995 resultados para multiple-valued logic
Resumo:
Recent epidemiologic studies have suggested that ultraviolet radiation (UV) may protect against non-Hodgkin lymphoma (NHL), but few, if any, have assessed multiple indicators of ambient and personal UV exposure. Using the US Radiologic Technologists study, we examined the association between NHL and self-reported time outdoors in summer, as well as average year-round and seasonal ambient exposures based on satellite estimates for different age periods, and sun susceptibility in participants who had responded to two questionnaires (1994–1998, 2003–2005) and who were cancer-free as of the earlier questionnaire. Using unconditional logistic regression, we estimated the odds ratio (OR) and 95% confidence intervals for 64,103 participants with 137 NHL cases. Self-reported time outdoors in summer was unrelated to risk. Lower risk was somewhat related to higher average year-round and winter ambient exposure for the period closest in time, and prior to, diagnosis (ages 20–39). Relative to 1.0 for the lowest quartile of average year-round ambient UV, the estimated OR for successively higher quartiles was 0.68 (0.42–1.10); 0.82 (0.52–1.29); and 0.64 (0.40–1.03), p-trend = 0.06), for this age period. The lower NHL risk associated with higher year-round average and winter ambient UV provides modest additional support for a protective relationship between UV and NHL.
Resumo:
Students with learning disabilities (LD) often experience significant feelings of loneliness. There is some evidence to suggest that these feelings of loneliness may be related to social difficulties that are linked to their learning disability. Adolescents experience more loneliness than any other age group, primarily because this is a time of identity formation and self-evaluation. Therefore, adolescents with learning disabilities are highly likely to experience the negative feelings of loneliness. Many areas of educational research have highlighted the impact of negative feelings on learning. This begs the question, =are adolescents with learning disabilities doubly disadvantaged in regard to their learning?‘ That is, if their learning experience is already problematic, does loneliness exacerbate these learning difficulties? This thesis reveals the findings of a doctoral project which examined this complicated relationship between loneliness and classroom participation using a social cognitive framework. In this multiple case-study design, narratives were constructed using classroom observations and interviews which were conducted with 4 adolescent students (2 girls and 2 boys, from years 9-12) who were identified as likely to be experiencing learning disabilities. Discussion is provided on the method used to identify students with learning disabilities and the related controversy of using disability labels. A key aspect of the design was that it allowed the students to relate their school experiences and have their stories told. The design included an ethnographic element in its focus on the interactions of the students within the school as a culture and elements of narrative inquiry were used, particularly in reporting the results. The narratives revealed all participants experienced problematic social networks. Further, an alarmingly high level of bullying was discovered. Participants reported that when they were feeling rejected or were missing a valued other they had little cognitive energy for learning and did not want to be in school. Absenteeism amongst the group was high, but this was also true for the rest of the school population. A number of relationships emerged from the narratives using social cognitive theory. These relationships highlighted the impact of cognitive, behavioural and environmental factors in the school experience of lonely students with learning disabilities. This approach reflects the social model of disability that frames the research.
Resumo:
Symmetric multi-processor (SMP) systems, or multiple-CPU servers, are suitable for implementing parallel algorithms because they employ dedicated communication devices to enhance the inter-processor communication bandwidth, so that a better performance can be obtained. However, the cost for a multiple-CPU server is high and therefore, the server is usually shared among many users. The work-load due to other users will certainly affect the performance of the parallel programs so it is desirable to derive a method to optimize parallel programs under different loading conditions. In this paper, we present a simple method, which can be applied in SPMD type parallel programs, to improve the speedup by controlling the number of threads within the programs.
Resumo:
Background Delivering effective multiple health behavior interventions to large numbers of adults with chronic conditions via primary care settings is a public health priority. Purpose Within a 12-month, telephone-delivered diet and physical activity intervention with multiple behavioral outcomes, we examined the extent and co-variation of multiple health behavior change. Methods A cluster-randomized trial with 434 patients with type 2 diabetes or hypertension were recruited from 10 general practices, which were randomized to receive telephone counseling or usual care. Results Those receiving telephone counseling were significantly more likely than those in usual care to make greater reductions in multiple behaviors after adjusting for baseline risk behaviors (OR 2.42; 95%CI 1.43, 4.11). Controlling for baseline risk and group allocation, making changes to either physical activity, fat, vegetable, or fiber intake was associated with making significantly more improvements in other behaviors. Conclusions For patients with chronic conditions, telephone counseling can significantly improve multiple health behaviors, with behavioral changes tending to co-vary.
Resumo:
Traffic control at a road junction by a complex fuzzy logic controller is investigated. The increase in the complexity of junction means more number of input variables must be taken into account, which will increase the number of fuzzy rules in the system. A hierarchical fuzzy logic controller is introduced to reduce the number of rules. Besides, the increase in the complexity of the controller makes formulation of the fuzzy rules difficult. A genetic algorithm based off-line leaning algorithm is employed to generate the fuzzy rules. The learning algorithm uses constant flow-rates as training sets. The system is tested by both constant and time-varying flow-rates. Simulation results show that the proposed controller produces lower average delay than a fixed-time controller does under various traffic conditions.
Resumo:
Using sculpture and drawing as my primary methods of investigation, this research explores ways of shifting the emphasis of my creative visual arts practice from object to process whilst still maintaining a primacy of material outcomes. My motivation was to locate ways of developing a sustained practice shaped as much by new works, as by a creative flow between works. I imagined a practice where a logic of structure within discrete forms and a logic of the broader practice might be developed as mutually informed processes. Using basic structural components of multiple wooden curves and linear modes of deployment – in both sculptures and drawings – I have identified both emergence theory and the image of rhizomic growth (Deleuze and Guattari, 1987) as theoretically integral to this imagining of a creative practice, both in terms of critiquing and developing works. Whilst I adopt a formalist approach for this exegesis, the emergence and rhizome models allow it to work as a critique of movement, of becoming and changing, rather than merely a formalism of static structure. In these models, therefore, I have identified a formal approach that can be applied not only to objects, but to practice over time. The thorough reading and application of these ontological models (emergence and rhizome) to visual arts practice, in terms of processes, objects and changes, is the primary contribution of this thesis. The works that form the major component of the research develop, reflect and embody these notions of movement and change.
Resumo:
In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least theoretically, join various types of IMSs to make them interoperable and give users the illusion that they are interacting with just one IMS. However, due to the complexity of an IMS, attempting to join various types of IMSs is a technically challenging task, let alone assessing how well an IMetS manages to integrate these IMSs. The first contribution of this thesis is the development of a generic IMS model called the Layered Identity Infrastructure Model (LIIM). Using this model, we develop a set of properties that an ideal IMetS should provide. This idealized form is then used as a benchmark to evaluate existing IMetSs. Different types of IMS provide varying levels of privacy protection support. Unfortunately, as observed by Jøsang et al (2007), there is insufficient privacy protection in many of the existing IMSs. In this thesis, we study and extend a type of privacy enhancing technology known as an Anonymous Credential System (ACS). In particular, we extend the ACS which is built on the cryptographic primitives proposed by Camenisch, Lysyanskaya, and Shoup. We call this system the Camenisch, Lysyanskaya, Shoup - Anonymous Credential System (CLS-ACS). The goal of CLS-ACS is to let users be as anonymous as possible. Unfortunately, CLS-ACS has problems, including (1) the concentration of power to a single entity - known as the Anonymity Revocation Manager (ARM) - who, if malicious, can trivially reveal a user’s PII (resulting in an illegal revocation of the user’s anonymity), and (2) poor performance due to the resource-intensive cryptographic operations required. The second and third contributions of this thesis are the proposal of two protocols that reduce the trust dependencies on the ARM during users’ anonymity revocation. Both protocols distribute trust from the ARM to a set of n referees (n > 1), resulting in a significant reduction of the probability of an anonymity revocation being performed illegally. The first protocol, called the User Centric Anonymity Revocation Protocol (UCARP), allows a user’s anonymity to be revoked in a user-centric manner (that is, the user is aware that his/her anonymity is about to be revoked). The second protocol, called the Anonymity Revocation Protocol with Re-encryption (ARPR), allows a user’s anonymity to be revoked by a service provider in an accountable manner (that is, there is a clear mechanism to determine which entity who can eventually learn - and possibly misuse - the identity of the user). The fourth contribution of this thesis is the proposal of a protocol called the Private Information Escrow bound to Multiple Conditions Protocol (PIEMCP). This protocol is designed to address the performance issue of CLS-ACS by applying the CLS-ACS in a federated single sign-on (FSSO) environment. Our analysis shows that PIEMCP can both reduce the amount of expensive modular exponentiation operations required and lower the risk of illegal revocation of users’ anonymity. Finally, the protocols proposed in this thesis are complex and need to be formally evaluated to ensure that their required security properties are satisfied. In this thesis, we use Coloured Petri nets (CPNs) and its corresponding state space analysis techniques. All of the protocols proposed in this thesis have been formally modeled and verified using these formal techniques. Therefore, the fifth contribution of this thesis is a demonstration of the applicability of CPN and its corresponding analysis techniques in modeling and verifying privacy enhancing protocols. To our knowledge, this is the first time that CPN has been comprehensively applied to model and verify privacy enhancing protocols. From our experience, we also propose several CPN modeling approaches, including complex cryptographic primitives (such as zero-knowledge proof protocol) modeling, attack parameterization, and others. The proposed approaches can be applied to other security protocols, not just privacy enhancing protocols.
Resumo:
Many of the power utilities around the world experienced spurious tripping of directional earth fault relays in their mesh distribution networks due to induced circulating currents. This circulating current is zero sequence and induced in the healthy circuit due to the zero sequence current flow resulting from a ground fault of a parallel circuit. This paper quantitatively discusses the effects of mutual coupling on earth fault protection of distribution systems. An actual spurious tripping event is analyzed to support the theory and to present options for improved resilience to spurious tripping.
Resumo:
Since the 1970s the internationalisation process of firms has attracted wide research interest. One of the dominant explanations of firm internationalisation resulting from this research activity is the Uppsala stages model. In this paper, a pre-internationalisation phase is incorporated into the traditional Uppsala model to address the question: What are the antecedents of this model? Four concepts are proposed as the key components that define the experiential learning process underlying a firm’s pre-export phase: export stimuli, attitudinal/psychological commitment, resources and lateral rigidity. Through a survey of 290 Australian exporting and non-exporting small-medium sized firms, data relating to the four pre-internationalisation concepts is collected and an Export Readiness Index (ERI) is constructed through factor analysis. Using logistic regression, the ERI is tested as a tool for analysing export readiness among Australian SMEs.
Resumo:
This is the second part of a paper that explores a range of magico-religious experiences such as immaterial voices and visions, in terms of local cultural, moral and socio-political circumstances in an Aboriginal town in rural Queensland. This part of the paper explores the political and cultural symbolism and meaning of suicide. It charts the saliency of suicide amongst two groups of kin and cohorts and the social meaningfulness and problematic of the voices and visions in relation to suicide, to identity and family forms and to funerals and a heavily drinking lifestyle. I argue that voices and visions are used to reinterpret social experience and to establish meaning and that tragically suicide evokes connectivity rather than anomie and here cannot be understood merely as an individualistic act or evidence of individual pathology. Rather it is about transformation and crossing a threshold to join an enduring domain of Aboriginality. In this life world, where family is the highest social value and where a relational view of persons holds sway, the individualistic practice of psychiatric and other helping professions, is a considerable problem.
Resumo:
Being in paid employment is socially valued, and is linked to health, financial security and time use. Issues arising from a lack of occupational choice and control, and from diminished role partnerships are particularly problematic in the lives of people with an intellectual disability. Informal support networks are shown to influence work opportunities for people without disabilities, but their impact on the work experiences of people with disability has not been thoroughly explored. The experience of 'work' and preparation for work was explored with a group of four people with an intellectual disability (the participants) and the key members of their informal support networks (network members) in New South Wales, Australia. Network members and participants were interviewed and participant observations of work and other activities were undertaken. Data analysis included open, conceptual and thematic coding. Data analysis software assisted in managing the large datasets across multiple team members. The insight and actions of network members created and sustained the employment and support opportunities that effectively matched the needs and interests of the participants. Recommendations for future research are outlined.
Resumo:
In cloud computing resource allocation and scheduling of multiple composite web services is an important challenge. This is especially so in a hybrid cloud where there may be some free resources available from private clouds but some fee-paying resources from public clouds. Meeting this challenge involves two classical computational problems. One is assigning resources to each of the tasks in the composite web service. The other is scheduling the allocated resources when each resource may be used by more than one task and may be needed at different points of time. In addition, we must consider Quality-of-Service issues, such as execution time and running costs. Existing approaches to resource allocation and scheduling in public clouds and grid computing are not applicable to this new problem. This paper presents a random-key genetic algorithm that solves new resource allocation and scheduling problem. Experimental results demonstrate the effectiveness and scalability of the algorithm.
Resumo:
Path planning and trajectory design for autonomous underwater vehicles (AUVs) is of great importance to the oceanographic research community because automated data collection is becoming more prevalent. Intelligent planning is required to maneuver a vehicle to high-valued locations to perform data collection. In this paper, we present algorithms that determine paths for AUVs to track evolving features of interest in the ocean by considering the output of predictive ocean models. While traversing the computed path, the vehicle provides near-real-time, in situ measurements back to the model, with the intent to increase the skill of future predictions in the local region. The results presented here extend prelim- inary developments of the path planning portion of an end-to-end autonomous prediction and tasking system for aquatic, mobile sensor networks. This extension is the incorporation of multiple vehicles to track the centroid and the boundary of the extent of a feature of interest. Similar algorithms to those presented here are under development to consider additional locations for multiple types of features. The primary focus here is on algorithm development utilizing model predictions to assist in solving the motion planning problem of steering an AUV to high-valued locations, with respect to the data desired. We discuss the design technique to generate the paths, present simulation results and provide experimental data from field deployments for tracking dynamic features by use of an AUV in the Southern California coastal ocean.
Resumo:
-
Resumo:
This study explored youth caregiving for a parent with multiple sclerosis (MS) from multiple perspectives, and examined associations between caregiving and child negative (behavioural emotional difficulties, somatisation) and positive (life satisfaction, positive affect, prosocial behaviour) adjustment outcomes overtime. A total of 88 families participated; 85 parents with MS, 55 partners and 130 children completed questionnaires at Time 1. Child caregiving was assessed by the Youth Activities of Caregiving Scale (YACS). Child and parent questionnaire data were collected at Time 1 and child data were collected 12 months later (Time 2). Factor analysis of the child and parent YACS data replicated the four factors (instrumental, social-emotional, personal-intimate, domestic-household care), all of which were psychometrically sound. The YACS factors were related to parental illness and caregiving context variables that reflected increased caregiving demands. The Time 1 instrumental and social-emotional care domains were associated with poorer Time 2 adjustment, whereas personal-intimate was related to better adjustment and domestic-household care was unrelated to adjustment. Children and their parents exhibited highest agreement on personal-intimate, instrumental and total caregiving, and least on domestic-household and social-emotional care. Findings delineate the key dimensions of young caregiving in MS and the differential links between caregiving activities and youth adjustment.