918 resultados para Chevrolet Citation.


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Flow-insensitive solutions to dataflow problems have been known to be highly scalable; however also hugely imprecise. For non-separable dataflow problems this solution is further degraded due to spurious facts generated as a result of dependence among the dataflow facts. We propose an improvement to the standard flow-insensitive analysis by creating a generalized version of the dominator relation that reduces the number of spurious facts generated. In addition, the solution obtained contains extra information to facilitate the extraction of a better solution at any program point, very close to the flow-sensitive solution. To improve the solution further, we propose the use of an intra-block variable renaming scheme. We illustrate these concepts using two classic non-separable dataflow problems --- points-to analysis and constant propagation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: Fatigue is one of the most distressing and commonly experienced symptoms in patients with advanced cancer. Although the self-management (SM) of cancer-related symptoms has received increasing attention, no research instrument assessing fatigue SM outcomes for patients with advanced cancer is available. Objectives: to describe the development and preliminary testing of an interviewer administered instrument for assessing the frequency, and perceived levels of effectiveness and self-efficacy associated with fatigue SM behaviors in patients with advanced cancer. Methods: The development and testing of the Self-efficacy in Managing Symptoms Scale- Fatigue Subscale for Patients with Advanced Cancer (SMSFS-A) involved a number of procedures: item-generation using a comprehensive literature review and semi-structured interviews, content validity evaluation using expert panel reviews, and face validity and test-retest reliability evaluation using pilot testing. Results: Initially, 23 items (22 specific behaviors with one global item) were generated from the literature review and semi-structured interviews. After two rounds of expert panel review, the final scale was reduced to 17 items (16 behaviors with one global item). Participants in the pilot test (n=10) confirmed that the questions in this scale were clear and easy to understand. Bland-Altman analysis showed agreement of results over a one-week interval. Conclusions: The SMSFS-A items were generated using multiple sources. This tool demonstrated preliminary validity and reliability. Implications for practice: The SMSFS-A has the potential to be used for clinical and research purposes. Nurses can use this instrument for collecting data to inform the initiation of appropriate fatigue SM support for this population.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The research field of Business Process Management (BPM) has gradually developed as a discipline situated within the computer, management and information systems sciences. Its evolution has been shaped by its own conference series, the BPM conference. Still, as with any other academic discipline, debates accrue and persist, which target the identity as well as the quality and maturity of the BPM field. In this paper, we contribute to the debate on the identity and progress of the BPM conference research community through an analysis of the BPM conference proceedings. We develop an understanding of signs of progress of research presented at this conference, where, how, and why papers in this conference have had an impact, and the most appropriate formats for disseminating influential research in this conference. Based on our findings from this analysis, we provide conclusions about the state of the conference series and develop a set of recommendations to further develop the conference community in terms of research maturity, methodological advance, quality, impact, and progression.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

- Background In the UK, women aged 50–73 years are invited for screening by mammography every 3 years. In 2009–10, more than 2.24 million women in this age group in England were invited to take part in the programme, of whom 73% attended a screening clinic. Of these, 64,104 women were recalled for assessment. Of those recalled, 81% did not have breast cancer; these women are described as having a false-positive mammogram. - Objective The aim of this systematic review was to identify the psychological impact on women of false-positive screening mammograms and any evidence for the effectiveness of interventions designed to reduce this impact. We were also looking for evidence of effects in subgroups of women. - Data sources MEDLINE, MEDLINE In-Process & Other Non-Indexed Citations, EMBASE, Health Management Information Consortium, Cochrane Central Register for Controlled Trials, Cochrane Database of Systematic Reviews, Centre for Reviews and Dissemination (CRD) Database of Abstracts of Reviews of Effects, CRD Health Technology Assessment (HTA), Cochrane Methodology, Web of Science, Science Citation Index, Social Sciences Citation Index, Conference Proceedings Citation Index-Science, Conference Proceeding Citation Index-Social Science and Humanities, PsycINFO, Cumulative Index to Nursing and Allied Health Literature, Sociological Abstracts, the International Bibliography of the Social Sciences, the British Library's Electronic Table of Contents and others. Initial searches were carried out between 8 October 2010 and 25 January 2011. Update searches were carried out on 26 October 2011 and 23 March 2012. - Review methods Based on the inclusion criteria, titles and abstracts were screened independently by two reviewers. Retrieved papers were reviewed and selected using the same independent process. Data were extracted by one reviewer and checked by another. Each included study was assessed for risk of bias. - Results Eleven studies were found from 4423 titles and abstracts. Studies that used disease-specific measures found a negative psychological impact lasting up to 3 years. Distress increased with the level of invasiveness of the assessment procedure. Studies using instruments designed to detect clinical levels of morbidity did not find this effect. Women with false-positive mammograms were less likely to return for the next round of screening [relative risk (RR) 0.97; 95% confidence interval (CI) 0.96 to 0.98] than those with normal mammograms, were more likely to have interval cancer [odds ratio (OR) 3.19 (95% CI 2.34 to 4.35)] and were more likely to have cancer detected at the next screening round [OR 2.15 (95% CI 1.55 to 2.98)]. - Limitations This study was limited to UK research and by the robustness of the included studies, which frequently failed to report quality indicators, for example failure to consider the risk of bias or confounding, or failure to report participants' demographic characteristics. - Conclusions We conclude that the experience of having a false-positive screening mammogram can cause breast cancer-specific psychological distress that may endure for up to 3 years, and reduce the likelihood that women will return for their next round of mammography screening. These results should be treated cautiously owing to inherent weakness of observational designs and weaknesses in reporting. Future research should include a qualitative interview study and observational studies that compare generic and disease-specific measures, collect demographic data and include women from different social and ethnic groups.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A divide-and-correct algorithm is described for multiple-precision division in the negative base number system. In this algorithm an initial quotient estimate is obtained from suitable segmented operands; this is then corrected by simple rules to arrive at the true quotient.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Memoir describes her life in Germany, her decision to leave Germany after the death of her parents, and to work in the United States in 1934. Detailed description of every day life in Germany (after World War I) and in the United States, and later of various travels all over the world. Also mentions her German-Jewish ancestors on her maternal side (great-great-grandparents: Moritz and Fanny Hertz, great-grandmother: Helene Hertz nee Orthenberger), who had a textile business.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

It has been argued that transition points in life, such as the approach towards, and early years of retirement present key opportunities for interventions to improve the health of the population. Research has also highlighted inequalities in health status in the retired population and in response to interventions which should be addressed. We aimed to conduct a systematic review to synthesise international evidence on the types and effectiveness of interventions to increase physical activity among people around the time of retirement. A systematic review of literature was carried out between February 2014 and April 2015. Searches were not limited by language or location, but were restricted by date to studies published from 1990 onwards. Methods for identification of relevant studies included electronic database searching, reference list checking, and citation searching. Systematic search of the literature identified 104 papers which described study populations as being older adults. However, we found only one paper which specifically referred to their participants as being around the time of retirement. The intervention approaches for older adults encompassed: training of health care professionals; counselling and advice giving; group sessions; individual training sessions; in-home exercise programmes; in-home computer-delivered programmes; in-home telephone support; in-home diet and exercise programmes; and community-wide initiatives. The majority of papers reported some intervention effect, with evidence of positive outcomes for all types of programmes. A wide range of different measures were used to evaluate effectiveness, many were self-reported and few studies included evaluation of sedentary time. While the retirement transition is considered a significant point of life change, little research has been conducted to assess whether physical activity interventions at this time may be effective in promoting or maintaining activity, or reducing health inequalities. We were unable to find any evidence that the transition to retirement period was, or was not a significant point for intervention. Studies in older adults more generally indicated that a range of interventions might be effective for people around retirement age.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Business Process Management (BPM) as a research field integrates different perspectives from the disciplines computer science, management science and information systems research. Its evolution has by been shaped by the corresponding conferences series, the International Conference on Business Process Management (BPM conference). As much as in other academic discipline, there is an ongoing debate that discusses the identity, the quality and maturity of the BPM field. In this paper, we review and summarize the major findings a larger study that will be published in the Business & Information Systems Engineering journal in 2016. In the study, we investigate the identity and progress of the BPM conference research community through an analysis of the BPM conference proceedings. Based on our findings from this analysis, we formulate recommendations to further develop the conference community in terms of methodological advance, quality, impact and progression.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we analyse a block cipher mode of operation submitted in 2014 to the cryptographic competition for authenticated encryption (CAESAR). This mode is designed by Recacha and called ++AE (plus-plus-ae). We propose a chosen plaintext forgery attack on ++AE that requires only a single chosen message query to allow an attacker to construct multiple forged messages. Our attack is deterministic and guaranteed to pass ++AE integrity check. We demonstrate the forgery attack using 128-bit AES as the underlying block cipher. Hence, ++AE is insecure as an authenticated encryption mode of operation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Canonical forms for m-valued functions referred to as m-Reed-Muller canonical (m-RMC) forms that are a generalization of RMC forms of two-valued functions are proposed. m-RMC forms are based on the operations ?m (addition mod m) and .m (multiplication mod m) and do not, as in the cases of the generalizations proposed in the literature, require an m-valued function for m not a power of a prime, to be expressed by a canonical form for M-valued functions, where M > m is a power of a prime. Methods of obtaining the m-RMC forms from the truth vector or the sum of products representation of an m-valued function are discussed. Using a generalization of the Boolean difference to m-valued logic, series expansions for m-valued functions are derived.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper a nonlinear control has been designed using the dynamic inversion approach for automatic landing of unmanned aerial vehicles (UAVs), along with associated path planning. This is a difficult problem because of light weight of UAVs and strong coupling between longitudinal and lateral modes. The landing maneuver of the UAV is divided into approach, glideslope and flare. In the approach UAV aligns with the centerline of the runway by heading angle correction. In glideslope and flare the UAV follows straight line and exponential curves respectively in the pitch plane with no lateral deviations. The glideslope and flare path are scheduled as a function of approach distance from runway. The trajectory parameters are calculated such that the sink rate at touchdown remains within specified bounds. It is also ensured that the transition from the glideslope to flare path is smooth by ensuring C-1 continuity at the transition. In the outer loop, the roll rate command is generated by assuring a coordinated turn in the alignment segment and by assuring zero bank angle in the glideslope and flare segments. The pitch rate command is generated from the error in altitude to control the deviations from the landing trajectory. The yaw rate command is generated from the required heading correction. In the inner loop, the aileron, elevator and rudder deflections are computed together to track the required body rate commands. Moreover, it is also ensured that the forward velocity of the UAV at the touch down remains close to a desired value by manipulating the thrust of the vehicle. A nonlinear six-DOF model, which has been developed from extensive wind-tunnel testing, is used both for control design as well as to validate it.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background Despite considerable effort, most smokers relapse within a few months after quitting due to cigarette craving. The widespread adoption of mobile phones presents new opportunities to provide support during attempts to quit. Objective To design and pilot a mobile app "DistractMe" to enable quitters to access and share distractions and tips to cope with cigarette cravings. Methods A qualitative study with 14 smokers who used DistractMe on their mobiles during the first weeks of their quit attempt. Based on interviews, diaries, and log data, we examined how the app supported quitting strategies. Results Three distinct techniques of coping when using DistractMe were identified: diversion, avoidance, and displacement. We further identified three forms of engagement with tips for coping: preparation, fortification, and confrontation. Overall, strategies to prevent cravings and their effects (avoidance, displacement, preparation, and fortification) were more common than immediate coping strategies (diversion and confrontation). Tips for coping were more commonly used than distractions to cope with cravings, because they helped to fortify the quit attempt and provided opportunities to connect with other users of the application. However, distractions were important to attract new users and to facilitate content sharing. Conclusions Based on the qualitative results, we recommend that mobile phone-based interventions focus on tips shared by peers and frequent content updates. Apps also require testing with larger groups of users to assess whether they can be self-sustaining.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article addresses the problem of how to select the optimal combination of sensors and how to determine their optimal placement in a surveillance region in order to meet the given performance requirements at a minimal cost for a multimedia surveillance system. We propose to solve this problem by obtaining a performance vector, with its elements representing the performances of subtasks, for a given input combination of sensors and their placement. Then we show that the optimal sensor selection problem can be converted into the form of Integer Linear Programming problem (ILP) by using a linear model for computing the optimal performance vector corresponding to a sensor combination. Optimal performance vector corresponding to a sensor combination refers to the performance vector corresponding to the optimal placement of a sensor combination. To demonstrate the utility of our technique, we design and build a surveillance system consisting of PTZ (Pan-Tilt-Zoom) cameras and active motion sensors for capturing faces. Finally, we show experimentally that optimal placement of sensors based on the design maximizes the system performance.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper we give the performance of MQAM OFDM based WLAN in presence of single and multiple channels Zigbee interference. An analytical model for getting symbol error rate (SER) in presence of single and multiple channel Zigbee interference in AWGN and Rayleigh fading channel for MQAM OFDM system is given. Simulation results are compared with analytical symbol error rate (SER) of the MQAM-OFDM system. For analysis we have modeled the Zigbee interference using the power spectral density (PSD) of OQPSK modulation and finding the average interference power for each sub-carrier of the OFDM system. Then we have averaged the SER over all WLAN sub-carriers. Simulations closely match with the analytical models. It is seen from simulation and analytical results that performance of WLAN is severely affected by Zigbee interference. Symbol error rate (SER) for 16QAM and 64QAM OFDM system is of order of 10(-2) for SIR (signal to interference ratio) of 20dB and 30dB respectively in presence of single Zigbee interferer inside the WLAN frequency band for Rayleigh fading channel. For SIR values more than 30dB and 40dB the SER approaches the SER without interference for 16QAM and 64QAM OFDM system respectively.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Emerging embedded applications are based on evolving standards (e.g., MPEG2/4, H.264/265, IEEE802.11a/b/g/n). Since most of these applications run on handheld devices, there is an increasing need for a single chip solution that can dynamically interoperate between different standards and their derivatives. In order to achieve high resource utilization and low power dissipation, we propose REDEFINE, a polymorphic ASIC in which specialized hardware units are replaced with basic hardware units that can create the same functionality by runtime re-composition. It is a ``future-proof'' custom hardware solution for multiple applications and their derivatives in a domain. In this article, we describe a compiler framework and supporting hardware comprising compute, storage, and communication resources. Applications described in high-level language (e.g., C) are compiled into application substructures. For each application substructure, a set of compute elements on the hardware are interconnected during runtime to form a pattern that closely matches the communication pattern of that particular application. The advantage is that the bounded CEs are neither processor cores nor logic elements as in FPGAs. Hence, REDEFINE offers the power and performance advantage of an ASIC and the hardware reconfigurability and programmability of that of an FPGA/instruction set processor. In addition, the hardware supports custom instruction pipelining. Existing instruction-set extensible processors determine a sequence of instructions that repeatedly occur within the application to create custom instructions at design time to speed up the execution of this sequence. We extend this scheme further, where a kernel is compiled into custom instructions that bear strong producer-consumer relationship (and not limited to frequently occurring sequences of instructions). Custom instructions, realized as hardware compositions effected at runtime, allow several instances of the same to be active in parallel. A key distinguishing factor in majority of the emerging embedded applications is stream processing. To reduce the overheads of data transfer between custom instructions, direct communication paths are employed among custom instructions. In this article, we present the overview of the hardware-aware compiler framework, which determines the NoC-aware schedule of transports of the data exchanged between the custom instructions on the interconnect. The results for the FFT kernel indicate a 25% reduction in the number of loads/stores, and throughput improves by log(n) for n-point FFT when compared to sequential implementation. Overall, REDEFINE offers flexibility and a runtime reconfigurability at the expense of 1.16x in power and 8x in area when compared to an ASIC. REDEFINE implementation consumes 0.1x the power of an FPGA implementation. In addition, the configuration overhead of the FPGA implementation is 1,000x more than that of REDEFINE.