92 resultados para Android,Peer to Peer,Wifi,Mesh Network


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Collagen fibrillation within articular cartilage (AC) plays a key role in joint osteoarthritis (OA) progression and, therefore, studying collagen synthesis changes could be an indicator for use in the assessment of OA. Various staining techniques have been developed and used to determine the collagen network transformation under microscopy. However, because collagen and proteoglycan coexist and have the same index of refraction, conventional methods for specific visualization of collagen tissue is difficult. This study aimed to develop an advanced staining technique to distinguish collagen from proteoglycan and to determine its evolution in relation to OA progression using optical and laser scanning confocal microscopy (LSCM). A number of AC samples were obtained from sheep joints, including both healthy and abnormal joints with OA grades 1 to 3. The samples were stained using two different trichrome methods and immunohistochemistry (IHC) to stain both colourimetrically and with fluorescence. Using optical microscopy and LSCM, the present authors demonstrated that the IHC technique stains collagens only, allowing the collagen network to be separated and directly investigated. Fluorescently-stained IHC samples were also subjected to LSCM to obtain three-dimensional images of the collagen fibres. Changes in the collagen fibres were then correlated with the grade of OA in tissue. This study is the first to successfully utilize the IHC staining technique in conjunction with laser scanning confocal microscopy. This is a valuable tool for assessing changes to articular cartilage in OA.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Experiments were undertaken to study effect of initial conditions on the expansion ratio of two grains in a laboratory scale, single speed, single screw extruder at Naresuan University, Thailand. Jasmine rice and Mung bean were used as the material. Three different initial moisture contents were adjusted for the grains and classified them into three groups according to particle sizes. Mesh sizes used are 12 and 14. Expansion ratio was measured at a constant barrel temperature of 190oC. Response surface methodology was used to obtain optimum conditions between moisture content and particle size of the materials concerned.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Ethernet is a key component of the standards used for digital process buses in transmission substations, namely IEC 61850 and IEEE Std 1588-2008 (PTPv2). These standards use multicast Ethernet frames that can be processed by more than one device. This presents some significant engineering challenges when implementing a sampled value process bus due to the large amount of network traffic. A system of network traffic segregation using a combination of Virtual LAN (VLAN) and multicast address filtering using managed Ethernet switches is presented. This includes VLAN prioritisation of traffic classes such as the IEC 61850 protocols GOOSE, MMS and sampled values (SV), and other protocols like PTPv2. Multicast address filtering is used to limit SV/GOOSE traffic to defined subsets of subscribers. A method to map substation plant reference designations to multicast address ranges is proposed that enables engineers to determine the type of traffic and location of the source by inspecting the destination address. This method and the proposed filtering strategy simplifies future changes to the prioritisation of network traffic, and is applicable to both process bus and station bus applications.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Protection of a distribution network in the presence of distributed generators (DGs) using overcurrent relays is a challenging task due to the changes in fault current levels and reverse power flow. Specifically, in the presence of current limited converter interfaced DGs, overcurrent relays may fail to isolate the faulted section either in grid connected or islanded mode of operation. In this paper, a new inverse type relay is presented to protect a distribution network, which may have several DG connections. The new relay characteristic is designed based on the measured admittance of the protected line. The relay is capable of detecting faults under changing fault current levels. The relay performance is evaluated using PSCAD simulation and laboratory experiments.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Road asset managers are overwhelmed with a high volume of raw data which they need to process and utilise in supporting their decision making. This paper presents a method that processes road-crash data of a whole road network and exposes hidden value inherent in the data by deploying the clustering data mining method. The goal of the method is to partition the road network into a set of groups (classes) based on common data and characterise the class crash types to produce a crash profiles for each cluster. By comparing similar road classes with differing crash types and rates, insight can be gained into these differences that are caused by the particular characteristics of their roads. These differences can be used as evidence in knowledge development and decision support.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Participation in networks, both as a concept and process, is widely supported in environmental education as a democratic and equitable pathway to individual and social change for sustainability. However, the processes of participation in networks are rarely problematized. Rather, it is assumed that we inherently know how to participate in networks. This assumption means that participation is seldom questioned. Underlying support for participation in networks is a belief that it allows individuals to connect in new and meaningful ways, that individuals can engage in making decisions and in bringing about change in arenas that affect them, and that they will be engaging in new, non-hierarchical and equitable relationships. In this paper we problematize participation in networks. As an example we use research into a decentralized network – described as such in its own literature - the Queensland Environmentally Sustainable Schools Initiative Alliance in Australia – to argue that while network participants were engaged and committed to participation in this network, 'old' forms of top-down engagement and relationships needed to be unlearnt. This paper thus proposes that for participation in decentralized networks to be meaningful, new learning about how to participate needs to occur.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Recommender systems are one of the recent inventions to deal with ever growing information overload in relation to the selection of goods and services in a global economy. Collaborative Filtering (CF) is one of the most popular techniques in recommender systems. The CF recommends items to a target user based on the preferences of a set of similar users known as the neighbours, generated from a database made up of the preferences of past users. With sufficient background information of item ratings, its performance is promising enough but research shows that it performs very poorly in a cold start situation where there is not enough previous rating data. As an alternative to ratings, trust between the users could be used to choose the neighbour for recommendation making. Better recommendations can be achieved using an inferred trust network which mimics the real world "friend of a friend" recommendations. To extend the boundaries of the neighbour, an effective trust inference technique is required. This thesis proposes a trust interference technique called Directed Series Parallel Graph (DSPG) which performs better than other popular trust inference algorithms such as TidalTrust and MoleTrust. Another problem is that reliable explicit trust data is not always available. In real life, people trust "word of mouth" recommendations made by people with similar interests. This is often assumed in the recommender system. By conducting a survey, we can confirm that interest similarity has a positive relationship with trust and this can be used to generate a trust network for recommendation. In this research, we also propose a new method called SimTrust for developing trust networks based on user's interest similarity in the absence of explicit trust data. To identify the interest similarity, we use user's personalised tagging information. However, we are interested in what resources the user chooses to tag, rather than the text of the tag applied. The commonalities of the resources being tagged by the users can be used to form the neighbours used in the automated recommender system. Our experimental results show that our proposed tag-similarity based method outperforms the traditional collaborative filtering approach which usually uses rating data.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Australian government, and opposition, are committed to facilitating high-speed broadband provision. In April 2009 the (then) Labor government announced a proposal to facilitate provision by mandating “…the use of fibre optic infrastructure … in greenfield estates ….” Separately, the installation of (usually overhead) cables commenced in select brownfield areas throughout Australia. In the lead up to the 2010 federal election, the broadband policy focus of the (then) federal opposition was to enabling private investment rather than direct investment by government itself. High-speed broadband is essential for Australia’s economic future. Whether implementation is undertaken by government, government owned corporations or private investors, will impact on the processes to be followed. Who does what, also will determine the rights available to land owners. The next stage, of necessity, will involve the establishment of procedures to require the retrofitting of existing urban environments. This clearly will have major property, property rights and valuation impacts. As Horan (2000) observed “…preserving... unique characteristics … of…regions requires a compromise between economic ambitions and social, cultural, and environmental values”. The uncertainty following the federal election, and the influence of independants with individual agendas; presents unique challenges for broadband implementation. This paper seeks to identify the processes to be followed by various potential broadband investors as they work to establish a ubiquitous network. It overviews current legislative regimes and examines concerns raised by stakeholders in various government reviews. It concludes by plotting a clear way forward to the future, with particular regard to property rights and usage.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper presents an extended granule mining based methodology, to effectively describe the relationships between granules not only by traditional support and confidence, but by diversity and condition diversity as well. Diversity measures how diverse of a granule associated with the other granules, it provides a kind of novel knowledge in databases. We also provide an algorithm to implement the proposed methodology. The experiments conducted to characterize a real network traffic data collection show that the proposed concepts and algorithm are promising.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Sequence data often have competing signals that are detected by network programs or Lento plots. Such data can be formed by generating sequences on more than one tree, and combining the results, a mixture model. We report that with such mixture models, the estimates of edge (branch) lengths from maximum likelihood (ML) methods that assume a single tree are biased. Based on the observed number of competing signals in real data, such a bias of ML is expected to occur frequently. Because network methods can recover competing signals more accurately, there is a need for ML methods allowing a network. A fundamental problem is that mixture models can have more parameters than can be recovered from the data, so that some mixtures are not, in principle, identifiable. We recommend that network programs be incorporated into best practice analysis, along with ML and Bayesian trees.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Queen's Park in Maryborough is one of many public gardens established in the nineteenth century in Queensland: in Brisbane, Ipswich, Toowoomba, Warwick, Rockhampton, Mackay, Townsville, Cairns and Cooktown. They were created primarily as places of horticultural experimentation, as well as for recreational purposes. They formed a local area network, with the Brisbane Botanic Garden and the Government Botanist, Walter Hill, at the centre – at least in the 1870s. From here, the links extended to other botanic gardens in Australia, and beyond Australia to the British colonial network managed through the Royal Botanic Gardens (RBG), Kew. It was an informal network, supplying a knowledge of basic economic botany that founded many tropical agricultural industries and also provided much-needed recreational, educational and inspirational opportunities for colonial newcomers and residents. The story of these parks, from the time when they were first set aside as public reserves by the government surveyors to the present day, is central to the history of urban planning in regional centres. This article provides a statewide overview together with a more in-depth examination of Maryborough's own historic Queen's Park.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A Flash Event (FE) represents a period of time when a web-server experiences a dramatic increase in incoming traffic, either following a newsworthy event that has prompted users to locate and access it, or as a result of redirection from other popular web or social media sites. This usually leads to network congestion and Quality-of-Service (QoS) degradation. These events can be mistaken for Distributed Denial-of-Service (DDoS) attacks aimed at disrupting the server. Accurate detection of FEs and their distinction from DDoS attacks is important, since different actions need to be undertaken by network administrators in these two cases. However, lack of public domain FE datasets hinders research in this area. In this paper we present a detailed study of flash events and classify them into three broad categories. In addition, the paper describes FEs in terms of three key components: the volume of incoming traffic, the related source IP-addresses, and the resources being accessed. We present such a FE model with minimal parameters and use publicly available datasets to analyse and validate our proposed model. The model can be used to generate different types of FE traffic, closely approximating real-world scenarios, in order to facilitate research into distinguishing FEs from DDoS attacks.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

With the progressive exhaustion of fossil energy and the enhanced awareness of environmental protection, more attention is being paid to electric vehicles (EVs). Inappropriate siting and sizing of EV charging stations could have negative effects on the development of EVs, the layout of the city traffic network, and the convenience of EVs' drivers, and lead to an increase in network losses and a degradation in voltage profiles at some nodes. Given this background, the optimal sites of EV charging stations are first identified by a two-step screening method with environmental factors and service radius of EV charging stations considered. Then, a mathematical model for the optimal sizing of EV charging stations is developed with the minimization of total cost associated with EV charging stations to be planned as the objective function and solved by a modified primal-dual interior point algorithm (MPDIPA). Finally, simulation results of the IEEE 123-node test feeder have demonstrated that the developed model and method cannot only attain the reasonable planning scheme of EV charging stations, but also reduce the network loss and improve the voltage profile.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The evolution of classic power grids to smart grids creates chances for most participants in the energy sector. Customers can save money by reducing energy consumption, energy providers can better predict energy demand and environment benefits since lower energy consumption implies lower energy production including a decrease of emissions from plants. But information and communication systems supporting smart grids can also be subject to classical or new network attacks. Attacks can result in serious damage such as harming privacy of customers, creating economical loss and even disturb the power supply/demand balance of large regions and countries. In this paper, we give an overview about the German smart measuring architecture, protocols and security. Afterwards, we present a simulation framework which enables researchers to analyze security aspects of smart measuring scenarios.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The 2011 floods in Southeast Queensland had a devastating impact on many sectors including transport. Road and rail systems across all flooded areas of Queensland were severely affected and significant economic losses occurred as a result of roadway and railway closures. Travellers were compelled to take alternative routes because of road closures or deteriorated traffic conditions on their regular route. Extreme changes in traffic volume can occur under such scenarios which disrupts the network re-equilibrium and re-stabilisation in the recovery phase as travellers continuously adjust their travel options. This study explores how travellers respond to such a major network disruption. A comprehensive study was undertaken focusing on how bus riders reacted to the floods in Southeast Queensland by comparing the ridership patterns before, during and after the floods. The study outcomes revealed the evolving reactions of transit users to direct and indirect impacts of a natural disaster. A good understanding of this process is crucial for developing appropriate strategies to encourage modal shift of automobile users to public transit and also for modelling of travel behaviours during and after a major network disruption caused by natural disasters.