972 resultados para hardware implementation
Resumo:
The efficient computation of matrix function vector products has become an important area of research in recent times, driven in particular by two important applications: the numerical solution of fractional partial differential equations and the integration of large systems of ordinary differential equations. In this work we consider a problem that combines these two applications, in the form of a numerical solution algorithm for fractional reaction diffusion equations that after spatial discretisation, is advanced in time using the exponential Euler method. We focus on the efficient implementation of the algorithm on Graphics Processing Units (GPU), as we wish to make use of the increased computational power available with this hardware. We compute the matrix function vector products using the contour integration method in [N. Hale, N. Higham, and L. Trefethen. Computing Aα, log(A), and related matrix functions by contour integrals. SIAM J. Numer. Anal., 46(5):2505–2523, 2008]. Multiple levels of preconditioning are applied to reduce the GPU memory footprint and to further accelerate convergence. We also derive an error bound for the convergence of the contour integral method that allows us to pre-determine the appropriate number of quadrature points. Results are presented that demonstrate the effectiveness of the method for large two-dimensional problems, showing a speedup of more than an order of magnitude compared to a CPU-only implementation.
The dual nature of information systems in enabling a new wave of hardware ventures: Towards a theory
Resumo:
Hardware ventures are emerging entrepreneurial firms that create new market offerings based on development of digital devices. These ventures are important elements in the global economy but have not yet received much attention in the literature. Our interest in examining hardware ventures is specifically in the role that information system (IS) resources play in enabling them. We ask how the role of IS resources for hardware ventures can be conceptualized and develop a framework for assessment. Our framework builds on the distinction of operand and operant resources and distinguishes between two key lifecycle stages of hardware ventures: start-up and growth. We show how this framework can be used to discuss the role, nature, and use of IS for hardware ventures and outline empirical research strategies that flow from it. Our work contributes to broadening and enriching the IS field by drawing attention to its role in significant and novel phenomena.
Resumo:
The powerful influence of peers on fellow students’ learning engagement and their ability to foster self-efficacy is well recognised. A positive learner mindset can be fostered through establishment of guided meaningful relationships formed between peers. Recognising the value of peer connections in shaping the student learning experience, peer programs have been widely adopted by universities as a mechanism to facilitate these connections. While potentially beneficial, a lack of knowledge and inexperience by program implementers can lead to program outcomes being compromised. To mitigate this risk, QUT has established university wide systems and benchmarks for enacting peer programs. These measures aim to promote program implementation integrity by supporting and developing the knowledge and capabilities of peer leaders and program coordinators. This paper describes a range of measures that have been instigated to optimise the quality of programs and ensure outcomes are mutually constructive and beneficial for all stakeholders.
Resumo:
The Canadian Best Practice Recommendations for Stroke Care are intended to reduce variations in stroke care and facilitate closure of the gap between evidence and practice (Lindsay et al., 2010). The publication of best practice recommendations is only the beginning of this process. The guidelines themselves are not sufficient to change practice and increase consistency in care. Therefore, a key objective of the Canadian Stroke Network (CSN) Best Practices Working Group (BPWG) is to encourage and facilitate ongoing professional development and training for health care professionals providing stroke care. This is addressed through a multi-factorial approach to the creation and dissemination of inter-professional implementation tools and resources. The resources developed by CSN span pre-professional education, ongoing professional development, patient education and may be used to inform systems change. With a focus on knowledge translation, several inter-professional point-of-care tools have been developed by the CSN in collaboration with numerous professional organizations and expert volunteers. These resources are used to facilitate awareness, understanding and applications of evidence-based care across stroke care settings. Similar resources are also developed specifically for stroke patients, their families and informal caregivers, and the general public. With each update of the Canadian Best Practice Recommendations for Stroke Care, the BPWG and topic-specific writing groups propose priority areas for ongoing resource development. In 2010, two of these major educational initiatives were undertaken and recently completed—one to support continuing education for health care professionals regarding secondary stroke prevention and the other to educate families, informal caregivers and the public about pediatric stroke. This paper presents an overview of these two resources, and we encourage health care professionals to integrate these into their personal learning plans and tool kits for patients.
Resumo:
This tutorial primarily focuses on the implementation of Information Accountability (IA) protocols defined in an Information Accountability Framework (IAF) in eHealth systems. Concerns over the security and privacy of patient information are one of the biggest hindrances to sharing health information and the wide adoption of eHealth systems. At present, there are competing requirements between healthcare consumers' (i.e. patients) requirements and healthcare professionals' (HCP) requirements. While consumers want control over their information, healthcare professionals want access to as much information as required in order to make well-informed decisions and provide quality care. This conflict is evident in the review of Australia's PCEHR system and in recent studies of patient control of access to their eHealth information. In order to balance these requirements, the use of an Information Accountability Framework devised for eHealth systems has been proposed. Through the use of IA protocols, so-called Accountable-eHealth systems (AeH) create an eHealth environment where health information is available to the right person at the right time without rigid barriers whilst empowering the consumers with information control and transparency. In this half-day tutorial, we will discuss and describe the technical challenges surrounding the implementation of the IAF protocols into existing eHealth systems and demonstrate their use. The functionality of the protocols and AeH systems will be demonstrated, and an example of the implementation of the IAF protocols into an existing eHealth system will be presented and discussed.
Resumo:
Since 2003, Mainland China has been promoting the public–private partnership (PPP) procurement model in the waste-to-energy incineration sector to reduce the waste burying rate and improve environmental quality. Five critical risk factors (CRFs) that affect the construction and operation of waste-to-energy incineration projects have been identified from real-life risk events of 14 PPP waste-to-energy incineration plants through content analysis. These risk factors are insufficient waste supply, disposal of non-licensed waste, environmental risk, payment risk, and lack of supporting infrastructure. A recently completed PPP waste-to-energy incineration plant, the Shanghai Tianma project, was investigated to learn from the effective management of CRFs. First-hand data about the Shanghai Tianma project was collected, with a focus on project negotiation and concession agreement. Lessons learned about risk management were acquired. This paper presents a detailed study of the contractual structure, risk sharing scheme, risk response measures to CRFs, and project transfer of a PPP project. The study results will provide governments with management implications to prepare equitable concession agreements and benefit private investors by effectively mitigating and managing risks in future PPP waste-to-energy incineration projects.
Resumo:
Objective Chest pain is one of the most common complaints in patients presenting to an emergency department. Delays in management due to a lack of readily available objective tests to risk stratify patients with possible acute coronary syndromes can lead to an unnecessarily lengthy admission placing pressure on hospital beds or inappropriate discharge. The need for a co-ordinated system of clinical management based on enhanced communication between departments, timely and appropriate triage, clinical investigation, diagnosis, and treatment was identified. Methods An evidence-based Chest Pain Management Service and clinical pathway were developed and implemented, including the introduction of after-hours exercise stress testing. Results Between November 2005 and March 2013, 5662 patients were managed according to a Chest Pain Management pathway resulting in a reduction of 5181 admission nights by more timely identification of patients at low risk who could then be discharged. In addition, 1360 days were avoided in high-risk patients who received earlier diagnosis and treatment. Conclusions The creation of a Chest Pain Management pathway and the extended exercise stress testing service resulted in earlier discharge for low-risk patients; and timely treatment for patients with positive and equivocal exercise stress test results. This service demonstrated a significant saving in overnight admissions.
Resumo:
This report provides an evaluation of the implementation of the Polluter Pays Principle (PPP) – a principle of international environmental law – in the context of pollution from sugarcane farming affecting Australia’s Great Barrier Reef (GBR). The research was part of an experiment to test methods for evaluating the effectiveness of environmental laws. Overall, we found that whilst the PPP is reflected to a limited extent in Australian law (more so in Queensland law, than at the national level), the behaviour one might expect in terms of implementing the principle was largely inadequate. Evidence of a longer term, explicit commitment to the PPP was particularly weak.
Resumo:
Pakistan is widely known and appreciated in the world for its history, Islamic culture and norms. Since the creation of Pakistan, it inherited poverty in its roots. There are many reasons for poverty but one lies on the shoulder of women who are 50% of the total population of Pakistan. On the apex of it, women do not take part in the development of Pakistan because when they step out of their homes, they suffer a lot of problems. These problems are a hurdle in their active participation in development .Government has tried to create an environment for those women, who suffer different problems. Harassment of women at work place is one of those problems which discourage women in taking active part in economic and social development of society. Women Activists, from the last decade, were working for the protection of woman’s right at workplace and they succeeded in formulation of Harassment Act 2010. Since law is ineffective without its proper mechanism of implementation, steps should be taken for its proper implementation mechanism. This article aims to provide information about the provisions of law, related to the harassment of women at workplace with an attempt to explore the effectiveness of its implementation. The study was conducted in twin cities of Pakistan, Islamabad and Rawalpindi. Interviews were conducted with the employees and employers of organizations, educational institutions, women activists, NGOs workers, lawyers, judges and some law enforcement officers. Group discussions were also held with teachers, students of Human rights and religious personalities. This report focuses on the implementation mechanism of new legislation in Pakistan. It also highlights some important facts related to its enforcement.
Resumo:
Many software applications extend their functionality by dynamically loading libraries into their allocated address space. However, shared libraries are also often of unknown provenance and quality and may contain accidental bugs or, in some cases, deliberately malicious code. Most sandboxing techniques which address these issues require recompilation of the libraries using custom tool chains, require significant modifications to the libraries, do not retain the benefits of single address-space programming, do not completely isolate guest code, or incur substantial performance overheads. In this paper we present LibVM, a sandboxing architecture for isolating libraries within a host application without requiring any modifications to the shared libraries themselves, while still retaining the benefits of a single address space and also introducing a system call inter-positioning layer that allows complete arbitration over a shared library’s functionality. We show how to utilize contemporary hardware virtualization support towards this end with reasonable performance overheads and, in the absence of such hardware support, our model can also be implemented using a software-based mechanism. We ensure that our implementation conforms as closely as possible to existing shared library manipulation functions, minimizing the amount of effort needed to apply such isolation to existing programs. Our experimental results show that it is easy to gain immediate benefits in scenarios where the goal is to guard the host application against unintentional programming errors when using shared libraries, as well as in more complex scenarios, where a shared library is suspected of being actively hostile. In both cases, no changes are required to the shared libraries themselves.
Resumo:
The Artificial Neural Networks (ANNs) are being used to solve a variety of problems in pattern recognition, robotic control, VLSI CAD and other areas. In most of these applications, a speedy response from the ANNs is imperative. However, ANNs comprise a large number of artificial neurons, and a massive interconnection network among them. Hence, implementation of these ANNs involves execution of computer-intensive operations. The usage of multiprocessor systems therefore becomes necessary. In this article, we have presented the implementation of ART1 and ART2 ANNs on ring and mesh architectures. The overall system design and implementation aspects are presented. The performance of the algorithm on ring, 2-dimensional mesh and n-dimensional mesh topologies is presented. The parallel algorithm presented for implementation of ART1 is not specific to any particular architecture. The parallel algorithm for ARTE is more suitable for a ring architecture.
Resumo:
Regional planning faces numerous decision making uncertainties related to the complex interdependencies between urban and regional centres. Questions about how to achieve sustainable planning solutions across regions are a key uncertainty and relate to a lack of information about the actual achievement of outcomes as proposed by the objectives of a plan. Regional plan implementation and its impact on environmental, social and economic outcomes have been little explored within Australian urban and regional planning research. Despite a desire to improve the conditions across Australian regions, ambiguity persists regarding the results of regional planning efforts. Of the variables affecting regional planning, scholars argue that governance has a significant impact on achieving outcomes (see Pahl-Wostl 2009). In order to better analyse the impact of governance, we propose a set of governance indicators to examine decisions across regional planning institutions and apply this to governance models across Queensland’s regions. We contend that these governance indicators can support a more rigorous assessment of the impacts of governance models on plan implementation and outcomes. We propose that this is a way to better understand the relationship between planning and outcomes across urban and regional areas.
Resumo:
Multiprocessor systems which afford a high degree of parallelism are used in a variety of applications. The extremely stringent reliability requirement has made the provision of fault-tolerance an important aspect in the design of such systems. This paper presents a review of the various approaches towards tolerating hardware faults in multiprocessor systems. It. emphasizes the basic concepts of fault tolerant design and the various problems to be taken care of by the designer. An indepth survey of the various models, techniques and methods for fault diagnosis is given. Further, we consider the strategies for fault-tolerance in specialized multiprocessor architectures which have the ability of dynamic reconfiguration and are suited to VLSI implementation. An analysis of the state-óf-the-art is given which points out the major aspects of fault-tolerance in such architectures.