290 resultados para Scenarios of foldin


Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper, we present a dynamic model to identify influential users of micro-blogging services. Micro-blogging services, such as Twitter, allow their users (twitterers) to publish tweets and choose to follow other users to receive tweets. Previous work on user influence on Twitter, concerns more on following link structure and the contents user published, seldom emphasizes the importance of interactions among users. We argue that, by emphasizing on user actions in micro-blogging platform, user influence could be measured more accurately. Since micro-blogging is a powerful social media and communication platform, identifying influential users according to user interactions has more practical meanings, e.g., advertisers may concern how many actions – buying, in this scenario – the influential users could initiate rather than how many advertisements they spread. By introducing the idea of PageRank algorithm, innovatively, we propose our model using action-based network which could capture the ability of influential users when they interacting with micro-blogging platform. Taking the evolving prosperity of micro-blogging into consideration, we extend our actionbaseduser influence model into a dynamic one, which could distinguish influential users in different time periods. Simulation results demonstrate that our models could support and give reasonable explanations for the scenarios that we considered.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Integration of rooftop photovoltaics (PVs) in residential networks at moderate penetration levels is becoming a reality in many countries including Australia. Despite the technical challenges in properly accommodating PV units, one of the major benefits is the ability of PV units to extend useful life time of distribution transformers. This effect is not quantified in the existing literature. This paper carries out an analysis into the impacts of rooftop PVs at different penetration levels on the performance of distribution transformers and residential networks. This paper presents a methodology to quantify the benefit of the distribution transformer life extension brought about by customer-owned rooftop PV units. The proposed methodology is applied to a real distribution system with various scenarios, including different penetration levels. The results show the distribution transformer loss-of-life function, as a function of the rooftop PV penetration level, is monotonically decreasing function which saturates after a certain penetration level. The best life improvements occur with transformers that are highly loaded and the presence of a significant PV installation may support the deferral of transformer upgrades.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Australia is experiencing the global phenomenon of an ageing population with the baby boomer generation starting to reach retirement age in large numbers. As a result, there is a growing need for appropriate accommodation and this will continue to grow for the foreseeable future. However, the needs of the fit, mobile and techno savvy baby boomers are likely to be far different from those of previous generations of older people, but are as yet unknown and unanticipated. This paper reports on the findings of a Futuring research project to explore the preferred housing futures for the baby boomer generation in the city of Brisbane, an aspiring creative city in South East Queensland (SEQ), Australia. Their future home design and service needs are predicted by firstly employing a global environmental scan of related and associated ageing futures issues. This was followed by a micro-Futuring workshop, based on Inayatullah’s Futures Triangle Analysis, to identify a range of scenarios. The key aspects of the workshop culminated in the development of a Transformational Scenario – EUTOPIA 75+. From this, a suite of six design recommendations for seniors’ housing design and smart services provision are synthesised to give a sense of direction of preferred living styles, especially in terms of physical housing spaces, with a view to identifying new house design opportunities for the allied industries and research organisations. The issues identified are also of concern for aged care service providers, retirement living developers, and for academics involved in the social and physical design of living spaces for older people.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This thesis addresses voltage violation problem, the most critical issue associated with high level penetration of photovoltaic (PV) in electricity distribution network. A coordinated control algorithm using the reactive power from PV inverter and integrated battery energy storage has been developed and investigated in different network scenarios in the thesis. Probable variations associated with solar generation, end-user participation and network parameters are also considered. Furthermore, a unified data model and well-defined communication protocol to ensure the smooth coordination between all the components during the operation of the algorithm is described. Finally this thesis incorporated the uncertainties of solar generation using probabilistic load flow analysis.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Objectives To estimate the burden of disease attributable to unsafe water, sanitation and hygiene (WSH) by age group for South Africa in 2000. Design World Health Organization comparative risk assessment methodology was used to estimate the disease burden attributable to an exposure by comparing the observed risk factor distribution with a theoretical lowest possible population distribution. A scenario-based approach was applied for estimating diarrhoeal disease burden from unsafe WSH. Six exposure scenarios were defined based on the type of water and sanitation infrastructure and environmental faecal-oral pathogen load. For ‘intestinal parasites’ and schistosomiasis, the burden was assumed to be 100% attributable to exposure to unsafe WSH. Setting South Africa. Outcome measures Disease burden from diarrhoeal diseases, intestinal parasites and schistosomiasis, measured by deaths and disability-adjusted life years (DALYs). Results 13 434 deaths were attributable to unsafe WSH accounting for 2.6% (95% uncertainty interval 2.4 - 2.7%) of all deaths in South Africa in 2000. The burden was especially high in children under 5 years, accounting for 9.3% of total deaths in this age group and 7.4% of burden of disease. Overall, the burden due to unsafe WSH was equivalent to 2.6% (95% uncertainty interval 2.5 - 2.7%) of the total disease burden for South Africa, ranking this risk factor seventh for the country. Conclusions Unsafe WSH remains an important risk factor for disease in South Africa, especially in children under 5. High priority needs to be given to the provision of safe and sustainable sanitation and water facilities and to promoting safe hygiene behaviours, particularly among children.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Alignment-free methods, in which shared properties of sub-sequences (e.g. identity or match length) are extracted and used to compute a distance matrix, have recently been explored for phylogenetic inference. However, the scalability and robustness of these methods to key evolutionary processes remain to be investigated. Here, using simulated sequence sets of various sizes in both nucleotides and amino acids, we systematically assess the accuracy of phylogenetic inference using an alignment-free approach, based on D2 statistics, under different evolutionary scenarios. We find that compared to a multiple sequence alignment approach, D2 methods are more robust against among-site rate heterogeneity, compositional biases, genetic rearrangements and insertions/deletions, but are more sensitive to recent sequence divergence and sequence truncation. Across diverse empirical datasets, the alignment-free methods perform well for sequences sharing low divergence, at greater computation speed. Our findings provide strong evidence for the scalability and the potential use of alignment-free methods in large-scale phylogenomics.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

There is a concern that high densities of elephants in southern Africa could lead to the overall reduction of other forms of biodiversity. We present a grid-based model of elephant-savanna dynamics, which differs from previous elephant-vegetation models by accounting for woody plant demographics, tree-grass interactions, stochastic environmental variables (fire and rainfall), and spatial contagion of fire and tree recruitment. The model projects changes in height structure and spatial pattern of trees over periods of centuries. The vegetation component of the model produces long-term tree-grass coexistence, and the emergent fire frequencies match those reported for southern African savannas. Including elephants in the savanna model had the expected effect of reducing woody plant cover, mainly via increased adult tree mortality, although at an elephant density of 1.0 elephant/km2, woody plants still persisted for over a century. We tested three different scenarios in addition to our default assumptions. (1) Reducing mortality of adult trees after elephant use, mimicking a more browsing-tolerant tree species, mitigated the detrimental effect of elephants on the woody population. (2) Coupling germination success (increased seedling recruitment) to elephant browsing further increased tree persistence, and (3) a faster growing woody component allowed some woody plant persistence for at least a century at a density of 3 elephants/km2. Quantitative models of the kind presented here provide a valuable tool for exploring the consequences of management decisions involving the manipulation of elephant population densities. © 2005 by the Ecological Society of America.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Wound healing and tumour growth involve collective cell spreading, which is driven by individual motility and proliferation events within a population of cells. Mathematical models are often used to interpret experimental data and to estimate the parameters so that predictions can be made. Existing methods for parameter estimation typically assume that these parameters are constants and often ignore any uncertainty in the estimated values. We use approximate Bayesian computation (ABC) to estimate the cell diffusivity, D, and the cell proliferation rate, λ, from a discrete model of collective cell spreading, and we quantify the uncertainty associated with these estimates using Bayesian inference. We use a detailed experimental data set describing the collective cell spreading of 3T3 fibroblast cells. The ABC analysis is conducted for different combinations of initial cell densities and experimental times in two separate scenarios: (i) where collective cell spreading is driven by cell motility alone, and (ii) where collective cell spreading is driven by combined cell motility and cell proliferation. We find that D can be estimated precisely, with a small coefficient of variation (CV) of 2–6%. Our results indicate that D appears to depend on the experimental time, which is a feature that has been previously overlooked. Assuming that the values of D are the same in both experimental scenarios, we use the information about D from the first experimental scenario to obtain reasonably precise estimates of λ, with a CV between 4 and 12%. Our estimates of D and λ are consistent with previously reported values; however, our method is based on a straightforward measurement of the position of the leading edge whereas previous approaches have involved expensive cell counting techniques. Additional insights gained using a fully Bayesian approach justify the computational cost, especially since it allows us to accommodate information from different experiments in a principled way.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A national online survey of private and public will drafters distributed through State/public trustee offices in seven states/territories and law societies and community legal centres across all states/territories yielded 257 responses. The survey, using questions, scales and case scenarios sought to canvas perceptions of difficulties facing will drafters and the strategies used to address them.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Driver cognitions about aggressive driving of others are potentially important to the development of evidence-based interventions. Previous research has suggested that perceptions that other drivers are intentionally aggressive may influence recipient driver anger and subsequent aggressive responses. Accordingly, recent research on aggressive driving has attempted to distinguish between intentional and unintentional motives in relation to problem driving behaviours. This study assessed driver cognitive responses to common potentially provocative hypothetical driving scenarios to explore the role of attributions in driver aggression. A convenience sample of 315 general drivers 16–64 yrs (M = 34) completed a survey measuring trait aggression (Aggression Questionnaire AQ), driving anger (Driving Anger Scale, DAS), and a proxy measure of aggressive driving behaviour (Australian Propensity for Angry Driving AusPADS). Purpose designed items asked for drivers’ ‘most likely’ thought in response to AusPADS scenarios. Response options were equivalent to causal attributions about the other driver. Patterns in endorsements of attribution responses to the scenarios suggested that drivers tended to adopt a particular perception of the driving of others regardless of the depicted circumstances: a driving attributional style. No gender or age differences were found for attributional style. Significant differences were detected between attributional styles for driving anger and endorsement of aggressive responses to driving situations. Drivers who attributed the on-road event to the other being an incompetent or dangerous driver had significantly higher driving anger scores and endorsed significantly more aggressive driving responses than those drivers who attributed other driver’s behaviour to mistakes. In contrast, drivers who gave others the ‘benefit of the doubt’ endorsed significantly less aggressive driving responses than either of these other two groups, suggesting that this style is protective.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This program of research investigated the harmful effects of mistreatment by the workgroup, and the role of perceived rejection as a critical mediator linking mistreatment and outcomes. This research program had three primary purposes. First, the research aimed to examine the important role of workgroup mistreatment as an independent predictor of negative outcomes, over and above the influence of supervisor mistreatment. Second, the research aimed to examine the effect of perceived rejection as an explanatory variable linking workgroup mistreatment and outcomes. Finally, the moderating effect of organizational norms on the relationship between workgroup mistreatment and perceived rejection was examined. The relationships of interest were examined over four studies, using multiple methods of data collection, across part-time and full-time working samples. In Study 1 (Chapter 2), the independent role of workgroup mistreatment and the mediating role of perceived rejection were examined. One hundred and forty two part-time working participants took part in the study. The participants completed a questionnaire on workplace behaviors in their organizations. The results of hierarchical regression analyses revealed a strong harmful effect of workgroup mistreatment, independent of mistreatment by the supervisor. In addition, the results showed that perceived rejection fully mediated the relationship between workgroup mistreatment and depression and organizational based self esteem. The study highlighted that perceived rejection acts as a key underlying psychological mechanism involved in the effect of workgroup mistreatment. This study has been published in the Journal of Occupational Health Psychology. Study 2 and Study 3 were presented as one paper in Chapter 3. The aims of these two studies was to explore the effects of workgroup mistreatment on a wider range of individual and organizational level outcomes, and to provide further evidence of the mediating role of perceived rejection as observed in Study 1. The results from both studies demonstrated that workgroup mistreatment had a significant and independent role in predicting negative individual and organizational level outcomes, providing support for the findings of Study 1. In the first study, 189 participants received scenarios manipulating workgroup mistreatment and supervisor mistreatment. The results of hierarchical regression analyses revealed that workgroup mistreatment harmfully affected participants, over and above that of the supervisor. The results also demonstrated that perceived rejection mediated the positive relationships between workgroup mistreatment and depression and organizational deviance, and also the negative relationships between workgroup mistreatment and organizational based self esteem and organizational citizenship behaviors. The second study included an additional aim, to examine the moderating role of supportive organizational norms. Two hundred and twenty nine participants read scenarios that manipulated workgroup mistreatment, supervisor mistreatment and organizational norms. The results of hierarchical regression analyses revealed the significant harmful effects of workgroup mistreatment, over and above the influence of supervisor mistreatment. The results also revealed the mediating role of perceived rejection. The direct effect of positive organizational norms also emerged, consistent with previous research. In addition, the result revealed that employees who experienced supportive organizational norms were more likely to reconcile with their workgroup members after experiencing mistreatment compared to employees who experienced hostile organizational norms. Finally, an unexpected pattern on the key affective variables of depression and organizational based self esteem emerged, such that mistreatment led to more negative outcomes in the supportive norms condition than in the hostile condition, where employees appeared to be desensitized. This paper is currently under review at the Journal of Applied Social Psychology. In Study 4 (Chapter 4), the overall model of workplace mistreatment was tested on a sample of full-time workers in an applied setting. One hundred and seventy two adults took part in the study. Participants were required to evaluate their workplace regarding mistreatment and organizational norms and to report their own psychological, behavioral and organizational outcomes. The results revealed that workgroup mistreatment was associated with increased depression, stress and avoidance, over and above supervisor mistreatment. In addition, the results revealed that perceived rejection acted as an explanatory variable linking workgroup mistreatment to a number of outcomes. Furthermore, the moderating role of hostile organizational norms emerged on depression, stress, reconciliation and avoidance. This paper is currently under review at the Journal of Occupational Health Psychology. Overall, the four studies provided empirical support for the majority of the hypotheses. The effects were demonstrated for a range of psychological, behavioral, and organizational level outcomes, using multiple methods of data collection, across part-time and full-time workers. At the conclusion of the thesis (Chapter 5), an overall summary is provided of the findings across all four studies, practical and theoretical implications and research directions.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The consequences of falls are often dreadful for individuals with lower limb amputation using bone-anchored prosthesis.[1-5] Typically, the impact on the fixation is responsible for bending the intercutaneous piece that could lead to a complete breakage over time. .[3, 5-8] The surgical replacement of this piece is possible but complex and expensive. Clearly, there is a need for solid data enabling an evidence-based design of protective devices limiting impact forces and torsion applied during a fall. The impact on the fixation during an actual fall is obviously difficult to record during a scientific experiment.[6, 8-13] Consequently, Schwartze and colleagues opted for one of the next best options science has to offer: simulation with an able-bodied participant. They recorded body movements and knee impacts on the floor while mimicking several plausible falling scenarios. Then, they calculated the forces and moments that would be applied at four levels along the femur corresponding to amputation heights.[6, 8-11, 14-25] The overall forces applied during the falls were similar regardless of the amputation height indicating that the impact forces were simply translated along the femur. As expected, they showed that overall moments generally increased with amputation height due to changes in lever arm. This work demonstrates that devices preventing only against force overload do not require considering amputation height while those protecting against bending moments should. Another significant contribution is to provide, for the time, the magnitude of the impact load during different falls. This loading range is crucial to the overall design and, more precisely, the triggering threshold of protective devices. Unfortunately, the analysis of only a single able-bodied participant replicating falls limits greatly the generalisation of the findings. Nonetheless, this case study is an important milestone contributing to a better understanding of load impact during a fall. This new knowledge will improve the treatment, the safe ambulation and, ultimately, the quality of life of individuals fitted with bone-anchored prosthesis.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Fast restoration of critical loads and non-black-start generators can significantly reduce the economic losses caused by power system blackouts. In a parallel power system restoration scenario, the sectionalization of restoration subsystems plays a very important role in determining the pickup of critical loads before synchronization. Most existing research mainly focuses on the startup of non-black-start generators. The restoration of critical loads, especially the loads with cold load characteristics, has not yet been addressed in optimizing the subsystem divisions. As a result, sectionalized restoration subsystems cannot achieve the best coordination between the pickup of loads and the ramping of generators. In order to generate sectionalizing strategies considering the pickup of critical loads in parallel power system restoration scenarios, an optimization model considering power system constraints, the characteristics of the cold load pickup and the features of generator startup is proposed in this paper. A bi-level programming approach is employed to solve the proposed sectionalizing model. In the upper level the optimal sectionalizing problem for the restoration subsystems is addressed, while in the lower level the objective is to minimize the outage durations of critical loads. The proposed sectionalizing model has been validated by the New-England 39-bus system and the IEEE 118-bus system. Further comparisons with some existing methods are carried out as well.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

With the increasing competitiveness in global markets, many developing nations are striving to constantly improve their services in search for the next competitive edge. As a result, the demand and need for Business Process Management (BPM) in these regions is seeing a rapid rise. Yet there exists a lack of professional expertise and knowledge to cater to that need. Therefore, the development of well-structured BPM training/ education programs has become an urgent requirement for these industries. Furthermore, the lack of textbooks or other self-educating material, that go beyond the basics of BPM, further ratifies the need for case based teaching and related cases that enable the next generation of professionals in these countries. Teaching cases create an authentic learning environment where complexities and challenges of the ‘real world’ can be presented in a narrative, enabling students to evolve crucial skills such as problem analysis, problem solving, creativity within constraints as well as the application of appropriate tools (BPMN) and techniques (including best practices and benchmarking) within richer and real scenarios. The aim of this paper is to provide a comprehensive teaching case demonstrating the means to tackle any developing nation’s legacy government process undermined by inefficiency and ineffectiveness. The paper also includes thorough teaching notes The article is presented in three main parts: (i) Introduction - that provides a brief background setting the context of this paper, (ii) The Teaching Case, and (iii) Teaching notes.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Supervisory Control and Data Acquisition (SCADA) systems are one of the key foundations of smart grids. The Distributed Network Protocol version 3 (DNP3) is a standard SCADA protocol designed to facilitate communications in substations and smart grid nodes. The protocol is embedded with a security mechanism called Secure Authentication (DNP3-SA). This mechanism ensures that end-to-end communication security is provided in substations. This paper presents a formal model for the behavioural analysis of DNP3-SA using Coloured Petri Nets (CPN). Our DNP3-SA CPN model is capable of testing and verifying various attack scenarios: modification, replay and spoofing, combined complex attack and mitigation strategies. Using the model has revealed a previously unidentified flaw in the DNP3-SA protocol that can be exploited by an attacker that has access to the network interconnecting DNP3 devices. An attacker can launch a successful attack on an outstation without possessing the pre-shared keys by replaying a previously authenticated command with arbitrary parameters. We propose an update to the DNP3-SA protocol that removes the flaw and prevents such attacks. The update is validated and verified using our CPN model proving the effectiveness of the model and importance of the formal protocol analysis.