999 resultados para symmetric group
Resumo:
Purpose - The study evaluates the pre- and post-training lesion localisation ability of a group of novice observers. Parallels are drawn with the performance of inexperienced radiographers taking part in preliminary clinical evaluation (PCE) and ‘red-dot’ systems, operating within radiography practice. Materials and methods - Thirty-four novice observers searched 92 images for simulated lesions. Pre-training and post-training evaluations were completed following the free-response the receiver operating characteristic (FROC) method. Training consisted of observer performance methodology, the characteristics of the simulated lesions and information on lesion frequency. Jackknife alternative FROC (JAFROC) and highest rating inferred ROC analyses were performed to evaluate performance difference on lesion-based and case-based decisions. The significance level of the test was set at 0.05 to control the probability of Type I error. Results - JAFROC analysis (F(3,33) = 26.34, p < 0.0001) and highest-rating inferred ROC analysis (F(3,33) = 10.65, p = 0.0026) revealed a statistically significant difference in lesion detection performance. The JAFROC figure-of-merit was 0.563 (95% CI 0.512,0.614) pre-training and 0.677 (95% CI 0.639,0.715) post-training. Highest rating inferred ROC figure-of-merit was 0.728 (95% CI 0.701,0.755) pre-training and 0.772 (95% CI 0.750,0.793) post-training. Conclusions - This study has demonstrated that novice observer performance can improve significantly. This study design may have relevance in the assessment of inexperienced radiographers taking part in PCE or commenting scheme for trauma.
Resumo:
Secure group communication is a paradigm that primarily designates one-to-many communication security. The proposed works relevant to secure group communication have predominantly considered the whole network as being a single group managed by a central powerful node capable of supporting heavy communication, computation and storage cost. However, a typical Wireless Sensor Network (WSN) may contain several groups, and each one is maintained by a sensor node (the group controller) with constrained resources. Moreover, the previously proposed schemes require a multicast routing support to deliver the rekeying messages. Nevertheless, multicast routing can incur heavy storage and communication overheads in the case of a wireless sensor network. Due to these two major limitations, we have reckoned it necessary to propose a new secure group communication with a lightweight rekeying process. Our proposal overcomes the two limitations mentioned above, and can be applied to a homogeneous WSN with resource-constrained nodes with no need for a multicast routing support. Actually, the analysis and simulation results have clearly demonstrated that our scheme outperforms the previous well-known solutions.
Resumo:
Securing group communication in wireless sensor networks has recently been extensively investigated. Many works have addressed this issue, and they have considered the grouping concept differently. In this paper, we consider a group as being a set of nodes sensing the same data type, and we alternatively propose an efficient secure group communication scheme guaranteeing secure group management and secure group key distribution. The proposed scheme (RiSeG) is based on a logical ring architecture, which permits to alleviate the group controller’s task in updating the group key. The proposed scheme also provides backward and forward secrecy, addresses the node compromise attack, and gives a solution to detect and eliminate the compromised nodes. The security analysis and performance evaluation show that the proposed scheme is secure, highly efficient, and lightweight. A comparison with the logical key hierarchy is preformed to prove the rekeying process efficiency of RiSeG. Finally, we present the implementation details of RiSeG on top of TelosB sensor nodes to demonstrate its feasibility.
Resumo:
Graphics processor units (GPUs) today can be used for computations that go beyond graphics and such use can attain a performance that is orders of magnitude greater than a normal processor. The software executing on a graphics processor is composed of a set of (often thousands of) threads which operate on different parts of the data and thereby jointly compute a result which is delivered to another thread executing on the main processor. Hence the response time of a thread executing on the main processor is dependent on the finishing time of the execution of threads executing on the GPU. Therefore, we present a simple method for calculating an upper bound on the finishing time of threads executing on a GPU, in particular NVIDIA Fermi. Developing such a method is nontrivial because threads executing on a GPU share hardware resources at very fine granularity.
Resumo:
We analyse the possibility that, in two Higgs doublet models, one or more of the Higgs couplings to fermions or to gauge bosons change sign, relative to the respective Higgs Standard Model couplings. Possible sign changes in the coupling of a neutral scalar to charged ones are also discussed. These wrong signs can have important physical consequences, manifesting themselves in Higgs production via gluon fusion or Higgs decay into two gluons or into two photons. We consider all possible wrong sign scenarios, and also the symmetric limit, in all possible Yukawa implementations of the two Higgs doublet model, in two different possibilities: the observed Higgs boson is the lightest CP-even scalar, or the heaviest one. We also analyse thoroughly the impact of the currently available LHC data on such scenarios. With all 8 TeV data analysed, all wrong sign scenarios are allowed in all Yukawa types, even at the 1 sigma level. However, we will show that B-physics constraints are crucial in excluding the possibility of wrong sign scenarios in the case where tan beta is below 1. We will also discuss the future prospects for probing the wrong sign scenarios at the next LHC run. Finally we will present a scenario where the alignment limit could be excluded due to non-decoupling in the case where the heavy CP-even Higgs is the one discovered at the LHC.
Resumo:
In recent papers, formulas are obtained for directional derivatives, of all orders, of the determinant, the permanent, the m-th compound map and the m-th induced power map. This paper generalizes these results for immanants and for other symmetric powers of a matrix.
Resumo:
In this paper, the exact value for the norm of directional derivatives, of all orders, for symmetric tensor powers of operators on finite dimensional vector spaces is presented. Using this result, an upper bound for the norm of all directional derivatives of immanants is obtained.
Resumo:
Signal Processing, Vol. 83, nº 11
Resumo:
The clinical and laboratory data of a disease in a resident of Ribeira Valley, São Paulo State, southeastern Brazil, caused by an agent close or identical to Caraparu, a Group C arbovirus, was described. Although there is evidence of an intensive circulation of several arboviruses in the area, no diagnosis of human disease by these agents has been made, except the encephalitis cases caused by Rocio virus during an epidemic in 1975-1977. An antigenic difference between Caraparu strains isolated in São Paulo and in Pará States and a close antigenic relationship between Caraparu strain from São Paulo and Bruconha virus were suggested by the serological tests.
Resumo:
The Mondunguara copper mines are situated in mountainous terrain in west-central Mozambique. The mineralization consists of chalcopyrite, pyrrhotite, common pcntlandite, cobaltpentlandite, pyrite and several minor oxides and sulphides in tabular ore bodies deeping steep to the north. Gold was known to occur in small quantities but no systematic sampling and analysis for precious clements was ever done. Mineralogical and geological evidence has shown that the ores are magmatic in origin and were derived from gabbro-peridotitic magma dykes saturated in sulphides when intruded. The ore bodies show a clear zonation. Platinum group elements as well as pure gold are associated with high temperature hexagonal pyrrhotite. This pyrrhotite being of no use is generally discarded to the tailing dumps. Late hydrothermal phases are enriched in native silver, silver tellurides as well as electrum.
Resumo:
Resistant populations of the Bacteroides fragilis group bacteria (two reference ones and two isolated from human and Callithrix penicillata marmoset) were obtained by the gradient plate technique, to clindamycin, penicillin G, metronidazole and mercuric chloride. All the four tested strains were originaly susceptible to the four antimicrobial drugs at the breakpoint used in this study. MICs determination for the four cultures gave constant values for each antimicrobial, on the several steps by the gradient plate technique. The intestinal human B. fragilis strains showed three DNA bands, that could be representative of only two plasmids in the closed covalently circular (CCC) form with molecular weights of approximately 25 and 2.5 Md. The results do not permit an association between the presence of plasmid in the human strain with the susceptibility to the studied drugs. The four strains were ß-lactamase negative in the two methods used, and no particular chromosomal genetic resistance marker was demonstred. The resistance (MIC) observed, after contact with penicillin G and mercuric chloride, were two-fold in the four tested strains
Resumo:
The current capabilities of mobile phones in terms of communication, processing and storage, enables its use to form autonomous networks of devices that can be used in case of collapse or inexistent support from a communication infrastructure. In this paper, we propose a network configuration of nodes that provides high-speed bidirectional device-to-device communication, with symmetrical data transfer rates, in Wi-Fi Direct multi-group scenarios, without using performance hindering broadcasts. Copyright © 2015 ICST.
Resumo:
The main objective of this work is to report on the development of a multi-criteria methodology to support the assessment and selection of an Information System (IS) framework in a business context. The objective is to select a technological partner that provides the engine to be the basis for the development of a customized application for shrinkage reduction on the supply chains management. Furthermore, the proposed methodology di ers from most of the ones previously proposed in the sense that 1) it provides the decision makers with a set of pre-defined criteria along with their description and suggestions on how to measure them and 2)it uses a continuous scale with two reference levels and thus no normalization of the valuations is required. The methodology here proposed is has been designed to be easy to understand and use, without a specific support of a decision making analyst.
Resumo:
Semigroup Forum, nº76 (2008), pg.579-583
Resumo:
Proceedings of the Edinburgh Mathematical Society, nº50 (2007), p.551-561