38 resultados para 6S code


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This book aims to explore the nature of code-switching. The purpose is to find out how this works and thereby inform language-teaching strategies. It focuses on Chinese / English bilinguals with special emphasis on younger students living in two linguistic worlds (Chinese and English). The book examines code-switching in relation to several aspects: grammatical structures, tonal facilitation, contextual factors, speakers' social background aspects and their participation in school language programs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objectives. We examined whether people moving into a housing development designed according to a state government livable neighborhoods subdivision code engage in more walking than do people who move to other types of developments.

Methods. In a natural experiment of 1813 people building homes in 73 new housing developments in Perth, Western Australia, we surveyed participants before and then 12 and 36 months after moving. We measured self-reported walking using the Neighborhood Physical Activity Questionnaire and collected perceptions of the environment and self-selection factors. We calculated objective measures of the built environment using a Geographic Information System.

Results.
After relocation, participants in livable versus conventional developments had greater street connectivity, residential density, land use mix, and access to destinations and more positive perceptions of their neighborhood (all P < .05). However, there were no significant differences in walking over time by type of development (P > .05).

Conclusions.
Implementation of the Livable Neighborhoods Guidelines produced more supportive environments; however, the level of intervention was insufficient to encourage more walking. Evaluations of new urban planning policies need to incorporate longer term follow-up to allow time for new neighborhoods to develop.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Malicious code is a threat to computer systems globally. In this paper, we outline the evolution of malicious code attacks. The threat is evolving, leaving challenges for attackers to improve attack techniques and for researchers and security specialists to improve detection accuracy. We present a novel architecture for an effective defense against malicious code attack, inspired by the human immune system. We introduce two phases of program execution: Adolescent and Mature Phase. The first phase uses a malware profile matching mechanism, whereas the second phase uses a program profile matching mechanism. Both mechanisms are analogous to the innate immune system

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper proposes an optimal linear quadratic Gaussian (LQG) controller for D-STATCOM to improve the dynamic performance of distribution networks with photovoltaic generators. The controller is designed based on the H∞ norm of the uncertain system. The change in system model due to the variation of load compositions in the composite load is considered as an uncertain term in the design algorithm. The performance of the designed controller is demonstrated on a widely used test system. Simulation results indicate that the proposed controller can be a potential solution for improving the voltage stability of distribution networks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Here we provide MATLAB code used to simulate drift and selection between and within individuals, which has been used to investigate mitochondrial haplotype frequency shifts in Sturnus vulgaris. Also provided is a microsatellite data set used to assess whether empirical allele frequency shifts were likely to be caused by admixture. These files support and upcoming publication, which concludes that within-individuals selection on mitochondrial DNA best explains empirical data.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Ordinary differential equations are used for modelling a wide range of dynamic systems. Even though there are many graphical software applications for this purpose, a fully customised solution for all problems is code-level programming of the model and solver. In this project, a free and open source C++ framework is designed to facilitate modelling in native code environment and fulfill the common simulation needs of control and many other engineering and science applications. The solvers of this project are obtained from ODEINT and specialised for Armadillo matrix library to provide an easy syntax and a fast execution. The solver code is minimised and its modification for users have become easier. There are several features added to the solvers such as controlling maximum step size, informing the solver about sudden input change and forcing custom times into the results and calling a custom method at these points. The comfort of the model designer, code readability, extendibility and model isolation have been considered in the structure of this framework. The application manages the output results, exporting and plotting them. Modifying the model has become more practical and a portion of corresponding codes are updated automatically. A set of libraries is provided for generation of output figures, matrix hashing, control system functions, profiling, etc. In this paper, an example of using this framework for a classical washout filter model is explained.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Code injection attacks are considered serious threats to the Internet users. In this type of attack the attacker injects malicious codes in the user programs to change or divert the execution flows. In this paper we explore the contemporary defence strategies against code injection attacks (CIAs) and underline their limitations. To overcome these limitations, we suggest a number of countermeasure mechanisms for protecting from CIAs. Our key idea relies on the multiplexing technique to preserve the exact return code to ensure the integrity of program execution trace of shell code. This technique also maintains a FIFO (first in first out) queue to defeat the conflict state when multiple caller method makes a call simultaneously. Finally, our technique can provide better performance, in terms of protection and speed, in some point compared to the CFI (control flow integrity) as well as CPM (code pointer masking) techniques.