954 resultados para Random access system
Resumo:
Localization is information of fundamental importance to carry out various tasks in the mobile robotic area. The exact degree of precision required in the localization depends on the nature of the task. The GPS provides global position estimation but is restricted to outdoor environments and has an inherent imprecision of a few meters. In indoor spaces, other sensors like lasers and cameras are commonly used for position estimation, but these require landmarks (or maps) in the environment and a fair amount of computation to process complex algorithms. These sensors also have a limited field of vision. Currently, Wireless Networks (WN) are widely available in indoor environments and can allow efficient global localization that requires relatively low computing resources. However, the inherent instability in the wireless signal prevents it from being used for very accurate position estimation. The growth in the number of Access Points (AP) increases the overlap signals areas and this could be a useful means of improving the precision of the localization. In this paper we evaluate the impact of the number of Access Points in mobile nodes localization using Artificial Neural Networks (ANN). We use three to eight APs as a source signal and show how the ANNs learn and generalize the data. Added to this, we evaluate the robustness of the ANNs and evaluate a heuristic to try to decrease the error in the localization. In order to validate our approach several ANNs topologies have been evaluated in experimental tests that were conducted with a mobile node in an indoor space.
Resumo:
To compare the 1-year cost-effectiveness of therapeutic assertive community treatment (ACT) with standard care in schizophrenia. ACT was specifically developed for patients with schizophrenia, delivered by psychosis experts highly trained in respective psychotherapies, and embedded into an integrated care system.
Resumo:
The brain is in many ways an immunologically and pharmacologically privileged site. The blood-brain barrier (BBB) of the cerebrovascular endothelium and its participation in the complex structure of the neurovascular unit (NVU) restrict access of immune cells and immune mediators to the central nervous system (CNS). In pathologic conditions, very well-organized immunologic responses can develop within the CNS, raising important questions about the real nature and the intrinsic and extrinsic regulation of this immune privilege. We assess the interactions of immune cells and immune mediators with the BBB and NVU in neurologic disease, cerebrovascular disease, and intracerebral tumors. The goals of this review are to outline key scientific advances and the status of the science central to both the neuroinflammation and CNS barriers fields, and highlight the opportunities and priorities in advancing brain barriers research in the context of the larger immunology and neuroscience disciplines. This review article was developed from reports presented at the 2011 Annual Blood-Brain Barrier Consortium Meeting.
Resumo:
The central nervous system (CNS) has long been regarded as an immune privileged organ implying that the immune system avoids the CNS to not disturb its homeostasis, which is critical for proper function of neurons. Meanwhile, it is accepted that immune cells do in fact gain access to the CNS and that immune responses can be mounted within this tissue. However, the unique CNS microenvironment strictly controls these immune reactions starting with tightly controlling immune cell entry into the tissue. The endothelial blood-brain barrier (BBB) and the epithelial blood-cerebrospinal fluid (CSF) barrier, which protect the CNS from the constantly changing milieu within the bloodstream, also strictly control immune cell entry into the CNS. Under physiological conditions, immune cell migration into the CNS is kept at a very low level. In contrast, during a variety of pathological conditions of the CNS such as viral or bacterial infections, or during inflammatory diseases such as multiple sclerosis, immunocompetent cells readily traverse the BBB and likely also the choroid plexus and subsequently enter the CNS parenchyma or CSF spaces. This chapter summarizes our current knowledge of immune cell entry across the blood CNS barriers. A large body of the currently available information on immune cell entry into the CNS has been derived from studying experimental autoimmune encephalomyelitis (EAE), an animal model for multiple sclerosis. Therefore, most of this chapter discussing immune cell entry during CNS pathogenesis refers to observations in the EAE model, allowing for the possibility that other mechanisms of immune cell entry into the CNS might apply under different pathological conditions such as bacterial meningitis or stroke.
Resumo:
This report describes the use of transluminal coil embolization to treat pseudoaneurysm of deep femoral artery branch in two patients. The pseudoaneurysms had developed after coronary angiographv in one patient and after hip replacement in the other. Immediate control angiography after embolization procedures demonstrated complete closure of the pseudoaneurysms. During follow-up of 19 and 3 months, respectively, there was no recurrent bleeding. The aim of this case report is to show the advances in endovascular microcatheter technology, and embolic materials, that made percutaneous transluminal embolization of arterial pseudoaneurysms safe and efficient. In addition, it keeps the medical personnel aware of vascular injuries at the access site related to endovascular procedures as well as vascular complications of total hip arthroplasty. It calls their attention to the possibility of endovascular treatment as an alternative to surgery.
Resumo:
Successful software systems cope with complexity by organizing classes into packages. However, a particular organization may be neither straightforward nor obvious for a given developer. As a consequence, classes can be misplaced, leading to duplicated code and ripple effects with minor changes effecting multiple packages. We claim that contextual information is the key to rearchitecture a system. Exploiting contextual information, we propose a technique to detect misplaced classes by analyzing how client packages access the classes of a given provider package. We define locality as a measure of the degree to which classes reused by common clients appear in the same package. We then use locality to guide a simulated annealing algorithm to obtain optimal placements of classes in packages. The result is the identification of classes that are candidates for relocation. We apply the technique to three applications and validate the usefulness of our approach via developer interviews.
Resumo:
1. Parasites might preferentially feed on hosts in good nutritional condition as such hosts provide better resources for the parasites' own growth, survival and reproduction. However, hosts in prime condition are also better able to develop costly immunological or physiological defence mechanisms, which in turn reduce the parasites' reproductive success. The interplay between host condition, host defence and parasite fitness will thus play an important part in the dynamics of host-parasite systems.;2. In a 2 x 2 design, we manipulated both the access to food in great tit Parus major broods and the exposure of the nestlings to hen fleas Ceratophyllus gallinae, a common ectoparasite of hole-breeding birds. We subsequently investigated the role of manipulated host condition, host immunocompetence, and experimentally induced host defence in nestlings on the reproductive success of individual hen flea females.;3. The food supplementation of the nestlings significantly influenced the parasites' reproductive success. Female fleas laid significantly more eggs when feeding on food-supplemented hosts.;4. Previous parasite exposure of the birds affected the reproductive success of fleas. However, the impact of this induced host response on flea reproduction depended on the birds' natural level of immunocompetence, assessed by the phytohaemagglutinin (PHA) skin test. Flea fecundity significantly decreased with increasing PHA response of the nestlings in previously parasite-exposed broods. No relationship between flea fitness and host immunocompetence was, however, found in previously unexposed broods. The PHA response thus correlates with the nestlings' ability to mount immunological or physiological defence mechanisms against hen fleas. No significant interaction effect between early flea exposure and food supplementation on the parasites' reproductive success was found.;5. Our study shows that the reproductive success of hen fleas is linked to the hosts' food supply early in life and their ability to mount induced immunological or physiological defence mechanisms. These interactions between host quality and parasite fitness are likely to influence host preference, host choice and parasite virulence and thus the evolutionary dynamics in host-parasite systems.
Resumo:
A free-space optical (FSO) laser communication system with perfect fast-tracking experiences random power fading due to atmospheric turbulence. For a FSO communication system without fast-tracking or with imperfect fast-tracking, the fading probability density function (pdf) is also affected by the pointing error. In this thesis, the overall fading pdfs of FSO communication system with pointing errors are calculated using an analytical method based on the fast-tracked on-axis and off-axis fading pdfs and the fast-tracked beam profile of a turbulence channel. The overall fading pdf is firstly studied for the FSO communication system with collimated laser beam. Large-scale numerical wave-optics simulations are performed to verify the analytically calculated fading pdf with collimated beam under various turbulence channels and pointing errors. The calculated overall fading pdfs are almost identical to the directly simulated fading pdfs. The calculated overall fading pdfs are also compared with the gamma-gamma (GG) and the log-normal (LN) fading pdf models. They fit better than both the GG and LN fading pdf models under different receiver aperture sizes in all the studied cases. Further, the analytical method is expanded to the FSO communication system with beam diverging angle case. It is shown that the gamma pdf model is still valid for the fast-tracked on-axis and off-axis fading pdfs with point-like receiver aperture when the laser beam is propagated with beam diverging angle. Large-scale numerical wave-optics simulations prove that the analytically calculated fading pdfs perfectly fit the overall fading pdfs for both focused and diverged beam cases. The influence of the fast-tracked on-axis and off-axis fading pdfs, the fast-tracked beam profile, and the pointing error on the overall fading pdf is also discussed. At last, the analytical method is compared with the previous heuristic fading pdf models proposed since 1970s. Although some of previously proposed fading pdf models provide close fit to the experiment and simulation data, these close fits only exist under particular conditions. Only analytical method shows accurate fit to the directly simulated fading pdfs under different turbulence strength, propagation distances, receiver aperture sizes and pointing errors.
Resumo:
As the performance gap between microprocessors and memory continues to increase, main memory accesses result in long latencies which become a factor limiting system performance. Previous studies show that main memory access streams contain significant localities and SDRAM devices provide parallelism through multiple banks and channels. These locality and parallelism have not been exploited thoroughly by conventional memory controllers. In this thesis, SDRAM address mapping techniques and memory access reordering mechanisms are studied and applied to memory controller design with the goal of reducing observed main memory access latency. The proposed bit-reversal address mapping attempts to distribute main memory accesses evenly in the SDRAM address space to enable bank parallelism. As memory accesses to unique banks are interleaved, the access latencies are partially hidden and therefore reduced. With the consideration of cache conflict misses, bit-reversal address mapping is able to direct potential row conflicts to different banks, further improving the performance. The proposed burst scheduling is a novel access reordering mechanism, which creates bursts by clustering accesses directed to the same rows of the same banks. Subjected to a threshold, reads are allowed to preempt writes and qualified writes are piggybacked at the end of the bursts. A sophisticated access scheduler selects accesses based on priorities and interleaves accesses to maximize the SDRAM data bus utilization. Consequentially burst scheduling reduces row conflict rate, increasing and exploiting the available row locality. Using a revised SimpleScalar and M5 simulator, both techniques are evaluated and compared with existing academic and industrial solutions. With SPEC CPU2000 benchmarks, bit-reversal reduces the execution time by 14% on average over traditional page interleaving address mapping. Burst scheduling also achieves a 15% reduction in execution time over conventional bank in order scheduling. Working constructively together, bit-reversal and burst scheduling successfully achieve a 19% speedup across simulated benchmarks.
Resumo:
Worldwide, rural populations are far less likely to have access to clean drinking water than are urban ones. In many developing countries, the current approach to rural water supply uses a model of demand-driven, community-managed water systems. In Suriname, South America rural populations have limited access to improved water supplies; community-managed water supply systems have been installed in several rural communities by nongovernmental organizations as part of the solution. To date, there has been no review of the performance of these water supply systems. This report presents the results of an investigation of three rural water supply systems constructed in Saramaka villages in the interior of Suriname. The investigation used a combination of qualitative and quantitative methods, coupled with ethnographic information, to construct a comprehensive overview of these water systems. This overview includes the water use of the communities, the current status of the water supply systems, histories and sustainability of the water supply projects, technical reviews, and community perceptions. From this overview, factors important to the sustainability of these water systems were identified. Community water supply systems are engineered solutions that operate through social cooperation. The results from this investigation show that technical adequacy is the first and most critical factor for long-term sustainability of a water system. It also shows that technical adequacy is dependent on the appropriateness of the engineering design for the social, cultural, and natural setting in which it takes place. The complex relationships between technical adequacy, community support, and the involvement of women play important roles in the success of water supply projects. Addressing these factors during the project process and taking advantage of alternative water resources may increase the supply of improved drinking water to rural communities.
Resumo:
In the Dominican Republic economic growth in the past twenty years has not yielded sufficient improvement in access to drinking water services, especially in rural areas where 1.5 million people do not have access to an improved water source (WHO, 2006). Worldwide, strategic development planning in the rural water sector has focused on participatory processes and the use of demand filters to ensure that service levels match community commitment to post-project operation and maintenance. However studies have concluded that an alarmingly high percentage of drinking water systems (20-50%) do not provide service at the design levels and/or fail altogether (up to 90%): BNWP (2009), Annis (2006), and Reents (2003). World Bank, USAID, NGOs, and private consultants have invested significant resources in an effort to determine what components make up an “enabling environment” for sustainable community management of rural water systems (RWS). Research has identified an array of critical factors, internal and external to the community, which affect long term sustainability of water services. Different frameworks have been proposed in order to better understand the linkages between individual factors and sustainability of service. This research proposes a Sustainability Analysis Tool to evaluate the sustainability of RWS, adapted from previous relevant work in the field to reflect the realities in the Dominican Republic. It can be used as a diagnostic tool for government entities and development organizations to characterize the needs of specific communities and identify weaknesses in existing training regimes or support mechanisms. The framework utilizes eight indicators in three categories (Organization/Management, Financial Administration, and Technical Service). Nineteen independent variables are measured resulting in a score of sustainability likely (SL), possible (SP), or unlikely (SU) for each of the eight indicators. Thresholds are based upon benchmarks from the DR and around the world, primary data collected during the research, and the author’s 32 months of field experience. A final sustainability score is calculated using weighting factors for each indicator, derived from Lockwood (2003). The framework was tested using a statistically representative geographically stratified random sample of 61 water systems built in the DR by initiatives of the National Institute of Potable Water (INAPA) and Peace Corps. The results concluded that 23% of sample systems are likely to be sustainable in the long term, 59% are possibly sustainable, and for 18% it is unlikely that the community will be able to overcome any significant challenge. Communities that were scored as unlikely sustainable perform poorly in participation, financial durability, and governance while the highest scores were for system function and repair service. The Sustainability Analysis Tool results are verified by INAPA and PC reports, evaluations, and database information, as well as, field observations and primary data collected during the surveys. Future research will analyze the nature and magnitude of relationships between key factors and the sustainability score defined by the tool. Factors include: gender participation, legal status of water committees, plumber/operator remuneration, demand responsiveness, post construction support methodologies, and project design criteria.
Resumo:
Focusing optical beams on a target through random propagation media is very important in many applications such as free space optical communica- tions and laser weapons. Random media effects such as beam spread and scintillation can degrade the optical system's performance severely. Compensation schemes are needed in these applications to overcome these random media effcts. In this research, we investigated the optimal beams for two different optimization criteria: one is to maximize the concentrated received intensity and the other is to minimize the scintillation index at the target plane. In the study of the optimal beam to maximize the weighted integrated intensity, we derive a similarity relationship between pupil-plane phase screen and extended Huygens-Fresnel model, and demonstrate the limited utility of maximizing the average integrated intensity. In the study ofthe optimal beam to minimize the scintillation index, we derive the first- and second-order moments for the integrated intensity of multiple coherent modes. Hermite-Gaussian and Laguerre-Gaussian modes are used as the coherent modes to synthesize an optimal partially coherent beam. The optimal beams demonstrate evident reduction of scintillation index, and prove to be insensitive to the aperture averaging effect.
Resumo:
Anonymity systems maintain the anonymity of communicating nodes by camouflaging them, either with peer nodes generating dummy traffic or with peer nodes participating in the actual communication process. The probability of any adversary breaking down the anonymity of the communicating nodes is inversely proportional to the number of peer nodes participating in the network. Hence to maintain the anonymity of the communicating nodes, a large number of peer nodes are needed. Lack of peer availability weakens the anonymity of any large scale anonymity system. This work proposes PayOne, an incentive based scheme for promoting peer availability. PayOne aims to increase the peer availability by encouraging nodes to participate in the anonymity system by awarding them with incentives and thereby promoting the anonymity strength. Existing incentive schemes are designed for single path based approaches. There is no incentive scheme for multipath based or epidemic based anonymity systems. This work has been specifically designed for epidemic protocols and has been implemented over MuON, one of the latest entries to the area of multicasting based anonymity systems. MuON is a peer-to-peer based anonymity system which uses epidemic protocol for data dissemination. Existing incentive schemes involve paying every intermediate node that is involved in the communication between the initiator and the receiver. These schemes are not appropriate for epidemic based anonymity systems due to the incurred overhead. PayOne differs from the existing schemes because it involves paying a single intermediate node that participates in the network. The intermediate node can be any random node that participates in the communication and does not necessarily need to lie in the communication path between the initiator and the receiver. The light-weight characteristics of PayOne make it viable for large-scale epidemic based anonymity systems.
Resumo:
Slope stability analysis is a major area of research in geotechnical engineering. That being said, very little is written in the geotechnical engineering literature on the design of box-cuts. The goal of this thesis will be to investigate the proper design of a boxcuts, and to design a box-cut for access to an underground copper mine. Issues that need to be considered in the box-cut design include, long term dewatering design, slope stability analysis, and erosion control. The soils at the project site were extremely low permeability, as a result a system of ejectors was designed both to improve the stability of the slopes and prevent flooding. Based on the results of limit equilibrium analysis and finite element analysis, a slope design of two horizontal on one vertical was selection, with a rock fill buttress providing reinforcement. Finally, Michigan DOT standards for seeding were used to provide erosion control