960 resultados para distributed coupled resonator bandpass filter principles


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In 2006, the American Law Institute (ALI) and the International Insolvency Institute (III) established a Transnational Insolvency Project and appointed Professor Ian Fletcher (United Kingdom) and Professor Bob Wessels (Netherlands) as Joint Reporters. The objective was to investigate whether the essential provisions of the ALI Principles of Cooperation among the NAFTA Countries (ALI-NAFTA Principles) and the annexed Guidelines Applicable to Court-to-Court Communication in Cross-border Cases (ALI-NAFTA Guidelines) may, with certain necessary modifications, be acceptable for use by jurisdictions across the world. In 2012, Professor Fletcher and Professor Wessels presented the report Transnational Insolvency: Global Principles for Cooperation in International Insolvency Cases (“ALI-III Report”) to the Annual Meetings of the American Law Institute and the International Insolvency Institute. In 2013, the Australian Academy of Law (AAL) provided support to the authors to undertake research on the possible benefits for Australia of courts and insolvency administrators of referring to the ALI-III Report when addressing international insolvency cases. This AAL project was at the request of the Council of Chief Justices of Australia and New Zealand. This research Report compares the Global Principles for Cooperation in International Insolvency Cases with the Cross-border Insolvency Act 2008 and the UNCITRAL Model Law as it has been adopted and has force of law in Australia. Further, it examines the Global Guidelines for Court-to-Court Communications in International Insolvency Cases in light of Australian cross-border insolvency and procedural law. Finally, it makes brief reference to and commentary on the Global Rules on Conflict–of-Laws Matters in International Insolvency Cases annexed to the ALI-III Report from the perspective of Australian choice of law rules.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Bundle adjustment is one of the essential components of the computer vision toolbox. This paper revisits the resection-intersection approach, which has previously been shown to have inferior convergence properties. Modifications are proposed that greatly improve the performance of this method, resulting in a fast and accurate approach. Firstly, a linear triangulation step is added to the intersection stage, yielding higher accuracy and improved convergence rate. Secondly, the effect of parameter updates is tracked in order to reduce wasteful computation; only variables coupled to significantly changing variables are updated. This leads to significant improvements in computation time, at the cost of a small, controllable increase in error. Loop closures are handled effectively without the need for additional network modelling. The proposed approach is shown experimentally to yield comparable accuracy to a full sparse bundle adjustment (20% error increase) while computation time scales much better with the number of variables. Experiments on a progressive reconstruction system show the proposed method to be more efficient by a factor of 65 to 177, and 4.5 times more accurate (increasing over time) than a localised sparse bundle adjustment approach.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

At NDSS 2012, Yan et al. analyzed the security of several challenge-response type user authentication protocols against passive observers, and proposed a generic counting based statistical attack to recover the secret of some counting based protocols given a number of observed authentication sessions. Roughly speaking, the attack is based on the fact that secret (pass) objects appear in challenges with a different probability from non-secret (decoy) objects when the responses are taken into account. Although they mentioned that a protocol susceptible to this attack should minimize this difference, they did not give details as to how this can be achieved barring a few suggestions. In this paper, we attempt to fill this gap by generalizing the attack with a much more comprehensive theoretical analysis. Our treatment is more quantitative which enables us to describe a method to theoretically estimate a lower bound on the number of sessions a protocol can be safely used against the attack. Our results include 1) two proposed fixes to make counting protocols practically safe against the attack at the cost of usability, 2) the observation that the attack can be used on non-counting based protocols too as long as challenge generation is contrived, 3) and two main design principles for user authentication protocols which can be considered as extensions of the principles from Yan et al. This detailed theoretical treatment can be used as a guideline during the design of counting based protocols to determine their susceptibility to this attack. The Foxtail protocol, one of the protocols analyzed by Yan et al., is used as a representative to illustrate our theoretical and experimental results.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Measuring Earth material behaviour on time scales of millions of years transcends our current capability in the laboratory. We review an alternative path considering multiscale and multiphysics approaches with quantitative structure-property relationships. This approach allows a sound basis to incorporate physical principles such as chemistry, thermodynamics, diffusion and geometry-energy relations into simulations and data assimilation on the vast range of length and time scales encountered in the Earth. We identify key length scales for Earth systems processes and find a substantial scale separation between chemical, hydrous and thermal diffusion. We propose that this allows a simplified two-scale analysis where the outputs from the micro-scale model can be used as inputs for meso-scale simulations, which then in turn becomes the micro-model for the next scale up. We present two fundamental theoretical approaches to link the scales through asymptotic homogenisation from a macroscopic thermodynamic view and percolation renormalisation from a microscopic, statistical mechanics view.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Motivation Awareness is an integral part of remote collaborative work and has been an important theme within the CSCW research. Our project aims at understanding and mediating non-verbal cues between remote participants involved in a design project. Research approach Within the AMIDA project we focus on distributed 'cooperative design' teams. We especially focus on the 'material' signals - signals in which people communicate through material artefacts, locations and their embodied actions. We apply an ethnographic approach to understand the role of physical artefacts in co-located naturalistic design setting. Based on the results we will generate important implications to support remote design work. We plan to develop a mixed-reality interface supported by a shared awareness display. This awareness display will provide information about the activities happening in the design room to remotely located participants. Findings/Design Our preliminary investigation with real-world design teams suggests that both the materiality of designers' work settings and their social practices play an important role in understanding these material signals that are at play. Originality/Value Most research supporting computer mediated communication have focused on either face-to-face or linguistically oriented communication paradigms. Our research focuses on mediating the non-verbal, material cues for supporting collaborative activities without impoverishing what designers do in their day to day working lives. Take away message An ethnographic approach allows us to understand the naturalistic practices of design teams, which can lead to designing effective technologies to support group work. In that respect, the findings of our research will have a generic value beyond the application domain chosen (design teams).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

IODP Expedition 339 drilled five sites in the Gulf of Cadiz and two off the west Iberian margin (November 2011 to January 2012), and recovered 5.5 km of sediment cores with an average recovery of 86.4%. The Gulf of Cadiz was targeted for drilling as a key location for the investigation of Mediterranean outflow water (MOW) through the Gibraltar Gateway and its influence on global circulation and climate. It is also a prime area for understanding the effects of tectonic activity on evolution of the Gibraltar Gateway and on margin sedimentation. We penetrated into the Miocene at two different sites and established a strong signal of MOW in the sedimentary record of the Gulf of Cadiz, following the opening of the Gibraltar Gateway. Preliminary results show the initiation of contourite deposition at 4.2–4.5 Ma, although subsequent research will establish whether this dates the onset of MOW. The Pliocene succession, penetrated at four sites, shows low bottom current activity linked with a weak MOW. Significant widespread unconformities, present in all sites but with hiatuses of variable duration, are interpreted as a signal of intensified MOW, coupled with flow confinement. The Quaternary succession shows a much more pronounced phase of contourite drift development, with two periods of MOW intensification separated by a widespread unconformity. Following this, the final phase of drift evolution established the contourite depositional system (CDS) architecture we see today. There is a significant climate control on this evolution of MOW and bottom-current activity. However, from the closure of the Atlantic–Mediterranean gateways in Spain and Morocco just over 6 Ma and the opening of the Gibraltar Gateway at 5.3 Ma, there has been an even stronger tectonic control on margin development, downslope sediment transport and contourite drift evolution. The Gulf of Cadiz is the world's premier contourite laboratory and thus presents an ideal testing ground for the contourite paradigm. Further study of these contourites will allow us to resolve outstanding issues related to depositional processes, drift budgets, and recognition of fossil contourites in the ancient record on shore. The expedition also verified an enormous quantity and extensive distribution of contourite sands that are clean and well sorted. These represent a relatively untapped and important exploration target for potential oil and gas reservoirs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Motivated by the need of private set operations in a distributed environment, we extend the two-party private matching problem proposed by Freedman, Nissim and Pinkas (FNP) at Eurocrypt’04 to the distributed setting. By using a secret sharing scheme, we provide a distributed solution of the FNP private matching called the distributed private matching. In our distributed private matching scheme, we use a polynomial to represent one party’s dataset as in FNP and then distribute the polynomial to multiple servers. We extend our solution to the distributed set intersection and the cardinality of the intersection, and further we show how to apply the distributed private matching in order to compute distributed subset relation. Our work extends the primitives of private matching and set intersection by Freedman et al. Our distributed construction might be of great value when the dataset is outsourced and its privacy is the main concern. In such cases, our distributed solutions keep the utility of those set operations while the dataset privacy is not compromised. Comparing with previous works, we achieve a more efficient solution in terms of computation. All protocols constructed in this paper are provably secure against a semi-honest adversary under the Decisional Diffie-Hellman assumption.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A comparison of relay power minimisation subject to received signal-to-noise ratio (SNR) at the receiver and SNR maximisation subject to the total transmitted power of relays for a typical wireless network with distributed beamforming is presented. It is desirable to maximise receiver quality-of-service (QoS) and also to minimise the cost of transmission in terms of power. Hence, these two optimisation problems are very common and have been addressed separately in the literature. It is shown that SNR maximisation subject to power constraint and power minimisation subject to SNR constraint yield the same results for a typical wireless network. It proves that either one of the optimisation approaches is sufficient.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Behavioral models capture operational principles of real-world or designed systems. Formally, each behavioral model defines the state space of a system, i.e., its states and the principles of state transitions. Such a model is the basis for analysis of the system’s properties. In practice, state spaces of systems are immense, which results in huge computational complexity for their analysis. Behavioral models are typically described as executable graphs, whose execution semantics encodes a state space. The structure theory of behavioral models studies the relations between the structure of a model and the properties of its state space. In this article, we use the connectivity property of graphs to achieve an efficient and extensive discovery of the compositional structure of behavioral models; behavioral models get stepwise decomposed into components with clear structural characteristics and inter-component relations. At each decomposition step, the discovered compositional structure of a model is used for reasoning on properties of the whole state space of the system. The approach is exemplified by means of a concrete behavioral model and verification criterion. That is, we analyze workflow nets, a well-established tool for modeling behavior of distributed systems, with respect to the soundness property, a basic correctness property of workflow nets. Stepwise verification allows the detection of violations of the soundness property by inspecting small portions of a model, thereby considerably reducing the amount of work to be done to perform soundness checks. Besides formal results, we also report on findings from applying our approach to an industry model collection.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In Service-oriented Architectures, business processes can be realized by composing loosely coupled services. The problem of QoS-aware service composition is widely recognized in the literature. Existing approaches on computing an optimal solution to this problem tackle structured business processes, i.e., business processes which are composed of XOR-block, AND-block, and repeat loop orchestration components. As of yet, OR-block and unstructured orchestration components have not been sufficiently considered in the context of QoS-aware service composition. The work at hand addresses this shortcoming. An approach for computing an optimal solution to the service composition problem is proposed considering the structured orchestration components, such as AND/XOR/OR-block and repeat loop, as well as unstructured orchestration components.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Marine Systems Simulator (MSS) is an environment which provides the necessary resources for rapid implementation of mathematical models of marine systems with focus on control system design. The simulator targets models¡Xand provides examples ready to simulate¡Xof different floating structures and its systems performing various operations. The platform adopted for the development of MSS is Matlab/Simulink. This allows a modular simulator structure, and the possibility of distributed development. Openness and modularity of software components have been the prioritized design principles, which enables a systematic reuse of knowledge and results in efficient tools for research and education. This paper provides an overview of the structure of the MSS, its features, current accessability, and plans for future development.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In attempting to build intelligent litigation support tools, we have moved beyond first generation, production rule legal expert systems. Our work integrates rule based and case based reasoning with intelligent information retrieval. When using the case based reasoning methodology, or in our case the specialisation of case based retrieval, we need to be aware of how to retrieve relevant experience. Our research, in the legal domain, specifies an approach to the retrieval problem which relies heavily on an extended object oriented/rule based system architecture that is supplemented with causal background information. We use a distributed agent architecture to help support the reasoning process of lawyers. Our approach to integrating rule based reasoning, case based reasoning and case based retrieval is contrasted to the CABARET and PROLEXS architectures which rely on a centralised blackboard architecture. We discuss in detail how our various cooperating agents interact, and provide examples of the system at work. The IKBALS system uses a specialised induction algorithm to induce rules from cases. These rules are then used as indices during the case based retrieval process. Because we aim to build legal support tools which can be modified to suit various domains rather than single purpose legal expert systems, we focus on principles behind developing legal knowledge based systems. The original domain chosen was theAccident Compensation Act 1989 (Victoria, Australia), which relates to the provision of benefits for employees injured at work. For various reasons, which are indicated in the paper, we changed our domain to that ofCredit Act 1984 (Victoria, Australia). This Act regulates the provision of loans by financial institutions. The rule based part of our system which provides advice on the Credit Act has been commercially developed in conjunction with a legal firm. We indicate how this work has lead to the development of a methodology for constructing rule based legal knowledge based systems. We explain the process of integrating this existing commercial rule based system with the case base reasoning and retrieval architecture.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Introduction Epithelial-to-mesenchymal transition (EMT) promotes cell migration and is important in metastasis. Cellular proliferation is often downregulated during EMT, and the reverse transition (MET) in metastases appears to be required for restoration of proliferation in secondary tumors. We studied the interplay between EMT and proliferation control by MYB in breast cancer cells. Methods MYB, ZEB1, and CDH1 expression levels were manipulated by lentiviral small-hairpin RNA (shRNA)-mediated knockdown/overexpression, and verified with Western blotting, immunocytochemistry, and qRT-PCR. Proliferation was assessed with bromodeoxyuridine pulse labeling and flow cytometry, and sulforhodamine B assays. EMT was induced with epidermal growth factor for 9 days or by exposure to hypoxia (1% oxygen) for up to 5 days, and assessed with qRT-PCR, cell morphology, and colony morphology. Protein expression in human breast cancers was assessed with immunohistochemistry. ZEB1-MYB promoter binding and repression were determined with Chromatin Immunoprecipitation Assay and a luciferase reporter assay, respectively. Student paired t tests, Mann–Whitney, and repeated measures two-way ANOVA tests determined statistical significance (P < 0.05). Results Parental PMC42-ET cells displayed higher expression of ZEB1 and lower expression of MYB than did the PMC42-LA epithelial variant. Knockdown of ZEB1 in PMC42-ET and MDA-MB-231 cells caused increased expression of MYB and a transition to a more epithelial phenotype, which in PMC42-ET cells was coupled with increased proliferation. Indeed, we observed an inverse relation between MYB and ZEB1 expression in two in vitro EMT cell models, in matched human breast tumors and lymph node metastases, and in human breast cancer cell lines. Knockdown of MYB in PMC42-LA cells (MYBsh-LA) led to morphologic changes and protein expression consistent with an EMT. ZEB1 expression was raised in MYBsh-LA cells and significantly repressed in MYB-overexpressing MDA-MB-231 cells, which also showed reduced random migration and a shift from mesenchymal to epithelial colony morphology in two dimensional monolayer cultures. Finally, we detected binding of ZEB1 to MYB promoter in PMC42-ET cells, and ZEB1 overexpression repressed MYB promoter activity. Conclusions This work identifies ZEB1 as a transcriptional repressor of MYB and suggests a reciprocal MYB-ZEB1 repressive relation, providing a mechanism through which proliferation and the epithelial phenotype may be coordinately modulated in breast cancer cells.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Fluid–Structure Interaction (FSI) problem is significant in science and engineering, which leads to challenges for computational mechanics. The coupled model of Finite Element and Smoothed Particle Hydrodynamics (FE-SPH) is a robust technique for simulation of FSI problems. However, two important steps of neighbor searching and contact searching in the coupled FE-SPH model are extremely time-consuming. Point-In-Box (PIB) searching algorithm has been developed by Swegle to improve the efficiency of searching. However, it has a shortcoming that efficiency of searching can be significantly affected by the distribution of points (nodes in FEM and particles in SPH). In this paper, in order to improve the efficiency of searching, a novel Striped-PIB (S-PIB) searching algorithm is proposed to overcome the shortcoming of PIB algorithm that caused by points distribution, and the two time-consuming steps of neighbor searching and contact searching are integrated into one searching step. The accuracy and efficiency of the newly developed searching algorithm is studied on by efficiency test and FSI problems. It has been found that the newly developed model can significantly improve the computational efficiency and it is believed to be a powerful tool for the FSI analysis.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Similarity solutions are carried out for flow of power law non-Newtonian fluid film on unsteady stretching surface subjected to constant heat flux. Free convection heat transfer induces thermal boundary layer within a semi-infinite layer of Boussinesq fluid. The nonlinear coupled partial differential equations (PDE) governing the flow and the boundary conditions are converted to a system of ordinary differential equations (ODE) using two-parameter groups. This technique reduces the number of independent variables by two, and finally the obtained ordinary differential equations are solved numerically for the temperature and velocity using the shooting method. The thermal and velocity boundary layers are studied by the means of Prandtl number and non-Newtonian power index plotted in curves.