96 resultados para Interchange nets


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Over the past decade the use of long-lasting insecticidal nets (LLINs), in combination with improved drug therapies, indoor residual spraying (IRS) and better health infrastructure, has helped reduce malaria in many African countries for the first time in a generation. However, insecticide resistance in the vector is an evolving threat to these gains. We review emerging and historical data on behavioural resistance in response to LLINs and IRS. Overall the current literature suggests behavioural and species changes may be emerging, but the data are sparse and, at times unconvincing. However, preliminary modelling has demonstrated that behavioural resistance could have significant impacts on the effectiveness of malaria control. We propose seven recommendations to improve understanding of resistance in malaria vectors. Determining the public health impact of physiological and behavioural insecticide resistance is an urgent priority if we are to maintain the significant gains made in reducing malaria morbidity and mortality.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

QUT’s new metadata repository (data registry), Research Data Finder, has been designed to promote the visibility and discoverability of QUT research datasets. Funded by the Australian National Data Service (ANDS), it will provide a qualitative snapshot of research data outputs created or collected by members of the QUT research community that are available via open or mediated access. As a fully integrated metadata repository Research Data Finder aligns with institutional sources of truth, such as QUT’s research administrative system, ResearchMaster, as well as QUT’s Academic Profiles system to provide high quality data descriptions that increase awareness of, and access to, shareable research data. In addition, the repository and its workflows are designed to foster smoother data management practices, enhance opportunities for collaboration and research, promote cross-disciplinary research and maximize existing research datasets. The metadata schema used in Research Data Finder is the Registry Interchange Format - Collections and Services (RIF-CS), developed by ANDS in 2009. This comprehensive schema is potentially complex for researchers; unlike metadata for publications, which are often made publicly available with the official publication, metadata for datasets are not typically available and need to be created. Research Data Finder uses a hybrid self-deposit and mediated deposit system. In addition to automated ingests from ResearchMaster (research project information) and Academic Profiles system (researcher information), shareable data is identified at a number of key “trigger points” in the research cycle. These include: research grant proposals; ethics applications; Data Management Plans; Liaison Librarian data interviews; and thesis submissions. These ingested records can be supplemented with related metadata including links to related publications, such as those in QUT ePrints. Records deposited in Research Data Finder are harvested by ANDS and made available to a national and international audience via Research Data Australia, ANDS’ discovery service for Australian research data. Researcher and research group metadata records are also harvested by the National Library of Australia (NLA) and these records are then published in Trove (the NLA’s digital information portal). By contributing records to the national infrastructure, QUT data will become more visible. Within Australia and internationally, many funding bodies have already mandated the open access of publications produced from publicly funded research projects, such as those supported by the Australian Research Council (ARC), or the National Health and Medical Research Council (NHMRC). QUT will be well placed to respond to the rapidly evolving climate of research data management. This project is supported by the Australian National Data Service (ANDS). ANDS is supported by the Australian Government through the National Collaborative Research Infrastructure Strategy Program and the Education Investment Fund (EIF) Super Science Initiative.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Parametric and generative modelling methods are ways in which computer models are made more flexible, and of formalising domain-specific knowledge. At present, no open standard exists for the interchange of parametric and generative information. The Industry Foundation Classes (IFC) which are an open standard for interoperability in building information models is presented as the base for an open standard in parametric modelling. The advantage of allowing parametric and generative representations are that the early design process can allow for more iteration and changes can be implemented quicker than with traditional models. This paper begins with a formal definition of what constitutes to be parametric and generative modelling methods and then proceeds to describe an open standard in which the interchange of components could be implemented. As an illustrative example of generative design, Frazer’s ‘Reptiles’ project from 1968 is reinterpreted.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The design of concurrent software systems, in particular process-aware information systems, involves behavioral modeling at various stages. Recently, approaches to behavioral analysis of such systems have been based on declarative abstractions defined as sets of behavioral relations. However, these relations are typically defined in an ad-hoc manner. In this paper, we address the lack of a systematic exploration of the fundamental relations that can be used to capture the behavior of concurrent systems, i.e., co-occurrence, conflict, causality, and concurrency. Besides the definition of the spectrum of behavioral relations, which we refer to as the 4C spectrum, we also show that our relations give rise to implication lattices. We further provide operationalizations of the proposed relations, starting by proposing techniques for computing relations in unlabeled systems, which are then lifted to become applicable in the context of labeled systems, i.e., systems in which state transitions have semantic annotations. Finally, we report on experimental results on efficiency of the proposed computations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Reducing complexity in Information Systems is an important topic in both research and industry. One strategy to deal with complexity is separation of concerns, which results in less complex, easily maintainable and more reusable systems. Separation of concerns can be addressed through the Aspect Oriented paradigm. Although this paradigm has been well researched in programming, it is still at the preliminary stage in the area of Business Process Management. While some efforts have been made to extend business process modelling with aspect oriented capability, it has not yet been investigated how aspect oriented business process models should be executed at runtime. In this paper, we propose a generic solution to support execution of aspect oriented business process models based on the principle behind dynamic weaving of aspects. This solution is formally specified using Coloured Petri Nets. The resulting formal specification serves as the blueprint to the implementation of a service module in the framework of a state-of-the-art Business Process Management System. Using this developed artefact, a case study is performed in which two simplified processes from real business in the domain of banking are modelled and executed in an aspect oriented manner. Through this case study, we also demonstrate that adoption of aspect oriented modularization increases the reusability while reducing the complexity of business process models in practice.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We finished penning this special issue and sending it to press on martin Luther King Jr. Day. We take pause, honoring Martin Luther King's memory and we are dedicating this project to his profound vision as a public intellectual and world activist for whom two of his breakthrough ideas are particularly relevant to this collection. The guest editors, along with the contributors, are reinforcing his messages for the current and future eras that "leadership is the action of ideas to make change, through the agency of individuals" (p. 74) and that "Injustice anywhere is a threat to justice everywhere" (p. 75) (see Temes 1996).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This research introduces a general methodology in order to create a Coloured Petri Net (CPN) model of a security protocol. Then standard or user-defined security properties of the created CPN model are identified. After adding an attacker model to the protocol model, the security property is verified using state space method. This approach is applied to analyse a number of trusted computing protocols. The results show the applicability of proposed method to analyse both standard and user-defined properties.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Newell (1985, 1986) identified the importance of interacting constraints on the emergent behaviours of learners or performers in sport as they assemble functional states of movement organisation in achieving task goals. Constraints, related to the person, task and environment, were defined as ‘boundaries or features that limit motion of the entity under consideration at any moment in time’ (Newell, 1986, p.347). Personal (or organismic) constraints include factors such as individual anthropometrics (height, weight, and limb lengths), fitness (e.g., strength, speed, aerobic capacity, and flexibility), mental skills (e.g. concentration, confidence, emotional control and motivation), perceptual and decisionmaking skills (e.g., recognising patterns of play, anticipation by reading the movements of opponents) and personality factors (e.g., risk taking or conservative behaviours). Newell (1986, p.350) distinguished between general environmental constraints, such as gravity, ambient temperature, natural light and altitude and task constraints, which are task specific and concerned with the goals of a specific activity. More recently, socio-cultural constraints (e.g., family support, cultural expectations and access to facilities) have also been considered as environmental constraints. Application of the constraints framework to the study of sport performance has led to task constraints being defined to include factors such as rules of games, equipment used, boundary playing areas and markings, nets and goals, the number of...

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Our single-word issue title “publish” no doubt conjures up all sorts of anxieties in most writers and academics. It first rings through the head as a command to produce, to make, to compose—and underlines its necessity. Publish implies an invocation of engagement with its sister noun “public.” It also suggests an interchange and exchange between an audience of readers and the produced texts, leading to something that has been called a “sphere” in its grandiose claims and a “community” in its slightly more modest conceit. To publish is to produce a different form of conversation, one that is abstracted from the oral into the written and then presumably back out into both written and spoken, thereby producing new circuits of interchange and exchange....

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Analysis of behavioural consistency is an important aspect of software engineering. In process and service management, consistency verification of behavioural models has manifold applications. For instance, a business process model used as system specification and a corresponding workflow model used as implementation have to be consistent. Another example would be the analysis to what degree a process log of executed business operations is consistent with the corresponding normative process model. Typically, existing notions of behaviour equivalence, such as bisimulation and trace equivalence, are applied as consistency notions. Still, these notions are exponential in computation and yield a Boolean result. In many cases, however, a quantification of behavioural deviation is needed along with concepts to isolate the source of deviation. In this article, we propose causal behavioural profiles as the basis for a consistency notion. These profiles capture essential behavioural information, such as order, exclusiveness, and causality between pairs of activities of a process model. Consistency based on these profiles is weaker than trace equivalence, but can be computed efficiently for a broad class of models. In this article, we introduce techniques for the computation of causal behavioural profiles using structural decomposition techniques for sound free-choice workflow systems if unstructured net fragments are acyclic or can be traced back to S- or T-nets. We also elaborate on the findings of applying our technique to three industry model collections.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Identification of behavioural contradictions is an important aspect of software engineering, in particular for checking the consistency between a business process model used as system specification and a corresponding workflow model used as implementation. In this paper, we propose causal behavioural profiles as the basis for a consistency notion, which capture essential behavioural information, such as order, exclusiveness, and causality between pairs of activities. Existing notions of behavioural equivalence, such as bisimulation and trace equivalence, might also be applied as consistency notions. Still, they are exponential in computation. Our novel concept of causal behavioural profiles provides a weaker behavioural consistency notion that can be computed efficiently using structural decomposition techniques for sound free-choice workflow systems if unstructured net fragments are acyclic or can be traced back to S- or T-nets.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Otitis media (OM) (a middle ear infection) is a common childhood illness that can leave some children with permanent hearing loss. OM can arise following infection with a variety of different pathogens, including a coinfection with influenza A virus (IAV) and Streptococcus pneumoniae (the pneumococcus). We and others have demonstrated that coinfection with IAV facilitates the replication of pneumococci in the middle ear. Specifically, we used a mouse model of OM to show that IAV facilitates the outgrowth of S. pneumoniae in the middle ear by inducing middle ear inflammation. Here, we seek to understand how the host inflammatory response facilitates bacterial outgrowth in the middle ear. Using B cell-deficient infant mice, we show that antibodies play a crucial role in facilitating pneumococcal replication. We subsequently show that this is due to antibody-dependent neutrophil extracellular trap (NET) formation in the middle ear, which, instead of clearing the infection, allows the bacteria to replicate. We further demonstrate the importance of these NETs as a potential therapeutic target through the transtympanic administration of a DNase, which effectively reduces the bacterial load in the middle ear. Taken together, these data provide novel insight into how pneumococci are able to replicate in the middle ear cavity and induce disease.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The structures of the ammonium salts of 3,5-dinitrobenzoic acid, NH4+ C7H3N2O6- (I), 4-nitrobenzoic acid, NH4+ C7H4N2O4- . 2H2O (II) and 2,4-dichlorobenzoic acid, NH4+ C7H3Cl2O2- . 0.5H2O (III), have been determined and their hydrogen-bonded structures are described. All salts form hydrogen-bonded polymeric structures, three-dimensional in (I) and two-dimensional in (II) and (III). With (I), a primary cation-anion cyclic association is formed [graph set R3/4(10)] through N-H...O hydrogen bonds, involving a carboxyl O,O' group on one side and a single carboxyl O-atom on the other. Structure extension involves both N-H...O hydrogen bonds to both carboxyl and nitro O-atom acceptors. With structure (II), the primary inter-species interactions and structure extension into layers lying parallel to (0 0 1) are through conjoined cyclic hydrogen-bonding motifs: R3/4(10) [one cation, a carboxyl (O,O') group and two water molecules] and centrosymmetric R2/4(8) [two cations and two water molecules]. The structure of (III) also has conjoined R3/4(10) and centrosymmetric R2/4(8) motifs in the layered structure but these differ in that he first involves one cation, a carboxyl (O,O') as well as a carboxyl (O) group and one water molecule, the second, two cations and two carboxyl O-groups. The layers lie parallel to (1 0 0). The structures of the salt hydrates (II) and (III) reported in this work, giving two-dimensional layered arrays through conjoined hydrogen-bonded nets provide further illustrations of a previously indicated trend among ammonium salts of carboxylic acids, but the anhydrous three-dimensional structure of (I) is inconsistent.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Security protocols are designed in order to provide security properties (goals). They achieve their goals using cryptographic primitives such as key agreement or hash functions. Security analysis tools are used in order to verify whether a security protocol achieves its goals or not. The analysed property by specific purpose tools are predefined properties such as secrecy (confidentiality), authentication or non-repudiation. There are security goals that are defined by the user in systems with security requirements. Analysis of these properties is possible with general purpose analysis tools such as coloured petri nets (CPN). This research analyses two security properties that are defined in a protocol that is based on trusted platform module (TPM). The analysed protocol is proposed by Delaune to use TPM capabilities and secrets in order to open only one secret from two submitted secrets to a recipient

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Distributed Network Protocol Version 3 (DNP3) is the de-facto communication protocol for power grids. Standard-based interoperability among devices has made the protocol useful to other infrastructures such as water, sewage, oil and gas. DNP3 is designed to facilitate interaction between master stations and outstations. In this paper, we apply a formal modelling methodology called Coloured Petri Nets (CPN) to create an executable model representation of DNP3 protocol. The model facilitates the analysis of the protocol to ensure that the protocol will behave as expected. Also, we illustrate how to verify and validate the behaviour of the protocol, using the CPN model and the corresponding state space tool to determine if there are insecure states. With this approach, we were able to identify a Denial of Service (DoS) attack against the DNP3 protocol.