825 resultados para look-ahead system

em Queensland University of Technology - ePrints Archive


Relevância:

90.00% 90.00%

Publicador:

Resumo:

An optical system which performs the multiplication of binary numbers is described and proof-of-principle experiments are performed. The simultaneous generation of all partial products, optical regrouping of bit products, and optical carry look-ahead addition are novel features of the proposed scheme which takes advantage of the parallel operations capability of optical computers. The proposed processor uses liquid crystal light valves (LCLVs). By space-sharing the LCLVs one such system could function as an array of multipliers. Together with the optical carry look-ahead adders described, this would constitute an optical matrix-vector multiplier.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The results of the annual survey on international contact lens fits have become available again, which presents a great opportunity to distill the RGP lens data to see what the status of RGP lenses is today as well as to revisit the last decade of RGP lens fitting and to look ahead to the next decade.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

We have developed a Hierarchical Look-Ahead Trajectory Model (HiLAM) that incorporates the firing pattern of medial entorhinal grid cells in a planning circuit that includes interactions with hippocampus and prefrontal cortex. We show the model’s flexibility in representing large real world environments using odometry information obtained from challenging video sequences. We acquire the visual data from a camera mounted on a small tele-operated vehicle. The camera has a panoramic field of view with its focal point approximately 5 cm above the ground level, similar to what would be expected from a rat’s point of view. Using established algorithms for calculating perceptual speed from the apparent rate of visual change over time, we generate raw dead reckoning information which loses spatial fidelity over time due to error accumulation. We rectify the loss of fidelity by exploiting the loop-closure detection ability of a biologically inspired, robot navigation model termed RatSLAM. The rectified motion information serves as a velocity input to the HiLAM to encode the environment in the form of grid cell and place cell maps. Finally, we show goal directed path planning results of HiLAM in two different environments, an indoor square maze used in rodent experiments and an outdoor arena more than two orders of magnitude larger than the indoor maze. Together these results bridge for the first time the gap between higher fidelity bio-inspired navigation models (HiLAM) and more abstracted but highly functional bio-inspired robotic mapping systems (RatSLAM), and move from simulated environments into real-world studies in rodent-sized arenas and beyond.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

A flexible and simple Bayesian decision-theoretic design for dose-finding trials is proposed in this paper. In order to reduce the computational burden, we adopt a working model with conjugate priors, which is flexible to fit all monotonic dose-toxicity curves and produces analytic posterior distributions. We also discuss how to use a proper utility function to reflect the interest of the trial. Patients are allocated based on not only the utility function but also the chosen dose selection rule. The most popular dose selection rule is the one-step-look-ahead (OSLA), which selects the best-so-far dose. A more complicated rule, such as the two-step-look-ahead, is theoretically more efficient than the OSLA only when the required distributional assumptions are met, which is, however, often not the case in practice. We carried out extensive simulation studies to evaluate these two dose selection rules and found that OSLA was often more efficient than two-step-look-ahead under the proposed Bayesian structure. Moreover, our simulation results show that the proposed Bayesian method's performance is superior to several popular Bayesian methods and that the negative impact of prior misspecification can be managed in the design stage.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Machine vision represents a particularly attractive solution for sensing and detecting potential collision-course targets due to the relatively low cost, size, weight, and power requirements of vision sensors (as opposed to radar and TCAS). This paper describes the development and evaluation of a real-time vision-based collision detection system suitable for fixed-wing aerial robotics. Using two fixed-wing UAVs to recreate various collision-course scenarios, we were able to capture highly realistic vision (from an onboard camera perspective) of the moments leading up to a collision. This type of image data is extremely scarce and was invaluable in evaluating the detection performance of two candidate target detection approaches. Based on the collected data, our detection approaches were able to detect targets at distances ranging from 400m to about 900m. These distances (with some assumptions about closing speeds and aircraft trajectories) translate to an advanced warning of between 8-10 seconds ahead of impact, which approaches the 12.5 second response time recommended for human pilots. We overcame the challenge of achieving real-time computational speeds by exploiting the parallel processing architectures of graphics processing units found on commercially-off-the-shelf graphics devices. Our chosen GPU device suitable for integration onto UAV platforms can be expected to handle real-time processing of 1024 by 768 pixel image frames at a rate of approximately 30Hz. Flight trials using manned Cessna aircraft where all processing is performed onboard will be conducted in the near future, followed by further experiments with fully autonomous UAV platforms.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

For ESL teachers working with low-literate adolescents the challenge is to provide instruction in basic literacy capabilities while also realising the benefits of interactive and dialogic pedagogies advocated for the students. In this article we look at literacy pedagogy for refugees of African origin in Australian classrooms. We report on an interview study conducted in an intensive English language school for new arrival adolescents and in three regular secondary schools. Brian Street’s ideological model is used. From this perspective, literacy entails not only technical skills, but also social and cultural ways of making meaning that are embedded within relations of power. The findings showed that teachers were strengthening control of instruction to enable mastery of technical capabilities in basic literacy and genre analysis. We suggest that this approach should be supplemented by a critical approach transforming relations of linguistic power that exclude, marginalise and humiliate the study students in the classroom.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper provides a framework for analysing the role of Australia’s research system in promoting national economic development. The paper is in two parts. Part One focuses on knowledge diffusion and technological development and emphasises the systemic nature of innovation processes within the emerging context of ‘learning economies’. The key understandings relevant to a nation’s research system are drawn out from contemporary developments in the international literature on ‘learning economies’. Some of the implications for Australia are discussed. The aim is to provide readers with some indications of what to look for in considering options for the future of Australia’s research system. More detailed information on relevant aspects of Australia’s industrial and trade structure, the extent of the R&D effort in industry and on issues such as management capability can be obtained from (Marceau et al 1997). In the second part, broad elements of the Australian research system are reviewed in the light of findings from the literature. The central role of universities in the innovation and research systems is described. Actions that can be taken by both universities and governments are suggested, particularly regarding the need to build and maintain efficient information flows at local, national and international levels. The paper briefly points to the nature of a research system capable of contributing effectively to the wealth of the nation and indicates some possible directions for enabling Australia to meet the demands of, and profit from, a knowledge-based economy.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper presents an approach to predict the operating conditions of machine based on classification and regression trees (CART) and adaptive neuro-fuzzy inference system (ANFIS) in association with direct prediction strategy for multi-step ahead prediction of time series techniques. In this study, the number of available observations and the number of predicted steps are initially determined by using false nearest neighbor method and auto mutual information technique, respectively. These values are subsequently utilized as inputs for prediction models to forecast the future values of the machines’ operating conditions. The performance of the proposed approach is then evaluated by using real trending data of low methane compressor. A comparative study of the predicted results obtained from CART and ANFIS models is also carried out to appraise the prediction capability of these models. The results show that the ANFIS prediction model can track the change in machine conditions and has the potential for using as a tool to machine fault prognosis.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The stochastic simulation algorithm was introduced by Gillespie and in a different form by Kurtz. There have been many attempts at accelerating the algorithm without deviating from the behavior of the simulated system. The crux of the explicit τ-leaping procedure is the use of Poisson random variables to approximate the number of occurrences of each type of reaction event during a carefully selected time period, τ. This method is acceptable providing the leap condition, that no propensity function changes “significantly” during any time-step, is met. Using this method there is a possibility that species numbers can, artificially, become negative. Several recent papers have demonstrated methods that avoid this situation. One such method classifies, as critical, those reactions in danger of sending species populations negative. At most, one of these critical reactions is allowed to occur in the next time-step. We argue that the criticality of a reactant species and its dependent reaction channels should be related to the probability of the species number becoming negative. This way only reactions that, if fired, produce a high probability of driving a reactant population negative are labeled critical. The number of firings of more reaction channels can be approximated using Poisson random variables thus speeding up the simulation while maintaining the accuracy. In implementing this revised method of criticality selection we make use of the probability distribution from which the random variable describing the change in species number is drawn. We give several numerical examples to demonstrate the effectiveness of our new method.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Queensland University of Technology (QUT) was one of the first universities in Australia to establish an institutional repository. Launched in November 2003, the repository (QUT ePrints) uses the EPrints open source repository software (from Southampton) and has enjoyed the benefit of an institutional deposit mandate since January 2004. Currently (April 2012), the repository holds over 36,000 records, including 17,909 open access publications with another 2,434 publications embargoed but with mediated access enabled via the ‘Request a copy’ button which is a feature of the EPrints software. At QUT, the repository is managed by the library.QUT ePrints (http://eprints.qut.edu.au) The repository is embedded into a number of other systems at QUT including the staff profile system and the University’s research information system. It has also been integrated into a number of critical processes related to Government reporting and research assessment. Internally, senior research administrators often look to the repository for information to assist with decision-making and planning. While some statistics could be drawn from the advanced search feature and the existing download statistics feature, they were rarely at the level of granularity or aggregation required. Getting the information from the ‘back end’ of the repository was very time-consuming for the Library staff. In 2011, the Library funded a project to enhance the range of statistics which would be available from the public interface of QUT ePrints. The repository team conducted a series of focus groups and individual interviews to identify and prioritise functionality requirements for a new statistics ‘dashboard’. The participants included a mix research administrators, early career researchers and senior researchers. The repository team identified a number of business criteria (eg extensible, support available, skills required etc) and then gave each a weighting. After considering all the known options available, five software packages (IRStats, ePrintsStats, AWStats, BIRT and Google Urchin/Analytics) were thoroughly evaluated against a list of 69 criteria to determine which would be most suitable. The evaluation revealed that IRStats was the best fit for our requirements. It was deemed capable of meeting 21 out of the 31 high priority criteria. Consequently, IRStats was implemented as the basis for QUT ePrints’ new statistics dashboards which were launched in Open Access Week, October 2011. Statistics dashboards are now available at four levels; whole-of-repository level, organisational unit level, individual author level and individual item level. The data available includes, cumulative total deposits, time series deposits, deposits by item type, % fulltexts, % open access, cumulative downloads, time series downloads, downloads by item type, author ranking, paper ranking (by downloads), downloader geographic location, domains, internal v external downloads, citation data (from Scopus and Web of Science), most popular search terms, non-search referring websites. The data is displayed in charts, maps and table format. The new statistics dashboards are a great success. Feedback received from staff and students has been very positive. Individual researchers have said that they have found the information to be very useful when compiling a track record. It is now very easy for senior administrators (including the Deputy Vice Chancellor-Research) to compare the full-text deposit rates (i.e. mandate compliance rates) across organisational units. This has led to increased ‘encouragement’ from Heads of School and Deans in relation to the provision of full-text versions.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Current English-as-a-second and foreign-language (ESL/EFL) research has encouraged to treat each communicative macroskill separately due to space constraint, but the interrelationship among these skills (listening, speaking, reading, and writing) is not paid due attention. This study attempts to examine first the existing relationship among the four dominant skills, second the potential impact of reading background on the overall language proficiency, and finally the relationship between listening and overall language proficiency as listening is considered an overlooked/passive skill in the pedagogy of the second/foreign language classroom. However, the literature in language learning has revealed that listening skill has salient importance in both first and second language learning. The purpose of this study is to investigate the role of each of four skills in EFL learning and their existing interrelationships in an EFL setting. The outcome of 701 Iranian applicants undertaking International English Language Testing System (IELTS) in Tehran demonstrates that all communicative macroskills have varied correlations from moderate (reading and writing) to high (listening and reading). The findings also show that the applicants’ reading history assisted them in better performing at high stakes tests, and what is more, listening skill was strongly correlated with the overall language proficiency.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The term fashion system describes inter-relationships between production and consumption, illustrating how the production of fashion is a collective activity. For instance, Yuniya Kawamura (2011) notes systems for the production of fashion differ around the globe and are subject to constant change, and Jennifer Craik (1994, 6) draws attention to an ‘array of competing and intermeshing systems cutting across western and non-western cultures. In China, Shanghai’s nascent fashion system seeks to emulate the Eurocentric system of Fashion Weeks and industry support groups. It promises designers a platform for global competition, yet there are tensions from within. Interaction with a fashion system inevitably means becoming validated or legitimised. Legitimisation in turn depends upon gatekeepers who make aesthetic judgments about the status, quality, and cultural value of a designers work (Becker 2008). My paper offers a new perspective on legitimisation that is drawn mainly from my PhD research. I argue that some Chinese fashion designers are on the path to becoming global fashion designers because they have embraced a global aesthetic that resonates with the human condition, rather than the manufactured authenticity of a Eurocentric fashion system that perpetuates endless consumption. In this way, they are able to ‘self-legitimise’. I contend these designers are ‘designers for humans’, because they are able to look beyond the mythology of fashion brands, and the Eurocentric fashion system, where they explore the tensions of man and culture in their practice. Furthermore, their design ethos pursues beauty, truth and harmony in the Chinese philosophical sense, as well as incorporating financial return in a process that is still enacted through a fashion system. Accordingly, cultural tradition, heritage and modernity, while still valuable, have less impact on their practice.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The cryptographic hash function literature has numerous hash function definitions and hash function requirements, and many of them disagree. This survey talks about the various definitions, and takes steps towards cleaning up the literature by explaining how the field has evolved and accurately depicting the research aims people have today.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Introduction Since 1992 there have been several articles published on research on plastic scintillators for use in radiotherapy. Plastic scintillators are said to be tissue equivalent, temperature independent and dose rate independent [1]. Although their properties were found to be promising for measurements in megavoltage X-ray beams there were some technical difficulties with regards to its commercialisation. Standard Imaging has produced the first commercial system which is now available for use in a clinical setting. The Exradin W1 scintillator device uses a dual fibre system where one fibre is connected to the Plastic Scintillator and the other fibre only measures Cerenkov radiation [2]. This paper presents results obtained during commissioning of this dosimeter system. Methods All tests were performed on a Novalis Tx linear accelerator equipped with a 6 MV SRS photon beam and conventional 6 and 18 MV X-ray beams. The following measurements were performed in a Virtual Water phantom at a depth of dose maximum. Linearity: The dose delivered was varied between 0.2 and 3.0 Gy for the same field conditions. Dose rate dependence: For this test the repetition rate of the linac was varied between 100 and 1,000 MU/min. A nominal dose of 1.0 Gy was delivered for each rate. Reproducibility: A total of five irradiations for the same setup. Results The W1 detector gave a highly linear relationship between dose and the number of Monitor Units delivered for a 10 9 10 cm2 field size at a SSD of 100 cm. The linearity was within 1 % for the high dose end and about 2 % for the very low dose end. For the dose rate dependence, the dose measured as a function of repetition the rate (100–1,000 MU/min) gave a maximum deviation of 0.9 %. The reproducibility was found to be better than 0.5 %. Discussion and conclusions The results for this system look promising so far being a new dosimetry system available for clinical use. However, further investigation is needed to produce a full characterisation prior to use in megavoltage X-ray beams.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Vehicular Ad-hoc Networks (VANETs) can make roads safer, cleaner, and smarter. It can offer a wide range of services, which can be safety and non-safety related. Many safety-related VANETs applications are real-time and mission critical, which would require strict guarantee of security and reliability. Even non-safety related multimedia applications, which will play an important role in the future, will require security support. Lack of such security and privacy in VANETs is one of the key hindrances to the wide spread implementations of it. An insecure and unreliable VANET can be more dangerous than the system without VANET support. So it is essential to make sure that “life-critical safety” information is secure enough to rely on. Securing the VANETs along with appropriate protection of the privacy drivers or vehicle owners is a very challenging task. In this work we summarize the attacks, corresponding security requirements and challenges in VANETs. We also present the most popular generic security policies which are based on prevention as well detection methods. Many VANETs applications require system-wide security support rather than individual layer from the VANETs’ protocol stack. In this work we will review the existing works in the perspective of holistic approach of security. Finally, we will provide some possible future directions to achieve system-wide security as well as privacy-friendly security in VANETs.