994 resultados para Flowchart model
Resumo:
We present a porous medium model of the growth and deterioration of the viable sublayers of an epidermal skin substitute. It consists of five species: cells, intracellular and extracellular calcium, tight junctions, and a hypothesised signal chemical emanating from the stratum corneum. The model is solved numerically in Matlab using a finite difference scheme. Steady state calcium distributions are predicted that agree well with the experimental data. Our model also demonstrates epidermal skin substitute deterioration if the calcium diffusion coefficient is reduced compared to reported values in the literature.
Resumo:
For the further noise reduction in the future, the traffic management which controls traffic flow and physical distribution is important. To conduct the measure by the traffic management effectively, it is necessary to apply the model for predicting the traffic flow in the citywide road network. For this purpose, the existing model named AVENUE was used as a macro-traffic flow prediction model. The traffic flow model was integrated with the road vehicles' sound power model, and the new road traffic noise prediction model was established. By using this prediction model, the noise map of entire city can be made. In this study, first, the change of traffic flow on the road network after the establishment of new roads was estimated, and the change of the road traffic noise caused by the new roads was predicted. As a result, it has been found that this prediction model has the ability to estimate the change of noise map by the traffic management. In addition, the macro-traffic flow model and our conventional micro-traffic flow model were combined, and the coverage of the noise prediction model was expanded.
Resumo:
Having a good automatic anomalous human behaviour detection is one of the goals of smart surveillance systems’ domain of research. The automatic detection addresses several human factor issues underlying the existing surveillance systems. To create such a detection system, contextual information needs to be considered. This is because context is required in order to correctly understand human behaviour. Unfortunately, the use of contextual information is still limited in the automatic anomalous human behaviour detection approaches. This paper proposes a context space model which has two benefits: (a) It provides guidelines for the system designers to select information which can be used to describe context; (b)It enables a system to distinguish between different contexts. A comparative analysis is conducted between a context-based system which employs the proposed context space model and a system which is implemented based on one of the existing approaches. The comparison is applied on a scenario constructed using video clips from CAVIAR dataset. The results show that the context-based system outperforms the other system. This is because the context space model allows the system to considering knowledge learned from the relevant context only.
Resumo:
With the advent of social web initiatives, some argued that these new emerging tools might be useful in tacit knowledge sharing through providing interactive and collaborative technologies. However, there is still a poverty of literature to understand how and what might be the contributions of social media in facilitating tacit knowledge sharing. Therefore, this paper is intended to theoretically investigate and map social media concepts and characteristics with tacit knowledge creation and sharing requirements. By conducting a systematic literature review, five major requirements found that need to be present in an environment that involves tacit knowledge sharing. These requirements have been analyzed against social media concepts and characteristics to see how they map together. The results showed that social media have abilities to comply some of the main requirements of tacit knowledge sharing. The relationships have been illustrated in a conceptual framework, suggesting further empirical studies to acknowledge findings of this study.
Resumo:
This article examines the current transfer pricing regime to consider whether it is a sound model to be applied to modern multinational entities. The arm's length price methodology is examined to enable a discussion of the arguments in favour of such a regime. The article then refutes these arguments concluding that, contrary to the very reason multinational entities exist, applying arm's length rules involves a legal fiction of imagining transactions between unrelated parties. Multinational entities exist to operate in a way that independent entities would not, which the arm's length rules fail to take into account. As such, there is clearly an air of artificiality in applying the arm's length standard. To demonstrate this artificiality with respect to modern multinational entities, multinational banks are used as an example. The article concluded that the separate entity paradigm adopted by the traditional transfer pricing regime is incongruous with the economic theory of modern multinational enterprises.
Resumo:
This paper presents a behavioral car-following model based on empirical trajectory data that is able to reproduce the spontaneous formation and ensuing propagation of stop-and-go waves in congested traffic. By analyzing individual drivers’ car-following behavior throughout oscillation cycles it is found that this behavior is consistent across drivers and can be captured by a simple model. The statistical analysis of the model’s parameters reveals that there is a strong correlation between driver behavior before and during the oscillation, and that this correlation should not be ignored if one is interested in microscopic output. If macroscopic outputs are of interest, simulation results indicate that an existing model with fewer parameters can be used instead. This is shown for traffic oscillations caused by rubbernecking as observed in the US 101 NGSIM dataset. The same experiment is used to establish the relationship between rubbernecking behavior and the period of oscillations.
Resumo:
The encryption method is a well established technology for protecting sensitive data. However, once encrypted, the data can no longer be easily queried. The performance of the database depends on how to encrypt the sensitive data. In this paper we review the conventional encryption method which can be partially queried and propose the encryption method for numerical data which can be effectively queried. The proposed system includes the design of the service scenario, and metadata.
Resumo:
Background: Despite the increasing clinical problems with metaphyseal fractures, most experimental studies investigate the healing of diaphyseal fractures. Although the mouse would be the preferable species to study the molecular and genetic aspects of metaphyseal fracture healing, a murine model does not exist yet. Using a special locking plate system, we herein introduce a new model, which allows the analysis of metaphyseal bone healing in mice. Methods: In 24 CD-1 mice the distal metaphysis of the femur was osteotomized. After stabilization with the locking plate, bone repair was analyzed radiologically, biomechanically, and histologically after 2 (n = 12) and 5 wk (n = 12). Additionally, the stiffness of the bone-implant construct was tested biomechanically ex vivo. Results: The torsional stiffness of the bone-implant construct was low compared with nonfractured control femora (0.23 ± 0.1 Nmm/°versus 1.78 ± 0.15 Nmm/°, P < 0.05). The cause of failure was a pullout of the distal screw. At 2 wk after stabilization, radiological analysis showed that most bones were partly bridged. At 5 wk, all bones showed radiological union. Accordingly, biomechanical analyses revealed a significantly higher torsional stiffness after 5 wk compared with that after 2 wk. Successful healing was indicated by a torsional stiffness of 90% of the contralateral control femora. Histological analyses showed new woven bone bridging the osteotomy without external callus formation and in absence of any cartilaginous tissue, indicating intramembranous healing. Conclusion: With the model introduced herein we report, for the first time, successful metaphyseal bone repair in mice. The model may be used to obtain deeper insights into the molecular mechanisms of metaphyseal fracture healing. © 2012 Elsevier Inc. All rights reserved.
Resumo:
Prevention and safety promotion programmes. Traditionally, in-depth investigations of crash risks are conducted using exposure controlled study or case-control methodology. However, these studies need either observational data for control cases or exogenous exposure data like vehicle-kilometres travel, entry flow or product of conflicting flow for a particular traffic location, or a traffic site. These data are not readily available and often require extensive data collection effort on a system-wide basis. Aim: The objective of this research is to propose an alternative methodology to investigate crash risks of a road user group in different circumstances using readily available traffic police crash data. Methods: This study employs a combination of a log-linear model and the quasi-induced exposure technique to estimate crash risks of a road user group. While the log-linear model reveals the significant interactions and thus the prevalence of crashes of a road user group under various sets of traffic, environmental and roadway factors, the quasi-induced exposure technique estimates relative exposure of that road user in the same set of explanatory variables. Therefore, the combination of these two techniques provides relative measures of crash risks under various influences of roadway, environmental and traffic conditions. The proposed methodology has been illustrated using Brisbane motorcycle crash data of five years. Results: Interpretations of results on different combination of interactive factors show that the poor conspicuity of motorcycles is a predominant cause of motorcycle crashes. Inability of other drivers to correctly judge the speed and distance of an oncoming motorcyclist is also evident in right-of-way violation motorcycle crashes at intersections. Discussion and Conclusions: The combination of a log-linear model and the induced exposure technique is a promising methodology and can be applied to better estimate crash risks of other road users. This study also highlights the importance of considering interaction effects to better understand hazardous situations. A further study on the comparison between the proposed methodology and case-control method would be useful.
Resumo:
The method on concurrent multi-scale model of structural behavior (CMSM-of-SB) for the purpose of structural health monitoring including model updating and validating has been studied. The detailed process of model updating and validating is discussed in terms of reduced scale specimen of the steel box girder in longitudinal stiffening truss of a long span bridge. Firstly, some influence factors affecting the accuracy of the CMSM-of-SB including the boundary restraint regidity, the geometry and material parameters on the toe of the weld and its neighbor are analyzed using sensitivity method. Then, sensitivity-based model updating technology is adopted to update the developed CMSM-of-SB and model verification is carried out through calculating and comparing stresses on different locations under various loading from dynamic characteristic and static response. It can be concluded that the CMSM-of-SB based on the substructure method is valid.
Resumo:
The new model of North Island Cenozoic palaeogeography developed by Kamp et al. has a range of important implications for the evolution of New Zealand terrestrial taxa over the past 30 Ma. Key aspects include the prolonged isolation of the biota on the North Island landmass from the larger and more diverse greater South Island, and the founding of North Island taxa from the potentially unusual ecosystem of a small island around Northland. The prolonged period of isolation is expected to have generated deep phylogenetic splits within taxa present on both islands, and an important current aim should be to identify such signals in surviving endemics to start building a picture of the historical phylogeography, and inferred ecology of both islands through the Cenozoic. Given the potential differences in founding terrestrial species and climatic conditions, it seems likely that the ecology may have been very diferent between the North and South Islands. New genetic data from the 10 or so species of extinct moa suggest that the radiation of moa was much more recent than previously suggested, and reveals a complex pattern that is inferred to result from the interplay of the Cenozoic biogeography, marine barriers, and glacial cycles.
Training the public to collect oral histories of our community : the OHAA Queensland Chapter’s model
Resumo:
In a digital age, the skills required to undertake an oral history project have changed dramatically. For community groups, this shift can be new and exciting, but can also invoke feelings of anxiety when there is a gap in the skill set. Addressing this gap is one of Oral History Association of Australia, Queensland (OHAA Qld) main activities. This paper reports on the OHAA Qld chapter’s oral history workshop program, which was radically altered in 2011.
Resumo:
Young novice drivers constitute a major public health concern due to the number of crashes in which they are involved, and the resultant injuries and fatalities. Previous research suggests psychological traits (reward sensitivity, sensation seeking propensity), and psychological states (anxiety, depression) influence their risky behaviour. The relationships between gender, anxiety, depression, reward sensitivity, sensation seeking propensity and risky driving are explored. Participants (390 intermediate drivers, 17-25 years) completed two online surveys at a six month interval. Surveys comprised sociodemographics, Brief Sensation Seeking Scale, Kessler’s Psychological Distress Scale, an abridged Sensitivity to Reward Questionnaire, and risky driving behaviour was measured by the Behaviour of Young Novice Drivers Scale. Structural equation modelling revealed anxiety, reward sensitivity and sensation seeking propensity predicted risky driving. Gender was a moderator, with only reward sensitivity predicting risky driving for males. Future interventions which consider the role of rewards, sensation seeking, and mental health may contribute to improved road safety for younger and older road users alike.
Resumo:
Enterprise architecture (EA) management has become an intensively discussed approach to manage enterprise transformations. Despite the popularity and potential of EA, both researchers and practitioners lament a lack of knowledge about the realization of benefits from EA. To determine the benefits from EA, we explore the various dimensions of EA benefit realization and report on the development of a validated and robust measurement instrument. In this paper, we test the reliability and construct validity of the EA benefit realization model (EABRM), which we have designed based on the DeLone & McLean IS success model and findings from exploratory interviews. A confirmatory factor analysis confirms the existence of an impact of five distinct and individually important dimensions on the benefits derived from EA: EA artefact quality, EA infrastructure quality, EA service quality, EA culture, and EA use. The analysis presented in this paper shows that the EA benefit realization model is an instrument that demonstrates strong reliability and validity.