648 resultados para PDP-11 (Computer)
Resumo:
100 year old gasoline engine technology vehicles have now become one of the major contributors of greenhouse gases. Plug-in Electric Vehicles (PEVs) have been proposed to achieve environmental friendly transportation. Even though the PEV usage is currently increasing, a technology breakthrough would be required to overcome battery related drawbacks. Although battery technology is evolving, drawbacks inherited with batteries such as; cost, size, weight, slower charging characteristic and low energy density would still be dominating constrains for development of EVs. Furthermore, PEVs have not been accepted as preferred choice by many consumers due to charging related issues. To address battery related limitations, the concept of dynamic Wireless Power Transfer (WPT) enabled EVs have been proposed in which EV is being charged while it is in motion. WPT enabled infrastructure has to be employed to achieve dynamic EV charging concept. The weight of the battery pack can be reduced as the required energy storage is lower if the vehicle can be powered wirelessly while driving. Stationary WPT charging where EV is charged wirelessly when it is stopped, is simpler than dynamic WPT in terms of design complexity. However, stationary WPT does not increase vehicle range compared to wired-PEVs. State-of-art WPT technology for future transportation is discussed in this chapter. Analysis of the WPT system and its performance indices are introduced. Modelling the WPT system using different methods such as equivalent circuit theory, two port network theory and coupled mode theory is described illustrating their own merits in Sect. 2.3. Both stationary and dynamic WPT for EV applications are illustrated in Sect. 2.4. Design challenges and optimization directions are analysed in Sect. 2.5. Adaptive tuning techniques such as adaptive impedance matching and frequency tuning are also discussed. A case study for optimizing resonator design is presented in Sect. 2.6. Achievements by the research community is introduced highlighting directions for future research.
Resumo:
Due to the availability of huge number of web services, finding an appropriate Web service according to the requirements of a service consumer is still a challenge. Moreover, sometimes a single web service is unable to fully satisfy the requirements of the service consumer. In such cases, combinations of multiple inter-related web services can be utilised. This paper proposes a method that first utilises a semantic kernel model to find related services and then models these related Web services as nodes of a graph. An all-pair shortest-path algorithm is applied to find the best compositions of Web services that are semantically related to the service consumer requirement. The recommendation of individual and composite Web services composition for a service request is finally made. Empirical evaluation confirms that the proposed method significantly improves the accuracy of service discovery in comparison to traditional keyword-based discovery methods.
Resumo:
It is a big challenge to guarantee the quality of discovered relevance features in text documents for describing user preferences because of large scale terms and data patterns. Most existing popular text mining and classification methods have adopted term-based approaches. However, they have all suffered from the problems of polysemy and synonymy. Over the years, there has been often held the hypothesis that pattern-based methods should perform better than term-based ones in describing user preferences; yet, how to effectively use large scale patterns remains a hard problem in text mining. To make a breakthrough in this challenging issue, this paper presents an innovative model for relevance feature discovery. It discovers both positive and negative patterns in text documents as higher level features and deploys them over low-level features (terms). It also classifies terms into categories and updates term weights based on their specificity and their distributions in patterns. Substantial experiments using this model on RCV1, TREC topics and Reuters-21578 show that the proposed model significantly outperforms both the state-of-the-art term-based methods and the pattern based methods.
Resumo:
It is important that we understand the factors and conditions that shape driver behaviour – those conditions within the road transport system that contribute to driver error and the situations where driver non-compliance to road regulations is likely. This report presents the findings derived from a program of research investigating the nature of errors made by drivers, involving a literature review and an on-road study. The review indicates that, despite significant investigation, the role of different error types in road traffic crashes remains unclear, as does the role of the wider road transport system failures in driver error causation.
Resumo:
For people with intellectual disabilities, there are significant barriers to inclusion in socially cooperative endeavors. This paper investigates the effectiveness of Stomp, a tangible user interface (TUI) designed to provide new participatory experiences for people with intellectual disability. Results from an observational study reveal the extent to which the Stomp system supports social and physical interaction. The tangible, spatial, and embodied qualities of Stomp result in an experience that does not rely on the acquisition of specific competencies before interaction and engagement can occur.
Resumo:
Intramedullary nailing is the standard fixation method for displaced diaphyseal fractures of the tibia. An optimal nail design should both facilitate insertion and anatomically fit the bone geometry at its final position in order to reduce the risk of stress fractures and malalignments. Due to the nonexistence of suitable commercial software, we developed a software tool for the automated fit assessment of nail designs. Furthermore, we demonstrated that an optimised nail, which fits better at the final position, is also easier to insert. Three-dimensional models of two nail designs and 20 tibiae were used. The fitting was quantified in terms of surface area, maximum distance, sum of surface areas and sum of maximum distances by which the nail was protruding into the cortex. The software was programmed to insert the nail into the bone model and to quantify the fit at defined increment levels. On average, the misfit during the insertion in terms of the four fitting parameters was smaller for the Expert Tibial Nail Proximal bend (476.3 mm2, 1.5 mm, 2029.8 mm2, 6.5 mm) than the Expert Tibial Nail (736.7 mm2, 2.2 mm, 2491.4 mm2, 8.0 mm). The differences were statistically significant (p ≤ 0.05). The software could be used by nail implant manufacturers for the purpose of implant design validation.
Resumo:
Like many other cataclysmic events September 11, a day now popularly believed to have 'changed the world', has become a topic taken up by children's writers. This thesis, titled The Whole World Shook: Ethnic, National and Heroic Identities in Children's Fiction About 9/11, examines how cultural identities are constructed within fictional texts for young people written about the attacks on the Twin Towers. It identifies three significant identity categories encoded in 9/11 books for children: ethnic identities, national identities, and heroic identities. The thesis argues that the identities formed within the selected children's texts are in flux, privileging performances of identities that are contingent on post-9/11 politics. This study is located within the field of children's literature criticism, which supports the understanding that children's books, like all texts, play a role in the production of identities. Children's literature is highly significant both in its pedagogical intent (to instruct and induct children into cultural practices and beliefs) and in its obscurity (in making the complex simple enough for children, and from sometimes intentionally shying away from difficult things). This literary criticism informed the study that the texts, if they were to be written at all, would be complex, varied and most likely as ambiguous and contradictory as the responses to the attacks on New York themselves. The theoretical framework for this thesis draws on a range of critical theories including literary theory, cultural studies, studies of performativity and postmodernism. This critical framework informs the approach by providing ways for: (i) understanding how political and ideological work is performed in children's literature; (ii) interrogating the constructed nature of cultural identities; (iii) developing a nuanced methodology for carrying out a close textual analysis. The textual analysis examines a representative sample of children's texts about 9/11, including picture books, young adult fiction, and a selection of DC Comics. Each chapter focuses on a different though related identity category. Chapter Four examines the performance of ethnic identities and race politics within a sample of picture books and young adult fiction; Chapter Five analyses the construction of collective, national identities in another set of texts; and Chapter Six does analytic work on a third set of texts, demonstrating the strategic performance of particular kinds of heroic identities. I argue that performances of cultural identities constructed in these texts draw on familiar versions of identities as well as contribute to new ones. These textual constructions can be seen as offering some certainties in increasingly uncertain times. The study finds, in its sample of books a co-mingling of xenophobia and tolerance; a binaried competition between good and evil and global harmony and national insularity; and a lauding of both the commonplace hero and the super-human. Being a recent corpus of texts about 9/11, these texts provide information on the kinds of 'selves' that appear to be privileged in the West since 2001. The thesis concludes that the shifting identities evident in texts that are being produced for children about 9/11 offer implicit and explicit accounts of what constitute good citizenship, loyalty to nation and community, and desirable attributes in a Western post-9/11 context. This thesis makes an original contribution to the field of children's literature by providing a focussed and sustained analysis of how texts for children about 9/11 contribute to formations of identity in these complex times of cultural unease and global unrest.
The suffix-free-prefix-free hash function construction and its indifferentiability security analysis
Resumo:
In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash functions by Coron et al. and in subsequent works, the initial value (IV) of hash functions is fixed. In addition, these indifferentiability results do not depend on the Merkle–Damgård (MD) strengthening in the padding functionality of the hash functions. We propose a generic n -bit-iterated hash function framework based on an n -bit compression function called suffix-free-prefix-free (SFPF) that works for arbitrary IV s and does not possess MD strengthening. We formally prove that SFPF is indifferentiable from a random oracle (RO) when the compression function is viewed as a fixed input-length random oracle (FIL-RO). We show that some hash function constructions proposed in the literature fit in the SFPF framework while others that do not fit in this framework are not indifferentiable from a RO. We also show that the SFPF hash function framework with the provision of MD strengthening generalizes any n -bit-iterated hash function based on an n -bit compression function and with an n -bit chaining value that is proven indifferentiable from a RO.
Resumo:
Protection of passwords used to authenticate computer systems and networks is one of the most important application of cryptographic hash functions. Due to the application of precomputed memory look up attacks such as birthday and dictionary attacks on the hash values of passwords to find passwords, it is usually recommended to apply hash function to the combination of both the salt and password, denoted salt||password, to prevent these attacks. In this paper, we present the first security analysis of salt||password hashing application. We show that when hash functions based on the compression functions with easily found fixed points are used to compute the salt||password hashes, these hashes are susceptible to precomputed offline birthday attacks. For example, this attack is applicable to the salt||password hashes computed using the standard hash functions such as MD5, SHA-1, SHA-256 and SHA-512 that are based on the popular Davies-Meyer compression function. This attack exposes a subtle property of this application that although the provision of salt prevents an attacker from finding passwords, salts prefixed to the passwords do not prevent an attacker from doing a precomputed birthday attack to forge an unknown password. In this forgery attack, we demonstrate the possibility of building multiple passwords for an unknown password for the same hash value and salt. Interestingly, password||salt (i.e. salts suffixed to the passwords) hashes computed using Davies-Meyer hash functions are not susceptible to this attack, showing the first security gap between the prefix-salt and suffix-salt methods of hashing passwords.
Resumo:
The global efforts to reduce carbon emissions from power generation have favoured renewable energy resources such as wind and solar in recent years. The generation of power from the renewable energy resources has become attractive because of various incentives provided by government policies supporting green power. Among the various available renewable energy resources, the power generation from wind has seen tremendous growth in the last decade. This article discusses various advantages of the upcoming offshore wind technology and associated considerations related to their construction. The conventional configuration of the offshore wind farm is based on the alternative current internal links. With the recent advances of improved commercialised converters, voltage source converters based high voltage direct current link for offshore wind farms is gaining popularity. The planning and construction phases of offshore wind farms, including related environmental issues, are discussed here.