54 resultados para Distributed computer-controlled systems
Resumo:
Inter-component communication has always been of great importance in the design of software architectures and connectors have been considered as first-class entities in many approaches [1][2][3]. We present a novel architectural style that is derived from the well-established domain of computer networks. The style adopts the inter-component communication protocol in a novel way that allows large scale software reuse. It mainly targets real-time, distributed, concurrent, and heterogeneous systems.
Resumo:
Systematic principal component analysis (PCA) methods are presented in this paper for reliable islanding detection for power systems with significant penetration of distributed generations (DGs), where synchrophasors recorded by Phasor Measurement Units (PMUs) are used for system monitoring. Existing islanding detection methods such as Rate-of-change-of frequency (ROCOF) and Vector Shift are fast for processing local information, however with the growth in installed capacity of DGs, they suffer from several drawbacks. Incumbent genset islanding detection cannot distinguish a system wide disturbance from an islanding event, leading to mal-operation. The problem is even more significant when the grid does not have sufficient inertia to limit frequency divergences in the system fault/stress due to the high penetration of DGs. To tackle such problems, this paper introduces PCA methods for islanding detection. Simple control chart is established for intuitive visualization of the transients. A Recursive PCA (RPCA) scheme is proposed as a reliable extension of the PCA method to reduce the false alarms for time-varying process. To further reduce the computational burden, the approximate linear dependence condition (ALDC) errors are calculated to update the associated PCA model. The proposed PCA and RPCA methods are verified by detecting abnormal transients occurring in the UK utility network.
Resumo:
Motivated by the need for designing efficient and robust fully-distributed computation in highly dynamic networks such as Peer-to-Peer (P2P) networks, we study distributed protocols for constructing and maintaining dynamic network topologies with good expansion properties. Our goal is to maintain a sparse (bounded degree) expander topology despite heavy {\em churn} (i.e., nodes joining and leaving the network continuously over time). We assume that the churn is controlled by an adversary that has complete knowledge and control of what nodes join and leave and at what time and has unlimited computational power, but is oblivious to the random choices made by the algorithm. Our main contribution is a randomized distributed protocol that guarantees with high probability the maintenance of a {\em constant} degree graph with {\em high expansion} even under {\em continuous high adversarial} churn. Our protocol can tolerate a churn rate of up to $O(n/\poly\log(n))$ per round (where $n$ is the stable network size). Our protocol is efficient, lightweight, and scalable, and it incurs only $O(\poly\log(n))$ overhead for topology maintenance: only polylogarithmic (in $n$) bits needs to be processed and sent by each node per round and any node's computation cost per round is also polylogarithmic. The given protocol is a fundamental ingredient that is needed for the design of efficient fully-distributed algorithms for solving fundamental distributed computing problems such as agreement, leader election, search, and storage in highly dynamic P2P networks and enables fast and scalable algorithms for these problems that can tolerate a large amount of churn.
Resumo:
Tail biting is a serious animal welfare and economic problem in pig production. Tail docking, which reduces but does not eliminate tail biting, remains widespread. However, in the EU tail docking may not be used routinely, and some 'alternative' forms of pig production and certain countries do not allow tail docking at all. Against this background, using a novel approach focusing on research where tail injuries were quantified, we review the measures that can be used to control tail biting in pigs without tail docking. Using this strict criterion, there was good evidence that manipulable substrates and feeder space affect damaging tail biting. Only epidemiological evidence was available for effects of temperature and season, and the effect of stocking density was unclear. Studies suggest that group size has little effect, and the effects of nutrition, disease and breed require further investigation. The review identifies a number of knowledge gaps and promising avenues for future research into prevention and mitigation. We illustrate the diversity of hypotheses concerning how different proposed risk factors might increase tail biting through their effect on each other or on the proposed underlying processes of tail biting. A quantitative comparison of the efficacy of different methods of provision of manipulable materials, and a review of current practices in countries and assurance schemes where tail docking is banned, both suggest that daily provision of small quantities of destructible, manipulable natural materials can be of considerable benefit. Further comparative research is needed into materials, such as ropes, which are compatible with slatted floors. Also, materials which double as fuel for anaerobic digesters could be utilised. As well as optimising housing and management to reduce risk, it is important to detect and treat tail biting as soon as it occurs. Early warning signs before the first bloody tails appear, such as pigs holding their tails tucked under, could in future be automatically detected using precision livestock farming methods enabling earlier reaction and prevention of tail damage. However, there is a lack of scientific studies on how best to respond to outbreaks: the effectiveness of, for example, removing biters and/or bitten pigs, increasing enrichment, or applying substances to tails should be investigated. Finally, some breeding companies are exploring options for reducing the genetic propensity to tail bite. If these various approaches to reduce tail biting are implemented we propose that the need for tail docking will be reduced. © 2014 The Animal Consortium.
Resumo:
Background: Many school-based interventions are being delivered in the absence of evidence of effectiveness (Snowling & Hulme, 2011, Br. J. Educ. Psychol., 81, 1).Aim: This study sought to address this oversight by evaluating the effectiveness of the commonly used the Lexia Reading Core5 intervention, with 4- to 6-year-old pupils in Northern Ireland.Sample: A total of 126 primary school pupils in year 1 and year 2 were screened on the Phonological Assessment Battery 2nd Edition (PhAB-2). Children were recruited from the equivalent year groups to Reception and Year 1 in England and Wales, and Pre-kindergarten and Kindergarten in North America.
Methods: A total of 98 below-average pupils were randomized (T0) to either an 8-week block (inline image = 647.51 min, SD = 158.21) of daily access to Lexia Reading Core5 (n = 49) or a waiting-list control group (n = 49). Assessment of phonological skills was completed at post-intervention (T1) and at 2-month follow-up (T2) for the intervention group only.
Results: Analysis of covariance which controlled for baseline scores found that the Lexia Reading Core5 intervention group made significantly greater gains in blending, F(1, 95) = 6.50, p = .012, partial η2 = .064 (small effect size) and non-word reading, F(1, 95) = 7.20, p = .009, partial η2 = .070 (small effect size). Analysis of the 2-month follow-up of the intervention group found that all group treatment gains were maintained. However, improvements were not uniform among the intervention group with 35% failing to make progress despite access to support. Post-hoc analysis revealed that higher T0 phonological working memory scores predicted improvements made in phonological skills.
Conclusions: An early-intervention, computer-based literacy program can be effective in boosting the phonological skills of 4- to 6-year-olds, particularly if these literacy difficulties are not linked to phonological working memory deficits.