936 resultados para shortest paths
Resumo:
This dissertation examines the origins of filial responsibility laws in Canada and the United States, laws which prescribe that adult children have an obligation of support which is owed to their parents. Filial responsibility laws enable an indigent parent, or an institution providing medical treatment and care to an indigent parent, to seek financial support from that parent’s adult children through the use of litigation. While those who favour these rarely-used laws claim that they bring many benefits to both the family and the state, there is little evidence to suggest that such benefits are actualized. The development and use of the laws in Canada and the United States make it clear that the limitation of the expenditure of government funds was the primary motive for these laws and the support of families a distant secondary motive.
Resumo:
The Internet has grown in size at rapid rates since BGP records began, and continues to do so. This has raised concerns about the scalability of the current BGP routing system, as the routing state at each router in a shortest-path routing protocol will grow at a supra-linearly rate as the network grows. The concerns are that the memory capacity of routers will not be able to keep up with demands, and that the growth of the Internet will become ever more cramped as more and more of the world seeks the benefits of being connected. Compact routing schemes, where the routing state grows only sub-linearly relative to the growth of the network, could solve this problem and ensure that router memory would not be a bottleneck to Internet growth. These schemes trade away shortest-path routing for scalable memory state, by allowing some paths to have a certain amount of bounded “stretch”. The most promising such scheme is Cowen Routing, which can provide scalable, compact routing state for Internet routing, while still providing shortest-path routing to nearly all other nodes, with only slightly stretched paths to a very small subset of the network. Currently, there is no fully distributed form of Cowen Routing that would be practical for the Internet. This dissertation describes a fully distributed and compact protocol for Cowen routing, using the k-core graph decomposition. Previous compact routing work showed the k-core graph decomposition is useful for Cowen Routing on the Internet, but no distributed form existed. This dissertation gives a distributed k-core algorithm optimised to be efficient on dynamic graphs, along with with proofs of its correctness. The performance and efficiency of this distributed k-core algorithm is evaluated on large, Internet AS graphs, with excellent results. This dissertation then goes on to describe a fully distributed and compact Cowen Routing protocol. This protocol being comprised of a landmark selection process for Cowen Routing using the k-core algorithm, with mechanisms to ensure compact state at all times, including at bootstrap; a local cluster routing process, with mechanisms for policy application and control of cluster sizes, ensuring again that state can remain compact at all times; and a landmark routing process is described with a prioritisation mechanism for announcements that ensures compact state at all times.
Resumo:
When multiple third-parties (states, coalitions, and international organizations) intervene in the same conflict, do their efforts inform one another? Anecdotal evidence suggests such a possibility, but research to date has not attempted to model this interdependence directly. The current project breaks with that tradition. In particular, it proposes three competing explanations of how previous intervention efforts affect current intervention decisions: a cost model (and a variant on it, a limited commitments model), a learning model, and a random model. After using a series of Markov transition (regime-switching) models to evaluate conflict management behavior within militarized interstate disputes in the 1946-2001 period, this study concludes that third-party intervention efforts inform one another. More specifically, third-parties examine previous efforts and balance their desire to manage conflict with their need to minimize intervention costs (the cost and limited commitments models). As a result, third-parties intervene regularly using verbal pleas and mediation, but rely significantly less frequently on legal, administrative, or peace operations strategies. This empirical threshold to the intervention costs that third-parties are willing to bear has strong theoretical foundations and holds across different time periods and third-party actors. Furthermore, the analysis indicates that the first third-party to intervene in a conflict is most likely to use a strategy designed to help the disputants work toward a resolution of their dispute. After this initial intervention, the level of third-party involvement declines and often devolves into a series of verbal pleas for peace. Such findings cumulatively suggest that disputants hold the key to effective conflict management. If the disputants adopt and maintain an extreme bargaining position or fail to encourage third-parties to accept greater intervention costs, their dispute will receive little more than verbal pleas for negotiations and peace.
Resumo:
On the one hand it has been advanced that remnant movement (RM) serves as a replacement for head movement and leads to certain permutations in word order while it disallows some others (e.g. Cinque (2005)), on the other hand, little attention has been devoted to the consequences RM has for clausal syntax. In this work, I illustrate one such consequence, namely the rise of crossing and nesting movement dependencies and their reflexes. In particular, I make a case for the existence of massive RM that involves entire clausal subtrees in Polish. The analysis provides a uniform solution to three robust puzzles in the Polish OVS construction in a straightforward way.
Resumo:
Nowadays, the development of the photovoltaic (PV) technology is consolidated as a source of renewable energy. The research in the topic of maximum improvement on the energy efficiency of the PV plants is today a major challenge. The main requirement for this purpose is to know the performance of each of the PV modules that integrate the PV field in real time. In this respect, a PLC communications based Smart Monitoring and Communications Module, which is able to monitor at PV level their operating parameters, has been developed at the University of Malaga. With this device you can check if any of the panels is suffering any type of overriding performance, due to a malfunction or partial shadowing of its surface. Since these fluctuations in electricity production from a single panel affect the overall sum of all panels that conform a string, it is necessary to isolate the problem and modify the routes of energy through alternative paths in case of PV panels array configuration.
Resumo:
A method is presented for accurate measurement of spectral flux-reflectance (albedo) in a laboratory, for media with long optical path lengths, such as snow and ice. The approach uses an acrylic hemispheric dome, which, when placed over the surface being studied, serves two functions: (i) it creates an overcast “sky” to illuminate the target surface from all directions within a hemisphere, and (ii) serves as a platform for measuring incident and backscattered spectral radiances, which can be integrated to obtain fluxes. The fluxes are relative measurements and because their ratio is used to determine flux-reflectance, no absolute radiometric calibrations are required. The dome and surface must meet minimum size requirements based on the scattering properties of the surface. This technique is suited for media with long photon path lengths since the backscattered illumination is collected over a large enough area to include photons that reemerge from the domain far from their point of entry because of multiple scattering and small absorption. Comparison between field and laboratory albedo of a portable test surface demonstrates the viability of this method.
Resumo:
This article aims to address the history of language from Antiquity to the structuralism of Saussure (2003) relating the concepts of language and sign language with the assumptions of Sociolinguistics, the science of language use in society. It is a succinct and objective approach of the various currents of thought about language throughout history, on the relationship between linguistic structure and social aspects and the close relationship between language, identity and society. This approach could also serve as a foundation more uniform for any student of language in their first steps on the road studies and research on this topic.
Resumo:
The focus on the study of word classes from a morphosyntactic-semantic approach seems to have been somewhat neglected when compared to the attention given to textual genres. We do not say that different textual genres should not be considered, on the contrary, they should be studied, but it is also necessary to remember the importance of word classes in terms of their function as cohesive, modal, hyperonym, argumentative, substitution and reference elements among various other functions in reading and in text production. This paper presents a reflection about the importance of a theoretical view for the production and comprehension of various text genres.
Resumo:
Hand hygiene is critical in the healthcare setting and it is believed that methicillin-resistant Staphylococcus aureus (MRSA), for example, is transmitted from patient to patient largely via the hands of health professionals. A study has been carried out at a large teaching hospital to estimate how often the gloves of a healthcare worker are contaminated with MRSA after contact with a colonized patient. The effectiveness of handwashing procedures to decontaminate the health professionals' hands was also investigated, together with how well different healthcare professional groups complied with handwashing procedures. The study showed that about 17% (9–25%) of contacts between a healthcare worker and a MRSA-colonized patient results in transmission of MRSA from a patient to the gloves of a healthcare worker. Different health professional groups have different rates of compliance with infection control procedures. Non-contact staff (cleaners, food services) had the shortest handwashing times. In this study, glove use compliance rates were 75% or above in all healthcare worker groups except doctors whose compliance was only 27%.
Resumo:
This paper suggests ways for educators and designers to understand and merge priorities in order to inform the development of mobile learning (m-learning) applications that maximise user experiences and hence learning opportunities. It outlines a User Experience Design (UXD) theory and development process that requires designers to conduct a thorough initial contextual inquiry into a particular domain in order to set project priorities and development guidelines. A matrix that identifies the key contextual considerations namely the social, cultural, spatial, technical and temporal constructs of any domain is presented as a vital tool for achieving successful UXD. The frame of reference provided by this matrix ensures that decisions made throughout the design process are attributable to a desired user experience. To illustrate how the proposed UXD theory and development process supports the creation of effective m-learning applications, this paper documents the development process of MILK (Mobile Informal Learning Kit). MILK is a support tool that allows teachers and students to develop event paths that consist of a series SMS question and answer messages that lead players through a series of checkpoints between point A and point B. These event paths can be designed to suit desired learning scenarios and can be used to explore a particular place or subject. They can also be designed to facilitate formal or informal learning experiences.
Resumo:
With the advent of Service Oriented Architecture, Web Services have gained tremendous popularity. Due to the availability of a large number of Web services, finding an appropriate Web service according to the requirement of the user is a challenge. This warrants the need to establish an effective and reliable process of Web service discovery. A considerable body of research has emerged to develop methods to improve the accuracy of Web service discovery to match the best service. The process of Web service discovery results in suggesting many individual services that partially fulfil the user’s interest. By considering the semantic relationships of words used in describing the services as well as the use of input and output parameters can lead to accurate Web service discovery. Appropriate linking of individual matched services should fully satisfy the requirements which the user is looking for. This research proposes to integrate a semantic model and a data mining technique to enhance the accuracy of Web service discovery. A novel three-phase Web service discovery methodology has been proposed. The first phase performs match-making to find semantically similar Web services for a user query. In order to perform semantic analysis on the content present in the Web service description language document, the support-based latent semantic kernel is constructed using an innovative concept of binning and merging on the large quantity of text documents covering diverse areas of domain of knowledge. The use of a generic latent semantic kernel constructed with a large number of terms helps to find the hidden meaning of the query terms which otherwise could not be found. Sometimes a single Web service is unable to fully satisfy the requirement of the user. In such cases, a composition of multiple inter-related Web services is presented to the user. The task of checking the possibility of linking multiple Web services is done in the second phase. Once the feasibility of linking Web services is checked, the objective is to provide the user with the best composition of Web services. In the link analysis phase, the Web services are modelled as nodes of a graph and an allpair shortest-path algorithm is applied to find the optimum path at the minimum cost for traversal. The third phase which is the system integration, integrates the results from the preceding two phases by using an original fusion algorithm in the fusion engine. Finally, the recommendation engine which is an integral part of the system integration phase makes the final recommendations including individual and composite Web services to the user. In order to evaluate the performance of the proposed method, extensive experimentation has been performed. Results of the proposed support-based semantic kernel method of Web service discovery are compared with the results of the standard keyword-based information-retrieval method and a clustering-based machine-learning method of Web service discovery. The proposed method outperforms both information-retrieval and machine-learning based methods. Experimental results and statistical analysis also show that the best Web services compositions are obtained by considering 10 to 15 Web services that are found in phase-I for linking. Empirical results also ascertain that the fusion engine boosts the accuracy of Web service discovery by combining the inputs from both the semantic analysis (phase-I) and the link analysis (phase-II) in a systematic fashion. Overall, the accuracy of Web service discovery with the proposed method shows a significant improvement over traditional discovery methods.
Resumo:
This article compares and contrasts the growth of Chinese and Korean multinational enterprises (MNEs). The article identifies the similarities and differences between Chinese and Korean MNEs in terms of motivations for internationalization, expansion strategies, and paths. The goal of this article is to contribute to the literature by shifting focus on host-country conditions to home-country conditions in explaining the drivers for firms' internationalization. We conclude that firms are motivated to expand abroad when faced with domestic competitive disadvantages resulting from absence or deficiency of one or more of Porter's Diamond attributes in their domestic market. Implications for further studies are also explored.
Resumo:
In dynamic environments, firms seek to build capabilities which will permit them to become innovation and change ready. Programs offered by intermediaries, while varying greatly in content and format, are designed to support those firms wishing to enhance their competitiveness. Firms which participate in intermediary programs have displayed their willingness to overcome deficiencies or barriers to competitiveness through acquiring knowledge which is external to the firm. This paper reports on interviews with 24 firms who were involved in a MAP or TAP program offered by QMI Solutions. The findings of the research suggest that knowledge intermediaries serve to disrupt organisational paths and in so doing establish mechanisms for ongoing learning and change. They do this first by disrupting the firm with a positive learning experience and also by establishing processes for developing new relationships and access to knowledge which are critical for learning and change. It is the experience of learning through knowledge exchange which can trigger the pursuit of new paths and it is the processes involving new relations and knowledge processing that provides the micro-foundations for ongoing learning and change. This suggests that the role of intermediaries goes well beyond merely knowledge transfer to include longer term effects on the capability of organisations to innovate, which is critical to economic competitiveness and the survival rate of firms.
Resumo:
Security-critical communications devices must be evaluated to the highest possible standards before they can be deployed. This process includes tracing potential information flow through the device's electronic circuitry, for each of the device's operating modes. Increasingly, however, security functionality is being entrusted to embedded software running on microprocessors within such devices, so new strategies are needed for integrating information flow analyses of embedded program code with hardware analyses. Here we show how standard compiler principles can augment high-integrity security evaluations to allow seamless tracing of information flow through both the hardware and software of embedded systems. This is done by unifying input/output statements in embedded program execution paths with the hardware pins they access, and by associating significant software states with corresponding operating modes of the surrounding electronic circuitry.