979 resultados para Nottingham


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The primary role of a trials Data Monitoring Committee (DMC) is to ensure the safety of enrolled patients. In stroke trials, safety is monitored typically by comparing death and stroke specific events between treatment groups. DMCs may also have the remit for monitoring efficacy depending on the aims of the trial. We hypothesised that functional outcome at end of follow-up, a measure of efficacy, is also a powerful measure of safety and tested this in a systematic review

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper combines the idea of a hierarchical distributed genetic algorithm with different inter-agent partnering strategies. Cascading clusters of sub-populations are built from bottom up, with higher-level sub-populations optimising larger parts of the problem. Hence higher-level sub-populations search a larger search space with a lower resolution whilst lower-level sub-populations search a smaller search space with a higher resolution. The effects of different partner selection schemes amongst the agents on solution quality are examined for two multiple-choice optimisation problems. It is shown that partnering strategies that exploit problem-specific knowledge are superior and can counter inappropriate (sub-) fitness measurements.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a new type of genetic algorithm for the set covering problem. It differs from previous evolutionary approaches first because it is an indirect algorithm, i.e. the actual solutions are found by an external decoder function. The genetic algorithm itself provides this decoder with permutations of the solution variables and other parameters. Second, it will be shown that results can be further improved by adding another indirect optimisation layer. The decoder will not directly seek out low cost solutions but instead aims for good exploitable solutions. These are then post optimised by another hill-climbing algorithm. Although seemingly more complicated, we will show that this three-stage approach has advantages in terms of solution quality, speed and adaptability to new types of problems over more direct approaches. Extensive computational results are presented and compared to the latest evolutionary and other heuristic approaches to the same data instances.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Changes in the television industry with regards to the development of new media technologies are having a significant impact on audience engagement with television drama. This article explores how the internet is being used to extend audience engagement onto platforms other than the television set to the point where television drama should increasingly be reconsidered as trans-media drama. However audience engagement with the various elements of a trans-media drama text is complex. By exploring audience attitudes towards character in the British television series Spooks and its associated online games, this article argues that in an increasingly converged media landscape audiences transfer values between platforms. Consequently the audience's perception of control in relation to their engagement with a trans-media drama text such as Spooks becomes complicated with values associated with television proving key to their engagement with the same fictional world in the form of games.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Introduction: Female sex is predictive of poor functional outcome in stroke, even after correction for prognostic factors. Poor quality of life (QoL) is observed in stroke survivors, with lower scores seen in the most disabled patients. We used data from the TAIST trial to assess the relationship between sex and QoL after ischaemic stroke. Methods: TAIST was a randomised controlled trial assessing the safety and efficacy of tinzaparin versus aspirin in 1,484 patients with acute ischaemic stroke. QoL was measured at 180 days post randomisation using the short-form 36 health survey which assesses QoL across eight domains. The relationship between sex and each domain was assessed using ordinal regression, both unadjusted and adjusted for key prognostics factors. Results: Of the 1,484 patients randomised into TAIST, 216 had died at 180 days post randomisation. 1,268 survivors were included in this analysis, 694 males (55%), 574 females (45%). Females tended to score lower than males across all QoL domains (apart from general health); statistically significant lower scores were seen for physical functioning (odds ratio (OR) 0.58, 95% confidence interval (CI) 0.47-0.72), vitality (OR 0.79, 95% CI 0.64-0.98) and mental health (OR 0.75, 95% CI 0.61-0.93). The results for physical functioning and mental health remained significant after adjustment for prognostic variables (OR 0.73, 95% CI 0.58-0.92; OR 0.76, 95% CI 0.60-0.95 respectively). Conclusions: QoL, in particular physical function and mental health domains, is lower in female patients after stroke. This difference persists even after correction for known prognostic factors such as age and stroke severity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Jerne's idiotypic network theory postulates that the immune response involves inter-antibody stimulation and suppression as well as matching to antigens. The theory has proved the most popular Artificial Immune System (AIS) model for incorporation into behavior-based robotics but guidelines for implementing idiotypic selection are scarce. Furthermore, the direct effects of employing the technique have not been demonstrated in the form of a comparison with non-idiotypic systems. This paper aims to address these issues. A method for integrating an idiotypic AIS network with a Reinforcement Learning based control system (RL) is described and the mechanisms underlying antibody stimulation and suppression are explained in detail. Some hypotheses that account for the network advantage are put forward and tested using three systems with increasing idiotypic complexity. The basic RL, a simplified hybrid AIS-RL that implements idiotypic selection independently of derived concentration levels and a full hybrid AIS-RL scheme are examined. The test bed takes the form of a simulated Pioneer robot that is required to navigate through maze worlds detecting and tracking door markers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper proposes a new memetic evolutionary algorithm to achieve explicit learning in rule-based nurse rostering, which involves applying a set of heuristic rules for each nurse's assignment. The main framework of the algorithm is an estimation of distribution algorithm, in which an ant-miner methodology improves the individual solutions produced in each generation. Unlike our previous work (where learning is implicit), the learning in the memetic estimation of distribution algorithm is explicit, i.e. we are able to identify building blocks directly. The overall approach learns by building a probabilistic model, i.e. an estimation of the probability distribution of individual nurse-rule pairs that are used to construct schedules. The local search processor (i.e. the ant-miner) reinforces nurse-rule pairs that receive higher rewards. A challenging real world nurse rostering problem is used as the test problem. Computational results show that the proposed approach outperforms most existing approaches. It is suggested that the learning methodologies suggested in this paper may be applied to other scheduling problems where schedules are built systematically according to specific rules.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Neural field models of firing rate activity typically take the form of integral equations with space-dependent axonal delays. Under natural assumptions on the synaptic connectivity we show how one can derive an equivalent partial differential equation (PDE) model that properly treats the axonal delay terms of the integral formulation. Our analysis avoids the so-called long-wavelength approximation that has previously been used to formulate PDE models for neural activity in two spatial dimensions. Direct numerical simulations of this PDE model show instabilities of the homogeneous steady state that are in full agreement with a Turing instability analysis of the original integral model. We discuss the benefits of such a local model and its usefulness in modeling electrocortical activity. In particular we are able to treat "patchy'" connections, whereby a homogeneous and isotropic system is modulated in a spatially periodic fashion. In this case the emergence of a "lattice-directed" traveling wave predicted by a linear instability analysis is confirmed by the numerical simulation of an appropriate set of coupled PDEs. Article published and (c) American Physical Society 2007

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper we consider instabilities of localised solutions in planar neural field firing rate models of Wilson-Cowan or Amari type. Importantly we show that angular perturbations can destabilise spatially localised solutions. For a scalar model with Heaviside firing rate function we calculate symmetric one-bump and ring solutions explicitly and use an Evans function approach to predict the point of instability and the shapes of the dominant growing modes. Our predictions are shown to be in excellent agreement with direct numerical simulations. Moreover, beyond the instability our simulations demonstrate the emergence of multi-bump and labyrinthine patterns. With the addition of spike-frequency adaptation, numerical simulations of the resulting vector model show that it is possible for structures without rotational symmetry, and in particular multi-bumps, to undergo an instability to a rotating wave. We use a general argument, valid for smooth firing rate functions, to establish the conditions necessary to generate such a rotational instability. Numerical continuation of the rotating wave is used to quantify the emergent angular velocity as a bifurcation parameter is varied. Wave stability is found via the numerical evaluation of an associated eigenvalue problem.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Changes in cellular calcium concentration control a wide range of physiological processes, from the subsecond release of synaptic neurotransmitters, to the regulation of gene expression over months or years. Calcium can also trigger cell death through both apoptosis and necrosis, and so the regulation of cellular calcium concentration must be tightly controlled through the concerted action of pumps, channels and buffers that transport calcium into and out of the cell cytoplasm. A hallmark of cellular calcium signalling is its spatiotemporal complexity: stimulation of cells by a hormone or neurotransmitter leads to oscillations in cytoplasmic calcium concentration that can vary markedly in time course, amplitude, frequency, and spatial range. In this chapter we review some of the biological roles of calcium, the experimental characterisation of complex dynamic changes in calcium concentration, and attempts to explain this complexity using computational models. We consider the "toolkit" of cellular proteins which influence calcium concentration, describe mechanistic models of key elements of the toolkit, and fit these into the framework of whole cell models of calcium oscillations and waves. Finally, we will touch on recent efforts to use stochastic modelling to elucidate elementary calcium signal events, and how these may evolve into global signals.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We extend the construction and analysis of the non-overlapping Schwarz preconditioners proposed in Antonietti et al. [Math. Model. Numer. Anal., 41(1):21-54, 2007] and [Math. Model. Numer. Anal., submitted, 2006] to the (non-consistent) super penalty discontinuos Galerkin methods introduced by Babuska et al. [SIAM J. Numer. Anal., 10:863-875, 1973] and by Brezzi et al. [Numer. Methods Partial Differential Equations, 16(4):365-378, 2000]. We show that the resulting preconditioners are scalable, and we provide the convergence estimates. We also present numerical experiments demonstrating the theoretical results.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Schedules can be built in a similar way to a human scheduler by using a set of rules that involve domain knowledge. This paper presents an Estimation of Distribution Algorithm (EDA) for the nurse scheduling problem, which involves choosing a suitable scheduling rule from a set for the assignment of each nurse. Unlike previous work that used Genetic Algorithms (GAs) to implement implicit learning, the learning in the proposed algorithm is explicit, i.e. we identify and mix building blocks directly. The EDA is applied to implement such explicit learning by building a Bayesian network of the joint distribution of solutions. The conditional probability of each variable in the network is computed according to an initial set of promising solutions. Subsequently, each new instance for each variable is generated by using the corresponding conditional probabilities, until all variables have been generated, i.e. in our case, a new rule string has been obtained. Another set of rule strings will be generated in this way, some of which will replace previous strings based on fitness selection. If stopping conditions are not met, the conditional probabilities for all nodes in the Bayesian network are updated again using the current set of promising rule strings. Computational results from 52 real data instances demonstrate the success of this approach. It is also suggested that the learning mechanism in the proposed approach might be suitable for other scheduling problems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Intrusion Detection Systems (IDSs) provide an important layer of security for computer systems and networks, and are becoming more and more necessary as reliance on Internet services increases and systems with sensitive data are more commonly open to Internet access. An IDS’s responsibility is to detect suspicious or unacceptable system and network activity and to alert a systems administrator to this activity. The majority of IDSs use a set of signatures that define what suspicious traffic is, and Snort is one popular and actively developing open-source IDS that uses such a set of signatures known as Snort rules. Our aim is to identify a way in which Snort could be developed further by generalising rules to identify novel attacks. In particular, we attempted to relax and vary the conditions and parameters of current Snort rules, using a similar approach to classic rule learning operators such as generalisation and specialisation. We demonstrate the effectiveness of our approach through experiments with standard datasets and show that we are able to detect previously undetected variants of various attacks. We conclude by discussing the general effectiveness and appropriateness of generalisation in Snort based IDS rule processing. Keywords: anomaly detection, intrusion detection, Snort, Snort rules

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Dendritic cells are antigen presenting cells that provide a vital link between the innate and adaptive immune system, providing the initial detection of pathogenic invaders. Research into this family of cells has revealed that they perform information fusion which directs immune responses. We have derived a Dendritic Cell Algorithm based on the functionality of these cells, by modelling the biological signals and differentiation pathways to build a control mechanism for an artificial immune system. We present algorithmic details in addition to experimental results, when the algorithm was applied to anomaly detection for the detection of port scans. The results show the Dendritic Cell Algorithm is successful at detecting port scans.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, self-organised and distributed manner. Secondly, current techniques used in computer security are not able to cope with the dynamic and increasingly complex nature of computer systems and their security. It is hoped that biologically inspired approaches in this area, including the use of immune-based systems will be able to meet this challenge. Here we review the algorithms used, the development of the systems and the outcome of their implementation. We provide an introduction and analysis of the key developments within this field, in addition to making suggestions for future research.