981 resultados para G-Hilbert Scheme


Relevância:

20.00% 20.00%

Publicador:

Resumo:

A tag-based item recommendation method generates an ordered list of items, likely interesting to a particular user, using the users past tagging behaviour. However, the users tagging behaviour varies in different tagging systems. A potential problem in generating quality recommendation is how to build user profiles, that interprets user behaviour to be effectively used, in recommendation models. Generally, the recommendation methods are made to work with specific types of user profiles, and may not work well with different datasets. In this paper, we investigate several tagging data interpretation and representation schemes that can lead to building an effective user profile. We discuss the various benefits a scheme brings to a recommendation method by highlighting the representative features of user tagging behaviours on a specific dataset. Empirical analysis shows that each interpretation scheme forms a distinct data representation which eventually affects the recommendation result. Results on various datasets show that an interpretation scheme should be selected based on the dominant usage in the tagging data (i.e. either higher amount of tags or higher amount of items present). The usage represents the characteristic of user tagging behaviour in the system. The results also demonstrate how the scheme is able to address the cold-start user problem.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Injection velocity has been recognized as a key variable in thermoplastic injection molding. Its closed-loop control is, however, difficult due to the complexity of the process dynamic characteristics. The basic requirements of the control system include tracking of a pre-determined injection velocity curve defined in a profile, load rejection and robustness. It is difficult for a conventional control scheme to meet all these requirements. Injection velocity dynamics are first analyzed in this paper. Then a novel double-controller scheme is adopted for the injection velocity control. This scheme allows an independent design of set-point tracking and load rejection and has good system robustness. The implementation of the double-controller scheme for injection velocity control is discussed. Special techniques such as profile transformation and shifting are also introduced to improve the velocity responses. The proposed velocity control has been experimentally demonstrated to be effective for a wide range of processing conditions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The detection of line-like features in images finds many applications in microanalysis. Actin fibers, microtubules, neurites, pilis, DNA, and other biological structures all come up as tenuous curved lines in microscopy images. A reliable tracing method that preserves the integrity and details of these structures is particularly important for quantitative analyses. We have developed a new image transform called the "Coalescing Shortest Path Image Transform" with very encouraging properties. Our scheme efficiently combines information from an extensive collection of shortest paths in the image to delineate even very weak linear features. © Copyright Microscopy Society of America 2011.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Unidirectional inductive power transfer (UIPT) systems allow loads to consume power while bidirectional IPT (BIPT) systems are more suitable for loads requiring two way power flow such as vehicle to grid (V2G) applications with electric vehicles (EVs). Many attempts have been made to improve the performance of BIPT systems. In a typical BIPT system, the output power is control using the pickup converter phase shift angle (PSA) while the primary converter regulates the input current. This paper proposes an optimized phase shift modulation strategy to minimize the coil losses of a series – series (SS) compensated BIPT system. In addition, a comprehensive study on the impact of power converters on the overall efficiency of the system is also presented. A closed loop controller is proposed to optimize the overall efficiency of the BIPT system. Theoretical results are presented in comparison to both simulations and measurements of a 0.5 kW prototype to show the benefits of the proposed concept. Results convincingly demonstrate the applicability of the proposed system offering high efficiency over a wide range of output power.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A virtual power system can be interfaced with a physical system to form a power hardware-in-the-loop (PHIL) simulation. In this scheme, the virtual system can be simulated in a fast parallel processor to provide near real-time outputs, which then can be interfaced to a physical hardware that is called the hardware under test (HuT). Stable operation of the entire system, while maintaining acceptable accuracy, is the main challenge of a PHIL simulation. In this paper, after an extended stability analysis for voltage and current type interfaces, some guidelines are provided to have a stable PHIL simulation. The presented analysis have been evaluated by performing several experimental tests using a Real Time Digital Simulator (RTDS™) and a voltage source converter (VSC). The practical test results are consistent with the proposed analysis.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The recognition of the potential efficacy of plasmid DNA (pDNA) molecules as vectors in the treatment and prevention of emerging diseases has birthed the confidence to combat global pandemics. This is due to the close-to-zero safety concern associated with pDNA vectors compared to viral vectors in cell transfection and targeting. Considerable attention has been paid to the potential of pDNA vectors but comparatively less thought has been given to the practical challenges in producing large quantities to meet current rising demands. A pilot-scale fermentation scheme was developed by employing a stoichiometrically-designed growth medium whose exceptional plasmid yield performance was attested in a shake flask environment for pUC19 and pEGFP-N1 transformed into E. coliDH5α and E. coliJM109, respectively. Batch fermentation of E. coliDH5α-pUC19 employing the stoichiometric medium displayed a maximum plasmid volumetric and specific yield of 62.6 mg/L and 17.1 mg/g (mg plasmid/g dry cell weight), respectively. Fed-batch fermentation of E. coliDH5α-pUC19 on a glycerol substrate demonstrated one of the highest ever reported pilot-scale plasmid specific yield of 48.98 mg/g and a volumetric yield of 0.53 g/L. The attainment of high plasmid specific yields constitutes a decrease in plasmid manufacturing cost and enhances the effectiveness of downstream processes by reducing the proportion of intracellular impurities. The effect of step-rise temperature induction was also considered to maximize ColE1-origin plasmid replication.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Halevi and Krawczyk proposed a message randomization algorithm called RMX as a front-end tool to the hash-then-sign digital signature schemes such as DSS and RSA in order to free their reliance on the collision resistance property of the hash functions. They have shown that to forge a RMX-hash-then-sign signature scheme, one has to solve a cryptanalytical task which is related to finding second preimages for the hash function. In this article, we will show how to use Dean’s method of finding expandable messages for finding a second preimage in the Merkle-Damgård hash function to existentially forge a signature scheme based on a t-bit RMX-hash function which uses the Davies-Meyer compression functions (e.g., MD4, MD5, SHA family) in 2 t/2 chosen messages plus 2 t/2 + 1 off-line operations of the compression function and similar amount of memory. This forgery attack also works on the signature schemes that use Davies-Meyer schemes and a variant of RMX published by NIST in its Draft Special Publication (SP) 800-106. We discuss some important applications of our attack.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background Despite the widely recognised importance of sustainable health care systems, health services research remains generally underfunded in Australia. The Australian Centre for Health Services Innovation (AusHSI) is funding health services research in the state of Queensland. AusHSI has developed a streamlined protocol for applying and awarding funding using a short proposal and accelerated peer review. Method An observational study of proposals for four health services research funding rounds from May 2012 to November 2013. A short proposal of less than 1,200 words was submitted using a secure web-based portal. The primary outcome measures are: time spent preparing proposals; a simplified scoring of grant proposals (reject, revise or accept for interview) by a scientific review committee; and progressing from submission to funding outcomes within eight weeks. Proposals outside of health services research were deemed ineligible. Results There were 228 eligible proposals across 4 funding rounds: from 29% to 79% were shortlisted and 9% to 32% were accepted for interview. Success rates increased from 6% (in 2012) to 16% (in 2013) of eligible proposals. Applicants were notified of the outcomes within two weeks from the interview; which was a maximum of eight weeks after the submission deadline. Applicants spent 7 days on average preparing their proposal. Applicants with a ranking of reject or revise received written feedback and suggested improvements for their proposals, and resubmissions composed one third of the 2013 rounds. Conclusions The AusHSI funding scheme is a streamlined application process that has simplified the process of allocating health services research funding for both applicants and peer reviewers. The AusHSI process has minimised the time from submission to notification of funding outcomes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Researchers spend an average of 38 working days preparing an NHMRC Project Grant proposal, but with success rates of just 15% then over 500 years of researcher went into failed applications in 2014. This time would likely have been better spent on actual research. Many applications are non-competitive and could possibly be culled early, saving time for both researchers and funding agencies. Our analysis of the major health and medical scheme in Australia estimated that 61% of applications were never likely to be funded...

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In recent years, there has been a rise in the number of people seeking asylum in Australia, resulting in over-crowded detention centres in various parts of the country. Appropriate management and assistance of asylum seekers has been an issue of major socio-political concern. In mid-2012, the Australian ruling government introduced a ‘first of its kind’ community placement initiative, which involved relocating low-risk asylum seekers from detention centres to homes of those Australian families who volunteered for this program. The present study investigated host families’ motivations for volunteering into this scheme and their resulting experiences. Twenty-four men and women from all over Australia were interviewed in person or over the telephone. Consistent with theoretical frameworks of altruism, acculturation, and intergroup contact, thematic analysis indicated participants’ interest in diversity/humanitarian issues were major factors that motivated them to host asylum seekers. Language and cultural barriers were reported as challenges, but generally, participants found the experience positive and rewarding. The initiative was regarded as an excellent avenue of learning about new cultures. The hosts played a strong role in promoting the English language proficiency and intercultural settlement of the asylum seekers. The scheme was considered as one way of diffusing fear/biases against asylum seekers prevalent amongst the Australian community at-large. Participants also provided suggestions to improve the scheme.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The NLM stream cipher designed by Hoon Jae Lee, Sang Min Sung, Hyeong Rag Kim is a strengthened version of the LM summation generator that combines linear and non-linear feedback shift registers. In recent works, the NLM cipher has been used for message authentication in lightweight communication over wireless sensor networks and for RFID authentication protocols. The work analyses the security of the NLM stream cipher and the NLM-MAC scheme that is built on the top of the NLM cipher. We first show that the NLM cipher suffers from two major weaknesses that lead to key recovery and forgery attacks. We prove the internal state of the NLM cipher can be recovered with time complexity about nlog7×2, where the total length of internal state is 2⋅n+22⋅n+2 bits. The attack needs about n2n2 key-stream bits. We also show adversary is able to forge any MAC tag very efficiently by having only one pair (MAC tag, ciphertext). The proposed attacks are practical and break the scheme with a negligible error probability.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In providing simultaneous information on expression profiles for thousands of genes, microarray technologies have, in recent years, been largely used to investigate mechanisms of gene expression. Clustering and classification of such data can, indeed, highlight patterns and provide insight on biological processes. A common approach is to consider genes and samples of microarray datasets as nodes in a bipartite graphs, where edges are weighted e.g. based on the expression levels. In this paper, using a previously-evaluated weighting scheme, we focus on search algorithms and evaluate, in the context of biclustering, several variations of Genetic Algorithms. We also introduce a new heuristic “Propagate”, which consists in recursively evaluating neighbour solutions with one more or one less active conditions. The results obtained on three well-known datasets show that, for a given weighting scheme,optimal or near-optimal solutions can be identified.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper addresses the development of trust in the use of Open Data through incorporation of appropriate authentication and integrity parameters for use by end user Open Data application developers in an architecture for trustworthy Open Data Services. The advantages of this architecture scheme is that it is far more scalable, not another certificate-based hierarchy that has problems with certificate revocation management. With the use of a Public File, if the key is compromised: it is a simple matter of the single responsible entity replacing the key pair with a new one and re-performing the data file signing process. Under this proposed architecture, the the Open Data environment does not interfere with the internal security schemes that might be employed by the entity. However, this architecture incorporates, when needed, parameters from the entity, e.g. person who authorized publishing as Open Data, at the time that datasets are created/added.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In 2008 the Australian government introduced the National Rental Affordability Scheme (NRAS) to increase the supply of affordable rental in Australia. This Federal Government initiative was progressively rolled out through four different rounds over the years with fifth round to be announced some time in 2014. Although the scheme has been successful evident there have been numerous setbacks experienced. This paper focuses on understanding lessons learnt from the performance of the scheme to make recommendations for future government initiatives. This evaluation is based on the combination of document analysis, government officers as well as approved NRAS participants operating throughout Queensland. The most significant challenges for the NRAS participants is the involvement of three levels government which cause delays in the scheme approval process.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In making this submission, we suggest that Australia learn from the experiences of other jurisdictions, and avoid some of the mistakes that have been made. In particular, this involves: * Ensuring that adequate information is available to evaluate the success of the scheme * Ensuring that notices sent to consumers provide full and accurate information that helps them understand their rights and options * Limiting the potential abuse of the system, and particularly attempts to intimidate consumers into paying unfair penalties through ‘speculative invoicing’ * Avoiding the potential for actual or perceived bias in the scheme’s oversight body