719 resultados para atomicity violation


Relevância:

10.00% 10.00%

Publicador:

Resumo:

We present several examples where prominent quantum properties are transferred from a microscopic superposition to thermal states at high temperatures. Our work is motivated by an analogy of Schrodinger's cat paradox, where the state corresponding to the virtual cat is a mixed thermal state with a large average photon number. Remarkably, quantum entanglement can be produced between thermal states with nearly the maximum Bell-inequality violation even when the temperatures of both modes approach infinity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The purposes of this research are: (1) to compare the similarides and differences in intra-group and inter-group social rules of hospital doctors and nurses; (2) to compare rule following, rule breaking & tolerance of rule breaking of doctors and nurses with respect to different work reladonships. Professional discipline and idendficadon, ingroup-outgroup membership and reladve status were used as predictors. In-depth interview of 20 doctors and 20 nurses were conducted to elicit social rules and goals. In the second study, 30 rules and 10 goals with high consensus were selected from study one and developed into a quesdonnaire which measured their applicadon to four different work reladonships, namely, padents, peers, seniors and doctors/nurses. Forty-three doctors and one hundred and seven nurses completed this questionnaire. In the third study, the frequency and goals of violation and tolerance of violation of five different social rules were measured. One hundred and thirty-six doctors and one hundred and sixty-six nurses completed the questionnaire.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper proposes an architecture for pervasive computing which utilizes context information to provide adaptations based on vertical handovers (handovers between heterogeneous networks) while supporting application Quality of Service (QoS). The future of mobile computing will see an increase in ubiquitous network connectivity which allows users to roam freely between heterogeneous networks. One of the requirements for pervasive computing is to adapt computing applications or their environment if current applications can no longer be provided with the requested QoS. One of possible adaptations is a vertical handover to a different network. Vertical handover operations include changing network interfaces on a single device or changes between different devices. Such handovers should be performed with minimal user distraction and minimal violation of communication QoS for user applications. The solution utilises context information regarding user devices, user location, application requirements, and network environment. The paper shows how vertical handover adaptations are incorporated into the whole infrastructure of a pervasive system

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Esta tese se propõe a investigar o gênero relatório, a fim de conhecer seus traços constitutivos, seu contexto situacional e a função sócio comunicativa que exerce em sua comunidade discursiva. Forma o objeto desta pesquisa os relatórios públicos escritos pelo prefeito Graciliano Ramos, nos anos de 1929 e 1930, e enviados ao governador do estado de Alagoas. Estes documentos alcançaram grande repercussão na época, devido ao tom irônico e ousado presente em seus textos que indicam uma transgressão da escritura do gênero relatório. Foram definidas para a unidade de análise as figuras de linguagem, na perspectiva de Quintiliano de Calahorra e sua incidência nestes textos prestando atenção nas transgressões praticadas pelo escritor gestor. Para alcançar os objetivos, a metodologia adotada foi o da análise da padronização de texto e textualização proposto por Bhatia, que compartilha com o da análise da expressão, de Lawrence Bardin.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This research is concerned with the development of distributed real-time systems, in which software is used for the control of concurrent physical processes. These distributed control systems are required to periodically coordinate the operation of several autonomous physical processes, with the property of an atomic action. The implementation of this coordination must be fault-tolerant if the integrity of the system is to be maintained in the presence of processor or communication failures. Commit protocols have been widely used to provide this type of atomicity and ensure consistency in distributed computer systems. The objective of this research is the development of a class of robust commit protocols, applicable to the coordination of distributed real-time control systems. Extended forms of the standard two phase commit protocol, that provides fault-tolerant and real-time behaviour, were developed. Petri nets are used for the design of the distributed controllers, and to embed the commit protocol models within these controller designs. This composition of controller and protocol model allows the analysis of the complete system in a unified manner. A common problem for Petri net based techniques is that of state space explosion, a modular approach to both the design and analysis would help cope with this problem. Although extensions to Petri nets that allow module construction exist, generally the modularisation is restricted to the specification, and analysis must be performed on the (flat) detailed net. The Petri net designs for the type of distributed systems considered in this research are both large and complex. The top down, bottom up and hybrid synthesis techniques that are used to model large systems in Petri nets are considered. A hybrid approach to Petri net design for a restricted class of communicating processes is developed. Designs produced using this hybrid approach are modular and allow re-use of verified modules. In order to use this form of modular analysis, it is necessary to project an equivalent but reduced behaviour on the modules used. These projections conceal events local to modules that are not essential for the purpose of analysis. To generate the external behaviour, each firing sequence of the subnet is replaced by an atomic transition internal to the module, and the firing of these transitions transforms the input and output markings of the module. Thus local events are concealed through the projection of the external behaviour of modules. This hybrid design approach preserves properties of interest, such as boundedness and liveness, while the systematic concealment of local events allows the management of state space. The approach presented in this research is particularly suited to distributed systems, as the underlying communication model is used as the basis for the interconnection of modules in the design procedure. This hybrid approach is applied to Petri net based design and analysis of distributed controllers for two industrial applications that incorporate the robust, real-time commit protocols developed. Temporal Petri nets, which combine Petri nets and temporal logic, are used to capture and verify causal and temporal aspects of the designs in a unified manner.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Modern distributed control systems comprise of a set of processors which are interconnected using a suitable communication network. For use in real-time control environments, such systems must be deterministic and generate specified responses within critical timing constraints. Also, they should be sufficiently robust to survive predictable events such as communication or processor faults. This thesis considers the problem of coordinating and synchronizing a distributed real-time control system under normal and abnormal conditions. Distributed control systems need to periodically coordinate the actions of several autonomous sites. Often the type of coordination required is the all or nothing property of an atomic action. Atomic commit protocols have been used to achieve this atomicity in distributed database systems which are not subject to deadlines. This thesis addresses the problem of applying time constraints to atomic commit protocols so that decisions can be made within a deadline. A modified protocol is proposed which is suitable for real-time applications. The thesis also addresses the problem of ensuring that atomicity is provided even if processor or communication failures occur. Previous work has considered the design of atomic commit protocols for use in non time critical distributed database systems. However, in a distributed real-time control system a fault must not allow stringent timing constraints to be violated. This thesis proposes commit protocols using synchronous communications which can be made resilient to a single processor or communication failure and still satisfy deadlines. Previous formal models used to design commit protocols have had adequate state coverability but have omitted timing properties. They also assumed that sites communicated asynchronously and omitted the communications from the model. Timed Petri nets are used in this thesis to specify and design the proposed protocols which are analysed for consistency and timeliness. Also the communication system is mcxielled within the Petri net specifications so that communication failures can be included in the analysis. Analysis of the Timed Petri net and the associated reachability tree is used to show the proposed protocols always terminate consistently and satisfy timing constraints. Finally the applications of this work are described. Two different types of applications are considered, real-time databases and real-time control systems. It is shown that it may be advantageous to use synchronous communications in distributed database systems, especially if predictable response times are required. Emphasis is given to the application of the developed commit protocols to real-time control systems. Using the same analysis techniques as those used for the design of the protocols it can be shown that the overall system performs as expected both functionally and temporally.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The paper represents a verification of a previously developed conceptual model of security related processes in DRM implementation. The applicability of established security requirements in practice is checked as well by comparing these requirements to four real DRM implementations (Microsoft Media DRM, Apple's iTunes, SunnComm Technologies’s MediaMax DRM and First4Internet’s XCP DRM). The exploited weaknesses of these systems resulting from the violation of specific security requirements are explained and the possibilities to avoid the attacks by implementing the requirements in designing step are discussed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

While the literature has suggested the possibility of breach being composed of multiple facets, no previous study has investigated this possibility empirically. This study examined the factor structure of typical component forms in order to develop a multiple component form measure of breach. Two studies were conducted. In study 1 (N = 420) multi-item measures based on causal indicators representing promissory obligations were developed for the five potential component forms (delay, magnitude, type/form, inequity and reciprocal imbalance). Exploratory factor analysis showed that the five components loaded onto one higher order factor, namely psychological contract breach suggesting that breach is composed of different aspects rather than types of breach. Confirmatory factor analysis provided further evidence for the proposed model. In addition, the model achieved high construct reliability and showed good construct, convergent, discriminant and predictive validity. Study 2 data (N = 189), used to validate study 1 results, compared the multiple-component measure with an established multiple item measure of breach (rather than a single item as in study 1) and also tested for discriminant validity with an established multiple item measure of violation. Findings replicated those in study 1. The findings have important implications for considering alternative, more comprehensive and elaborate ways of assessing breach.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In three experiments we investigated the impact that exposure to counter-stereotypes has on emotional reactions to outgroups. In Experiment 1, thinking about gender counter-stereotypes attenuated stereotyped emotions toward females and males. In Experiment 2, an immigrant counterstereotype attenuated stereotyped emotions toward this outgroup and reduced dehumanization tendencies. Experiment 3 replicated these results using an alternative measure of humanization. In both Experiments 2 and 3 sequential meditational analysis revealed that counter-stereotypes produced feelings of surprise which, in turn, elicited a cognitive process of expectancy violation which resulted in attenuated stereotyped emotions and an enhanced use of uniquely human characteristics to describe the outgroup. The findings extend research supporting the usefulness of counter-stereotype exposure for reducing prejudice and highlight its positive impact on intergroup emotions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

2000 Mathematics Subject Classification: 35Lxx, 35Pxx, 81Uxx, 83Cxx.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

High-volume capacitance is required to buffer the power difference between the input and output ports in single-phase grid-connected photovoltaic inverters, which become an obstacle to high system efficiency and long device lifetime. Furthermore, total harmonic distortion becomes serious when the system runs into low power level. In this study, a comprehensive analysis is introduced for two-stage topology with the consideration of active power, DC-link (DCL) voltage, ripple and capacitance. This study proposed a comprehensive DCL voltage control strategy to minimise the DCL capacitance while maintaining a normal system operation. Furthermore, the proposed control strategy is flexible to be integrated with the pulse-skipping control that significantly improves the power quality at light power conditions. Since the proposed control strategy needs to vary DCL voltage, an active protection scheme is also introduced to prevent any voltage violation across the DCL. The proposed control strategy is evaluated by both simulation and experiments, whose results confirm the system effectiveness.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The global economic and financial crisis has raised further concerns about the euro-entry criteria, in addition to other factors, such as the effective tightening of the criteria due to the enlargement of the EU from 12 to 27 members, the highly unfavourable property of business cycle dependence, the internal inconsistency of the criteria due to the structural price level convergence of Central and Eastern European countries, and the continuous violation of the criteria by euro-area members. The interest rate criterion became a highly volatile measure. Many US metropolitan areas would fail to qualify to be members of the US monetary union by applying the currently used inflation criterion to the US. It is time to reform the criteria and to strengthen their economic rationale within the legal framework of the EU treaty. A good solution would be to relate all criteria to the average of the euro area and simultaneously to extend the compliance period from the currently considered one year to a longer period.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The paper derives operational principles from environmental ethics for business organizations in order to achieve sustainability. Business affects the natural environment at different levels. Individual biological creatures are affected by business via hunting, fishing, agriculture, animal testing, etc. Natural ecosystems are affected by business via mining, regulating rivers, building, polluting the air, water and land, etc. The Earth as a whole is affected by business via exterminating species, contributing to climate change, etc. Business has a natural, non-reciprocal responsibility toward natural beings affected by its functioning. At the level of individual biological creatures, awareness-based ethics is adequate for business. It implies that business should assure natural life conditions and painless existence for animals and other sentient beings. From this point of view a business activity system can be considered acceptable only if its aggregate impact on animal welfare is non-negative. At the level of natural ecosystems, ecosystem ethics is relevant for business. It implies that business should use natural ecosystems in a proper way, that is, not damaging the health of the ecosystem during use. From this point of view a business activity system can be considered acceptable only if its aggregate impact on ecosystem health is non-negative. At the level of the Earth as a whole, Gaian ethics applies to business. Its implication is that business should not contribute to the violation of the systemic patterns and global mechanisms of the Earth. From this point of view a business activity system can be considered acceptable only if its aggregate impact on the living planet is non-negative. Satisfying the above principles can assure business sustainability in an ethically meaningful way. In this case business performs its duty: not to harm nature or allow others to come to harm.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A páronként összehasonlított alternatívák rangsorolásának problémája egyaránt felmerül a szavazáselmélet, a statisztika, a tudománymetria, a pszichológia és a sport területén. A nemzetközi szakirodalom alapján részletesen áttekintjük a megoldási lehetőségeket, bemutatjuk a gyakorlati alkalmazások során fellépő kérdések kezelésének, a valós adatoknak megfelelő matematikai környezet felépítésének módjait. Kiemelten tárgyaljuk a páros összehasonlítási mátrix megadását, az egyes pontozási eljárásokat és azok kapcsolatát. A tanulmány elméleti szempontból vizsgálja a Perron-Frobenius tételen alapuló invariáns, fair bets, PageRank, valamint az irányított gráfok csúcsainak rangsorolásra javasolt internal slackening és pozíciós erő módszereket. A közülük történő választáshoz az axiomatikus megközelítést ajánljuk, ennek keretében bemutatjuk az invariáns és a fair bets eljárások karakterizációját, és kitérünk a módszerek vitatható tulajdonságaira. _____ The ranking of the alternatives or selecting the best one are fundamental issues of social choice theory, statistics, psychology and sport. Different solution concepts, and various mathematical models of applications are reviewed based on the international literature. We are focusing on the de¯nition of paired comparison matrix, on main scoring procedures and their relation. The paper gives a theoretical analysis of the invariant, fair bets and PageRank methods, which are founded on Perron-Frobenius theorem, as well as the internal slackening and positional power procedures used for ranking the nodes of a directed graph. An axiomatic approach is proposed for the choice of an appropriate method. Besides some known characterizations for the invariant and fair bets methods, we also discuss the violation of some properties, meaning their main weakness.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The purpose of this study was to assess the knowledge of public school administrators with respect to special education (ESE) law. The study used a sample of 220 public school administrators. A survey instrument was developed consisting of 19 demographic questions and 20 situational scenarios. The scenarios were based on ESE issues of discipline, due process (including IEP procedures), identification, evaluation, placement, and related services. The participants had to decide whether a violation of the ESE child's rights had occurred by marking: (a) Yes, (b) No, or (c) Undecided. An analysis of the scores and demographic information was done using a two-way analysis of variance, chi-square, and crosstabs after a 77% survey response rate.^ Research questions addressed the administrators' overall level of knowledge. Comparisons were made between principals and assistant principals and differences between the levels of schooling. Exploratory questions were concerned with ESE issues deemed problematic by administrators, effects of demographic variables on survey scores, and the listing of resources utilized by administrators to access ESE information.^ The study revealed: (a) a significant difference was found when comparing the number of ESE courses taken and the score on the survey, (b) the top five resources of ESE information were the region office, school ESE department chairs, ESE teachers, county workshops, and county inservices, (c) problematic areas included discipline, evaluation procedures, placement issues, and IEP due process concerns, (d) administrators as a group did not exhibit a satisfactory knowledge of ESE law with a mean score of 12 correct and 74% of responding administrators scoring in the unsatisfactory level (below 70%), (e) across school levels, elementary administrators scored significantly higher than high school administrators, and (f) a significant implication that assistant principals consistently scored higher than principals on each scenario with a significant difference at the high school level.^ The study reveals a vital need for administrators to receive additional preparation in order to possess a basic understanding of ESE school law and how it impacts their respective schools and school districts so that they might meet professional obligations and protect the rights of all individuals involved. Recommendations for this additional administrative preparation and further research topics were discussed. ^