987 resultados para Algorithme de Wang-Landau
Resumo:
An anatase TiO 2 material with hierarchically structured spheres consisting of ultrathin nanosheets with 100% of the [001] facet exposed was employed to fabricate dye-sensitized solar cells (DSC s). Investigation of the electron transport and back reaction of the DSCs by electrochemical impedance spectroscopy showed that the spheres had a threefold lower electron recombination rate compared to the conventional TiO 2 nanoparticles. In contrast, the effective electron diffusion coefficient, D n, was not sensitive to the variation of the TiO 2 morphology. The TiO 2 spheres showed the same Dn as that of the nanoparticles. The influence of TiCl 4 post-treatment on the conduction band of the TiO 2 spheres and on the kinetics of electron transport and back reactions was also investigated. It was found that the TiCl 4 post-treatment caused a downward shift of the TiO 2 conduction band edge by 30 meV. Meanwhile, a fourfold increase of the effective electron lifetime of the DSC was also observed after TiCl4 treatment. The synergistic effect of the variation of the TiO 2 conduction band and the electron recombination determined the open-circuit voltage of the DSC. © 2012 Wang et al.
Resumo:
The development of text classification techniques has been largely promoted in the past decade due to the increasing availability and widespread use of digital documents. Usually, the performance of text classification relies on the quality of categories and the accuracy of classifiers learned from samples. When training samples are unavailable or categories are unqualified, text classification performance would be degraded. In this paper, we propose an unsupervised multi-label text classification method to classify documents using a large set of categories stored in a world ontology. The approach has been promisingly evaluated by compared with typical text classification methods, using a real-world document collection and based on the ground truth encoded by human experts.
Resumo:
Systems, methods and articles for determining anomalous user activity are disclosed. Data representing a transaction activity corresponding to a plurality of user transactions can be received and user transactions can be grouped according to types of user transactions. The transaction activity can be determined to be anomalous in relation to the grouped user transactions based on a predetermined parameter.
Resumo:
Singapore is a highly developed country that has a well connected island-wide road transport system including a network of expressways. The road standards of Singapore are generally good and road safety level is very high by international standards. This chapter discusses road safety status in Singapore and highlights the practices that have been undertaken to enhance the road safety. Statistics show that road traffic fatalities were decreasing over the years, albeit an increasing trend for total crashes. Motorcyclists and pedestrians were two vulnerable road user groups and shared significant proportions respectively about 49% and 28% of total road traffic deaths. In particular, young riders and pedestrians had a higher crash potential. To enhance safety of those vulnerable road users, Singapore has taken several initiatives including infrastructure improvements like paving better skid-resistant materials at crash-prone sites, providing more rain shelters for motorcyclists, and installation of reflective signs and markings near school zones; safety campaigns and awareness programs like ride safe programme, the road courtesy campaign, and the anti-drink drive campaign. While Land Transport Authority (LTA) looks into road safety through engineering solutions and road infrastructure developments, the Traffic Police of Singapore is responsible for law enforcements and regulations. A number of non-government organizations, private companies, and university research groups are also continuously working with the Traffic Police to study, promote, and educate the general public on road safety matters.
Resumo:
Navigational collisions are one of the major safety concerns in many seaports. To address this safety concern, a comprehensive and structured method of collision risk management is necessary. Traditionally management of port water collision risks has been relied on historical collision data. However, this collision-data-based approach is hampered by several shortcomings, such as randomness and rarity of collision occurrence leading to obtaining insufficient number of samples for a sound statistical analysis, insufficiency in explaining collision causation, and reactive approach to safety. A promising alternative approach that overcomes these shortcomings is the navigational traffic conflict technique that uses traffic conflicts as an alternative to the collision data. This paper proposes a collision risk management method by utilizing the principles of this technique. This risk management method allows safety analysts to diagnose safety deficiencies in a proactive manner, which, consequently, has great potential for managing collision risks in a fast, reliable and efficient manner.
Resumo:
Due to grave potential human, environmental and economical consequences of collisions at sea, collision avoidance has become an important safety concern in navigation. To reduce the risk of collisions at sea, appropriate collision avoidance actions need to be taken in accordance with the regulations, i.e., International Regulations for Preventing Collisions at Sea. However, the regulations only provide qualitative rules and guidelines, and therefore it requires navigators to decide on collision avoidance actions quantitatively by using their judgments which often leads to making errors in navigation. To better help navigators in collision avoidance, this paper develops a comprehensive collision avoidance decision making model for providing whether a collision avoidance action is required, when to take action and what action to be taken. The model is developed based on three types of collision avoidance actions, such as course change only, speed change only, and a combination of both. The model has potential to reduce the chance of making human error in navigation by assisting navigators in decision making on collision avoidance actions.
Resumo:
The redclaw crayfish Cherax quadricarinatus (von Martens) accounts for the entire commercial production of freshwater crayfish in Australia. Two forms have been recognized, an 'Eastern' form in northern Queensland and a 'Western' form in the Northern Territory and far northern Western Australia. To date, only the Eastern form has been exported overseas for culture (including to China). The genetic structure of three Chinese redclaw crayfish culture lines from three different geographical locations in China (Xiamen in Fujian Province, Guangzhou in Guangdong Province and Chongming in Shanghai) were investigated for their levels and patterns of genetic diversity using microsatellite markers. Twenty-eight SSR markers were isolated and used to analyse genetic diversity levels in three redclaw crayfish culture lines in China. This study set out to improve the current understanding of the molecular genetic characteristics of imported strains of redclaw crayfish reared in China. Microsatellite analysis revealed moderate allelic and high gene diversity in all three culture lines. Polymorphism information content estimates for polymorphic loci varied between 0.1168 and 0.8040, while pairwise F ST values among culture lines were moderate (0.0020-0.1244). The highest estimate of divergence was evident between the Xiamen and Guangzhou populations.
Resumo:
In this paper, a method of separating variables is effectively implemented for solving a time-fractional telegraph equation (TFTE) in two and three dimensions. We discuss and derive the analytical solution of the TFTE in two and three dimensions with nonhomogeneous Dirichlet boundary condition. This method can be extended to other kinds of the boundary conditions.
Resumo:
Enterprise Systems (ES) have emerged as possibly the most important and challenging development in the corporate use of information technology in the last decade. Organizations have invested heavily in these large, integrated application software suites expecting improvments in; business processes, management of expenditure, customer service, and more generally, competitiveness, improved access to better information/knowledge (i.e., business intelligence and analytics). Forrester survey data consistently shows that investment in ES and enterprise applications in general remains the top IT spending priority, with the ES market estimated at $38 billion and predicted to grow at a steady rate of 6.9%, reaching $50 billion by 2012 (Wang & Hamerman, 2008). Yet, organizations have failed to realize all the anticipated benefits. One of the key reasons is the inability of employees to properly utilize the capabilities of the enterprise systems to complete the work and extract information critical to decision making. In response, universities (tertiary institutes) have developed academic programs aimed at addressing the skill gaps. In parallel with the proliferation of ES, there has been growing recognition of the importance of Teaching Enterprise Systems at tertiary education institutes. Many academic papers have discused the important role of Enterprise System curricula at tertiary education institutes (Ask, 2008; Hawking, 2004; Stewart, 2001), where the teaching philosophises, teaching approaches and challenges in Enterprise Systems education were discussed. Following the global trends, tertiary institutes in the Pacific-Asian region commenced introducing Enterprise System curricula in late 1990s with a range of subjects (a subject represents a single unit, rather than a collection of units; which we refer to as a course) in faculties / schools / departments of Information Technology, Business and in some cases in Engineering. Many tertiary educations commenced their initial subject offers around four salient concepts of Enterprise Systems: (1) Enterprise Systems implementations, (2) Introductions to core modules of Enterprise Systems, (3) Application customization using a programming language (e.g. ABAP) and (4) Systems Administration. While universities have come a long way in developing curricula in the enterprise system area, many obstacles remain: high cost of technology, qualified faculty to teach, lack of teaching materials, etc.
Resumo:
INEX investigates focused retrieval from structured documents by providing large test collections of structured documents, uniform evaluation measures, and a forum for organizations to compare their results. This paper reports on the INEX 2011 evaluation campaign, which consisted of a five active tracks: Books and Social Search, Data Centric, Question Answering, Relevance Feedback, and Snippet Retrieval. INEX 2011 saw a range of new tasks and tracks, such as Social Book Search, Faceted Search, Snippet Retrieval, and Tweet Contextualization.
Resumo:
An increasing number of researchers have hypothesized that ozone may be involved in the particle formation processes that occur during printing, however no studies have investigated this further. In the current study, this hypothesis was tested in a chamber study by adding supplemental ozone to the chamber after a print job without measurable ozone emissions. Subsequent particle number concentration and size distribution measurements showed that new particles were formed minutes after the addition of ozone. The results demonstrated that ozone did react with printer-generated volatile organic compounds (VOCs) to form secondary organic aerosols (SOAs). The hypothesis was further confirmed by the observation of correlations among VOCs, ozone, and particles concentrations during a print job with measurable ozone emissions. The potential particle precursors were identified by a number of furnace tests, which suggested that squalene and styrene were the most likely SOA precursors with respect to ozone. Overall, this study significantly improved scientific understanding of the formation mechanisms of printer-generated particles, and highlighted the possible SOA formation potential of unsaturated nonterpene organic compounds by ozone-initiated reactions in the indoor environment. © 2011 American Chemical Society.
Resumo:
IT-supported field data management benefits on-site construction management by improving accessibility to the information and promoting efficient communication between project team members. However, most of on-site safety inspections still heavily rely on subjective judgment and manual reporting processes and thus observers’ experiences often determine the quality of risk identification and control. This study aims to develop a methodology to efficiently retrieve safety-related information so that the safety inspectors can easily access to the relevant site safety information for safer decision making. The proposed methodology consists of three stages: (1) development of a comprehensive safety database which contains information of risk factors, accident types, impact of accidents and safety regulations; (2) identification of relationships among different risk factors based on statistical analysis methods; and (3) user-specified information retrieval using data mining techniques for safety management. This paper presents an overall methodology and preliminary results of the first stage research conducted with 101 accident investigation reports.
Resumo:
With the development of enterprise informatisation, Product Lifecycle Management (PLM) systems have been widely deployed and applied in enterprises. This paper analyzes the requirement that conducting version operations on business objects as specified in process models should be compliant with the versioning policies imposed by product lifecycles. This leads to the introduction of the concept of versioning compliance, and the approach of compliance checking that we proposed in our earlier work, which comprises both syntactical compatibility and behavioural compatibility checking. The paper then focuses on the tool implementation for providing automated support to the versioning compliance checking. An empirical evaluation of the tool was also performed with industrial partners using the well-known questionnaire-based method. The evaluation and feedback from practitioners further evidence the practical significance of this research question in the PLM field and demonstrate that the proposed solution with its automated tool support possesses a high application potential.