323 resultados para dominating sets
Resumo:
In this paper we present pyktree, an implementation of the K-tree algorithm in the Python programming language. The K-tree algorithm provides highly balanced search trees for vector quantization that scales up to very large data sets. Pyktree is highly modular and well suited for rapid-prototyping of novel distance measures and centroid representations. It is easy to install and provides a python package for library use as well as command line tools.
Resumo:
The Australian e-Health Research Centre in collaboration with the Queensland University of Technology's Paediatric Spine Research Group is developing software for visualisation and manipulation of large three-dimensional (3D) medical image data sets. The software allows the extraction of anatomical data from individual patients for use in preoperative planning. State-of-the-art computer technology makes it possible to slice through the image dataset at any angle, or manipulate 3D representations of the data instantly. Although the software was initially developed to support planning for scoliosis surgery, it can be applied to any dataset whether obtained from computed tomography, magnetic resonance imaging or any other imaging modality.
Resumo:
Many initiatives to improve Business processes are emerging. The essential roles and contributions of Business Analyst (BA) and Business Process Management (BPM) professionals to such initiatives have been recognized in literature and practice. The roles and responsibilities of a BA or BPM practitioner typically require different skill-sets; however these differences are often vague. This vagueness creates much confusion in practice and academia. While both the BA and BPM communities have made attempts to describe their domains through capability defining empirical research and developments of Bodies of knowledge, there has not yet been any attempt to identify the commonality of skills required and points of uniqueness between the two professions. This study aims to address this gap and presents the findings of a detailed content mapping exercise (using NVivo as a qualitative data analysis tool) of the International Institution of Business Analysis (IIBA®) Guide to the Business Analysis Body of Knowledge (BABOK® Guide) against core BPM competency and capability frameworks.
Resumo:
This paper presents an explanation of why the reuse of building components after demolition or deconstruction is critical to the future of the construction industry. An examination of the historical cause and response to climate change sets the scene as to why governance is becoming increasingly focused on the built environment as a mechanism to controlling waste generation associated with the process of demolition, construction and operation. Through an annotated description to the evolving design and construction methodology of a range of timber dwellings (typically 'Queenslanders' during the eras of 1880-1900, 1900-1920 & 1920-1940) the paper offers an evaluation to the variety of materials, which can be used advantageously by those wishing to 'regenerate' a Queenslander. This analysis of 'regeneration' details the constraints when considering relocation and/ or reuse by adaption including deconstruction of building components against the legislative framework requirements of the Queensland Building Act 1975 and the Queensland Sustainable Planning Act 2009, with a specific examination to those of the Building Codes of Australia. The paper concludes with a discussion of these constraints, their impacts on 'regeneration' and the need for further research to seek greater understanding of the practicalities and drivers of relocation, adaptive and building components suitability for reuse after deconstruction.
Resumo:
A growing body of personal epistemology research shows that personal epistemologies influence student learning, particularly in academic contexts. However, we know little about how personal epistemologies relate to teaching, and even less about teacher education. This introductory chapter sets the stage for this book which brings together a range of international researchers in the field of personal epistemology, teaching, and teacher education. This introductory chapter explores personal epistemology as a construct in the field of teaching and teacher education. In particular, it focuses on teacher education a one contextual influence on personal epistemologies by exploring the nature of teachers' personal epistemologies, teachers' personal epistemologies and learning, teachers' personal epistemologies and teaching, and changing personal epistemology in teacher education programs.
Resumo:
This paper presents a fault diagnosis method based on adaptive neuro-fuzzy inference system (ANFIS) in combination with decision trees. Classification and regression tree (CART) which is one of the decision tree methods is used as a feature selection procedure to select pertinent features from data set. The crisp rules obtained from the decision tree are then converted to fuzzy if-then rules that are employed to identify the structure of ANFIS classifier. The hybrid of back-propagation and least squares algorithm are utilized to tune the parameters of the membership functions. In order to evaluate the proposed algorithm, the data sets obtained from vibration signals and current signals of the induction motors are used. The results indicate that the CART–ANFIS model has potential for fault diagnosis of induction motors.
Resumo:
Background Phylogeographic reconstruction of some bacterial populations is hindered by low diversity coupled with high levels of lateral gene transfer. A comparison of recombination levels and diversity at seven housekeeping genes for eleven bacterial species, most of which are commonly cited as having high levels of lateral gene transfer shows that the relative contributions of homologous recombination versus mutation for Burkholderia pseudomallei is over two times higher than for Streptococcus pneumoniae and is thus the highest value yet reported in bacteria. Despite the potential for homologous recombination to increase diversity, B. pseudomallei exhibits a relative lack of diversity at these loci. In these situations, whole genome genotyping of orthologous shared single nucleotide polymorphism loci, discovered using next generation sequencing technologies, can provide very large data sets capable of estimating core phylogenetic relationships. We compared and searched 43 whole genome sequences of B. pseudomallei and its closest relatives for single nucleotide polymorphisms in orthologous shared regions to use in phylogenetic reconstruction. Results Bayesian phylogenetic analyses of >14,000 single nucleotide polymorphisms yielded completely resolved trees for these 43 strains with high levels of statistical support. These results enable a better understanding of a separate analysis of population differentiation among >1,700 B. pseudomallei isolates as defined by sequence data from seven housekeeping genes. We analyzed this larger data set for population structure and allele sharing that can be attributed to lateral gene transfer. Our results suggest that despite an almost panmictic population, we can detect two distinct populations of B. pseudomallei that conform to biogeographic patterns found in many plant and animal species. That is, separation along Wallace's Line, a biogeographic boundary between Southeast Asia and Australia. Conclusion We describe an Australian origin for B. pseudomallei, characterized by a single introduction event into Southeast Asia during a recent glacial period, and variable levels of lateral gene transfer within populations. These patterns provide insights into mechanisms of genetic diversification in B. pseudomallei and its closest relatives, and provide a framework for integrating the traditionally separate fields of population genetics and phylogenetics for other bacterial species with high levels of lateral gene transfer.
Resumo:
Background The vast sequence divergence among different virus groups has presented a great challenge to alignment-based analysis of virus phylogeny. Due to the problems caused by the uncertainty in alignment, existing tools for phylogenetic analysis based on multiple alignment could not be directly applied to the whole-genome comparison and phylogenomic studies of viruses. There has been a growing interest in alignment-free methods for phylogenetic analysis using complete genome data. Among the alignment-free methods, a dynamical language (DL) method proposed by our group has successfully been applied to the phylogenetic analysis of bacteria and chloroplast genomes. Results In this paper, the DL method is used to analyze the whole-proteome phylogeny of 124 large dsDNA viruses and 30 parvoviruses, two data sets with large difference in genome size. The trees from our analyses are in good agreement to the latest classification of large dsDNA viruses and parvoviruses by the International Committee on Taxonomy of Viruses (ICTV). Conclusions The present method provides a new way for recovering the phylogeny of large dsDNA viruses and parvoviruses, and also some insights on the affiliation of a number of unclassified viruses. In comparison, some alignment-free methods such as the CV Tree method can be used for recovering the phylogeny of large dsDNA viruses, but they are not suitable for resolving the phylogeny of parvoviruses with a much smaller genome size.
Resumo:
The Electrocardiogram (ECG) is an important bio-signal representing the sum total of millions of cardiac cell depolarization potentials. It contains important insight into the state of health and nature of the disease afflicting the heart. Heart rate variability (HRV) refers to the regulation of the sinoatrial node, the natural pacemaker of the heart by the sympathetic and parasympathetic branches of the autonomic nervous system. The HRV signal can be used as a base signal to observe the heart's functioning. These signals are non-linear and non-stationary in nature. So, higher order spectral (HOS) analysis, which is more suitable for non-linear systems and is robust to noise, was used. An automated intelligent system for the identification of cardiac health is very useful in healthcare technology. In this work, we have extracted seven features from the heart rate signals using HOS and fed them to a support vector machine (SVM) for classification. Our performance evaluation protocol uses 330 subjects consisting of five different kinds of cardiac disease conditions. We demonstrate a sensitivity of 90% for the classifier with a specificity of 87.93%. Our system is ready to run on larger data sets.
Resumo:
In this Part 2 attention is turned towards the legal arrangements in nation states for managing wetlands. These national arrangements have effect within the international arrangements already mentioned and any regional arrangements that are relevant. However, each national system is a reflection of its own historical, cultural, political and constitutional background. It is the purpose of this Part 2 to review and assess the national approaches to wetlands management. This involves an analysis of a range of instruments. These are: constitutional rules; strategic rules; regulatory rules; and management rules. Each of these sets of rules performs different functions, assumes different forms and is differentially capable of enforcement.
Resumo:
Pascoite mineral having yellow-orange colour of Colorado, USA origin has been characterized by EPR, optical and NIR spectroscopy. The colour dark red-orange to yellow-orange colour of the pascoite indicates that the mineral contain mixed valency of vanadium. The optical spectrum exhibits a number of electronic bands due to presence of VO(II) ions in the mineral. From EPR studies, the parameters of g, A are evaluated and the data confirm that the ion is in distorted octahedron. Optical absorption studies reveal that two sets of VO(II) is in distorted octahedron. The bands in NIR spectra are due to the overtones and combinations of water molecules.
Resumo:
This chapter sets out to identify related issues surrounding the use of Information and Computer Technology (ICT) in developing relationships between local food producers and consumers (both individuals and businesses). Three surveys were conducted in South- East Wales to consider the overlapping issues. The first concerned the role of ICT in relationships between farmers’ market (FMs) vendors and their traditional customers. The second survey examined potential new markets for farmers in the propensity of restaurants and hotels to buy locally, the types and sources of purchases made and the modes of advertising of these businesses. The final survey focused on the potential to expand local web- based selling of farmers’ produce in the future, by examining the potential market of high ICT- use small hotels. Despite the development of tailored ICT facilities, farmers’ market vendors and current individual customers are antipathetic to them. In addition, whilst there is a desire for more local produce particularly amongst independent local restaurants and hotels, this has not been capitalised upon and there is much work to be done even amongst high ICT-use small hotels, to expand the range and scope of farmers’ markets. This raises the need for creation and utilisation of enhanced logistics, payment and marketing management capacity available through a web- based presence, linked to promotion of FMs in business- to- business (B2B) links with local restaurants and hotels. This linked quantitative research highlights the potential value in substantial development of both web portals and supporting logistics to exploit this potential in the future.
Resumo:
Analysis of either footprints or footwear impressions which have been recovered from a crime scene is a well known and well accepted part of forensic investigation. When this evidence is obtained by investigating officers, comparative analysis to a suspect’s evidence may be undertaken. This can be done either by the detectives or in some cases, podiatrists with experience in forensic analysis. Frequently asked questions of a podiatrist include; “What additional information should be collected from a suspect (for the purposes of comparison), and how should it be collected?” This paper explores the answers to these and related questions based on 20 years of practical experience in the field of crime scene analysis as it relates to podiatry and forensics. Elements of normal and abnormal foot function are explored and used to explain the high degree of variability in wear patterns produced by the interaction of the foot and footwear. Based on this understanding the potential for identifying unique features of the user and correlating this to footwear evidence becomes apparent. Standard protocols adopted by podiatrists allow for more precise, reliable, and valid results to be obtained from their analysis. Complex data sets are now being obtained by investigating officers and, in collaboration with the podiatrist; higher quality conclusions are being achieved. This presentation details the results of investigations which have used standard protocols to collect and analyse footwear and suspects of recent major crimes.
Resumo:
The literature abounds with descriptions of failures in high-profile projects and a range of initiatives has been generated to enhance project management practice (e.g., Morris, 2006). Estimating from our own research, there are scores of other project failures that are unrecorded. Many of these failures can be explained using existing project management theory; poor risk management, inaccurate estimating, cultures of optimism dominating decision making, stakeholder mismanagement, inadequate timeframes, and so on. Nevertheless, in spite of extensive discussion and analysis of failures and attention to the presumed causes of failure, projects continue to fail in unexpected ways. In the 1990s, three U.S. state departments of motor vehicles (DMV) cancelled major projects due to time and cost overruns and inability to meet project goals (IT-Cortex, 2010). The California DMV failed to revitalize their drivers’ license and registration application process after spending $45 million. The Oregon DMV cancelled their five year, $50 million project to automate their manual, paper-based operation after three years when the estimates grew to $123 million; its duration stretched to eight years or more and the prototype was a complete failure. In 1997, the Washington state DMV cancelled their license application mitigation project because it would have been too big and obsolete by the time it was estimated to be finished. There are countless similar examples of projects that have been abandoned or that have not delivered the requirements.
Resumo:
In a similar fashion to many western countries, the political context of Japan has been transformed since the 1975 UN World Conference on Women, which eventually led to the establishment of the Basic Law for a Gender-equal Society in Japan in 1999. The Basic Law sets out a series of general guidelines across every field of society, including education. This trajectory policy research study targets gender issues in Japanese higher education and follows the development of the Basic Law and, in particular, how it has been interpreted by bureaucrats and implemented within the field of higher education. This feminist policy research study examines Japanese power relationships within the field of gender and identifies gender discourses embedded within Japanese gender equity policy documents. The study documents the experiences of, and strategies used by, Japanese feminists in relation to gender equity policies in education. Drawing on critical feminist theory and feminist critical discourse theory, the study explores the relationship between gender discourses and social practices and analyses how unequal gender relations have been sustained through the implementation of Japanese gender equity policy. Feminist critical policy analysis and feminist critical discourse analysis have been used to examine data collected through interviews with key players, including policy makers and policy administrators from the national government and higher education institutions offering teacher education courses. The study also scrutinises the minutes of government meetings, and other relevant policy documents. The study highlights the struggles between policy makers in the government and bureaucracy, and feminist educators working for change. Following an anti-feminist backlash, feminist discourses in the original policy documents were weakened or marginalised in revisions, ultimately weakening the impact of the Basic Law in the higher education institutions. The following four key findings are presented within the research: 1) tracking of the original feminist teachers’ movement that existed just prior to the development of the Basic Law in 1999; 2) the formation of the Basic Law, and how the policy resulted in a weakening of the main tenets of women’s policy from a feminist perspective; 3) the problematic manner in which the Basic Law was interpreted at the bureaucratic level; and 4) the limited impact of the Basic Law on higher education and the strategies and struggles of feminist scholars in reaction to this law.