levels. Our experiments show that GUARD efficiently provides close to ideal fairness for real-time applications that can tolerate covert channel bandwidths of upto one bit per second.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Receive antenna selection (AS) has been shown to maintain the diversity benefits of multiple antennas while potentially reducing hardware costs. However, the promised diversity gains of receive AS depend on the assumptions of perfect channel knowledge at the receiver and slowly time-varying fading. By explicitly accounting for practical constraints imposed by the next-generation wireless standards such as training, packetization and antenna switching time, we propose a single receive AS method for time-varying fading channels. The method exploits the low training overhead and accuracy possible from the use of discrete prolate spheroidal (DPS) sequences based reduced rank subspace projection techniques. It only requires knowledge of the Doppler bandwidth, and does not require detailed correlation knowledge. Closed-form expressions for the channel prediction and estimation error as well as symbol error probability (SEP) of M-ary phase-shift keying (MPSK) for symbol-by-symbol receive AS are also derived. It is shown that the proposed AS scheme, after accounting for the practical limitations mentioned above, outperforms the ideal conventional single-input single-output (SISO) system with perfect CSI and no AS at the receiver and AS with conventional estimation based on complex exponential basis functions.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Single receive antenna selection (AS) allows single-input single-output (SISO) systems to retain the diversity benefits of multiple antennas with minimum hardware costs. We propose a single receive AS method for time-varying channels, in which practical limitations imposed by next-generation wireless standards such as training, packetization and antenna switching time are taken into account. The proposed method utilizes low-complexity subspace projection techniques spanned by discrete prolate spheroidal (DPS) sequences. It only uses Doppler bandwidth knowledge, and does not need detailed correlation knowledge. Results show that the proposed AS method outperforms ideal conventional SISO systems with perfect CSI but no AS at the receiver and AS using the conventional Fourier estimation/prediction method. A closed-form expression for the symbol error probability (SEP) of phase-shift keying (MPSK) with symbol-by-symbol receive AS is derived.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper discusses dynamic modeling of non-isolated DC-DC converters (buck, boost and buck-boost) under continuous and discontinuous modes of operation. Three types of models are presented for each converter, namely, switching model, average model and harmonic model. These models include significant non-idealities of the converters. The switching model gives the instantaneous currents and voltages of the converter. The average model provides the ripple-free currents and voltages, averaged over a switching cycle. The harmonic model gives the peak to peak values of ripple in currents and voltages. The validity of all these models is established by comparing the simulation results with the experimental results from laboratory prototypes, at different steady state and transient conditions. Simulation based on a combination of average and harmonic models is shown to provide all relevant information as obtained from the switching model, while consuming less computation time than the latter.