978 resultados para SEARCH TECHNIQUE


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Multilevel inverters provide an attractive solution for power electronics when both reduced harmonic contents and high voltages are required. In this paper, a novel predictive current control technique is proposed for a three-phase multilevel inverter, which controls the capacitors voltages and load currents with low switching losses. The advantage of this contribution is that the technique can be applied to more voltage levels without significantly changing the control circuit. The three-phase three-level inverter with a pure inductive load has been implemented to track reference currents using analogue circuits and programmable logic device.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

‘Practice makes perfect’ expresses the common misconception that repetitive practice without appropriate feed-back will deliver improvement in tasks being practised. This paper explores the implementation of a student-driven feed-back mechanism and shows how functional and aesthetic understanding can be progressively enhanced through reflective practice. More efficient practice of clearly understood tasks will enhance dance training outcomes. We were looking for ways to improve teaching efficiency, effectiveness of the students’ practice in the studio and application of safe dance practices. We devised a web-based on-line format, ‘Performing Reflective Practice’, designed to augment and refine studio practice. Only perfect practice makes perfect!

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In 2005, the Association of American Publishers (AAP) and the Authors Guild (AG) sued Google for ‘massive copyright infringement’ for the mass digitization of books for the Google Book Search Project. In 2008, the parties reached a settlement, pending court approval. If approved, the settlement could have far-reaching consequences for authors, libraries, educational institutions and the reading public. In this article, I provide an overview of the Google Book Search Settlement. Firstly, I explain the Google Book Search Project, the legal questions raised by the Project and the lawsuit brought against Google. Secondly, I examine the terms of the Settlement Agreement, including what rights were granted between the parties and what rights were granted to the general public. Finally, I consider the implications of the settlement for Australia. The Settlement Agreement, and consequently the broader scope of the Google Book Search Project, is currently limited to the United States. In this article I consider whether the Project could be extended to Australia at a later date, how Google might go about doing this, and the implications of such an extension under the Copyright Act 1968 (Cth). I argue that without prior agreements with rightholders, our limited exceptions to copyright infringement mean that Google is unlikely to be able to extend the full scope of the Project to Australia without infringing copyright.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

With a lack of places to gain an education in the craft of romance writing, novelists have few places to turn to gain real feedback. This paper investigates an alternative to textbooks, conferences, and workshops through an examination of the role provided to the writer by critique groups. How these groups work, how they benefit an author, and the critique groups as a whole are discussed. This work studies the form of Peer Assessment and Learning (PAL) and compares the technique used by educational institutions all over the world with the practice of author groups critiquing their own work. The research shows how a critique group can assist a writer to learn, grow and develop, helping to enhance the writer’s skills through constructive feedback, which gives them confidence to sell their work.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Questions the extent to which Westerrn commercial laws adopted by China, particularly in its Company Laws of 1993 and 1995, are comptaible with China's different cultural and legal traditions. Suggests that Western concepts of the rule of law and of corporate governance are alient to China. Outlines the development of the Western legal tradition. based on Judaeo-Christian beliefs and legal rationalism. Compares this with the deveopment of the Chinese legal tradtion, based on Confucianism and legalism. Proposes ways in which the two traditions could be reconciled more effectively.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

BOOK: Written by the surgeons of the Exeter Hip Team and their colleagues from around the world, this book describes 40 years of innovation and development with cemented hip replacement. Topics covered include the basic science behind successful cemented hip replacement, modern surgical techniques and recent advances. There is also extensive coverage of the revision techniques developed at Exeter and elsewhere, focussing on femoral and acetabular impaction grafting. Each chapter is a self-contained article with an emphasis, where appropriate, on practical techniques and surgical tips, supported by line drawings and intra-operative photographs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Discusses the importation of Western concepts of corporate governance into Hong Kong where many companies are family companies to which Asian culture is more familiar. Considers different models of corporate governance and questions the application of Western structures to family owned companies. Examines the weaknesses inherent in the typical structure of Asian companies, particularly from the point of view of minority shareholders. Suggests that a system of governance based on Confucian philosophy may be more effective in Hong Kong.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Genetically modified (GM) food products are the source of much controversy and in the context of consumer behaviour, the way in which consumers perceive such food products is of paramount importance both theoretically and practically. Despite this, relatively little research has focused on GM food products from a consumer perspective, and as such, this study seeks to better understand what effects consumer willingness to buy GM food products in Australian consumers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background and purpose Our aim was to prove in an animal model that the use of HA paste at the cement-bone interface in the acetabulum would improve fixation. We examined, in sheep, the effect of interposing a layer of hydroxyapatite cement around the periphery of a polyethylene socket prior to fixing it using polymethylemethacrylate (PMMA). Methods We made a randomized study involving 22 sheep to test whether the application of BoneSource hydroxyapatite material to the surface of the ovine acetabulum prior to cementing a polyethylene cup at hip arthroplasty improved the fixation and the nature of the interface. We studied the gross radiographical appearance of the implant-bone interface and the histological appearance at the interface. Results There were more radiolucencies evident in the control group. Histologically, only sheep randomized into the BoneSource group exhibited a fully osseointegrated interface. Use of the hydroxyapatite material did not confer any detrimental effects. In some cases the material appeared to have been fully resorbed. When the material was evident on histological section, it was incorporated into an osseointegrated interface. There was no giant cell reaction present in any case. There was no evidence of migration of BoneSource to the articulation. Interpretation The application of HA material prior to cementation of a socket produced an improved interface. The technique may be useful in man with to extend the longevity of the cemented implant by protecting the socket interface from the effect of hydrodynamic fluid flow and particulate debris.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background Malnutrition is common among dialysis patients and is associated with an adverse outcome. One cause of this is a persistent reduction in nutrient intake, suggesting an abnormality of appetite regulation. Methods We used a novel technique to describe the appetite profile in 46 haemodialysis (HD) patients and 40 healthy controls. The Electronic Appetite Rating System (EARS) employs a palmtop computer to collect hourly ratings of motivation to eat and mood. We collected data on hunger, desire to eat, fullness, and tiredness. HD subjects were monitored on the dialysis day and the interdialytic day. Controls were monitored for 1 or 2 days. Results Temporal profiles of motivation to eat for the controls were similar on both days. Temporal profiles of motivation to eat for the HD group were lower on the dialysis day. Mean HD scores were not significantly different from controls. Dietary records indicated that dialysis patients consumed less food than controls. Conclusions Our data indicate that the EARS can be used to monitor subjective appetite states continuously in a group of HD patients. A HD session reduces hunger and desire to eat. Patients feel more tired after dialysis. This does not correlate with their hunger score, but does correlate with their fullness rating. Nutrient intake is reduced, suggesting a resetting of appetite control for the HD group. The EARS may be useful for intervention studies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis is devoted to the study of linear relationships in symmetric block ciphers. A block cipher is designed so that the ciphertext is produced as a nonlinear function of the plaintext and secret master key. However, linear relationships within the cipher can still exist if the texts and components of the cipher are manipulated in a number of ways, as shown in this thesis. There are four main contributions of this thesis. The first contribution is the extension of the applicability of integral attacks from word-based to bitbased block ciphers. Integral attacks exploit the linear relationship between texts at intermediate stages of encryption. This relationship can be used to recover subkey bits in a key recovery attack. In principle, integral attacks can be applied to bit-based block ciphers. However, specific tools to define the attack on these ciphers are not available. This problem is addressed in this thesis by introducing a refined set of notations to describe the attack. The bit patternbased integral attack is successfully demonstrated on reduced-round variants of the block ciphers Noekeon, Present and Serpent. The second contribution is the discovery of a very small system of equations that describe the LEX-AES stream cipher. LEX-AES is based heavily on the 128-bit-key (16-byte) Advanced Encryption Standard (AES) block cipher. In one instance, the system contains 21 equations and 17 unknown bytes. This is very close to the upper limit for an exhaustive key search, which is 16 bytes. One only needs to acquire 36 bytes of keystream to generate the equations. Therefore, the security of this cipher depends on the difficulty of solving this small system of equations. The third contribution is the proposal of an alternative method to measure diffusion in the linear transformation of Substitution-Permutation-Network (SPN) block ciphers. Currently, the branch number is widely used for this purpose. It is useful for estimating the possible success of differential and linear attacks on a particular SPN cipher. However, the measure does not give information on the number of input bits that are left unchanged by the transformation when producing the output bits. The new measure introduced in this thesis is intended to complement the current branch number technique. The measure is based on fixed points and simple linear relationships between the input and output words of the linear transformation. The measure represents the average fraction of input words to a linear diffusion transformation that are not effectively changed by the transformation. This measure is applied to the block ciphers AES, ARIA, Serpent and Present. It is shown that except for Serpent, the linear transformations used in the block ciphers examined do not behave as expected for a random linear transformation. The fourth contribution is the identification of linear paths in the nonlinear round function of the SMS4 block cipher. The SMS4 block cipher is used as a standard in the Chinese Wireless LAN Wired Authentication and Privacy Infrastructure (WAPI) and hence, the round function should exhibit a high level of nonlinearity. However, the findings in this thesis on the existence of linear relationships show that this is not the case. It is shown that in some exceptional cases, the first four rounds of SMS4 are effectively linear. In these cases, the effective number of rounds for SMS4 is reduced by four, from 32 to 28. The findings raise questions about the security provided by SMS4, and might provide clues on the existence of a flaw in the design of the cipher.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis investigates aspects of encoding the speech spectrum at low bit rates, with extensions to the effect of such coding on automatic speaker identification. Vector quantization (VQ) is a technique for jointly quantizing a block of samples at once, in order to reduce the bit rate of a coding system. The major drawback in using VQ is the complexity of the encoder. Recent research has indicated the potential applicability of the VQ method to speech when product code vector quantization (PCVQ) techniques are utilized. The focus of this research is the efficient representation, calculation and utilization of the speech model as stored in the PCVQ codebook. In this thesis, several VQ approaches are evaluated, and the efficacy of two training algorithms is compared experimentally. It is then shown that these productcode vector quantization algorithms may be augmented with lossless compression algorithms, thus yielding an improved overall compression rate. An approach using a statistical model for the vector codebook indices for subsequent lossless compression is introduced. This coupling of lossy compression and lossless compression enables further compression gain. It is demonstrated that this approach is able to reduce the bit rate requirement from the current 24 bits per 20 millisecond frame to below 20, using a standard spectral distortion metric for comparison. Several fast-search VQ methods for use in speech spectrum coding have been evaluated. The usefulness of fast-search algorithms is highly dependent upon the source characteristics and, although previous research has been undertaken for coding of images using VQ codebooks trained with the source samples directly, the product-code structured codebooks for speech spectrum quantization place new constraints on the search methodology. The second major focus of the research is an investigation of the effect of lowrate spectral compression methods on the task of automatic speaker identification. The motivation for this aspect of the research arose from a need to simultaneously preserve the speech quality and intelligibility and to provide for machine-based automatic speaker recognition using the compressed speech. This is important because there are several emerging applications of speaker identification where compressed speech is involved. Examples include mobile communications where the speech has been highly compressed, or where a database of speech material has been assembled and stored in compressed form. Although these two application areas have the same objective - that of maximizing the identification rate - the starting points are quite different. On the one hand, the speech material used for training the identification algorithm may or may not be available in compressed form. On the other hand, the new test material on which identification is to be based may only be available in compressed form. Using the spectral parameters which have been stored in compressed form, two main classes of speaker identification algorithm are examined. Some studies have been conducted in the past on bandwidth-limited speaker identification, but the use of short-term spectral compression deserves separate investigation. Combining the major aspects of the research, some important design guidelines for the construction of an identification model when based on the use of compressed speech are put forward.