9 resultados para Execution context
em Greenwich Academic Literature Archive - UK
Resumo:
The availability of a very accurate dependence graph for a scalar code is the basis for the automatic generation of an efficient parallel implementation. The strategy for this task which is encapsulated in a comprehensive data partitioning code generation algorithm is described. This algorithm involves the data partition, calculation of assignment ranges for partitioned arrays, addition of a comprehensive set of execution control masks, altering loop limits, addition and optimisation of communications for all data. In this context, the development and implementation of strategies to merge communications wherever possible has proved an important feature in producing efficient parallel implementations for numerical mesh based codes. The code generation strategies described here are embedded within the Computer Aided Parallelisation tools (CAPTools) software as a key part of a toolkit for automating as much as possible of the parallelisation process for mesh based numerical codes. The algorithms used enables parallelisation of real computational mechanics codes with only minor user interaction and without any prior manual customisation of the serial code to suit the parallelisation tool.
Resumo:
This special issue "Formal Approaches to Legal Evidence" of the Artificial Intelligence and Law, September 2001, Vol. 9, Issue 2-3, which was guest edited by Ephraim Nissan.
Resumo:
Optimisation in wireless sensor networks is necessary due to the resource constraints of individual devices, bandwidth limits of the communication channel, relatively high probably of sensor failure, and the requirement constraints of the deployed applications in potently highly volatile environments. This paper presents BioANS, a protocol designed to optimise a wireless sensor network for resource efficiency as well as to meet a requirement common to a whole class of WSN applications - namely that the sensor nodes are dynamically selected on some qualitative basis, for example the quality by which they can provide the required context information. The design of BioANS has been inspired by the communication mechanisms that have evolved in natural systems. The protocol tolerates randomness in its environment, including random message loss, and incorporates a non-deterministic ’delayed-bids’ mechanism. A simulation model is used to explore the protocol’s performance in a wide range of WSN configurations. Characteristics evaluated include tolerance to sensor node density and message loss, communication efficiency, and negotiation latency .
Resumo:
Within the building evacuation context, wayfinding describes the process in which an individual located within an arbitrarily complex enclosure attempts to find a path which leads them to relative safety, usually the exterior of the enclosure. Within most evacuation modelling tools, wayfinding is completely ignored; agents are either assigned the shortest distance path or use a potential field to find the shortest path to the exits. In this paper a novel wayfinding technique that attempts to represent the manner in which people wayfind within structures is introduced and demonstrated through two examples. The first step is to encode the spatial information of the enclosure in terms of a graph. The second step is to apply search algorithms to the graph to find possible routes to the destination and assign a cost to the routes based on their personal route preferences such as "least time" or "least distance" or a combination of criteria. The third step is the route execution and refinement. In this step, the agent moves along the chosen route and reassesses the route at regular intervals and may decide to take an alternative path if the agent determines that an alternate route is more favourable e.g. initial path is highly congested or is blocked due to fire.
Resumo:
Evacuation models have been playing an important function in the transition process from prescriptive fire safety codes to performance-based ones over the last three decades. In fact, such models became also useful tools in different tasks within fire safety engineering field, such as fire risks assessment and fire investigation. However, there are some difficulties in this process when using these models. For instance, during the evacuation modelling analysis, a common problem faced by fire safety engineers concerns the number of simulations which needs to be performed. In other terms, which fire designs (i.e., scenarios) should be investigated using the evacuation models? This type of question becomes more complex when specific issues such as the optimal positioning of exits within an arbitrarily structure needs to be addressed. Therefore, this paper presents a methodology which combines the use of evacuation models with numerical techniques used in the operational research field, such as Design of Experiments (DoE), Response Surface Models (RSM) and the numerical optimisation techniques. The methodology here presented is restricted to evacuation modelling analysis, nevertheless this same concept can be extended to fire modelling analysis.
Resumo:
[This is a summary of an Oral Presentation] The study explored the expression of Big 5 personality traits in three different social contexts (with parents friends and work colleagues) to test the prediction that personality is socially variable due to the motivation to ‘fit in’. The questionnaire-based method produced results that support this hypothesis; all Big 5 traits were significantly variable across contexts with Conscientiousness the least variable and Extraversion possessiveness. The results indicated that females reported being more distressed than males and older respondents reported being less distressed then younger respondents. The findings from this study contribute to the literature on online infidelity in terms of understanding differences in the way it is perceived.
Resumo:
Internationally literature emphasises concern regarding the phenomenon of violence and aggression within the emergency field. This paper emphasises the important role education and training may play in reducing the risk of staff being exposed to violent or aggressive experiences. Furthermore, the paper emphasises, explores and discusses well recognised theories relating to aggression development. These theories can be used to explain both organisational strategies designed to minimise aggression in the emergency department and situational factors contributing to the development of aggressive interactions.