860 resultados para active and passive quantum error correction


Relevância:

100.00% 100.00%

Publicador:

Resumo:

An Artificial Neural Network (ANN) is a computational modeling tool which has found extensive acceptance in many disciplines for modeling complex real world problems. An ANN can model problems through learning by example, rather than by fully understanding the detailed characteristics and physics of the system. In the present study, the accuracy and predictive power of an ANN was evaluated in predicting kinetic viscosity of biodiesels over a wide range of temperatures typically encountered in diesel engine operation. In this model, temperature and chemical composition of biodiesel were used as input variables. In order to obtain the necessary data for model development, the chemical composition and temperature dependent fuel properties of ten different types of biodiesels were measured experimentally using laboratory standard testing equipments following internationally recognized testing procedures. The Neural Networks Toolbox of MatLab R2012a software was used to train, validate and simulate the ANN model on a personal computer. The network architecture was optimised following a trial and error method to obtain the best prediction of the kinematic viscosity. The predictive performance of the model was determined by calculating the absolute fraction of variance (R2), root mean squared (RMS) and maximum average error percentage (MAEP) between predicted and experimental results. This study found that ANN is highly accurate in predicting the viscosity of biodiesel and demonstrates the ability of the ANN model to find a meaningful relationship between biodiesel chemical composition and fuel properties at different temperature levels. Therefore the model developed in this study can be a useful tool in accurately predict biodiesel fuel properties instead of undertaking costly and time consuming experimental tests.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Rationale: Anabolic steroids are drugs of abuse. However, the potential for addiction remains unclear. Testosterone induces conditioned place preference in rats and oral self-administration in hamsters. Objectives: To determine if male rats and hamsters consume testosterone by intravenous (IV) or intracerebroventricular (ICV) self- administration. Methods: With each nose-poke in the active hole during daily 4-h tests in an operant condi- tioning chamber, gonad-intact adult rats and hamsters received 50 mg testosterone in an aqueous solution of b-cyclodextrin via jugular cannula. The inactive nose- poke hole served as a control. Additional hamsters received vehicle infusions. Results: Rats (n=7) expressed a significant preference for the active nose-poke hole (10.0€2.8 responses/4 h) over the inactive hole (4.7€1.2 responses/4 h). Similarly, during 16 days of testosterone self-administration IV, hamsters (n=9) averaged 11.7€2.9 responses/4 h and 6.3€1.1 responses/4 h in the active and inactive nose-poke holes, respectively. By contrast, vehicle controls (n=8) failed to develop a preference for the active nose-poke hole (6.5€0.5 and 6.4€0.3 responses/4 h). Hamsters (n=8) also self-administered 1 mg testosterone ICV (active hole:39.8€6.0 nose-pokes/ 4 h; inactive hole: 22.6€7.1 nose-pokes/4 h). When testosterone was replaced with vehicle, nose-poking in the active hole declined from 31.1€7.6 to 11.9€3.2 responses/ 4 h within 6 days. Likewise, reversing active and inactive holes increased nose-poking in the previously inactive hole from 9.1€1.9 to 25.6€5.4 responses/4 h. However, reducing the testosterone dose from 1 mg to 0.2 mg per 1 ml injection did not change nose-poking. Conclu- sions: Compared with other drugs of abuse, testosterone reinforcement is modest. Nonetheless, these data support the hypothesis that testosterone is reinforcing.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Governments are challenged by the need to ensure that ageing populations stay active and engaged as they age. Therefore, it is critical to investigate the role of mobility in older people's engagement in out-of-home activities, and to identify the experiences they have within their communities. This research investigates the use of transportation by older people and its implications for their out-of-home activities within suburban environments. The qualitative, mixed-method approach employs data collection methods which include a daily travel diary (including a questionnaire), Global Positioning System (GPS) tracking and semi-structured interviews with older people living in suburban environments in Brisbane, Australia. Results show that older people are mobile throughout the city, and their car provides them with that opportunity to access desired destinations. This ability to drive allows older people to live independently and to assist others who do not drive, particularly where transport alternatives are not as accessible. The ability to transport goods and other people is a significant advantage of the private car over other transport options. People with no access to private transportation who live in low-density environments are disadvantaged when it comes to participation within the community. Further research is needed to better understand the relationship between transportation and participation within the community environment, to assist policy makers and city and transportation planners to develop strategies for age-friendly environments within the community.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The study investigated the influence of traffic and land use parameters on metal build-up on urban road surfaces. Mathematical relationships were developed to predict metals originating from fuel combustion and vehicle wear. The analysis undertaken found that nickel and chromium originate from exhaust emissions, lead, copper and zinc from vehicle wear, cadmium from both exhaust and wear and manganese from geogenic sources. Land use does not demonstrate a clear pattern in relation to the metal build-up process, though its inherent characteristics such as traffic activities exert influence. The equation derived for fuel related metal load has high cross-validated coefficient of determination (Q2) and low Standard Error of Cross-Validation (SECV) values indicates that the model is reliable, while the equation derived for wear-related metal load has low Q2 and high SECV values suggesting its use only in preliminary investigations. Relative Prediction Error values for both equations are considered to be well within the error limits for a complex system such as an urban road surface. These equations will be beneficial for developing reliable stormwater treatment strategies in urban areas which specifically focus on mitigation of metal pollution.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper presents an efficient hybrid evolutionary optimization algorithm based on combining Ant Colony Optimization (ACO) and Simulated Annealing (SA), called ACO-SA, for distribution feeder reconfiguration (DFR) considering Distributed Generators (DGs). Due to private ownership of DGs, a cost based compensation method is used to encourage DGs in active and reactive power generation. The objective function is summation of electrical energy generated by DGs and substation bus (main bus) in the next day. The approach is tested on a real distribution feeder. The simulation results show that the proposed evolutionary optimization algorithm is robust and suitable for solving DFR problem.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Accounting education is critical and any improvements in tertiary education of accounting students should result in better prepared graduates entering the profession. This study evaluates accounting students’ learning styles and the interaction of learning styles and teaching methodologies during degree programmes. Nine classes of accounting students (648 students) spread across four years and two degree programmes were evaluated. Students self-evaluated their learning style, pre-instruction. They were then subject to two separate teaching techniques (one active and one passive) in each course. Learning styles were then re-assessed and teaching techniques evaluated. Accounting students displayed a preference for passive learning, even those far advanced in their degrees. Furthermore, when learning styles matched teaching methods used, usefulness was assessed as high but when learning styles and teaching methods differed, usefulness deteriorated. Overall, the teaching methods were deemed more effective by active rather than passive learners. The implications are significant. To maximise educational benefit for the accounting profession, student learning styles should be assessed before designing appropriate teaching methodologies. This has resource implications which would have to be considered.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this chapter, we discuss four related areas of cryptology, namely, authentication, hashing, message authentication codes (MACs), and digital signatures. These topics represent active and growing research topics in cryptology. Space limitations allow us to concentrate only on the essential aspects of each topic. The bibliography is intended to supplement our survey. We have selected those items which providean overview of the current state of knowledge in the above areas. Authentication deals with the problem of providing assurance to a receiver that a communicated message originates from a particular transmitter, and that the received message has the same content as the transmitted message. A typical authentication scenario occurs in computer networks, where the identity of two communicating entities is established by means of authentication. Hashing is concerned with the problem of providing a relatively short digest–fingerprint of a much longer message or electronic document. A hashing function must satisfy (at least) the critical requirement that the fingerprints of two distinct messages are distinct. Hashing functions have numerous applications in cryptology. They are often used as primitives to construct other cryptographic functions. MACs are symmetric key primitives that provide message integrity against active spoofing by appending a cryptographic checksum to a message that is verifiable only by the intended recipient of the message. Message authentication is one of the most important ways of ensuring the integrity of information that is transferred by electronic means. Digital signatures provide electronic equivalents of handwritten signatures. They preserve the essential features of handwritten signatures and can be used to sign electronic documents. Digital signatures can potentially be used in legal contexts.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this chapter we continue the exposition of crypto topics that was begun in the previous chapter. This chapter covers secret sharing, threshold cryptography, signature schemes, and finally quantum key distribution and quantum cryptography. As in the previous chapter, we have focused only on the essentials of each topic. We have selected in the bibliography a list of representative items, which can be consulted for further details. First we give a synopsis of the topics that are discussed in this chapter. Secret sharing is concerned with the problem of how to distribute a secret among a group of participating individuals, or entities, so that only predesignated collections of individuals are able to recreate the secret by collectively combining the parts of the secret that were allocated to them. There are numerous applications of secret-sharing schemes in practice. One example of secret sharing occurs in banking. For instance, the combination to a vault may be distributed in such a way that only specified collections of employees can open the vault by pooling their portions of the combination. In this way the authority to initiate an action, e.g., the opening of a bank vault, is divided for the purposes of providing security and for added functionality, such as auditing, if required. Threshold cryptography is a relatively recently studied area of cryptography. It deals with situations where the authority to initiate or perform cryptographic operations is distributed among a group of individuals. Many of the standard operations of single-user cryptography have counterparts in threshold cryptography. Signature schemes deal with the problem of generating and verifying electronic) signatures for documents.Asubclass of signature schemes is concerned with the shared-generation and the sharedverification of signatures, where a collaborating group of individuals are required to perform these actions. A new paradigm of security has recently been introduced into cryptography with the emergence of the ideas of quantum key distribution and quantum cryptography. While classical cryptography employs various mathematical techniques to restrict eavesdroppers from learning the contents of encrypted messages, in quantum cryptography the information is protected by the laws of physics.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This cross-sectional study examined the association between psychosocial factors (mothers’ perception of own and child weight, maternal self-efficacy in feeding and involvement of the mother-in-law in child-feeding) and controlling feeding practices (monitoring, restriction, pressure to eat and passive feeding). Participants were 531 affluent-Indian mothers in Australia and Mumbai with children aged 1-5 years. The psychosocial variables and feeding practices were measured using a combination of previously validated scales and study-developed items/scales. Multivariable regression analyses were stratified by sample (Australia and Mumbai) to investigate psychosocial factors related to the feeding practices, adjusting for covariates. Self-efficacy in feeding was associated with each of the feeding practices in at least one of the samples (β values between 0.1-0.2, p= 0.04-0.005). The greater involvement of the mother-in-law in child-feeding was related to the higher use of restriction in both samples (β values ≥0.2, p=0.02). In contrast, maternal weight perceptions were not consistently associated with feeding practices in either sample. The findings highlighted that unique (self-efficacy in feeding) and culturally-specific (involvement of the mother-in-law) variables not extensively researched within the context of child-feeding were important factors associated with Indian mothers’ feeding practices. Greater consideration of these factors may be required when tailoring child-feeding interventions for Indian mothers.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Background Physical activity (PA) patterns are likely to change in young adulthood in line with changes in lifestyle that occur in the transition from adolescence to adulthood. The aim of this study was to ascertain whether key life events experienced by young women in their early twenties are associated with increasing levels of inactivity. Methods This was a 4-year follow-up of 7281 participants (aged 18 to 23 years at baseline) in the Australian Longitudinal Study of Women’s Health, with self-reported measures of PA, life events, body mass index (BMI), and sociodemographic variables. Results The cross-sectional data indicated no change in PA between baseline (57% “active”) and follow-up (56% “active”). However, for almost 40% of the sample, PA category changed between baseline and follow-up, with approximately 20% of the women changing from being “active” to “inactive,” and another 20% changing from being “inactive” to “active.” After adjustment for age, other sociodemographic variables, BMI, and PA at baseline, women who reported getting married, having a first or subsequent child, or beginning paid work were more likely to be inactive at follow-up than those who did not report these events. Conclusions The results suggest that life events such as getting married, having children, and starting work are associated with decreased levels of PA in young adult women. Strategies are needed to promote maintenance of activity at the time when most women experience these key life-stage transitions.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

OBJECTIVES This study examined the associations between physical activity and other health behaviors in a representative sample of US adolescents. METHODS In the 1990 Youth Risk Behavior Survey, 11631 high school students provided information on physical activity; diet; substance use; and other negative health behaviors. Logistic regression analyses examined associations between physical activity and other health behaviors in a subset of 2652 high-active and 1641 low-active students. RESULTS Low activity was associated with cigarette smoking, marijuana use, lower fruit and vegetable consumption, greater television watching, failure to wear a seat belt, and low perception of academic performance. For consumption of fruit, television watching, and alcohol consumption, significant interactions were found with race/ethnicity or sex, suggesting that sociocultural factors may affect the relationships between physical activity and some health behaviors. CONCLUSIONS Low physical activity was associated with several other negative health behaviors in teenagers. Future studies should examine whether interventions for increasing physical activity in youth can be effective in reducing negative health behaviors.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A robust and reliable grid power interface system for wind turbines using a permanent-magnet synchronous generator (PMSG) is proposed in this paper, where an integration of a generator-side three-switch buck-type rectifier and a grid-side Z-source inverter is employed as a bridge between the generator and the grid. The modulation strategy for the proposed topology is developed from space-vector modulation and Z-source network operation principles. Two PMSG control methods, namely, unity-power-factor control and rotor-flux-orientation control (Id = 0), are studied to establish an optimized control scheme for the generator-side three-switch buck-type rectifier. The system control scheme decouples active- and reactive-power control through voltage-oriented control and optimizes PMSG control for the grid- and generator-side converters independently. Maximum power point tracking is implemented by adjusting the shoot-through duty cycles of the Z-source network. The design considerations of the passive components are also provided. The performances and practicalities of the designed architecture have been verified by simulations and experiments.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Aims Child-feeding practices may be modifiable risk factors for childhood obesity; however investigation of feeding practices in non-Western populations is scarce. This cross-sectional study examines feeding practices of affluent Indian mothers with children aged 1-5 years residing in Australia and Mumbai, India. The secondary aim was to study the association between maternal and child characteristics and feeding practices. Methods In Australia 230 and in Mumbai 301 mothers completed either a hardcopy or online questionnaire. Self-reported maternal feeding practices (restriction, monitoring, pressure to eat, passive and responsive feeding) were measured using established scales and culturally-specific items. Results Mothers in both samples were equally likely to use non-responsive feeding practices, namely dietary restriction, pressure and passive feeding. Similarly, at least 50% of mothers in both samples did not feed their child responsively (mother decides what and the child decides how much to eat). The only difference observed after controlling for covariates (mothers’ age, BMI, religion, education, questionnaire type, child’s age, birth place, gender, number of siblings, and weight-for-age (WAZ) scores) was that mothers in the Australian sample used higher levels of dietary monitoring (β= 0.2, P= 0.006). Mothers with a higher BMI (OR: 0.84, CI: 0.89-0.99, p=0.03) and following Hinduism (OR: 0.50, CI: 0.33-0.83, p=0.008) were less likely to feed responsively. Conclusions These results suggest that Indian mothers in both the samples may benefit from interventions that promote responsive child-feeding practices.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Active and collaborative learning are becoming essential strategies to attract, engage and retain students. These methods have been adopted within the Science and Engineering Faculty of Queensland University of Technology for use in its Science, Information Technology and Engineering degrees. This paper describes the adoption and application of these techniques in a specific first year unit in a new Bachelor of Information Technology degree which has majors in Computer Science and Information Systems. The paper reports on the design, development and implementation of this foundation subject and discusses how it uses active and collaborative learning to teach design thinking through a series of design challenges, and how it uses critiquing and reflection to ensure that students become more aware of design and team processes.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Background and Aims Research into craving is hampered by lack of theoretical specification and a plethora of substance-specific measures. This study aimed to develop a generic measure of craving based on elaborated intrusion (EI) theory. Confirmatory factor analysis (CFA) examined whether a generic measure replicated the three-factor structure of the Alcohol Craving Experience (ACE) scale over different consummatory targets and time-frames. Design Twelve studies were pooled for CFA. Targets included alcohol, cigarettes, chocolate and food. Focal periods varied from the present moment to the previous week. Separate analyses were conducted for strength and frequency forms. Setting Nine studies included university students, with single studies drawn from an internet survey, a community sample of smokers and alcohol-dependent out-patients. Participants A heterogeneous sample of 1230 participants. Measurements Adaptations of the ACE questionnaire. Findings Both craving strength [comparative fit indices (CFI = 0.974; root mean square error of approximation (RMSEA) = 0.039, 95% confidence interval (CI) = 0.035–0.044] and frequency (CFI = 0.971, RMSEA = 0.049, 95% CI = 0.044–0.055) gave an acceptable three-factor solution across desired targets that mapped onto the structure of the original ACE (intensity, imagery, intrusiveness), after removing an item, re-allocating another and taking intercorrelated error terms into account. Similar structures were obtained across time-frames and targets. Preliminary validity data on the resulting 10-item Craving Experience Questionnaire (CEQ) for cigarettes and alcohol were strong. Conclusions The Craving Experience Questionnaire (CEQ) is a brief, conceptually grounded and psychometrically sound measure of desires. It demonstrates a consistent factor structure across a range of consummatory targets in both laboratory and clinical contexts.