984 resultados para trajectory


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The explicit expression for spatial-temporal Airy pulse is derived from the Maxwell's equations in paraxial approximation. The trajectory of the pulse in the time-space coordinates is analysed. The existence of a bifurcation point that separates regions with qualitatively different features of the pulse propagation is demonstrated. At this point the velocity of the pulse becomes infinite and the orientation of it changes to the opposite.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Computer simulated trajectories of bulk water molecules form complex spatiotemporal structures at the picosecond time scale. This intrinsic complexity, which underlies the formation of molecular structures at longer time scales, has been quantified using a measure of statistical complexity. The method estimates the information contained in the molecular trajectory by detecting and quantifying temporal patterns present in the simulated data (velocity time series). Two types of temporal patterns are found. The first, defined by the short-time correlations corresponding to the velocity autocorrelation decay times (â‰0.1â€ps), remains asymptotically stable for time intervals longer than several tens of nanoseconds. The second is caused by previously unknown longer-time correlations (found at longer than the nanoseconds time scales) leading to a value of statistical complexity that slowly increases with time. A direct measure based on the notion of statistical complexity that describes how the trajectory explores the phase space and independent from the particular molecular signal used as the observed time series is introduced. © 2008 The American Physical Society.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We investigate the sensitivity of a Markov model with states and transition probabilities obtained from clustering a molecular dynamics trajectory. We have examined a 500 ns molecular dynamics trajectory of the peptide valine-proline-alanine-leucine in explicit water. The sensitivity is quantified by varying the boundaries of the clusters and investigating the resulting variation in transition probabilities and the average transition time between states. In this way, we represent the effect of clustering using different clustering algorithms. It is found that in terms of the investigated quantities, the peptide dynamics described by the Markov model is sensitive to the clustering; in particular, the average transition times are found to vary up to 46%. Moreover, inclusion of nonphysical sparsely populated clusters can lead to serious errors of up to 814%. In the investigation, the time step used in the transition matrix is determined by the minimum time scale on which the system behaves approximately Markovian. This time step is found to be about 100 ps. It is concluded that the description of peptide dynamics with transition matrices should be performed with care, and that using standard clustering algorithms to obtain states and transition probabilities may not always produce reliable results.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

DUE TO COPYRIGHT RESTRICTIONS ONLY AVAILABLE FOR CONSULTATION AT ASTON UNIVERSITY LIBRARY AND INFORMATION SERVICES WITH PRIOR ARRANGEMENT

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Inductive reasoning is fundamental to human cognition, yet it remains unclear how we develop this ability and what might influence our inductive choices. We created novel categories in which crucial factors such as domain and category structure were manipulated orthogonally. We trained 403 4-9-year-old children to categorise well-matched natural kind and artefact stimuli with either featural or relational category structure, followed by induction tasks. This wide age range allowed for the first full exploration of the developmental trajectory of inductive reasoning in both domains. We found a gradual transition from perceptual to categorical induction with age. This pattern was stable across domains, but interestingly, children showed a category bias one year later for relational categories. We hypothesise that the ability to use category information in inductive reasoning develops gradually, but is delayed when children need to process and apply more complex category structures. © 2014 © 2014 Taylor & Francis.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

When export and import is connected with output of basic production, and criterion functional represents a final state of economy, the generalization of classical qualitative results of the main-line theory on a case of dynamic input-output balance optimization model for open economy is given.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

What actors and processes at what levels of analysis and through what mechanisms have pushed Iran's nuclear program (INP) towards being designated as a proliferation threat (securitization)? What actors and processes at what levels of analysis and through what mechanisms have pushed Iran's nuclear program away from being designated as an existential threat (de-securitization)? What has been the overall balance of power and interaction dynamics of these opposing forces over the last half-century and what is their most likely future trajectory? ^ Iran's nuclear story can be told as the unfolding of constant interaction between state and non-state forces of "nuclear securitization" and "nuclear de-securitization." Tracking the crisscrossing interaction between these different securitizing and de-securitizing actors in a historical context constitutes the central task of this project. ^ A careful tracing of "security events" on different analytical levels reveals the broad contours of the evolutionary trajectory of INP and its possible future path(s). Out of this theoretically conscious historical narrative, one can make informed observations about the overall thrust of INP along the securitization - de-securitization continuum. ^ The main contributions of this work are three fold: First, it brings a fresh theoretical perspective on Iran's proliferation behavior by utilizing the "securitization" theory tracing the initial indications of the threat designation of INP all the way back to the mid 1970s. Second, it gives a solid and thematically grounded historical texture to INP by providing an intimate engagement with the persons, processes, and events of Tehran's nuclear pursuit over half a century. Third, it demonstrates how INP has interacted with and even at times transformed the NPT as the keystone of the non-proliferation regime, and how it has affected and injected urgency to the international discourse on nuclear proliferation specifically in the Middle East.^

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In recent years, there has been an enormous growth of location-aware devices, such as GPS embedded cell phones, mobile sensors and radio-frequency identification tags. The age of combining sensing, processing and communication in one device, gives rise to a vast number of applications leading to endless possibilities and a realization of mobile Wireless Sensor Network (mWSN) applications. As computing, sensing and communication become more ubiquitous, trajectory privacy becomes a critical piece of information and an important factor for commercial success. While on the move, sensor nodes continuously transmit data streams of sensed values and spatiotemporal information, known as ``trajectory information". If adversaries can intercept this information, they can monitor the trajectory path and capture the location of the source node. ^ This research stems from the recognition that the wide applicability of mWSNs will remain elusive unless a trajectory privacy preservation mechanism is developed. The outcome seeks to lay a firm foundation in the field of trajectory privacy preservation in mWSNs against external and internal trajectory privacy attacks. First, to prevent external attacks, we particularly investigated a context-based trajectory privacy-aware routing protocol to prevent the eavesdropping attack. Traditional shortest-path oriented routing algorithms give adversaries the possibility to locate the target node in a certain area. We designed the novel privacy-aware routing phase and utilized the trajectory dissimilarity between mobile nodes to mislead adversaries about the location where the message started its journey. Second, to detect internal attacks, we developed a software-based attestation solution to detect compromised nodes. We created the dynamic attestation node chain among neighboring nodes to examine the memory checksum of suspicious nodes. The computation time for memory traversal had been improved compared to the previous work. Finally, we revisited the trust issue in trajectory privacy preservation mechanism designs. We used Bayesian game theory to model and analyze cooperative, selfish and malicious nodes' behaviors in trajectory privacy preservation activities.^

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The promise of Wireless Sensor Networks (WSNs) is the autonomous collaboration of a collection of sensors to accomplish some specific goals which a single sensor cannot offer. Basically, sensor networking serves a range of applications by providing the raw data as fundamentals for further analyses and actions. The imprecision of the collected data could tremendously mislead the decision-making process of sensor-based applications, resulting in an ineffectiveness or failure of the application objectives. Due to inherent WSN characteristics normally spoiling the raw sensor readings, many research efforts attempt to improve the accuracy of the corrupted or "dirty" sensor data. The dirty data need to be cleaned or corrected. However, the developed data cleaning solutions restrict themselves to the scope of static WSNs where deployed sensors would rarely move during the operation. Nowadays, many emerging applications relying on WSNs need the sensor mobility to enhance the application efficiency and usage flexibility. The location of deployed sensors needs to be dynamic. Also, each sensor would independently function and contribute its resources. Sensors equipped with vehicles for monitoring the traffic condition could be depicted as one of the prospective examples. The sensor mobility causes a transient in network topology and correlation among sensor streams. Based on static relationships among sensors, the existing methods for cleaning sensor data in static WSNs are invalid in such mobile scenarios. Therefore, a solution of data cleaning that considers the sensor movements is actively needed. This dissertation aims to improve the quality of sensor data by considering the consequences of various trajectory relationships of autonomous mobile sensors in the system. First of all, we address the dynamic network topology due to sensor mobility. The concept of virtual sensor is presented and used for spatio-temporal selection of neighboring sensors to help in cleaning sensor data streams. This method is one of the first methods to clean data in mobile sensor environments. We also study the mobility pattern of moving sensors relative to boundaries of sub-areas of interest. We developed a belief-based analysis to determine the reliable sets of neighboring sensors to improve the cleaning performance, especially when node density is relatively low. Finally, we design a novel sketch-based technique to clean data from internal sensors where spatio-temporal relationships among sensors cannot lead to the data correlations among sensor streams.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this Bachelor Thesis I want to provide readers with tools and scripts for the control of a 7DOF manipulator, backed up by some theory of Robotics and Computer Science, in order to better contextualize the work done. In practice, we will see most common software, and developing environments, used to cope with our task: these include ROS, along with visual simulation by VREP and RVIZ, and an almost "stand-alone" ROS extension called MoveIt!, a very complete programming interface for trajectory planning and obstacle avoidance. As we will better appreciate and understand in the introduction chapter, the capability of detecting collision objects through a camera sensor, and re-plan to the desired end-effector pose, are not enough. In fact, this work is implemented in a more complex system, where recognition of particular objects is needed. Through a package of ROS and customized scripts, a detailed procedure will be provided on how to distinguish a particular object, retrieve its reference frame with respect to a known one, and then allow navigation to that target. Together with technical details, the aim is also to report working scripts and a specific appendix (A) you can refer to, if desiring to put things together.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper examines the methodological choices of researchers studying the HR practices–outcome relationship via a content analysis of 281 studies published across the last twenty years. The prevalence and trajectory of change over time are reported for a wide range of methodological choices relevant to internal, external, construct, and statistical conclusion validity. While the results indicate a high incidence of potentially problematic cross-sectional, single informant, and single level designs, they also reveal significant improvements over time across many validity relevant methodological choices. This broad based improvement in the methodological underpinnings of HR research suggests that researchers and practitioners can view the findings reported in the HR literature with increasing confidence. Directions for future research are provided.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Family caregivers of patients enrolled in home-based palliative care programmes provide unpaid care and assistance with daily activities to terminally ill family members. Caregivers often experience caregiver burden, which is an important predictor of anxiety and depression that can extend into bereavement. We conducted a longitudinal, prospective cohort study to comprehensively assess modifiable and non-modifiable patient and caregiver factors that account for caregiver burden over the palliative care trajectory. Caregivers (n = 327) of patients with malignant neoplasm were recruited from two dedicated home-based palliative care programmes in Southern Ontario, Canada from 1 July 2010 to 31 August 2012. Data were obtained from bi-weekly telephone interviews with caregivers from study admission until death, and from palliative care programme and home-care agency databases. Information collected comprised patient and caregiver demographics, utilisation of privately and publicly financed resources, patient clinical status and caregiver burden. The average age of the caregivers was 59.0 years (SD: 13.2), and almost 70% were female. Caregiver burden increased over time in a non-linear fashion from study admission to patient death. Increased monthly unpaid care-giving time costs, monthly public personal support worker costs, emergency department visits and low patient functional status were associated with higher caregiver burden. Greater use of hospice care was associated with lower burden. Female caregivers tended to report more burden compared to men as death approached, and burden was higher when patients were male. Low patient functional status was the strongest predictor of burden. Understanding the influence of modifiable and non-modifiable factors on the experience of burden over the palliative trajectory is essential for the development and targeting of programmes and policies to support family caregivers and reduce burden. Supporting caregivers can have benefits such as improved caregiver health outcomes, and enhancing their ability to meet care-giving demands, thereby potentially allowing for longer patient care in the home setting.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This papers examines the use of trajectory distance measures and clustering techniques to define normal
and abnormal trajectories in the context of pedestrian tracking in public spaces. In order to detect abnormal
trajectories, what is meant by a normal trajectory in a given scene is firstly defined. Then every trajectory
that deviates from this normality is classified as abnormal. By combining Dynamic Time Warping and a
modified K-Means algorithms for arbitrary-length data series, we have developed an algorithm for trajectory
clustering and abnormality detection. The final system performs with an overall accuracy of 83% and 75%
when tested in two different standard datasets.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper discusses social housing policy in Brazil since the 1990s by analyzing government programs’ institutional arrangements, their sources of revenues and the formatting of related financial systems. The conclusion suggests that all these arrangements have not constituted a comprehensive housing policy with the clear aim of serving to enhance housing conditions in the country. Housing ‘policies’ since the 1990s – as proposed by Fernando Collor de Mello, Itamar Franco, Fernando Henrique Cardoso and ´ Luis Inacio Lula da Silva’s governments (in the latter case, despite much progress towards subsidized investment programs) – have sought to consolidate financial instruments in line with global markets, restructuring the way private interests operate within the system, a necessary however incomplete course of action. Different from rhetoric, this has resulted in failure as the more fundamental social results for the poor have not yet been achieved.