946 resultados para Personal area network
Resumo:
Dynamic asset rating is one of a number of techniques that could be used to facilitate low carbon electricity network operation. This paper focusses on distribution level transformer dynamic rating under this context. The models available for use with dynamic asset rating are discussed and compared using measured load and weather conditions from a trial Network area within Milton Keynes. The paper then uses the most appropriate model to investigate, through simulation, the potential gains in dynamic rating compared to static rating under two transformer cooling methods to understand the potential gain to the Network Operator.
Resumo:
Silvia Baeva - In the Ministry of Education and Science’s system it has been talked about optimization of the school network; this optimization can be carried out in different directions and be supported by laws. An important aspect in the optimization of the school network is to reduce costs and increase overall efficiency in each school. We will formulate this aspect as a problem of the multicriteria decisions making and by appropriate numbers of methods and criteria it can be transformed to the problem of unicriterion optimization. This problem is separated into two stages: 1-th stage – determining the minimum number of classes in a school under certain statutory provisions for the size of each of them; 2-th stage – the appointment of a minimum number of teachers and achievement of maximal effectiveness of teaching and acquiring of knowledge and skills by students according to certain statutory provisions for teachers’ annual norms of subjects and number of hours in a particular subject area and the salaries of teachers. The achievement of maximum overall efficiency is a priority in all schools.
Resumo:
Today, the question of how to successfully reduce supply chain costs whilst increasing customer satisfaction continues to be the focus of many firms. It is noted in the literature that supply chain automation can increase flexibility whilst reducing inefficiencies. However, in the dynamic and process driven environment of distribution, there is the absence of a cohesive automation approach to guide companies in improving network competitiveness. This paper aims to address the gap in the literature by developing a three-level framework automation application approach with the assistance of radio frequency identification (RFID) technology and returnable transport equipment (RTE). The first level considers the automation of data retrieval and highlights the benefits of RFID. The second level consists of automating distribution processes such as unloading and assembling orders. As the labour is reduced with the introduction of RFID enabled robots, the balance between automation and labour is discussed. Finally, the third level is an analysis of the decision-making process at network points and the application of cognitive automation to objects. A distribution network scenario is formed and used to illustrate network reconfiguration at each level. The research pinpoints that RFID enabled RTE offers a viable tool to assist supply chain automation. Further research is proposed in particular, the area of cognitive automation to aide with decision-making.
Resumo:
It is important to help researchers find valuable papers from a large literature collection. To this end, many graph-based ranking algorithms have been proposed. However, most of these algorithms suffer from the problem of ranking bias. Ranking bias hurts the usefulness of a ranking algorithm because it returns a ranking list with an undesirable time distribution. This paper is a focused study on how to alleviate ranking bias by leveraging the heterogeneous network structure of the literature collection. We propose a new graph-based ranking algorithm, MutualRank, that integrates mutual reinforcement relationships among networks of papers, researchers, and venues to achieve a more synthetic, accurate, and less-biased ranking than previous methods. MutualRank provides a unified model that involves both intra- and inter-network information for ranking papers, researchers, and venues simultaneously. We use the ACL Anthology Network as the benchmark data set and construct the gold standard from computer linguistics course websites of well-known universities and two well-known textbooks. The experimental results show that MutualRank greatly outperforms the state-of-the-art competitors, including PageRank, HITS, CoRank, Future Rank, and P-Rank, in ranking papers in both improving ranking effectiveness and alleviating ranking bias. Rankings of researchers and venues by MutualRank are also quite reasonable.
Resumo:
Lifelong surveillance is not cost-effective after endovascular aneurysm repair (EVAR), but is required to detect aortic complications which are fatal if untreated (type 1/3 endoleak, sac expansion, device migration). Aneurysm morphology determines the probability of aortic complications and therefore the need for surveillance, but existing analyses have proven incapable of identifying patients at sufficiently low risk to justify abandoning surveillance. This study aimed to improve the prediction of aortic complications, through the application of machine-learning techniques. Patients undergoing EVAR at 2 centres were studied from 2004–2010. Aneurysm morphology had previously been studied to derive the SGVI Score for predicting aortic complications. Bayesian Neural Networks were designed using the same data, to dichotomise patients into groups at low- or high-risk of aortic complications. Network training was performed only on patients treated at centre 1. External validation was performed by assessing network performance independently of network training, on patients treated at centre 2. Discrimination was assessed by Kaplan-Meier analysis to compare aortic complications in predicted low-risk versus predicted high-risk patients. 761 patients aged 75 +/− 7 years underwent EVAR in 2 centres. Mean follow-up was 36+/− 20 months. Neural networks were created incorporating neck angu- lation/length/diameter/volume; AAA diameter/area/volume/length/tortuosity; and common iliac tortuosity/diameter. A 19-feature network predicted aor- tic complications with excellent discrimination and external validation (5-year freedom from aortic complications in predicted low-risk vs predicted high-risk patients: 97.9% vs. 63%; p < 0.0001). A Bayesian Neural-Network algorithm can identify patients in whom it may be safe to abandon surveillance after EVAR. This proposal requires prospective study.
Resumo:
Recent advances in electronic and computer technologies lead to wide-spread deployment of wireless sensor networks (WSNs). WSNs have wide range applications, including military sensing and tracking, environment monitoring, smart environments, etc. Many WSNs have mission-critical tasks, such as military applications. Thus, the security issues in WSNs are kept in the foreground among research areas. Compared with other wireless networks, such as ad hoc, and cellular networks, security in WSNs is more complicated due to the constrained capabilities of sensor nodes and the properties of the deployment, such as large scale, hostile environment, etc. Security issues mainly come from attacks. In general, the attacks in WSNs can be classified as external attacks and internal attacks. In an external attack, the attacking node is not an authorized participant of the sensor network. Cryptography and other security methods can prevent some of external attacks. However, node compromise, the major and unique problem that leads to internal attacks, will eliminate all the efforts to prevent attacks. Knowing the probability of node compromise will help systems to detect and defend against it. Although there are some approaches that can be used to detect and defend against node compromise, few of them have the ability to estimate the probability of node compromise. Hence, we develop basic uniform, basic gradient, intelligent uniform and intelligent gradient models for node compromise distribution in order to adapt to different application environments by using probability theory. These models allow systems to estimate the probability of node compromise. Applying these models in system security designs can improve system security and decrease the overheads nearly in every security area. Moreover, based on these models, we design a novel secure routing algorithm to defend against the routing security issue that comes from the nodes that have already been compromised but have not been detected by the node compromise detecting mechanism. The routing paths in our algorithm detour those nodes which have already been detected as compromised nodes or have larger probabilities of being compromised. Simulation results show that our algorithm is effective to protect routing paths from node compromise whether detected or not.
Resumo:
A LLE-GC-MS method was developed to detect PPCPs in surface water samples from Big Cypress National Park, Everglades National Park and Biscayne National Park in South Florida. The most frequently found PPCPs were caffeine, DEET and triclosan with detected maximum concentration of 169 ng/L, 27.9 ng/L and 10.9 ng/L, respectively. The detection frequencies of hormones were less than PPCPs. Detected maximal concentrations of estrone, 17β-estradiol, coprostan-3-ol, coprostane and coprostan-3-one were 5.98 ng/L, 3.34 ng/L, 16.5 ng/L, 13.5 ng/L and 6.79 ng/L, respectively. An ASE-SPE-GC-MS method was developed and applied to the analysis of the sediment and soil area where reclaimed water was used for irrigation. Most analytes were below detection limits, even though some of analytes were detected in the reclaimed water at relatively high concentrations corroborating the fact that PPCPs do not significantly partition to mineral phases. An online SPE-HPLC-APPI-MS/MS method and an online SPE-HPLC-HESI-MS/MS method were developed to analyze reclaimed water and drinking water samples. In the reclaimed water study, reclaimed water samples were collected from the sprinkler for a year-long period at Florida International University Biscayne Bay Campus, where reclaimed water was reused for irrigation. Analysis results showed that several analytes were continuously detected in all reclaimed water samples. Coprostanol, bisphenol A and DEET's maximum concentration exceeded 10 μg/L (ppb). The four most frequently detected compounds were diphenhydramine (100%), DEET (98%), atenolol (98%) and carbamazepine (96%). In the study of drinking water, 54 tap water samples were collected from the Miami-Dade area. The maximum concentrations of salicylic acid, ibuprofen and DEET were 521 ng/L, 301 ng/L and 290 ng/L, respectively. The three most frequently detected compounds were DEET (93%), carbamazepine (43%) and salicylic acid (37%), respectively. Because the source of drinking water in Miami-Dade County is the relatively pristine Biscayne aquifer, these findings suggest the presence of wastewater intrusions into the delivery system or the onset of direct influence of surface waters into the shallow aquifer.
Resumo:
This report summarizes the existing data from the FIU Coastal Water Quality Monitoring Network for calendar year January 1 – December 31, 2007. This includes water quality data collected from 28 stations in Florida Bay, 22 stations in Whitewater Bay, 25 stations in Ten Thousand Islands, 25 stations in Biscayne Bay, 49 stations on the Southwest Florida Shelf (Shelf), and 28 stations in the Cape Romano-Pine Island Sound area. Each of the stations in Florida Bay were monitored on a monthly basis with monitoring beginning in March 1991; Whitewater Bay monitoring began in September 1992; Biscayne Bay monthly monitoring began September 1993; the SW Florida Shelf was sampled quarterly beginning in spring 1995; and monthly sampling in the Cape Romano-Pine Island Sound area started January 1999.
Resumo:
This report summarizes the existing data from the FIU Coastal Water Quality Monitoring Network for calendar year January 1 – December 31, 2007. This includes water quality data collected from 28 stations in Florida Bay, 22 stations in Whitewater Bay, 25 stations in Ten Thousand Islands, 25 stations in Biscayne Bay, 49 stations on the Southwest Florida Shelf (Shelf), and 28 stations in the Cape Romano-Pine Island Sound area. Each of the stations in Florida Bay were monitored on a monthly basis with monitoring beginning in March 1991; Whitewater Bay monitoring began in September 1992; Biscayne Bay monthly monitoring began September 1993; the SW Florida Shelf was sampled quarterly beginning in spring 1995; and monthly sampling in the Cape Romano-Pine Island Sound area started January 1999.
Resumo:
This study was conducted to understand (a) hospital social workers' perspectives about patients' personal autonomy and self-determination, (b) their experiences, and (c) their beliefs and behaviors. The study used the maximum variation sampling strategy to select hospitals and hospital social work respondents. Individual interviews were conducted with 31 medical/surgical and mental health hospital social workers who worked in 13 hospitals. The data suggest the following four points. First, the hospital setting as an outside influence as it relates to illness and safety, and its four categories, mentally alert patients, family members, health care professionals, and social work respondents, seems to enhance or diminish patients' autonomy in discharge planning decision making. Second, respondents report they believe patients must be safe both inside and outside the hospital. In theory, respondents support autonomy and self-determination, respect patients' wishes, and believe patients are the decision makers. However, in practice, respondents respect autonomy and self-determination to a point. Third, a model, The Patient's Decision in Discharge Planning: A Continuum, is presented where a safe discharge plan is at one end of a continuum, while an unsafe discharge plan is at the other end. Respondents respect personal autonomy and the patient's self-determination to a point. This point is likely to be located in a gray area where the patient's decision crosses from one end of the continuum to the other. When patients decide on an unsafe discharge plan, workers' interventions range from autonomy to paternalism. And fourth, the hospital setting as an outside influence may not offer the best opportunity for patients to make decisions (a) because of beliefs family members and health care professionals hold about the value of patient self-determination, and (b) because patients may not feel free to make decisions in an environment where they are surrounded by family members, health care professionals, and social work respondents who have power and who think they know best. Workers need to continue to educate elderly patients about their right to self-determination in the hospital setting. ^
Resumo:
Recent advances in electronic and computer technologies lead to wide-spread deployment of wireless sensor networks (WSNs). WSNs have wide range applications, including military sensing and tracking, environment monitoring, smart environments, etc. Many WSNs have mission-critical tasks, such as military applications. Thus, the security issues in WSNs are kept in the foreground among research areas. Compared with other wireless networks, such as ad hoc, and cellular networks, security in WSNs is more complicated due to the constrained capabilities of sensor nodes and the properties of the deployment, such as large scale, hostile environment, etc. Security issues mainly come from attacks. In general, the attacks in WSNs can be classified as external attacks and internal attacks. In an external attack, the attacking node is not an authorized participant of the sensor network. Cryptography and other security methods can prevent some of external attacks. However, node compromise, the major and unique problem that leads to internal attacks, will eliminate all the efforts to prevent attacks. Knowing the probability of node compromise will help systems to detect and defend against it. Although there are some approaches that can be used to detect and defend against node compromise, few of them have the ability to estimate the probability of node compromise. Hence, we develop basic uniform, basic gradient, intelligent uniform and intelligent gradient models for node compromise distribution in order to adapt to different application environments by using probability theory. These models allow systems to estimate the probability of node compromise. Applying these models in system security designs can improve system security and decrease the overheads nearly in every security area. Moreover, based on these models, we design a novel secure routing algorithm to defend against the routing security issue that comes from the nodes that have already been compromised but have not been detected by the node compromise detecting mechanism. The routing paths in our algorithm detour those nodes which have already been detected as compromised nodes or have larger probabilities of being compromised. Simulation results show that our algorithm is effective to protect routing paths from node compromise whether detected or not.
Resumo:
The purpose of this study was to analyze the network performance by observing the effect of varying network size and data link rate on one of the most commonly found network configurations. Computer networks have been growing explosively. Networking is used in every aspect of business, including advertising, production, shipping, planning, billing, and accounting. Communication takes place through networks that form the basis of transfer of information. The number and type of components may vary from network to network depending on several factors such as requirement and actual physical placement of the networks. There is no fixed size of the networks and they can be very small consisting of say five to six nodes or very large consisting of over two thousand nodes. The varying network sizes make it very important to study the network performance so as to be able to predict the functioning and the suitability of the network. The findings demonstrated that the network performance parameters such as global delay, load, router processor utilization, router processor delay, etc. are affected. The findings demonstrated that the network performance parameters such as global delay, load, router processor utilization, router processor delay, etc. are affected significantly due to the increase in the size of the network and that there exists a correlation between the various parameters and the size of the network. These variations are not only dependent on the magnitude of the change in the actual physical area of the network but also on the data link rate used to connect the various components of the network.
Resumo:
This study is concerned with storytelling as a part of the folk culture of a fishing community on the north east coast of Newfoundland. The study is based on field work done in the community throughout the summer of 1969 during which I tape recorded oral narratives along with other folklore and folklife material . The principal genre discussed is the personal experience narrative which is an account of the experiences of either the narrator, someone in his kin network, orhis friends. It was found that a large number of community residents communicate in narrative form and that the narratives function to substantiate conversation preceeding the narrativei have a didactic function; function as a means of entertainment~ and reflect the narrators' and the community's value system. The methods employed in collecting the material were the directive and the non-directive interview techniques and participant observation. Collecting was done mainly among fishermen between fifty and eighty years of age and who, on -the average, had not gone beyond the sixth grade in school. Since the narratives are so much a part of the environment, I give an account of the community culture. The principal things that I deal with are the community's history, economy, education, religion, and social life which includes rites of passage, calendar customs , social events, visiting patterns, and gossip. Information in each of these categories is based primarily on oral reports, narratives and documented materials. After a discussion of the storytelling process in the community, I deal specifically with four male narrators. For each I give biographical information, discuss his repertoire, telling situations, style, and give a sampling of his narratives. The fourth narrator is discussed in more detail than the first three. The narratives of the latter comprise the final chapter in the study, and have been analyzed to show what they tell us about the narrator's style, his value system, and the community culture.
Resumo:
The protection of cyberspace has become one of the highest security priorities of governments worldwide. The EU is not an exception in this context, given its rapidly developing cyber security policy. Since the 1990s, we could observe the creation of three broad areas of policy interest: cyber-crime, critical information infrastructures and cyber-defence. One of the main trends transversal to these areas is the importance that the private sector has come to assume within them. In particular in the area of critical information infrastructure protection, the private sector is seen as a key stakeholder, given that it currently operates most infrastructures in this area. As a result of this operative capacity, the private sector has come to be understood as the expert in network and information systems security, whose knowledge is crucial for the regulation of the field. Adopting a Regulatory Capitalism framework, complemented by insights from Network Governance, we can identify the shifting role of the private sector in this field from one of a victim in need of protection in the first phase, to a commercial actor bearing responsibility for ensuring network resilience in the second, to an active policy shaper in the third, participating in the regulation of NIS by providing technical expertise. By drawing insights from the above-mentioned frameworks, we can better understand how private actors are involved in shaping regulatory responses, as well as why they have been incorporated into these regulatory networks.
Resumo:
As we look around a scene, we perceive it as continuous and stable even though each saccadic eye movement changes the visual input to the retinas. How the brain achieves this perceptual stabilization is unknown, but a major hypothesis is that it relies on presaccadic remapping, a process in which neurons shift their visual sensitivity to a new location in the scene just before each saccade. This hypothesis is difficult to test in vivo because complete, selective inactivation of remapping is currently intractable. We tested it in silico with a hierarchical, sheet-based neural network model of the visual and oculomotor system. The model generated saccadic commands to move a video camera abruptly. Visual input from the camera and internal copies of the saccadic movement commands, or corollary discharge, converged at a map-level simulation of the frontal eye field (FEF), a primate brain area known to receive such inputs. FEF output was combined with eye position signals to yield a suitable coordinate frame for guiding arm movements of a robot. Our operational definition of perceptual stability was "useful stability," quantified as continuously accurate pointing to a visual object despite camera saccades. During training, the emergence of useful stability was correlated tightly with the emergence of presaccadic remapping in the FEF. Remapping depended on corollary discharge but its timing was synchronized to the updating of eye position. When coupled to predictive eye position signals, remapping served to stabilize the target representation for continuously accurate pointing. Graded inactivations of pathways in the model replicated, and helped to interpret, previous in vivo experiments. The results support the hypothesis that visual stability requires presaccadic remapping, provide explanations for the function and timing of remapping, and offer testable hypotheses for in vivo studies. We conclude that remapping allows for seamless coordinate frame transformations and quick actions despite visual afferent lags. With visual remapping in place for behavior, it may be exploited for perceptual continuity.