964 resultados para self-deployment algorithms
Resumo:
Halogen bonding has been observed for the first time between an isoindoline nitroxide and an iodoperfluorocarbon (see figure), which cocrystallize to form a discrete 2:1 supramolecular compound in which NO.⋅⋅⋅I halogen bonding is the dominant intermolecular interaction. This illustrates the potential use of halogen bonding and isoindoline nitroxide tectons for the assembly of organic spin systems...
Resumo:
Attachment, fear of intimacy and differentiation of self were examined by means of self-report questionnaires in 158 volunteers, including 99 clients enrolled in addiction treatment programs. As expected, clients (who were undergoing treatment for alcoholism, heroin addiction, amphetamine/cocaine addiction or cannabis abuse) reported higher levels of insecure attachment and fear of intimacy, and lower levels of secure attachment and differentiation of self, compared to controls. Insecure attachment, high fear of intimacy and low self-differentiation appear to characterize clients enrolled in addiction treatment programs. Such characteristics may reflect a predisposition to substance problems, an effect of chronic substance problems, or conceivably both.
Resumo:
Despite the challenges that giftedness can add to self-formation during early adolescence, gifted young adolescents seldom are asked about their lives outside of counselling and educational contexts. The study considers the complexities that face gifted young adolescents in the process of self-discovery and self-representation, thereby building a case for seeking their own viewpoints. A guiding assumption for the study was that gifted young adolescents may respond positively to the opportunity to share their own perspectives and their own versions of “who they are”. The theoretical underpinnings for this study drew from Dialogical Self Theory. The study resides within an interactive view of self as a dynamic construction rather than a static state, where “who we are” is formed in everyday exchanges with self and others. Self-making as a process among gifted young adolescents is presented as an interactive network of “I” voices interpreted to reflect internal and external dialogue. In this way, self is understood within dialogical concepts of voices as multiple expressions. The study invited twelve gifted young adolescents to write freely about themselves over a six month period in an email journal project. Participants were recruited online and by word-of-mouth and they were able to negotiate their own levels of involvement. Access to the lives of individual young adolescents was sought in an out-of-school setting using narrative methods of personal writing in the form of journals sent as emails to the researcher. The role of the researcher was to act as a supportive listener who responded to participant-led emails and thereby facilitated the process of authoring that occurred across the data-gathering phase. The listening process involved responses that were affirming and designed to build trust. Data in the form of email texts were analysed using a close listening method that uncovered patterns of voices that were explicitly or subtly expressed by participants. The interpretation of voices highlighted the tensions and contradictions involved in the process of participants forming a “self” that emerged as multiple “I” voices. There were three key findings of the study. First, the gifted young adolescent participants each constructed a self around four key voices of Author, Achiever, Resistor/Co-operator and Self-Innovator. These voices were dialogical selfconstructions that showed multiplicity as a normal way of being. Second, the selfmaking processes of the gifted young adolescent participants were guided by a hierarchy of voices that were directed through self-awareness. Third, authoring in association with a responsive adult listener emerged as a dialogic space for promoting self-awareness and a language of self-expression among gifted young adolescents. The findings of the study contribute to knowledge about gifted young adolescents by presenting their own versions of “who” they are, perspectives that might differ from mainstream perceptions. Participants were shown to have highly diverse, complex and individual expressions that have implications for how well they are understood and supported by others. The use of email journals helped to create a synergy for self-disclosure and a safe space for self-expression where participants’ abilities to be themselves were encouraged. Increased self-awareness and selfknowledge among gifted young adolescents is vital to their self-formation and their management of self and others’ expectations. This study makes an original contribution to the field of self-study by highlighting the processes and complexities of young adolescents’ self-constructions. Through the innovative use of narrative methods and an inter-disciplinary approach, the voices of gifted young adolescents were privileged. At a practical level, the study can inform educators, policy-makers, parents and all those who seek to contribute to the well-being of gifted young adolescents.
Resumo:
Aim. This paper is a report of a study to explore rural nurses' experiences of mentoring. Background. Mentoring has recently been proposed by governments, advocates and academics as a solution to the problem for retaining rural nurses in the Australian workforce. Action in the form of mentor development workshops has changed the way that some rural nurses now construct supportive relationships as mentoring. Method. A grounded theory design was used with nine rural nurses. Eleven semi-structured interviews were conducted in various states of Australia during 2004-2005. Situational analysis mapping techniques and frame analysis were used in combination with concurrent data generation and analysis and theoretical sampling. Findings. Experienced rural nurses cultivate novices through supportive mentoring relationships. The impetus for such relationships comes from their own histories of living and working in the same community, and this was termed 'live my work'. Rural nurses use multiple perspectives of self in order to manage their interactions with others in their roles as community members, consumers of healthcare services and nurses. Personal strategies adapted to local context constitute the skills that experienced rural nurses pass-on to neophyte rural nurses through mentoring, while at the same time protecting them through troubleshooting and translating local cultural norms. Conclusion. Living and working in the same community creates a set of complex challenges for novice rural nurses that are better faced with a mentor in place. Thus, mentoring has become an integral part of experienced rural nurses' practice to promote staff retention. © 2007 The Authors.
Resumo:
Purpose: To compare self-reported driving difficulty by persons with hemianopic or quadrantanopic field loss with that reported by age-matched drivers with normal visual fields; and to examine how their self- reported driving difficulty compares to ratings of driving performance provided by a certified driving rehabilitation specialist(CDRS). Method: Participants were 17 persons with hemianopic field loss, 7 with quadrantanopic loss, and 24 age-matched controls with normal visual fields, all of whom had current drivers’ licenses. Information was collected via questionnaire regarding driving difficulties experienced in 21 typical driving situations grouped into 3 categories(involvement of peripheral vision, low visibility conditions, and independent mobility). On-road driving performance was evaluated by a CDRS using a standard assessment scale. Results: Drivers with hemianopic and quadrantanopic field loss expressed significantly more difficulty with driving maneuvers involving peripheral vision and independent mobility, compared to those with normal visual fields. Drivers with hemianopia and quadrantanopia who were rated as unsafe to drive based upon an on-road assessment by the CDRS were no more likely to report driving difficulty than those rated as safe. Conclusion: This study highlights aspects of driving that hemianopic or quadrantanopic persons find particularly problematic, thus suggesting areas that could be focused on driving rehabilitation. Some drivers with hemianopia or quadrantanopia may inappropriately view themselves as good drivers when in fact their driving performance is unsafe as judged by a driving professional.
Resumo:
The CIGRE WGs A3.20 and A3.24 identify the requirements of simulation tools to predict various stresses during the development and operational phases of medium voltage vacuum circuit breaker (VCB) testing. This paper reviews the modelling methodology [13], VCB models and tools to identify future research. It will include the application of the VCB model for the impending failure of a VCB using electro-magnetic-transient-program with diagnostic and prognostic algorithm development. The methodology developed for a VCB degradation model is to modify the dielectric equation to cover a restriking period of more than 1 millimetre.
Resumo:
This article analyses the legality of Israel’s 2007 airstrike on an alleged Syrian nuclear facility at Al-Kibar—an incident that has been largely overlooked by international lawyers to date. The absence of a threat of imminent attack from Syria means Israel’s military action was not a lawful exercise of anticipatory self-defence. Yet, despite Israel’s clear violation of the prohibition on the use of force there was remarkably little condemnation from other states, suggesting the possibility of growing international support for the doctrine of pre-emptive self-defence. This article argues that the muted international reaction to Israel’s pre-emptive action was the result of political factors, and should not be seen as endorsement of the legality of the airstrike. As such, a lack of opinio juris means the Al-Kibar episode cannot be viewed as extending the scope of the customary international law right of self-defence so as to permit the use of force against non-imminent threats. However, two features of this incident—namely, Israel’s failure to offer any legal justification for its airstrike, and the international community’s apparent lack of concern over legality—are also evident in other recent uses of force in the ‘war on terror’ context. These developments may indicate a shift in state practice involving a downgrading of the role of international law in discussions of the use of force. This may signal a declining perception of the legitimacy of the jus ad bellum, at least in cases involving minor uses of force.
Resumo:
Most web service discovery systems use keyword-based search algorithms and, although partially successful, sometimes fail to satisfy some users information needs. This has given rise to several semantics-based approaches that look to go beyond simple attribute matching and try to capture the semantics of services. However, the results reported in the literature vary and in many cases are worse than the results obtained by keyword-based systems. We believe the accuracy of the mechanisms used to extract tokens from the non-natural language sections of WSDL files directly affects the performance of these techniques, because some of them can be more sensitive to noise. In this paper three existing tokenization algorithms are evaluated and a new algorithm that outperforms all the algorithms found in the literature is introduced.
Resumo:
Research related to personal epistemology in teacher education indicates that teachers’ beliefs about knowing and learning influence their pedagogical practices. In the current study, we interviewed 31 child care students to investigate the relationship between personal epistemology and beliefs about children’s learning as they engaged in teaching practices with young children. We drew on self authorship theory to analyze this data, which considers the evolving capacity of learners to analyze and make informed judgments about knowledge (personal epistemology)in the light of their professional identity (intrapersonal beliefs) and interdependent social relationships (interpersonal beliefs). The majority of students described practical personal epistemologies which involved either modeling, reflection on, or evaluation of practical strategies. These epistemologies have implications for child care teachers’ professional identities and their relationships with families, children, and staff in child care contexts.
Resumo:
This important work describes recent theoretical advances in the study of artificial neural networks. It explores probabilistic models of supervised learning problems, and addresses the key statistical and computational questions. Chapters survey research on pattern classification with binary-output networks, including a discussion of the relevance of the Vapnik Chervonenkis dimension, and of estimates of the dimension for several neural network models. In addition, Anthony and Bartlett develop a model of classification by real-output networks, and demonstrate the usefulness of classification with a "large margin." The authors explain the role of scale-sensitive versions of the Vapnik Chervonenkis dimension in large margin classification, and in real prediction. Key chapters also discuss the computational complexity of neural network learning, describing a variety of hardness results, and outlining two efficient, constructive learning algorithms. The book is self-contained and accessible to researchers and graduate students in computer science, engineering, and mathematics
Resumo:
The use of adaptive wing/aerofoil designs is being considered, as they are promising techniques in aeronautic/ aerospace since they can reduce aircraft emissions and improve aerodynamic performance of manned or unmanned aircraft. This paper investigates the robust design and optimization for one type of adaptive techniques: active flow control bump at transonic flow conditions on a natural laminar flow aerofoil. The concept of using shock control bump is to control supersonic flow on the suction/pressure side of natural laminar flow aerofoil that leads to delaying shock occurrence (weakening its strength) or boundary layer separation. Such an active flow control technique reduces total drag at transonic speeds due to reduction of wave drag. The location of boundary-layer transition can influence the position and structure of the supersonic shock on the suction/pressure side of aerofoil. The boundarylayer transition position is considered as an uncertainty design parameter in aerodynamic design due to the many factors, such as surface contamination or surface erosion. This paper studies the shock-control-bump shape design optimization using robust evolutionary algorithms with uncertainty in boundary-layer transition locations. The optimization method is based on a canonical evolution strategy and incorporates the concepts of hierarchical topology, parallel computing, and asynchronous evaluation. The use of adaptive wing/aerofoil designs is being considered, as they are promising techniques in aeronautic/ aerospace since they can reduce aircraft emissions and improve aerodynamic performance of manned or unmanned aircraft. This paper investigates the robust design and optimization for one type of adaptive techniques: active flow control bump at transonic flow conditions on a natural laminar flow aerofoil. The concept of using shock control bump is to control supersonic flow on the suction/pressure side of natural laminar flow aerofoil that leads to delaying shock occurrence (weakening its strength) or boundary-layer separation. Such an active flow control technique reduces total drag at transonic speeds due to reduction of wave drag. The location of boundary-layer transition can influence the position and structure of the supersonic shock on the suction/pressure side of aerofoil. The boundarylayer transition position is considered as an uncertainty design parameter in aerodynamic design due to the many factors, such as surface contamination or surface erosion. This paper studies the shock-control-bump shape design optimization using robust evolutionary algorithms with uncertainty in boundary-layer transition locations. The optimization method is based on a canonical evolution strategy and incorporates the concepts of hierarchical topology, parallel computing, and asynchronous evaluation. Two test cases are conducted: the first test assumes the boundary-layer transition position is at 45% of chord from the leading edge, and the second test considers robust design optimization for the shock control bump at the variability of boundary-layer transition positions. The numerical result shows that the optimization method coupled to uncertainty design techniques produces Pareto optimal shock-control-bump shapes, which have low sensitivity and high aerodynamic performance while having significant total drag reduction.
Resumo:
This study investigates the application of two advanced optimization methods for solving active flow control (AFC) device shape design problem and compares their optimization efficiency in terms of computational cost and design quality. The first optimization method uses hierarchical asynchronous parallel multi-objective evolutionary algorithm and the second uses hybridized evolutionary algorithm with Nash-Game strategies (Hybrid-Game). Both optimization methods are based on a canonical evolution strategy and incorporate the concepts of parallel computing and asynchronous evaluation. One type of AFC device named shock control bump (SCB) is considered and applied to a natural laminar flow (NLF) aerofoil. The concept of SCB is used to decelerate supersonic flow on suction/pressure side of transonic aerofoil that leads to a delay of shock occurrence. Such active flow technique reduces total drag at transonic speeds which is of special interest to commercial aircraft. Numerical results show that the Hybrid-Game helps an EA to accelerate optimization process. From the practical point of view, applying a SCB on the suction and pressure sides significantly reduces transonic total drag and improves lift-to-drag (L/D) value when compared to the baseline design.
Resumo:
Log-linear and maximum-margin models are two commonly-used methods in supervised machine learning, and are frequently used in structured prediction problems. Efficient learning of parameters in these models is therefore an important problem, and becomes a key factor when learning from very large data sets. This paper describes exponentiated gradient (EG) algorithms for training such models, where EG updates are applied to the convex dual of either the log-linear or max-margin objective function; the dual in both the log-linear and max-margin cases corresponds to minimizing a convex function with simplex constraints. We study both batch and online variants of the algorithm, and provide rates of convergence for both cases. In the max-margin case, O(1/ε) EG updates are required to reach a given accuracy ε in the dual; in contrast, for log-linear models only O(log(1/ε)) updates are required. For both the max-margin and log-linear cases, our bounds suggest that the online EG algorithm requires a factor of n less computation to reach a desired accuracy than the batch EG algorithm, where n is the number of training examples. Our experiments confirm that the online algorithms are much faster than the batch algorithms in practice. We describe how the EG updates factor in a convenient way for structured prediction problems, allowing the algorithms to be efficiently applied to problems such as sequence learning or natural language parsing. We perform extensive evaluation of the algorithms, comparing them to L-BFGS and stochastic gradient descent for log-linear models, and to SVM-Struct for max-margin models. The algorithms are applied to a multi-class problem as well as to a more complex large-scale parsing task. In all these settings, the EG algorithms presented here outperform the other methods.
Resumo:
We consider the problem of structured classification, where the task is to predict a label y from an input x, and y has meaningful internal structure. Our framework includes supervised training of Markov random fields and weighted context-free grammars as special cases. We describe an algorithm that solves the large-margin optimization problem defined in [12], using an exponential-family (Gibbs distribution) representation of structured objects. The algorithm is efficient—even in cases where the number of labels y is exponential in size—provided that certain expectations under Gibbs distributions can be calculated efficiently. The method for structured labels relies on a more general result, specifically the application of exponentiated gradient updates [7, 8] to quadratic programs.