817 resultados para person-centred systems
Resumo:
This correspondence paper addresses the problem of output feedback stabilization of control systems in networked environments with quality-of-service (QoS) constraints. The problem is investigated in discrete-time state space using Lyapunov’s stability theory and the linear inequality matrix technique. A new discrete-time modeling approach is developed to describe a networked control system (NCS) with parameter uncertainties and nonideal network QoS. It integrates a network-induced delay, packet dropout, and other network behaviors into a unified framework. With this modeling, an improved stability condition, which is dependent on the lower and upper bounds of the equivalent network-induced delay, is established for the NCS with norm-bounded parameter uncertainties. It is further extended for the output feedback stabilization of the NCS with nonideal QoS. Numerical examples are given to demonstrate the main results of the theoretical development.
Resumo:
Consider a person searching electronic health records, a search for the term ‘cracked skull’ should return documents that contain the term ‘cranium fracture’. A information retrieval systems is required that matches concepts, not just keywords. Further more, determining relevance of a query to a document requires inference – its not simply matching concepts. For example a document containing ‘dialysis machine’ should align with a query for ‘kidney disease’. Collectively we describe this problem as the ‘semantic gap’ – the difference between the raw medical data and the way a human interprets it. This paper presents an approach to semantic search of health records by combining two previous approaches: an ontological approach using the SNOMED CT medical ontology; and a distributional approach using semantic space vector space models. Our approach will be applied to a specific problem in health informatics: the matching of electronic patient records to clinical trials.
Resumo:
The development of locally-based healthcare initiatives, such as community health coalitions that focus on capacity building programs and multi-faceted responses to long-term health problems, have become an increasingly important part of the public health landscape. As a result of their complexity and the level of investment, it has become necessary to develop innovative ways to help manage these new healthcare approaches. Geographical Information Systems (GIS) have been suggested as one of the innovative approaches that will allow community health coalitions to better manage and plan their activities. The focus of this paper is to provide a commentary on the use of GIS as a tool for community coalitions and discuss some of the potential benefits and issues surrounding the development of these tools.
Resumo:
With the advances in computer hardware and software development techniques in the past 25 years, digital computer simulation of train movement and traction systems has been widely adopted as a standard computer-aided engineering tool [1] during the design and development stages of existing and new railway systems. Simulators of different approaches and scales are used extensively to investigate various kinds of system studies. Simulation is now proven to be the cheapest means to carry out performance predication and system behaviour characterisation. When computers were first used to study railway systems, they were mainly employed to perform repetitive but time-consuming computational tasks, such as matrix manipulations for power network solution and exhaustive searches for optimal braking trajectories. With only simple high-level programming languages available at the time, full advantage of the computing hardware could not be taken. Hence, structured simulations of the whole railway system were not very common. Most applications focused on isolated parts of the railway system. It is more appropriate to regard those applications as primarily mechanised calculations rather than simulations. However, a railway system consists of a number of subsystems, such as train movement, power supply and traction drives, which inevitably contains many complexities and diversities. These subsystems interact frequently with each other while the trains are moving; and they have their special features in different railway systems. To further complicate the simulation requirements, constraints like track geometry, speed restrictions and friction have to be considered, not to mention possible non-linearities and uncertainties in the system. In order to provide a comprehensive and accurate account of system behaviour through simulation, a large amount of data has to be organised systematically to ensure easy access and efficient representation; the interactions and relationships among the subsystems should be defined explicitly. These requirements call for sophisticated and effective simulation models for each component of the system. The software development techniques available nowadays allow the evolution of such simulation models. Not only can the applicability of the simulators be largely enhanced by advanced software design, maintainability and modularity for easy understanding and further development, and portability for various hardware platforms are also encouraged. The objective of this paper is to review the development of a number of approaches to simulation models. Attention is, in particular, given to models for train movement, power supply systems and traction drives. These models have been successfully used to enable various ‘what-if’ issues to be resolved effectively in a wide range of applications, such as speed profiles, energy consumption, run times etc.
Resumo:
Abstract Computer simulation is a versatile and commonly used tool for the design and evaluation of systems with different degrees of complexity. Power distribution systems and electric railway network are areas for which computer simulations are being heavily applied. A dominant factor in evaluating the performance of a software simulator is its processing time, especially in the cases of real-time simulation. Parallel processing provides a viable mean to reduce the computing time and is therefore suitable for building real-time simulators. In this paper, we present different issues related to solving the power distribution system with parallel computing based on a multiple-CPU server and we will concentrate, in particular, on the speedup performance of such an approach.
Resumo:
This paper reports the challenges experienced by nurse educators in changing a teacher-centred, content-driven approach to teaching and learning to a learner-centred, process-driven approach within a School of Nursing in Taiwan. While a general movement towards a learner-centred approach was achieved, the curriculum transformation process was complex and inevitably slow with many challenges. First the study is outlined, with the key challenges experienced by the participating nurse educators explicated and illuminated with excerpts drawn from the research data. This is followed by a discussion of possible reasons for the challenges and how they were overcome and the transition process from teacher-centred to learner-centred education facilitated.
Resumo:
While critical success factors (CSFs) of enterprise system (ES) implementation are mature concepts and have received considerable attention for over a decade, researchers have very often focused on only a specific aspect of the implementation process or a specific CSF. Resultantly, there is (1) little research documented that encompasses all significant CSF considerations and (2) little empirical research into the important factors of successful ES implementation. This paper is part of a larger research effort that aims to contribute to understanding the phenomenon of ES CSFs, and reports on preliminary findings from a case study conducted at a Queensland University of Technology (QUT) in Australia. This paper reports on an empirically derived CSFs framework using a directed content analysis of 79 studies; from top IS outlets, employing the characteristics of the analytic theory, and from six different projects implemented at QUT.
Resumo:
A number of instrumented laboratory-scale soil embankment slopes were subjected to artificial rainfall until they failed. The factor of safety of the slope based on real-time measurements of pore-water pressure (suction) and laboratory measured soil properties were calculated as the rainfall progressed. Based on the experiment measurements and slope stability analysis, it was observed that slope displacement measurements can be used to warn the slope failure more accurately. Further, moisture content/pore-water pressure measurements near the toe of the slope and the real-time factor of safety can also be used for prediction of rainfall-induced embankment failures with adequate accuracy.
Resumo:
This book (256 pages, written in Korean) is a critical essay that reviews, questions, and criticises Korean and Eastern immigrants’ thinking and behaviour styles in Australia from their cultural perspectives, and discuss and proposes a creative cultural dimension for their better life in a multicultural context. Multiculturalism is not supportive of Eastern cultures because of individualistic collection of cultures, while transculturalism facilitates nurture of their culture in a community-oriented way within multicultural circumstances. Korean and Eastern immigrants, sharing oriental cultural systems and values, should approach to the Australian multicultural context with transculturalism which allows creating new cultural values in collaboration with and by participation into local communities. ------------------------------------------------------------ Many Eastern immigrants live in their own ethnic communities without or less interacting with Australian (communities). The author defines this phenomenon as “reverse immigration”. Reverse immigration refers to re-immigrating to their ethnic community in Australia or to their birth country despite they did not anticipate that this would happen to them before immigration to Australia. The author argues that Easterners’ collectivistic culture often devalues individuality and vice versa. Cultural clash between West and East often forces the immigrants to choose reverse immigration because of their lack of understanding of Western culture and their cultural characteristics such as low individuality, high power distance, and high uncertainty avoidance. For example, a vague boundary between individualist and collectivist in a collectivistic context (within their ethnic group) often leads to maladjustment to local communities and enhancement of cultural conservatism. The author proposes that the cultural clash can be overcome by cross-cultural activities named “transculturalism”. To Eastern immigrants, transculturalism can be achieved by acculturation of their two predominant cultures, the third-person perspective and generalised others. In a multicultural context, the former refers to the ability to share another person's feelings and emotions as if they were your own, and the latter does the ability to manage community and public expectations. When both cultural values are used for quality interactions between East and West, they allow Eastern immigrants to be more creative and critical and Australian to be more socially inclusive and culturally tolerant. With these discussions, the author discusses cultural differences throughout the book with four topics (chapters) and proposes transculturalism as a solution to the reverse immigration. ------------------------------------------------------------ Chapter 1 criticises Koreans’ attitudes and methods towards learning English that is less pragmatic and practical, but more likely to be a scholarly study. The author explains that Koreans’ non-pragmatic towards learning English has been firmly built based on their traditional systems and values that Koreans view English as a discipline and an aim of academic achievements rather than a means of communication. Within their cultural context, English can be perceived as more than a language, but something like vastly superior to their language and culture. Their collectivistic culture regards English as an unreachable and heterogeneous one that may threaten their cultural identity, so that “scholarly studying” is only the way to achieve (not learn) it. This discourages the immigrants to engage and involve in daily dialogues by “using” English as a second language. The author further advises the readers to be aware of Eastern collectivistic culture in communication and interaction that sometimes completely reverses private and public topics in a Western context. This leads them to feel that they have no content to talk to natives. ------------------------------------------------------------ Chapter 2 compares between Korea and Australia in terms of their educational systems and values, and proposes how Eastern overseas students can achieve critical and creative thinking within a Western educational setting. Interestingly, this chapter includes an explanation of why Eastern overseas students easily fail assessments including essay writing, oral presentations and discussions. One of the reasons the author explains is that Eastern students are not familiar to criticise others and think creatively, especially when they recognise that their words and ideas may harm the collectivistic harmony. Western educational systems focuses on enhancement of individuality such as self-confidence, self-esteem, and self-expression, while Eastern educational systems foster group-oriented values such as interpersonal relationship, and strong moral and spiritual values. Yet, the author argues that the collectivistic approach to criticism and creativity is often more critical and creative than Western individuals when they know what they are supposed to do for a group (or a community). Therefore, Eastern students need to think their cultural merits and demerits by using an individual perspective rather than generalised others’ perspective. The latter often discourages individual participation in a community, and the generalised others in a Western culture is weaker than Eastern. Furthermore, Western educational systems do not educate students to transform (loose) their individuality to fit into a group or a community. Rather they cultivate individuality for community prosperity. ------------------------------------------------------------ Chapter 3 introduces various cases of reverse immigration in workplaces that many immigrants return to their country or their ethnic community after many trials for acculturation. Reverse immigration is unexpected and not planned before immigration, so that its emotional embarrassment increases such severe social loneliness. Most Eastern immigrant workers have tried to adjust themselves in this new cultural environment at the early stages of immigration. However, their cultural features of collectivism, high power distance, high uncertainty avoidance, and long-term oriented cultures suppress individual initiative and eliminate the space for experiments in ways of acculturation. The author argues that returning to their ethnic community (physically and psychologically) leads to two significant problems: their distorted parenting and becoming more conservatives. The former leads the first generation of immigrants to pressure their children to pursue extrinsic or materialist values, such as financial success, fame and physical appearance, rather than on intrinsic values, while the latter refers to their isolated conservative characters because of their remoteness from the changes of their own country. The author also warns that their ethnic and religious groups actively strengthens immigrants’ social loneliness and systematically discourages immigrants’ interests and desire to be involving into local communities. The ethnic communities and leaders have not been interacting with Australian local communities and, as a result, are eager to conserve outdated cultural systems values. Even they have a tendency to weed out those people who wish to settle down within Australian local communities. They believe that those people can threaten their community’s survival and continuity. ------------------------------------------------------------ Chapter 4 titled multiculturalism argues that Korean and Eastern immigrants should more precisely understand Australia as a multicultural society in a way of collaboratively creating new cultural values. The author introduces multiculturalism with its definitions and history in Australia and argues the limitations of multiculturalism from an Easterner’s perspective. With well known tragedies of the second generations of U.S. immigrants, Cho Seung-Hui, a university student, massacred 32 people on the Virginia Tech before committing suicide and Hidal Hassan, an Army psychiatrist, killed 13 people at Fort Hood and the responses of ethnic community, the author explains that their mental illness may be derived from their parents’ (or ethnic group) culturally isolated attitude and socially static viewpoint of U.S. (Western system and values). The author insists that multiculturalism may restrict Eastern immigrants’ engagement and involvement in local communities. Multiculturalism has been systematically and historically developed based on Western systems and cultural values. In other words, multiculturalism requires high self-confidence and self-esteem that Eastern immigrants less prioritise them. It has been generally known that Easterners put more weight on human relationship than Westerners, but the author claims that this is not true. Within an individualistic culture, Westerners are more interested in building person-to-person connections and relationships. While Easterners are more interested in how individuals can achieve a sense of belonging within a group and a community. Therefore, multiculturalism is an ideology which forces Eastern immigrants to discard their strong desire to be part of a group and does not give a sense of belonging. In a consequence, the author advises that Eastern immigrants should aim towards “transculturalism” which allows them to actively participate in and contribute to their multicultural community. Transculturalism does not ask Easterners to discard their cultural values, but enables them to be a collectivistic individualist (a community leader) who is capable of developing new cultural values in a more creative and productive way. Furthermore, transculturalism encourages Western Australians in a multicultural context to collaborate with ethnic minorities to build a better community.
Resumo:
Music is inherently active and interactive. Like technologies before them, digital systems provide a range of enhanced music performance opportunities. In this paper we outline the educational advantages of ensemble performance in which generative media systems are integrated. As a concrete example, we focus on our work with the jam2jam system which uses generative music processes to enhance collaborative music making. We suggest that our research points toward a new class of activities that maintain the well established benefits of ensemble performance while adding cultural and pedagogical value by leveraging the capabilities and cachet of digital media practices.
Resumo:
This abstract explores the possibility of a grass roots approach to engaging people in community change initiatives by designing simple interactive exploratory prototypes for use by communities over time that support shared action. The prototype is gradually evolved in response to community use, fragments of data gathered through the prototype, and participant feedback with the goal of building participation in community change initiatives. A case study of a system to support ridesharing is discussed. The approach is compared and contrasted to a traditional IT systems procurement approach.
Resumo:
A combined specular reflection and diffusion model using the radiosity technique was developed to calculate road traffic noise level on residential balconies. The model is capable of numerous geometrical configurations for a single balcony situated in the centre of a street canyon. The geometry of the balcony and the street can be altered with width,length and height. The model was used to calculate for three different geometrical and acoustic absorption characteristics for a balcony. The calculated results are presented in this paper.
Resumo:
This paper treats the seismic mitigation of medium rise frame-shear wall structures and building facade systems using passive damping devices. The frame shear wall structures have embedded viscoelastic and friction dampers in different configurations and placed in various locations in the structure. Influence of damper type, configuration and location are investigated. Results for tip deflections which provide an overall evaluation of the seismic response of the structure, are determined. Seismic mitigation of building facade systems in which visco-elastic dampers are fitted at the horizontal connections between the facades and the frame, instead of the traditional rigid connections, are also treated. Finite element techniques are used to model and analyse the two structural systems under different earthquake loadings, scaled to the same peak ground acceleration for meaningful comparison of responses. Results demonstrate the feasibility of these techniques for seismic mitigation.
Resumo:
AC motors are largely used in a wide range of modern systems, from household appliances to automated industry applications such as: ventilations systems, fans, pumps, conveyors and machine tool drives. Inverters are widely used in industrial and commercial applications due to the growing need for speed control in ASD systems. Fast switching transients and the common mode voltage, in interaction with parasitic capacitive couplings, may cause many unwanted problems in the ASD applications. These include shaft voltage and leakage currents. One of the inherent characteristics of Pulse Width Modulation (PWM) techniques is the generation of the common mode voltage, which is defined as the voltage between the electrical neutral of the inverter output and the ground. Shaft voltage can cause bearing currents when it exceeds the amount of breakdown voltage level of the thin lubricant film between the inner and outer rings of the bearing. This phenomenon is the main reason for early bearing failures. A rapid development in power switches technology has lead to a drastic decrement of switching rise and fall times. Because there is considerable capacitance between the stator windings and the frame, there can be a significant capacitive current (ground current escaping to earth through stray capacitors inside a motor) if the common mode voltage has high frequency components. This current leads to noises and Electromagnetic Interferences (EMI) issues in motor drive systems. These problems have been dealt with using a variety of methods which have been reported in the literature. However, cost and maintenance issues have prevented these methods from being widely accepted. Extra cost or rating of the inverter switches is usually the price to pay for such approaches. Thus, the determination of cost-effective techniques for shaft and common mode voltage reduction in ASD systems, with the focus on the first step of the design process, is the targeted scope of this thesis. An introduction to this research – including a description of the research problem, the literature review and an account of the research progress linking the research papers – is presented in Chapter 1. Electrical power generation from renewable energy sources, such as wind energy systems, has become a crucial issue because of environmental problems and a predicted future shortage of traditional energy sources. Thus, Chapter 2 focuses on the shaft voltage analysis of stator-fed induction generators (IG) and Doubly Fed Induction Generators DFIGs in wind turbine applications. This shaft voltage analysis includes: topologies, high frequency modelling, calculation and mitigation techniques. A back-to-back AC-DC-AC converter is investigated in terms of shaft voltage generation in a DFIG. Different topologies of LC filter placement are analysed in an effort to eliminate the shaft voltage. Different capacitive couplings exist in the motor/generator structure and any change in design parameters affects the capacitive couplings. Thus, an appropriate design for AC motors should lead to the smallest possible shaft voltage. Calculation of the shaft voltage based on different capacitive couplings, and an investigation of the effects of different design parameters are discussed in Chapter 3. This is achieved through 2-D and 3-D finite element simulation and experimental analysis. End-winding parameters of the motor are also effective factors in the calculation of the shaft voltage and have not been taken into account in previous reported studies. Calculation of the end-winding capacitances is rather complex because of the diversity of end winding shapes and the complexity of their geometry. A comprehensive analysis of these capacitances has been carried out with 3-D finite element simulations and experimental studies to determine their effective design parameters. These are documented in Chapter 4. Results of this analysis show that, by choosing appropriate design parameters, it is possible to decrease the shaft voltage and resultant bearing current in the primary stage of generator/motor design without using any additional active and passive filter-based techniques. The common mode voltage is defined by a switching pattern and, by using the appropriate pattern; the common mode voltage level can be controlled. Therefore, any PWM pattern which eliminates or minimizes the common mode voltage will be an effective shaft voltage reduction technique. Thus, common mode voltage reduction of a three-phase AC motor supplied with a single-phase diode rectifier is the focus of Chapter 5. The proposed strategy is mainly based on proper utilization of the zero vectors. Multilevel inverters are also used in ASD systems which have more voltage levels and switching states, and can provide more possibilities to reduce common mode voltage. A description of common mode voltage of multilevel inverters is investigated in Chapter 6. Chapter 7 investigates the elimination techniques of the shaft voltage in a DFIG based on the methods presented in the literature by the use of simulation results. However, it could be shown that every solution to reduce the shaft voltage in DFIG systems has its own characteristics, and these have to be taken into account in determining the most effective strategy. Calculation of the capacitive coupling and electric fields between the outer and inner races and the balls at different motor speeds in symmetrical and asymmetrical shaft and balls positions is discussed in Chapter 8. The analysis is carried out using finite element simulations to determine the conditions which will increase the probability of high rates of bearing failure due to current discharges through the balls and races.
Resumo:
In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least theoretically, join various types of IMSs to make them interoperable and give users the illusion that they are interacting with just one IMS. However, due to the complexity of an IMS, attempting to join various types of IMSs is a technically challenging task, let alone assessing how well an IMetS manages to integrate these IMSs. The first contribution of this thesis is the development of a generic IMS model called the Layered Identity Infrastructure Model (LIIM). Using this model, we develop a set of properties that an ideal IMetS should provide. This idealized form is then used as a benchmark to evaluate existing IMetSs. Different types of IMS provide varying levels of privacy protection support. Unfortunately, as observed by Jøsang et al (2007), there is insufficient privacy protection in many of the existing IMSs. In this thesis, we study and extend a type of privacy enhancing technology known as an Anonymous Credential System (ACS). In particular, we extend the ACS which is built on the cryptographic primitives proposed by Camenisch, Lysyanskaya, and Shoup. We call this system the Camenisch, Lysyanskaya, Shoup - Anonymous Credential System (CLS-ACS). The goal of CLS-ACS is to let users be as anonymous as possible. Unfortunately, CLS-ACS has problems, including (1) the concentration of power to a single entity - known as the Anonymity Revocation Manager (ARM) - who, if malicious, can trivially reveal a user’s PII (resulting in an illegal revocation of the user’s anonymity), and (2) poor performance due to the resource-intensive cryptographic operations required. The second and third contributions of this thesis are the proposal of two protocols that reduce the trust dependencies on the ARM during users’ anonymity revocation. Both protocols distribute trust from the ARM to a set of n referees (n > 1), resulting in a significant reduction of the probability of an anonymity revocation being performed illegally. The first protocol, called the User Centric Anonymity Revocation Protocol (UCARP), allows a user’s anonymity to be revoked in a user-centric manner (that is, the user is aware that his/her anonymity is about to be revoked). The second protocol, called the Anonymity Revocation Protocol with Re-encryption (ARPR), allows a user’s anonymity to be revoked by a service provider in an accountable manner (that is, there is a clear mechanism to determine which entity who can eventually learn - and possibly misuse - the identity of the user). The fourth contribution of this thesis is the proposal of a protocol called the Private Information Escrow bound to Multiple Conditions Protocol (PIEMCP). This protocol is designed to address the performance issue of CLS-ACS by applying the CLS-ACS in a federated single sign-on (FSSO) environment. Our analysis shows that PIEMCP can both reduce the amount of expensive modular exponentiation operations required and lower the risk of illegal revocation of users’ anonymity. Finally, the protocols proposed in this thesis are complex and need to be formally evaluated to ensure that their required security properties are satisfied. In this thesis, we use Coloured Petri nets (CPNs) and its corresponding state space analysis techniques. All of the protocols proposed in this thesis have been formally modeled and verified using these formal techniques. Therefore, the fifth contribution of this thesis is a demonstration of the applicability of CPN and its corresponding analysis techniques in modeling and verifying privacy enhancing protocols. To our knowledge, this is the first time that CPN has been comprehensively applied to model and verify privacy enhancing protocols. From our experience, we also propose several CPN modeling approaches, including complex cryptographic primitives (such as zero-knowledge proof protocol) modeling, attack parameterization, and others. The proposed approaches can be applied to other security protocols, not just privacy enhancing protocols.