35 resultados para Associative algebras
em Queensland University of Technology - ePrints Archive
Resumo:
The 1:1 proton-transfer compounds of L-tartaric acid with 3-aminopyridine [3-aminopyridinium hydrogen (2R,3R)-tartrate dihydrate, C5H7N2+·C4H5O6-·2H2O, (I)], pyridine-3-carboxylic acid (nicotinic acid) [anhydrous 3-carboxypyridinium hydrogen (2R,3R)-tartrate, C6H6NO2+·C4H5O6-, (II)] and pyridine-2-carboxylic acid [2-carboxypyridinium hydrogen (2R,3R)-tartrate monohydrate, C6H6NO2+·C4H5O6-·H2O, (III)] have been determined. In (I) and (II), there is a direct pyridinium-carboxyl N+-HO hydrogen-bonding interaction, four-centred in (II), giving conjoint cyclic R12(5) associations. In contrast, the N-HO association in (III) is with a water O-atom acceptor, which provides links to separate tartrate anions through Ohydroxy acceptors. All three compounds have the head-to-tail C(7) hydrogen-bonded chain substructures commonly associated with 1:1 proton-transfer hydrogen tartrate salts. These chains are extended into two-dimensional sheets which, in hydrates (I) and (III) additionally involve the solvent water molecules. Three-dimensional hydrogen-bonded structures are generated via crosslinking through the associative functional groups of the substituted pyridinium cations. In the sheet struture of (I), both water molecules act as donors and acceptors in interactions with separate carboxyl and hydroxy O-atom acceptors of the primary tartrate chains, closing conjoint cyclic R44(8), R34(11) and R33(12) associations. Also, in (II) and (III) there are strong cation carboxyl-carboxyl O-HO hydrogen bonds [OO = 2.5387 (17) Å in (II) and 2.441 (3) Å in (III)], which in (II) form part of a cyclic R22(6) inter-sheet association. This series of heteroaromatic Lewis base-hydrogen L-tartrate salts provides further examples of molecular assembly facilitated by the presence of the classical two-dimensional hydrogen-bonded hydrogen tartrate or hydrogen tartrate-water sheet substructures which are expanded into three-dimensional frameworks via peripheral cation bifunctional substituent-group crosslinking interactions.
Resumo:
Traditional approaches to joint control required accurate modelling of the system dynamic of the plant in question. Fuzzy Associative Memory (FAM) control schemes allow adequate control without a model of the system to be controlled. This paper presents a FAM based joint controller implemented on a humanoid robot. An empirically tuned PI velocity control loop is augmented with this feed forward FAM, with considerable reduction in joint position error achieved online and with minimal additional computational overhead.
Resumo:
Changes in dendritic spine number and shape are believed to reflect structural plasticity consequent to learning. Previous studies have strongly suggested that the dorsal subnucleus of the lateral amygdala is an important site of physiological plasticity in Pavlovian fear conditioning. In the present study, we examined the effect of auditory fear conditioning on dendritic spine numbers in the dorsal subnucleus of the lateral amygdala using an immunolabelling procedure to visualize the spine-associated protein spinophilin. Associatively conditioned rats that received paired tone and shock presentations had 35% more total spinophilin-immunoreactive spines than animals that had unpaired stimulation, consistent with the idea that changes in the number of dendritic spines occur during learning and account in part for memory.
Resumo:
Cued recall and item recognition are considered the standard episodic memory retrieval tasks. However, only the neural correlates of the latter have been studied in detail with fMRI. Using an event-related fMRI experimental design that permits spoken responses, we tested hypotheses from an auto-associative model of cued recall and item recognition [Chappell, M., & Humphreys, M. S. (1994). An auto-associative neural network for sparse representations: Analysis and application to models of recognition and cued recall. Psychological Review, 101, 103-128]. In brief, the model assumes that cues elicit a network of phonological short term memory (STM) and semantic long term memory (LTM) representations distributed throughout the neocortex as patterns of sparse activations. This information is transferred to the hippocampus which converges upon the item closest to a stored pattern and outputs a response. Word pairs were learned from a study list, with one member of the pair serving as the cue at test. Unstudied words were also intermingled at test in order to provide an analogue of yes/no recognition tasks. Compared to incorrectly rejected studied items (misses) and correctly rejected (CR) unstudied items, correctly recalled items (hits) elicited increased responses in the left hippocampus and neocortical regions including the left inferior prefrontal cortex (LIPC), left mid lateral temporal cortex and inferior parietal cortex, consistent with predictions from the model. This network was very similar to that observed in yes/no recognition studies, supporting proposals that cued recall and item recognition involve common rather than separate mechanisms.
Resumo:
Photo from process: David Megarrity, albury 2007 - example of convergence of writing/design/perfomance/video RESEARCH COMPONENT Fallen Awake was a practice-led research process that opened the development process to the influence of collaborative authorship across artforms. The project focused on of how multiple artforms and artists converge their vision into a singular text, in the context of collaborative authorship. The work also uncovered new questions relating to the dream-life of children. The stimulus for the work was a selection of verbal statements by three-year-olds, raising complex ethical questions as the project progressed about the child’s voice, mediated by the adult artist, for the eventual presentation to a child audience. With the text emergent and open to influence, this project raised other questions related to the lived experience of children, dreaming, creative play and the development of consciousness. It pushed the creative process to experiment with associative, rather then causal narratives, and to negotiate the challenges this raises for traditional story structures and the development processes that usually shape them. It led to the consideration of each artforms and artist as equal contributors in the development of story: traditionally the province of the sole author. The outcomes appeared in various artforms, none of which was live-performance based. An ‘artist’s book’ by the designer, a ‘video treatment’ - a DVD capturing the approach to the performance and a script for an innovative large-scale performance. Fallen Awake was developed with the assistance of Strut & Fret Production House, Arts Queensland, and HotHouse Theatre, Albury Wodonga, through their ‘Month in the Country’ initiative.
Resumo:
Experience plays an important role in building management. “How often will this asset need repair?” or “How much time is this repair going to take?” are types of questions that project and facility managers face daily in planning activities. Failure or success in developing good schedules, budgets and other project management tasks depend on the project manager's ability to obtain reliable information to be able to answer these types of questions. Young practitioners tend to rely on information that is based on regional averages and provided by publishing companies. This is in contrast to experienced project managers who tend to rely heavily on personal experience. Another aspect of building management is that many practitioners are seeking to improve available scheduling algorithms, estimating spreadsheets and other project management tools. Such “micro-scale” levels of research are important in providing the required tools for the project manager's tasks. However, even with such tools, low quality input information will produce inaccurate schedules and budgets as output. Thus, it is also important to have a broad approach to research at a more “macro-scale.” Recent trends show that the Architectural, Engineering, Construction (AEC) industry is experiencing explosive growth in its capabilities to generate and collect data. There is a great deal of valuable knowledge that can be obtained from the appropriate use of this data and therefore the need has arisen to analyse this increasing amount of available data. Data Mining can be applied as a powerful tool to extract relevant and useful information from this sea of data. Knowledge Discovery in Databases (KDD) and Data Mining (DM) are tools that allow identification of valid, useful, and previously unknown patterns so large amounts of project data may be analysed. These technologies combine techniques from machine learning, artificial intelligence, pattern recognition, statistics, databases, and visualization to automatically extract concepts, interrelationships, and patterns of interest from large databases. The project involves the development of a prototype tool to support facility managers, building owners and designers. This final report presents the AIMMTM prototype system and documents how and what data mining techniques can be applied, the results of their application and the benefits gained from the system. The AIMMTM system is capable of searching for useful patterns of knowledge and correlations within the existing building maintenance data to support decision making about future maintenance operations. The application of the AIMMTM prototype system on building models and their maintenance data (supplied by industry partners) utilises various data mining algorithms and the maintenance data is analysed using interactive visual tools. The application of the AIMMTM prototype system to help in improving maintenance management and building life cycle includes: (i) data preparation and cleaning, (ii) integrating meaningful domain attributes, (iii) performing extensive data mining experiments in which visual analysis (using stacked histograms), classification and clustering techniques, associative rule mining algorithm such as “Apriori” and (iv) filtering and refining data mining results, including the potential implications of these results for improving maintenance management. Maintenance data of a variety of asset types were selected for demonstration with the aim of discovering meaningful patterns to assist facility managers in strategic planning and provide a knowledge base to help shape future requirements and design briefing. Utilising the prototype system developed here, positive and interesting results regarding patterns and structures of data have been obtained.
Resumo:
Experience plays an important role in building management. “How often will this asset need repair?” or “How much time is this repair going to take?” are types of questions that project and facility managers face daily in planning activities. Failure or success in developing good schedules, budgets and other project management tasks depend on the project manager's ability to obtain reliable information to be able to answer these types of questions. Young practitioners tend to rely on information that is based on regional averages and provided by publishing companies. This is in contrast to experienced project managers who tend to rely heavily on personal experience. Another aspect of building management is that many practitioners are seeking to improve available scheduling algorithms, estimating spreadsheets and other project management tools. Such “micro-scale” levels of research are important in providing the required tools for the project manager's tasks. However, even with such tools, low quality input information will produce inaccurate schedules and budgets as output. Thus, it is also important to have a broad approach to research at a more “macro-scale.” Recent trends show that the Architectural, Engineering, Construction (AEC) industry is experiencing explosive growth in its capabilities to generate and collect data. There is a great deal of valuable knowledge that can be obtained from the appropriate use of this data and therefore the need has arisen to analyse this increasing amount of available data. Data Mining can be applied as a powerful tool to extract relevant and useful information from this sea of data. Knowledge Discovery in Databases (KDD) and Data Mining (DM) are tools that allow identification of valid, useful, and previously unknown patterns so large amounts of project data may be analysed. These technologies combine techniques from machine learning, artificial intelligence, pattern recognition, statistics, databases, and visualization to automatically extract concepts, interrelationships, and patterns of interest from large databases. The project involves the development of a prototype tool to support facility managers, building owners and designers. This Industry focused report presents the AIMMTM prototype system and documents how and what data mining techniques can be applied, the results of their application and the benefits gained from the system. The AIMMTM system is capable of searching for useful patterns of knowledge and correlations within the existing building maintenance data to support decision making about future maintenance operations. The application of the AIMMTM prototype system on building models and their maintenance data (supplied by industry partners) utilises various data mining algorithms and the maintenance data is analysed using interactive visual tools. The application of the AIMMTM prototype system to help in improving maintenance management and building life cycle includes: (i) data preparation and cleaning, (ii) integrating meaningful domain attributes, (iii) performing extensive data mining experiments in which visual analysis (using stacked histograms), classification and clustering techniques, associative rule mining algorithm such as “Apriori” and (iv) filtering and refining data mining results, including the potential implications of these results for improving maintenance management. Maintenance data of a variety of asset types were selected for demonstration with the aim of discovering meaningful patterns to assist facility managers in strategic planning and provide a knowledge base to help shape future requirements and design briefing. Utilising the prototype system developed here, positive and interesting results regarding patterns and structures of data have been obtained.
Resumo:
Elaborated Intrusion theory (Kavanagh, Andrade & May 2005) distinguishes between unconscious, associative processes as the precursors of desire, and controlled processes of cognitive elaboration that lead to conscious sensory images of the target of desire and associated affect. We argue that these mental images play a key role in motivating human behavior. Consciousness is functional in that it allows competing goals to be compared and evaluated. The role of effortful cognitive processes in desire helps to explain the different time courses of craving and physiological withdrawal.
Resumo:
Despite the advent of improved pharmacological treatments to alleviate substance-related desires, psychological approaches will continue to be required. However, the current psychological treatment that most specifically focuses on desires and their management—cue exposure (CE)—has not lived up to its original promise. This paper argues that current psychological approaches to desire do not adequately incorporate our knowledge about the factors that trigger, maintain, and terminate episodes of desire. It asserts that the instigation and maintenance of desires involve both associative and elaborative processes. Understanding the processes triggering the initiation of intrusive thoughts may assist in preventing some episodes, but occasional intrusions will be inevitable. A demonstration of the ineffectiveness of thought suppression may discourage its use as a coping strategy for desire-related intrusions, and mindfulness meditation plus cognitive therapy may help in accepting their occurrence and letting them go. Competing tasks may be used to reduce elaboration of desires, and competing sensory images may have particular utility. The application of these procedures during episodes that are elicited in the clinic may allow the acquisition of more effective strategies to address desires in the natural environment.
Resumo:
This paper reports on a study in which 29 Year 6 students (selected from the top 30% of 176 Year 6 students) were individually interviewed to explore their ability to reunitise hundredths as tenths (Behr, Harel, Post & Lesh, 1992) when represented by prototypic (PRO) and nonprototypic (NPRO) models. The results showed that 55.2% of the students were able to unitise both models and that reunitising was more successful with the PRO model. The interviews revealed that many of these students had incomplete, fragmented or non-existent structural knowledge of the reunitising process and often relied on syntactic clues to complete the tasks. The implication for teaching is that instruction should not be limited to PRO representations of the part/whole notion of fraction and that the basic structures (equal parts, link between name and number of equal parts) of the part/whole notion needs to be revisited often.
Resumo:
Centre for Mathematics and Science Education, QUT, Brisbane, Australia This paper reports on a study in which Years 6 and 10 students were individually interviewed to determine their ability to unitise and reunitise number lines used to represent mixed numbers and improper fractions. Only 16.7% of the students (all Year 6) were successful on all three tasks and, in general, Year 6 students outperformed Year 8 students. The interviews revealed that the remaining students had incomplete, fragmented or non-existent structural knowledge of mixed numbers and improper fractions, and were unable to unitise or reunitise number lines. The implication for teaching is that instruction should focus on providing students with a variety of fraction representations in order to develop rich and flexible schema for all fraction types (mixed numbers, and proper and improper fractions).
Resumo:
The Airy stress function, although frequently employed in classical linear elasticity, does not receive similar usage for granular media problems. For plane strain quasi-static deformations of a cohesionless Coulomb–Mohr granular solid, a single nonlinear partial differential equation is formulated for the Airy stress function by combining the equilibrium equations with the yield condition. This has certain advantages from the usual approach, in which two stress invariants and a stress angle are introduced, and a system of two partial differential equations is needed to describe the flow. In the present study, the symmetry analysis of differential equations is utilised for our single partial differential equation, and by computing an optimal system of one-dimensional Lie algebras, a complete set of group-invariant solutions is derived. By this it is meant that any group-invariant solution of the governing partial differential equation (provided it can be derived via the classical symmetries method) may be obtained as a member of this set by a suitable group transformation. For general values of the parameters (angle of internal friction and gravity g) it is found there are three distinct classes of solutions which correspond to granular flows considered previously in the literature. For the two limiting cases of high angle of internal friction and zero gravity, the governing partial differential equation admit larger families of Lie point symmetries, and from these symmetries, further solutions are derived, many of which are new. Furthermore, the majority of these solutions are exact, which is rare for granular flow, especially in the case of gravity driven flows.
Resumo:
Bana et al. proposed the relation formal indistinguishability (FIR), i.e. an equivalence between two terms built from an abstract algebra. Later Ene et al. extended it to cover active adversaries and random oracles. This notion enables a framework to verify computational indistinguishability while still offering the simplicity and formality of symbolic methods. We are in the process of making an automated tool for checking FIR between two terms. First, we extend the work by Ene et al. further, by covering ordered sorts and simplifying the way to cope with random oracles. Second, we investigate the possibility of combining algebras together, since it makes the tool scalable and able to cover a wide class of cryptographic schemes. Specially, we show that the combined algebra is still computationally sound, as long as each algebra is sound. Third, we design some proving strategies and implement the tool. Basically, the strategies allow us to find a sequence of intermediate terms, which are formally indistinguishable, between two given terms. FIR between the two given terms is then guaranteed by the transitivity of FIR. Finally, we show applications of the work, e.g. on key exchanges and encryption schemes. In the future, the tool should be extended easily to cover many schemes. This work continues previous research of ours on use of compilers to aid in automated proofs for key exchange.
Resumo:
It is recognised that individuals do not always respond honestly when completing psychological tests. One of the foremost issues for research in this area is the inability to detect individuals attempting to fake. While a number of strategies have been identified in faking, a commonality of these strategies is the latent role of long term memory. Seven studies were conducted in order to examine whether it is possible to detect the activation of faking related cognitions using a lexical decision task. Study 1 found that engagement with experiential processing styles predicted the ability to fake successfully, confirming the role of associative processing styles in faking. After identifying appropriate stimuli for the lexical decision task (Studies 2A and 2B), Studies 3 to 5 examined whether a cognitive state of faking could be primed and subsequently identified, using a lexical decision task. Throughout the course of these studies, the experimental methodology was increasingly refined in an attempt to successfully identify the relevant priming mechanisms. The results were consistent and robust throughout the three priming studies: faking good on a personality test primed positive faking related words in the lexical decision tasks. Faking bad, however, did not result in reliable priming of negative faking related cognitions. To more completely address potential issues with the stimuli and the possible role of affective priming, two additional studies were conducted. Studies 6A and 6B revealed that negative faking related words were more arousing than positive faking related words, and that positive faking related words were more abstract than negative faking related words and neutral words. Study 7 examined whether the priming effects evident in the lexical decision tasks occurred as a result of an unintentional mood induction while faking the psychological tests. Results were equivocal in this regard. This program of research aligned the fields of psychological assessment and cognition to inform the preliminary development and validation of a new tool to detect faking. Consequently, an implicit technique to identify attempts to fake good on a psychological test has been identified, using long established and robust cognitive theories in a novel and innovative way. This approach represents a new paradigm for the detection of individuals responding strategically to psychological testing. With continuing development and validation, this technique may have immense utility in the field of psychological assessment.