976 resultados para Inside-Outside Algorithm
Resumo:
In an earlier paper [1], it has been shown that velocity ratio, defined with reference to the analogous circuit, is a basic parameter in the complete analysis of a linear one-dimensional dynamical system. In this paper it is shown that the terms constituting velocity ratio can be readily determined by means of an algebraic algorithm developed from a heuristic study of the process of transfer matrix multiplication. The algorithm permits the set of most significant terms at a particular frequency of interest to be identified from a knowledge of the relative magnitudes of the impedances of the constituent elements of a proposed configuration. This feature makes the algorithm a potential tool in a first approach to a rational design of a complex dynamical filter. This algorithm is particularly suited for the desk analysis of a medium size system with lumped as well as distributed elements.
Resumo:
Described here is a deterministic division algorithm in a negative-base number system; here, the divisor is mapped into a suitable range by premultiplication, so that the choice of the quotient digit is deterministic.
Resumo:
The transport of glycine in vitro into the silk glands of the silkworm has been studied. Glycine accumulates inside the tissue to a concentration higher than that present outside, indicating an active transport mechanism. The kinetics of uptake show a biphasic curve and two apparent Km values for accumulation, 0.33 mM and 5.00 mM. The effect of inhibitors on the energy metabolism of glycine transport is inconclusive. Exchange studies indicate the existence of two pools inside the gland, one that is easily removed by exchange and osmotic shock, and the other which is not. The results obtained conform with the carrier model of Britten and McClure concerning the amino-acid pool in E. coli.
Resumo:
Intensive pig and poultry farming in Australia can be a source of pathogens with implications for food-safety and/or human illness. Seven studies were undertaken with the following objectives: · Assess the types of zoonotic pathogens in waste · Assess the transfer of pathogens during re-use both within the shed and externally in the environment · The potential for movement of pathogens via aerosols In the first and second studies the extent of zoonotic pathogens was evaluated in both piggery effluent and chicken litter and Salmonella and Campylobacter were detected in both wastes. In the third study the dynamics of Salmonella during litter re-use was examined and results showed a trend for lower Salmonella levels and serovar diversity in re-used litter compared to new litter. Thus, re-use within the poultry farming system posed no increased risk. The fourth study addressed the direct risks of pathogens to farm workers due to reuse of piggery effluent within the pig shed. Based on air-borne Escherichia coli (E. coli) levels, re-using effluent did not pose a risk. In the fifth study high levels of Arcobacter spp. were detected in effluent ponds and freshly irrigated soils with potential food-safety risks during the irrigation of food-crops and pasture. The sixth and seventh studies addressed the risks from aerosols from mechanically ventilated sheds. Staphylococci were shown to have potential as markers, with airborne levels gradually dropping and reaching background levels at 400 m distance. Salmonella was detected (at low levels) both inside and outside the shed (at 10 m). Campylobacter was detected only once inside the shed during the 3-year period (at low levels). Results showed there was minimal risk to humans living adjacent to poultry farms This is the first comprehensive analysis studying key food-safety pathogens and potential public health risks associated with intensively farmed pigs and poultry in Australia.
Resumo:
Web data can often be represented in free tree form; however, free tree mining methods seldom exist. In this paper, a computationally fast algorithm FreeS is presented to discover all frequently occurring free subtrees in a database of labelled free trees. FreeS is designed using an optimal canonical form, BOCF that can uniquely represent free trees even during the presence of isomorphism. To avoid enumeration of false positive candidates, it utilises the enumeration approach based on a tree-structure guided scheme. This paper presents lemmas that introduce conditions to conform the generation of free tree candidates during enumeration. Empirical study using both real and synthetic datasets shows that FreeS is scalable and significantly outperforms (i.e. few orders of magnitude faster than) the state-of-the-art frequent free tree mining algorithms, HybridTreeMiner and FreeTreeMiner.
Location of concentrators in a computer communication network: a stochastic automation search method
Resumo:
The following problem is considered. Given the locations of the Central Processing Unit (ar;the terminals which have to communicate with it, to determine the number and locations of the concentrators and to assign the terminals to the concentrators in such a way that the total cost is minimized. There is alao a fixed cost associated with each concentrator. There is ail upper limit to the number of terminals which can be connected to a concentrator. The terminals can be connected directly to the CPU also In this paper it is assumed that the concentrators can bo located anywhere in the area A containing the CPU and the terminals. Then this becomes a multimodal optimization problem. In the proposed algorithm a stochastic automaton is used as a search device to locate the minimum of the multimodal cost function . The proposed algorithm involves the following. The area A containing the CPU and the terminals is divided into an arbitrary number of regions (say K). An approximate value for the number of concentrators is assumed (say m). The optimum number is determined by iteration later The m concentrators can be assigned to the K regions in (mk) ways (m > K) or (km) ways (K>m).(All possible assignments are feasible, i.e. a region can contain 0,1,…, to concentrators). Each possible assignment is assumed to represent a state of the stochastic variable structure automaton. To start with, all the states are assigned equal probabilities. At each stage of the search the automaton visits a state according to the current probability distribution. At each visit the automaton selects a 'point' inside that state with uniform probability. The cost associated with that point is calculated and the average cost of that state is updated. Then the probabilities of all the states are updated. The probabilities are taken to bo inversely proportional to the average cost of the states After a certain number of searches the search probabilities become stationary and the automaton visits a particular state again and again. Then the automaton is said to have converged to that state Then by conducting a local gradient search within that state the exact locations of the concentrators are determined This algorithm was applied to a set of test problems and the results were compared with those given by Cooper's (1964, 1967) EAC algorithm and on the average it was found that the proposed algorithm performs better.
Resumo:
A5-GMR-1 is a synchronous stream cipher used to provide confidentiality for communications between satellite phones and satellites. The keystream generator may be considered as a finite state machine, with an internal state of 81 bits. The design is based on four linear feedback shift registers, three of which are irregularly clocked. The keystream generator takes a 64-bit secret key and 19-bit frame number as inputs, and produces an output keystream of length between $2^8$ and $2^{10}$ bits. Analysis of the initialisation process for the keystream generator reveals serious flaws which significantly reduce the number of distinct keystreams that the generator can produce. Multiple (key, frame number) pairs produce the same keystream, and the relationship between the various pairs is easy to determine. Additionally, many of the keystream sequences produced are phase shifted versions of each other, for very small phase shifts. These features increase the effectiveness of generic time-memory tradeoff attacks on the cipher, making such attacks feasible.
Resumo:
Recommendations - 1 To identify a person with diabetes at risk for foot ulceration, examine the feet annually to seek evidence for signs or symptoms of peripheral neuropathy and peripheral artery disease. (GRADE strength of recommendation: strong; Quality of evidence: low) - 2 In a person with diabetes who has peripheral neuropathy, screen for a history of foot ulceration or lower-extremity amputation, peripheral artery disease, foot deformity, pre-ulcerative signs on the foot, poor foot hygiene and ill-fitting or inadequate footwear. (Strong; Low) - 3 Treat any pre-ulcerative sign on the foot of a patient with diabetes. This includes removing callus, protecting blisters and draining when necessary, treating ingrown or thickened toe nails, treating haemorrhage when necessary and prescribing antifungal treatment for fungal infections. (Strong; Low) - 4 To protect their feet, instruct an at-risk patient with diabetes not to walk barefoot, in socks only, or in thin-soled standard slippers, whether at home or when outside. (Strong; Low) - 5 Instruct an at-risk patient with diabetes to daily inspect their feet and the inside of their shoes, daily wash their feet (with careful drying particularly between the toes), avoid using chemical agents or plasters to remove callus or corns, use emollients to lubricate dry skin and cut toe nails straight across. (Weak; Low) - 6 Instruct an at-risk patient with diabetes to wear properly fitting footwear to prevent a first foot ulcer, either plantar or non-plantar, or a recurrent non-plantar foot ulcer. When a foot deformity or a pre-ulcerative sign is present, consider prescribing therapeutic shoes, custom-made insoles or toe orthosis. (Strong; Low) - 7 To prevent a recurrent plantar foot ulcer in an at-risk patient with diabetes, prescribe therapeutic footwear that has a demonstrated plantar pressure-relieving effect during walking (i.e. 30% relief compared with plantar pressure in standard of care therapeutic footwear) and encourage the patient to wear this footwear. (Strong; Moderate) - 8 To prevent a first foot ulcer in an at-risk patient with diabetes, provide education aimed at improving foot care knowledge and behaviour, as well as encouraging the patient to adhere to this foot care advice. (Weak; Low) - 9 To prevent a recurrent foot ulcer in an at-risk patient with diabetes, provide integrated foot care, which includes professional foot treatment, adequate footwear and education. This should be repeated or re-evaluated once every 1 to 3 months as necessary. (Strong; Low) - 10 Instruct a high-risk patient with diabetes to monitor foot skin temperature at home to prevent a first or recurrent plantar foot ulcer. This aims at identifying the early signs of inflammation, followed by action taken by the patient and care provider to resolve the cause of inflammation. (Weak; Moderate) - 11 Consider digital flexor tenotomy to prevent a toe ulcer when conservative treatment fails in a high-risk patient with diabetes, hammertoes and either a pre-ulcerative sign or an ulcer on the distal toe. (Weak; Low) - 12 Consider Achilles tendon lengthening, joint arthroplasty, single or pan metatarsal head resection, or osteotomy to prevent a recurrent foot ulcer when conservative treatment fails in a high-risk patient with diabetes and a plantar forefoot ulcer. (Weak; Low) - 13 Do not use a nerve decompression procedure in an effort to prevent a foot ulcer in an at-risk patient with diabetes, in preference to accepted standards of good quality care. (Weak; Low)
Resumo:
The purpose of my research is to inquire into the essence and activity of God in the legendarium of the English philologist and writer J.R.R. Tolkien (1892-1973). The legendarium, composed of Tolkien’s writings related to Middle-earth, was begun when he created two Elvish languages, Quenya based on Finnish, Sindarin based on Welsh. Tolkien developed his mythology inspired by Germanic myths and The Kalevala. It is a fictional ancient history set in our world. The legendarium is monotheistic: God is called Eru ‘The One’ and Ilúvatar ‘Father of All’. Eru is the same as the Christian God, for Tolkien wanted to keep his tales consistent with his faith. He said his works were Christian by nature, with the religious element absorbed into the story and the symbolism. In The Silmarillion, set in the primeval ages of Middle-earth, the theological aspects are more conspicuous, while in The Lord of the Rings, which brings the stories to an end, they are mostly limited to symbolic references. The legendarium is unified by its realistic outlook on creaturely abilities and hope expressing itself as humbly defiant resistance. ”The possibility of complexity or of distinctions in the nature of Eru” is a part of the legendarium. Eru Ilúvatar is Trinitarian, as per Tolkien’s faith. Without contextual qualifiers, Eru seems to refer to God the Father, like God in the Bible. Being the creator who dwells outside the world is attributed to Him. The Holy Spirit is the only Person of the Trinity bestown with names: the Flame Imperishable and the Secret Fire. When Eru creates the material world with His word, He sends the Flame Imperishable to burn at the heart of the world. The Secret Fire signifies the Creative Power that belongs to God alone, and is a part of Him. The Son, the Word, is not directly mentioned, but according to one writing Eru must step inside the world in order to save it from corruption, yet remain outside it at the same time. The inner structure of the legendarium refers to the need for a future salvation. The creative word of Eru, “Eä! Let these things Be!”, probably has a connection with the Logos in Christianity. Thus we can find three “distinctions” in Eru: a Creator who dwells outside the world, a Sustainer who dwells inside it and a Redeemer who shall step inside it. Some studies of Tolkien have claimed that Eru is distant and remote. This seems to hold water only partially. Ilúvatar, the Father of All, has a special relation with the Eruhíni, His Children, the immortal Elves and the mortal Men. He communicates with them directly only through the Valar, who resemble archangels. Nevertheless, only the Children of Eru can fight against evil, because their tragic fortunes turn evil into good. Even though religious activities are scarce among them, the fundamental faith and ultimate hope of the “Free Peoples” is directed towards Eru. He is present in the drama of history as the “Author of the Story”, who at times also interferes with its course through catastrophes and eucatastrophes, ‘good catastrophes’. Eru brings about a catastrophe when evil would otherwise bring good to an end, and He brings about a eucatasrophe when creaturely strength is not sufficent for victory. Victory over corruption is especially connected with mortal Men, of whom the most (or least) insignificant people are the Hobbits. However, because of the “primeval disaster” (that is, fall) of Mankind, ultimate salvation can only remain open, a hope for the far future.
Resumo:
Those who work with others to explore new and creative ways of thinking about community and organizational participation, ways of engaging with others, individual well-being and creative solutions to problems, have a significant role in a cohesive society. Creative forms of learning can stimulate reflexive practices of self-care and lead to enhanced relationships and practices both personally and professionally. We argue that those who facilitate such practices for others do not always practice their own self-care, which potentially leads to burnout and disillusionment. This research sought to explore understandings and practices of self-care with such facilitators in order to develop resources or techniques to support more sustainable professional identities. A key finding is that reflexive processes are most effective and transforming when shared as a social practice.
Resumo:
While performing a mission, multiple Unmanned Aerial Vehicles (UAVs) need to avoid each other to prevent collisions among them. In this paper, we design a collision avoidance algorithm to resolve the conflict among UAVs that are on a collision course while flying to heir respective destinations. The collision avoidance algorithm consist of each UAV that is on a collision course reactively executing a maneuver that will, as in `inverse' Proportional Navigation (PN), increase Line of Sight (LOS) rate between them, resulting in a `pulling out' of collision course. The algorithm is tested for high density traffic scenarios as well as for robustness in the presence of noise.
Resumo:
This paper extends the iterative linear matrix inequality algorithm (ILMI) for systems having non-ideal PI, PD and PID implementations. The new algorithm uses the practical implementation of the feedback blocksto form the equivalent static output feedback plant. The LMI based synthesis techniques are used in the algorithm to design a multi-loop, multi-objective fixed structure control. The benefits of such a control design technique are brought out by applying it to the lateral stabilizing and tracking feedback control problem of a 30cm wingspan micro air vehicle.
Resumo:
This study of the Finns at the International Lenin School (ILS) reflects history of the Soviet Union during Stalin's era, history of the Communist International (Comintern) as well as history of Finnish communism. The life span of the ILS (1926-1938) matches up with creating and establishing the power structures of Stalinism. Both the ILS and Finnish Communism in the USSR became casualties of the Great Terror (1937-1938). After the WW2, however, the Soviet education was appreciated inside the Communist Party of Finland (CPF). If Finland would have become People's Democracy, the former ILS students would have composed the inner circle of the new "democratic" government. The Finnish teachers of the ILS were leaders of the CPF that was headquartered in Moscow. At the ILS studied in total 141 Finnish communists. The purpose of the ILS was to educate the communist parties' leading stratum of functionaries. They were supposed to internalize current values, methods and discipline of the Bolsheviks. This study evaluates the effects of the total school experience on the Finns that often ended in another total institution in Finland: prison. The curricula of the ILS consisted of theory of Marxism-Leninism, party history, political economics and themes of campaigns of Stalinism. The ILS year included participation in Bolshevik party life and practical work. During summer excursions (praktikas) the students could acquaint themselves with building of socialism in the Soviet Republics. At the ILS, intention to ideological moulding was not hidden. The students were supposed to adopt the Stalinist identity of the professional revolutionaries of the era. The ILS was saturated with ideology and propaganda. This study analyzes especially uses of history as vehicle of ideological standardisation and as instrument of power. Stalin contributed personally to shortcomings of history writing of the communist party. Later he supervised writing of the inclusive handbook of communism, "History of the All-Union Communist Party. Short Course". Special attention will be paid to the effects of Stalin's intervention at the ILS and inside the CPF. The life of the Finns at the ILS and outside the school is described at grass roots. The dividing line between personal and political is analyzed by charting emotional, intimate and bodily experiences of the Finns of the ILS. The fates of the ILS Finns after the studying or teaching period in Moscow are explored in detail. The protagonist among the teachers is Yrjö Sirola that was called "father of the CPF cadres". The Finnish ILS teachers and the formed students that had remained in the USSR were most severely hit by the Great Terror. The Soviet education had most importance in Finland of post WW2 period. The training at the ILS, however, did not contribute to revolution in Finland. The main heading of the study, "A Short Course of Stalinism", crystallises interpretation of the ILS as seat of learning of ideological unity of Stalinism. On the other hand, the title includes a statement of incompleteness of the Stalinist education if the schooling at the ILS had remained in one year.
Resumo:
A rank-augmnented LU-algorithm is suggested for computing a generalized inverse of a matrix. Initially suitable diagonal corrections are introduced in (the symmetrized form of) the given matrix to facilitate decomposition; a backward-correction scheme then yields a desired generalized inverse.
Resumo:
Cyclostationary analysis has proven effective in identifying signal components for diagnostic purposes. A key descriptor in this framework is the cyclic power spectrum, traditionally estimated by the averaged cyclic periodogram and the smoothed cyclic periodogram. A lengthy debate about the best estimator finally found a solution in a cornerstone work by Antoni, who proposed a unified form for the two families, thus allowing a detailed statistical study of their properties. Since then, the focus of cyclostationary research has shifted towards algorithms, in terms of computational efficiency and simplicity of implementation. Traditional algorithms have proven computationally inefficient and the sophisticated "cyclostationary" definition of these estimators slowed their spread in the industry. The only attempt to increase the computational efficiency of cyclostationary estimators is represented by the cyclic modulation spectrum. This indicator exploits the relationship between cyclostationarity and envelope analysis. The link with envelope analysis allows a leap in computational efficiency and provides a "way in" for the understanding by industrial engineers. However, the new estimator lies outside the unified form described above and an unbiased version of the indicator has not been proposed. This paper will therefore extend the analysis of envelope-based estimators of the cyclic spectrum, proposing a new approach to include them in the unified form of cyclostationary estimators. This will enable the definition of a new envelope-based algorithm and the detailed analysis of the properties of the cyclic modulation spectrum. The computational efficiency of envelope-based algorithms will be also discussed quantitatively for the first time in comparison with the averaged cyclic periodogram. Finally, the algorithms will be validated with numerical and experimental examples.