1000 resultados para Divisible Code


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Numerous experimental studies have been carried out to investigate the collapse of tubular metallic crash structures under axial compression. Some simple theoretical models have been developed but these often assume one type of progressive collapse, which is not always representative of the real situation. Finite Element (FE) models, when further refined, have the potential to predict the actual collapse mode and how it influences the load-displacement and energy absorption characteristics. This paper describes an FE modelling investigation with the explicit code LS−DYNA. An automatic mesh generation programme written by the authors is used to set up shell and solid element tube models. Mesh specification issues and features relating to the contact and friction models are discussed in detail. The crush modes, load-deflection characteristics and energy absorption values found in the simulations are compared with a reasonable degree of correlation to those observed in a physical testing programme; however, improvements are still required.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In all applications of clone detection it is important to have precise and efficient clone identification algorithms. This paper proposes and outlines a new algorithm, KClone for clone detection that incorporates a novel combination of lexical and local dependence analysis to achieve precision, while retaining speed. The paper also reports on the initial results of a case study using an implementation of KClone with which we have been experimenting. The results indi- cate the ability of KClone to find types-1,2, and 3 clones compared to token-based and PDG-based techniques. The paper also reports results of an initial empirical study of the performance of KClone compared to CCFinderX.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Being able to ask questions about the provenance of some data requires documentation on each influence on that data's existence and content. Much software exists, and is being developed, for which there is no provenance-awareness, i.e. at best, the data it outputs can be connected to its inputs, but with no record of intermediate processing. Further, where some record of processing does exist, e.g. as logs, it is not in a form easily connected with that of other processes. We would like to enable compiled software to record useful documentation without requiring prior manual adaptation. In this paper, we present an approach to adapting source code from its original form without manual manipulation, to record information on data provenance during execution.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study explored the diversity of emergency code telephone numbers currently in use in Australian hospitals and examined the feasibility of a standard emergency code telephone number for all Australian hospitals, based on the United Kingdom experience. An email and telephone convenience survey of Australian hospitals from six states and two territories was conducted. Of the 108 hospitals surveyed, seven did not use a telephone number system and used a button/ pager system to call an emergency. Of the 101 hospitals surveyed that used a telephone number system, 40 different emergency telephone numbers were in place, and in nine hospitals the telephone number used for Code Blue (medical emergency) was different to the telephone number used for other emergency codes. With increasing mobility of staff across hospitals, uniformity of emergency code telephone numbers is required to reduce confusion, potential danger and improve staff response in emergency situations. A single Australian standard emergency telephone number for all Australian hospitals is advocated.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In 1966, Wagner used computational search methods to construct a  [23,14,5] code. This code has been examined with much interest since that time, in hopes of finding a geometric construction and possible code extensions. In this article, we give a simple geometric construction for Wagner's code and consider extensions of this construction.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The aim of the study was to examine the ways that public sector organizations in Sweden communicated the intent of their codes of ethics to their employees. Primary data was obtained via a self-administered mail questionnaire distributed to a census of the top 100 organizations.

The study identified a range of methods used by organizations to integrate the ethos of codes into corporate culture. These methods included communication of the code, company induction of new staff, consequences for a breach of the code, ethical performance, an ethics ombudsman, the support of whistleblowers, a standing ethics committee, ethics education, and an ethics education committee.

Whilst many organizations have instituted ethical behaviour initiatives, activities specifically targeted at exposure, education and support for staff to perform ethically were found to be underdeveloped.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An analysis of log files from an immune World Wide Web server was used to discover the patterns of infection from the Code Red worm variants.  Analogies are drawn to biological systems.  The need for protection is commented on.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This essay examines the role of soccer in Australian popular life, emphasizing the game's position of secondary importance to rugby or Australian Rules in different regions. It draws on international comparisons with the USA or white British colonies to argue that in a uniquely multicultural country like Australia with established sporting traditions, domestic experience of the game could shape the past, present and future of soccer in the country. Given the cultural diversity of the state, it should work towards a strategic competitive advantage for the popularization of soccer in contemporary Australia

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Forensic practice in Australia and around the world attracts a high level of public and judicial scrutiny. The way in which the forensic psychologist conducts him or herself in ethically challenging situations is important not only to the reputation of the individual practitioner, but to the profession more widely. This paper outlines some of the ethical issues that commonly arise in forensic psychology practice and discusses these in relation to the recently published Australian Psychological Society (2007) Code of Ethics. Four ethically challenging scenarios are described and discussed in terms of how the Code might be used to offer guidance to psychologists about how they might best respond.