187 resultados para Box-constrained optimization
Resumo:
The railhead is severely stressed under the localized wheel contact patch close to the gaps in insulated rail joints. A modified railhead profile in the vicinity of the gapped joint, through a shape optimization model based on a coupled genetic algorithm and finite element method, effectively alters the contact zone and reduces the railhead edge stress concentration significantly. Two optimization methods, a grid search method and a genetic algorithm, were employed for this optimization problem. The optimal results from these two methods are discussed and, in particular, their suitability for the rail end stress minimization problem is studied. Through several numerical examples, the optimal profile is shown to be unaffected by either the magnitude or the contact position of the loaded wheel. The numerical results are validated through a large-scale experimental study.
Resumo:
The available wind power is stochastic and requires appropriate tools in the OPF model for economic and reliable power system operation. This paper exhibit the OPF formulation with factors involved in the intermittency of wind power. Weibull distribution is adopted to find the stochastic wind speed and power distribution. The reserve requirement is evaluated based on the wind distribution and risk of under/over estimation of the wind power. In addition, the Wind Energy Conversion System (WECS) is represented by Doubly Fed Induction Generator (DFIG) based wind farms. The reactive power capability for DFIG based wind farm is also analyzed. The study is performed on IEEE-30 bus system with wind farm located at different buses and with different wind profiles. Also the reactive power capacity to be installed in the wind farm to maintain a satisfactory voltage profile under the various wind flow scenario is demonstrated.
Resumo:
Objective: To explore psychosocial issues perceived to impact the mental health and well-being of resident (non-fly-in fly-out) mine workers at a local mine in regional Queensland. Design: A descriptive qualitative study using semistructured interviews. Setting: The research was conducted on-site at an opencut coal mine in regional Queensland. Participants: Ten miners (nine men) currently employed in workshop, production or supervisory roles. Main outcome measures: Self-reported issues affecting psychological well-being. Results: Participants’ occupation and the surrounding context appeared to have both positive and negative influences on their well-being. Overall findings could be grouped into four key themes: (i) the importance of relationships; (ii) the impact of lifestyle; (iii) work characteristics; and (iv) mental health attitudes. While not without strains on mental health, in general, participants reported that their current situation was superior to their previous mining jobs. This was attributed to close relationships among locally recruited workers, respect for management practices and rosters that allowed adequate sleep recovery and family time between shifts. Conclusions: This study is the first to examine mental health and well being in non-fly-in fly-out mining populations. It suggests that while some issues appear inherent in the mining occupation, personal and organisational support can help workers have a more positive workplace experience. Further work looking at more extensive comparisons over various mining contexts will greatly assist in the development of programs and support structures for rural and regional mine workers.
Resumo:
Virus-like particle-based vaccines for high-risk human papillomaviruses (HPVs) appear to have great promise; however, cell culture-derived vaccines will probably be very expensive. The optimization of expression of different codon-optimized versions of the HPV-16 L1 capsid protein gene in plants has been explored by means of transient expression from a novel suite of Agrobacterium tumefaciens binary expression vectors, which allow targeting of recombinant protein to the cytoplasm, endoplasmic reticulum (ER) or chloroplasts. A gene resynthesized to reflect human codon usage expresses better than the native gene, which expresses better than a plant-optimized gene. Moreover, chloroplast localization allows significantly higher levels of accumulation of L1 protein than does cytoplasmic localization, whilst ER retention was least successful. High levels of L1 (>17% total soluble protein) could be produced via transient expression: the protein assembled into higher-order structures visible by electron microscopy, and a concentrated extract was highly immunogenic in mice after subcutaneous injection and elicited high-titre neutralizing antibodies. Transgenic tobacco plants expressing a human codon-optimized gene linked to a chloroplast-targeting signal expressed L1 at levels up to 11% of the total soluble protein. These are the highest levels of HPV L1 expression reported for plants: these results, and the excellent immunogenicity of the product, significantly improve the prospects of making a conventional HPV vaccine by this means. © 2007 SGM.
Resumo:
Genetic recombination is a fundamental evolutionary mechanism promoting biological adaptation. Using engineered recombinants of the small single-stranded DNA plant virus, Maize streak virus (MSV), we experimentally demonstrate that fragments of genetic material only function optimally if they reside within genomes similar to those in which they evolved. The degree of similarity necessary for optimal functionality is correlated with the complexity of intragenomic interaction networks within which genome fragments must function. There is a striking correlation between our experimental results and the types of MSV recombinants that are detectable in nature, indicating that obligatory maintenance of intragenome interaction networks strongly constrains the evolutionary value of recombination for this virus and probably for genomes in general.
Resumo:
A baculovirus-insect cell expression system potentially provides the means to produce prophylactic HIV-1 virus-like particle (VLP) vaccines inexpensively and in large quantities. However, the system must be optimized to maximize yields and increase process efficiency. In this study, we optimized the production of two novel, chimeric HIV-1 VLP vaccine candidates (GagRT and GagTN) in insect cells. This was done by monitoring the effects of four specific factors on VLP expression: these were insect cell line, cell density, multiplicity of infection (MOI), and infection time. The use of western blots, Gag p24 ELISA, and four-factorial ANOVA allowed the determination of the most favorable conditions for chimeric VLP production, as well as which factors affected VLP expression most significantly. Both VLP vaccine candidates favored similar optimal conditions, demonstrating higher yields of VLPs when produced in the Trichoplusia ni Pro insect cell line, at a cell density of 1 × 106 cells/mL, and an infection time of 96 h post infection. It was found that cell density and infection time were major influencing factors, but that MOI did not affect VLP expression significantly. This work provides a potentially valuable guideline for HIV-1 protein vaccine optimization, as well as for general optimization of a baculovirus-based expression system to produce complex recombinant proteins. © 2009 American Institute of Chemical Engineers.
Resumo:
Vehicular Ad-hoc Networks (VANET) have different characteristics compared to other mobile ad-hoc networks. The dynamic nature of the vehicles which act as routers and clients are connected with unreliable radio links and Routing becomes a complex problem. First we propose CO-GPSR (Cooperative GPSR), an extension of the traditional GPSR (Greedy Perimeter Stateless Routing) which uses relay nodes which exploit radio path diversity in a vehicular network to increase routing performance. Next we formulate a Multi-objective decision making problem to select optimum packet relaying nodes to increase the routing performance further. We use cross layer information for the optimization process. We evaluate the routing performance more comprehensively using realistic vehicular traces and a Nakagami fading propagation model optimized for highway scenarios in VANETs. Our results show that when Multi-objective decision making is used for cross layer optimization of routing a 70% performance increment can be obtained for low vehicle densities on average, which is a two fold increase compared to the single criteria maximization approach.
Resumo:
In most visual mapping applications suited to Autonomous Underwater Vehicles (AUVs), stereo visual odometry (VO) is rarely utilised as a pose estimator as imagery is typically of very low framerate due to energy conservation and data storage requirements. This adversely affects the robustness of a vision-based pose estimator and its ability to generate a smooth trajectory. This paper presents a novel VO pipeline for low-overlap imagery from an AUV that utilises constrained motion and integrates magnetometer data in a bi-objective bundle adjustment stage to achieve low-drift pose estimates over large trajectories. We analyse the performance of a standard stereo VO algorithm and compare the results to the modified vo algorithm. Results are demonstrated in a virtual environment in addition to low-overlap imagery gathered from an AUV. The modified VO algorithm shows significantly improved pose accuracy and performance over trajectories of more than 300m. In addition, dense 3D meshes generated from the visual odometry pipeline are presented as a qualitative output of the solution.
Resumo:
Distributed Genetic Algorithms (DGAs) designed for the Internet have to take its high communication cost into consideration. For island model GAs, the migration topology has a major impact on DGA performance. This paper describes and evaluates an adaptive migration topology optimizer that keeps the communication load low while maintaining high solution quality. Experiments on benchmark problems show that the optimized topology outperforms static or random topologies of the same degree of connectivity. The applicability of the method on real-world problems is demonstrated on a hard optimization problem in VLSI design.
Resumo:
The DNA damage response encompasses a complex series of signaling pathways that function to regulate and facilitate the repair of damaged DNA. Recent studies have shown that the repair of transcriptionally inactive chromatin, named heterochromatin, is dependent upon the phosphorylation of the co-repressor, Krüppel-associated box (KRAB) domain-associated protein (KAP-1), by the ataxia telangiectasia-mutated (ATM) kinase. Co-repressors, such as KAP-1, function to regulate the rigid structure of heterochromatin by recruiting histone-modifying enzymes, such HDAC1/2, SETDB1, and nucleosome-remodeling complexes such as CHD3. Here, we have characterized a phosphorylation site in the HP1-binding domain of KAP-1, Ser-473, which is phosphorylated by the cell cycle checkpoint kinase Chk2. Expression of a nonphosphorylatable S473A mutant conferred cellular sensitivity to DNA-damaging agents and led to defective repair of DNA double-strand breaks in heterochromatin. In addition, cells expressing S473A also displayed defective mobilization of the HP1-β chromodomain protein. The DNA repair defect observed in cells expressing S473A was alleviated by depletion of HP1-β, suggesting that phosphorylation of KAP-1 on Ser-473 promotes the mobilization of HP1-β from heterochromatin and subsequent DNA repair. These results suggest a novel mechanism of KAP-1-mediated chromatin restructuring via Chk2-regulated HP1-β exchange from heterochromatin, promoting DNA repair.
Resumo:
In this paper, we will discuss the issue of rostering jobs of cabin crew attendants at KLM. Generated schedules get easily disrupted by events such as illness of an employee. Obviously, reserve people have to be kept 'on duty' to resolve such disruptions. A lot of reserve crew requires more employees, but too few results in so-called secondary disruptions, which are particularly inconvenient for both the crew members and the planners. In this research we will discuss several modifications of the reserve scheduling policy that have a potential to reduce the number of secondary disruptions, and therefore to improve the performance of the scheduling process.
Resumo:
The Cross-Entropy (CE) is an efficient method for the estimation of rare-event probabilities and combinatorial optimization. This work presents a novel approach of the CE for optimization of a Soft-Computing controller. A Fuzzy controller was designed to command an unmanned aerial system (UAS) for avoiding collision task. The only sensor used to accomplish this task was a forward camera. The CE is used to reach a near-optimal controller by modifying the scaling factors of the controller inputs. The optimization was realized using the ROS-Gazebo simulation system. In order to evaluate the optimization a big amount of tests were carried out with a real quadcopter.
Resumo:
The Australian Curriculum marks national reforms in social science education, first with the return to the disciplines of history and geography and second, through a new approach to interdisciplinary learning. This paper raises the question of whether the promise of interdisciplinary learning can be realised in the middle years of schooling if teachers have to teach history as a discipline rather than within an over-arching integrated curriculum framework. The paper explores the national blueprints and considers the national history curriculum in light of theories of teachers’ knowledge and middle school education. Evidence from teacher interviews indicates that historical understanding can be achieved through integrated frameworks to meet the goals of middle schooling.
Resumo:
In this paper, we propose an approach which attempts to solve the problem of surveillance event detection, assuming that we know the definition of the events. To facilitate the discussion, we first define two concepts. The event of interest refers to the event that the user requests the system to detect; and the background activities are any other events in the video corpus. This is an unsolved problem due to many factors as listed below: 1) Occlusions and clustering: The surveillance scenes which are of significant interest at locations such as airports, railway stations, shopping centers are often crowded, where occlusions and clustering of people are frequently encountered. This significantly affects the feature extraction step, and for instance, trajectories generated by object tracking algorithms are usually not robust under such a situation. 2) The requirement for real time detection: The system should process the video fast enough in both of the feature extraction and the detection step to facilitate real time operation. 3) Massive size of the training data set: Suppose there is an event that lasts for 1 minute in a video with a frame rate of 25fps, the number of frames for this events is 60X25 = 1500. If we want to have a training data set with many positive instances of the event, the video is likely to be very large in size (i.e. hundreds of thousands of frames or more). How to handle such a large data set is a problem frequently encountered in this application. 4) Difficulty in separating the event of interest from background activities: The events of interest often co-exist with a set of background activities. Temporal groundtruth typically very ambiguous, as it does not distinguish the event of interest from a wide range of co-existing background activities. However, it is not practical to annotate the locations of the events in large amounts of video data. This problem becomes more serious in the detection of multi-agent interactions, since the location of these events can often not be constrained to within a bounding box. 5) Challenges in determining the temporal boundaries of the events: An event can occur at any arbitrary time with an arbitrary duration. The temporal segmentation of events is difficult and ambiguous, and also affected by other factors such as occlusions.
Resumo:
Secure communications in distributed Wireless Sensor Networks (WSN) operating under adversarial conditions necessitate efficient key management schemes. In the absence of a priori knowledge of post-deployment network configuration and due to limited resources at sensor nodes, key management schemes cannot be based on post-deployment computations. Instead, a list of keys, called a key-chain, is distributed to each sensor node before the deployment. For secure communication, either two nodes should have a key in common in their key-chains, or they should establish a key through a secure-path on which every link is secured with a key. We first provide a comparative survey of well known key management solutions for WSN. Probabilistic, deterministic and hybrid key management solutions are presented, and they are compared based on their security properties and re-source usage. We provide a taxonomy of solutions, and identify trade-offs in them to conclude that there is no one size-fits-all solution. Second, we design and analyze deterministic and hybrid techniques to distribute pair-wise keys to sensor nodes before the deployment. We present novel deterministic and hybrid approaches based on combinatorial design theory and graph theory for deciding how many and which keys to assign to each key-chain before the sensor network deployment. Performance and security of the proposed schemes are studied both analytically and computationally. Third, we address the key establishment problem in WSN which requires key agreement algorithms without authentication are executed over a secure-path. The length of the secure-path impacts the power consumption and the initialization delay for a WSN before it becomes operational. We formulate the key establishment problem as a constrained bi-objective optimization problem, break it into two sub-problems, and show that they are both NP-Hard and MAX-SNP-Hard. Having established inapproximability results, we focus on addressing the authentication problem that prevents key agreement algorithms to be used directly over a wireless link. We present a fully distributed algorithm where each pair of nodes can establish a key with authentication by using their neighbors as the witnesses.