764 resultados para managed tasks
Resumo:
Heterogeneous computing technologies, such as multi-core CPUs, GPUs and FPGAs can provide significant performance improvements. However, developing applications for these technologies often results in coupling applications to specific devices, typically through the use of proprietary tools. This paper presents SHEPARD, a compile time and run-time framework that decouples application development from the target platform and enables run-time allocation of tasks to heterogeneous computing devices. Through the use of special annotated functions, called managed tasks, SHEPARD approximates a task's performance on available devices, and coupled with the approximation of current device demand, decides which device can satisfy the task with the lowest overall execution time. Experiments using a task parallel application, based on an in-memory database, demonstrate the opportunity for automatic run-time task allocation to achieve speed-up over a static allocation to a single specific device. © 2014 IEEE.
Resumo:
In-Memory Databases (IMDBs), such as SAP HANA, enable new levels of database performance by removing the disk bottleneck and by compressing data in memory. The consequence of this improved performance means that reports and analytic queries can now be processed on demand. Therefore, the goal is now to provide near real-time responses to compute and data intensive analytic queries. To facilitate this, much work has investigated the use of acceleration technologies within the database context. While current research into the application of these technologies has yielded positive results, they have tended to focus on single database tasks or on isolated single user requests. This paper uses SHEPARD, a framework for managing accelerated tasks across shared heterogeneous resources, to introduce acceleration into an IMDB. Results show how, using SHEPARD, multiple simultaneous user queries all receive speed-up by using a shared pool of accelerators. Results also show that offloading analytic tasks onto accelerators can have indirect benefits for other database workloads by reducing contention for CPU resources.
Resumo:
The main objective was to compare the environmental impacts of a building undergoing refurbishment both before and after the refurbishment and to assist in the design of the refurbishment with what is learned.
Resumo:
Objectives. Intrusive memories of extreme trauma can disrupt a stepwise approach to imaginal exposure. Concurrent tasks that load the visuospatial sketchpad (VSSP) of working memory reduce the vividness of recalled images. This study tested whether relief of distress from competing VSSP tasks during imaginal exposure is at the cost of impaired desensitization . Design. This study examined repeated exposure to emotive memories using 18 unselected undergraduates and a within-subjects design with three exposure conditions (Eye Movement, Visual Noise, Exposure Alone) in random, counterbalanced order. Method. At baseline, participants recalled positive and negative experiences, and rated the vividness and emotiveness of each image. A different positive and negative recollection was then used for each condition. Vividness and emotiveness were rated after each of eight exposure trials. At a post-exposure session 1 week later, participants rated each image without any concurrent task. Results. Consistent with previous research, vividness and distress during imaging were lower during Eye Movements than in Exposure Alone, with passive visual interference giving intermediate results. A reduction in emotional responses from Baseline to Post was of similar size for the three conditions. Conclusion. Visuospatial tasks may offer a temporary response aid for imaginal exposure without affecting desensitization.
Resumo:
Despite the facts that vehicle incidents continue to be the most common mechanism for Australian compensated fatalities and that employers have statutory obligations to provide safe workplaces, very few organisations are proactively and comprehensively managing their work-related road risks. Unfortunately, limited guidance is provided in the existing literature to assist practitioners in managing work-related road risks. The current research addresses this gap in the literature. To explore how work-related road safety can be enhanced, three studies were conducted. Study one explored the effectiveness of a range of risk management initiatives and whether comprehensive risk management practices were associated with safety outcomes. Study two explored barriers to, and facilitators for, accepting risk management initiatives. Study three explored the influence of organisational factors on road safety outcomes to identify optimal work environments for managing road risks. To maximise the research sample and increase generalisability, the studies were designed to allow data collection to be conducted simultaneously drawing upon the same sample obtained from four Australian organisations. Data was collected via four methods. A structured document review of published articles was conducted to identify what outcomes have been observed in previously investigated work-related road safety initiatives. The documents reviewed collectively assessed the effectiveness of 19 work-related road safety initiatives. Audits of organisational practices and process operating within the four researched organisations were conducted to identify whether organisations with comprehensive work-related road risk management practices and processes have better safety outcomes than organisations with limited risk management practices and processes. Interviews were conducted with a sample of 24 participants, comprising 16 employees and eight managers. The interviews were conducted to identify what barriers and facilitators within organisations are involved in implementing work-related road safety initiatives and whether differences in fleet safety climate, stage of change and safety ownership relate to work-related road safety outcomes. Finally, questionnaires were administered to a sample of 679 participants. The questionnaires were conducted to identify which initiatives are perceived by employees to be effective in managing work-related road risks and whether differences in fleet safety climate, stage of change and safety ownership relate to work-related road safety outcomes. Seven research questions were addressed in the current research project. The key findings with respect to each of the research questions are presented below. Research question one: What outcomes have been observed in previously investigated work-related road safety initiatives? The structured document review indicated that initiatives found to be positively associated with occupational road safety both during and after the intervention period included: a pay rise; driver training; group discussions; enlisting employees as community road safety change agents; safety reminders; and group and individual rewards. Research question two: Which initiatives are perceived by employees to be effective in managing work-related road risks? Questionnaire findings revealed that employees believed occupational road risks could best be managed through making vehicle safety features standard, providing practical driver skills training and through investigating serious vehicle incidents. In comparison, employees believed initiatives including signing a promise card commitment to drive safely, advertising the organisation’s phone number on vehicles and consideration of driving competency in staff selection process would have limited effectiveness in managing occupational road safety. Research question three: Do organisations with comprehensive work-related road risk management practices and processes have better safety outcomes than organisations with limited risk management practices and processes? The audit identified a difference among the organisations in their management of work-related road risks. Comprehensive risk management practices were associated with employees engaging in overall safer driving behaviours, committing less driving errors, and experiencing less fatigue and distraction issues when driving. Given that only four organisations participated in this research, these findings should only be considered as preliminary. Further research should be conducted to explore the relationship between comprehensiveness of risk management practices and road safety outcomes with a larger sample of organisations. Research question four: What barriers and facilitators within organisations are involved in implementing work-related road safety initiatives? The interviews identified that employees perceived six organisational characteristics as potential barriers to implementing work-related road safety initiatives. These included: prioritisation of production over safety; complacency towards work-related road risks; insufficient resources; diversity; limited employee input in safety decisions; and a perception that road safety initiatives were an unnecessary burden. In comparison, employees perceived three organisational characteristics as potential facilitators to implementing work-related road safety initiatives. These included: management commitment; the presence of existing systems that could support the implementation of initiatives; and supportive relationships. Research question five: Do differences in fleet safety climate relate to work-related road safety outcomes? The interviews and questionnaires identified that organisational climates with high management commitment, support for managing work demands, appropriate safety rules and safety communication were associated with employees who engaged in safer driving behaviours. Regression analyses indicated that as participants’ perceptions of safety climate increased, the corresponding likelihood of them engaging in safer driving behaviours increased. Fleet safety climate was perceived to influence road safety outcomes through several avenues. Some of these included: the allocation of sufficient resources to manage occupational road risks; fostering a supportive environment of mutual responsibility; resolving safety issues openly and fairly; clearly communicating to employees that safety is the top priority; and developing appropriate work-related road safety policies and procedures. Research question six: Do differences in stage of change relate to work-related road safety outcomes? The interviews and questionnaires identified that participants’ perceptions of initiative effectiveness were found to vary with respect to their individual stage of readiness, with stage-matched initiatives being perceived most effective. In regards to safety outcomes, regression analyses identified that as participants’ progress through the stages of change, the corresponding likelihood of them being involved in vehicle crashes decreases. Research question seven: Do differences in safety ownership relate to work-related road safety outcomes? The interviews and questionnaires revealed that management of road risks is often given less attention than other areas of health and safety management in organisations. In regards to safety outcomes, regression analyses identified that perceived authority and perceived shared ownership both emerged as significant independent predictors of self-reported driving behaviours pertaining to fatigue and distractions. The regression models indicated that as participants’ perceptions of the authority of the person managing road risks increases, and perceptions of shared ownership of safety tasks increases, the corresponding likelihood of them engaging in driving while fatigued or multitasking while driving decreases. Based on the findings from the current research, the author makes several recommendations to assist practitioners in developing proactive and comprehensive approaches to managing occupational road risks. The author also suggests several avenues for future research in the area of work-related road safety.
Resumo:
Services in the form of business services or IT-enabled (Web) Services have become a corporate asset of high interest in striving towards the agile organisation. However, while the design and management of a single service is widely studied and well understood, little is known about how a set of services can be managed. This gap motivated this paper, in which we explore the concept of Service Portfolio Management. In particular, we propose a Service Portfolio Management Framework that explicates service portfolio goals, tasks, governance issues, methods and enablers. The Service Portfolio Management Framework is based upon a thorough analysis and consolidation of existing, well-established portfolio management approaches. From an academic point of view, the Service Portfolio Management Framework can be positioned as an extension of portfolio management conceptualisations in the area of service management. Based on the framework, possible directions for future research are provided. From a practical point of view, the Service Portfolio Management Framework provides an organisation with a novel approach to managing its emerging service portfolios.
Resumo:
Managed execution frameworks, such as the.NET Common Language Runtime or the Java Virtual Machine, provide a rich environment for the creation of application programs. These execution environments are ideally suited for languages that depend on type-safety and the declarative control of feature access. Furthermore, such frameworks typically provide a rich collection of library primitives specialized for almost every domain of application programming. Thus, when a new language is implemented on one of these frameworks it becomes necessary to provide some kind of mapping from the new language to the libraries of the framework. The design of such mappings is challenging since the type-system of the new language may not span the domain exposed in the library application programming interfaces (APIs). The nature of these design considerations was clarified in the implementation of the Gardens Point Component Pascal (gpcp) compiler. In this paper we describe the issues, and the solutions that we settled on in this case. The problems that were solved have a wider applicability than just our example, since they arise whenever any similar language is hosted in such an environment.
Resumo:
Computer vision is much more than a technique to sense and recover environmental information from an UAV. It should play a main role regarding UAVs’ functionality because of the big amount of information that can be extracted, its possible uses and applications, and its natural connection to human driven tasks, taking into account that vision is our main interface to world understanding. Our current research’s focus lays on the development of techniques that allow UAVs to maneuver in spaces using visual information as their main input source. This task involves the creation of techniques that allow an UAV to maneuver towards features of interest whenever a GPS signal is not reliable or sufficient, e.g. when signal dropouts occur (which usually happens in urban areas, when flying through terrestrial urban canyons or when operating on remote planetary bodies), or when tracking or inspecting visual targets—including moving ones—without knowing their exact UMT coordinates. This paper also investigates visual serving control techniques that use velocity and position of suitable image features to compute the references for flight control. This paper aims to give a global view of the main aspects related to the research field of computer vision for UAVs, clustered in four main active research lines: visual serving and control, stereo-based visual navigation, image processing algorithms for detection and tracking, and visual SLAM. Finally, the results of applying these techniques in several applications are presented and discussed: this study will encompass power line inspection, mobile target tracking, stereo distance estimation, mapping and positioning.
Resumo:
Purpose: There have been few studies of visual temporal processing of myopic eyes. This study investigated the visual performance of emmetropic and myopic eyes using a backward visual masking location task. Methods: Data were collected for 39 subjects (15 emmetropes, 12 stable myopes, 12 progressing myopes). In backward visual masking, a target’s visibility is reduced by a mask presented in quick succession ‘after’ the target. The target and mask stimuli were presented at different interstimulus intervals (from 12 to 300 ms). The task involved locating the position of a target letter with both a higher (seven per cent) and a lower (five per cent) contrast. Results: Emmetropic subjects had significantly better performance for the lower contrast location task than the myopes (F2,36 = 22.88; p < 0.001) but there was no difference between the progressing and stable myopic groups (p = 0.911). There were no differences between the groups for the higher contrast location task (F2,36 = 0.72, p = 0.495). No relationship between task performance and either the magnitude of myopia or axial length was found for either task. Conclusions: A location task deficit was observed in myopes only for lower contrast stimuli. Both emmetropic and myopic groups had better performance for the higher contrast task compared to the lower contrast task, with myopes showing considerable improvement. This suggests that five per cent contrast may be the contrast threshold required to bias the task towards the magnocellular system (where myopes have a temporal processing deficit). Alternatively, the task may be sensitive to the contrast sensitivity of the observer.
Resumo:
Several brain imaging studies have assumed that response conflict is present in Stroop tasks. However, this has not been demonstrated directly. We examined the time-course of stimulus and response conflict resolution in a numerical Stroop task by combining single-trial electro-myography (EMG) and event-related brain potentials (ERP). EMG enabled the direct tracking of response conflict and the peak latency of the P300 ERP wave was used to index stimulus conflict. In correctly responded trials of the incongruent condition EMG detected robust incorrect response hand activation which appeared consistently in single trials. In 50–80% of the trials correct and incorrect response hand activation coincided temporally, while in 20–50% of the trials incorrect hand activation preceded correct hand activation. EMG data provides robust direct evidence for response conflict. However, congruency effects also appeared in the peak latency of the P300 wave which suggests that stimulus conflict also played a role in the Stroop paradigm. Findings are explained by the continuous flow model of information processing: Partially processed task-irrelevant stimulus information can result in stimulus conflict and can prepare incorrect response activity. A robust congruency effect appeared in the amplitude of incongruent vs. congruent ERPs between 330–400 ms, this effect may be related to the activity of the anterior cingulate cortex.
Resumo:
The critical problem of student disengagement and underachievement in the middle years of schooling (Years 4 . 9) has focussed attention on the quality of educational programs in schools, in Australia and elsewhere. The loss of enthusiasm for science in the middle years is particularly problematic given the growing demand for science professionals. Reshaping middle years programs has included an emphasis on integrating Information and Communication Technologies (ICTs) and improving assessment practices to engage students in higher cognitive processes and enhance academic rigour. Understanding the nature of academic rigour and how to embed it in students. science assessment tasks that incorporate the use of ICTs could enable teachers to optimise the quality of the learning environment. However, academic rigour is not clearly described or defined in the literature and there is little empirical evidence upon which researchers and teachers could draw to enhance understandings. This study used a collective case study design to explore teachers' understandings of academic rigour within science assessment tasks. The research design is based on a conceptual framework that is underpinned by socio-cultural theory. Three methods were used to collect data from six middle years teachers and their students. These methods were a survey, focus group discussion with teachers and a group of students and individual semi-structured interviews with teachers. Findings of the case study revealed six criteria of academic rigour, namely, higher order thinking, alignment, building on prior knowledge, scaffolding, knowledge construction and creativity. Results showed that the middle years teachers held rich understandings of academic rigour that led to effective utilisation of ICTs in science assessment tasks. Findings also indicated that teachers could further enhance their understandings of academic rigour in some aspects of each of the criteria. In particular, this study found that academic rigour could have been further optimised by: promoting more thoughtful discourse and interaction to foster higher order thinking; increasing alignment between curriculum, pedagogy, and assessment, and students. prior knowledge; placing greater emphasis on identifying, activating and building on prior knowledge; better differentiating the level of scaffolding provided and applying it more judiciously; fostering creativity throughout tasks; enhancing teachers‟ content knowledge and pedagogical content knowledge, and providing more in-depth coverage of fewer topics to support knowledge construction. Key contributions of this study are a definition and a model which clarify the nature of academic rigour.
Resumo:
Mobile ad-hoc networks (MANETs) are temporary wireless networks useful in emergency rescue services, battlefields operations, mobile conferencing and a variety of other useful applications. Due to dynamic nature and lack of centralized monitoring points, these networks are highly vulnerable to attacks. Intrusion detection systems (IDS) provide audit and monitoring capabilities that offer the local security to a node and help to perceive the specific trust level of other nodes. We take benefit of the clustering concept in MANETs for the effective communication between nodes, where each cluster involves a number of member nodes and is managed by a cluster-head. It can be taken as an advantage in these battery and memory constrained networks for the purpose of intrusion detection, by separating tasks for the head and member nodes, at the same time providing opportunity for launching collaborative detection approach. The clustering schemes are generally used for the routing purposes to enhance the route efficiency. However, the effect of change of a cluster tends to change the route; thus degrades the performance. This paper presents a low overhead clustering algorithm for the benefit of detecting intrusion rather than efficient routing. It also discusses the intrusion detection techniques with the help of this simplified clustering scheme.