990 resultados para well failure


Relevância:

20.00% 20.00%

Publicador:

Resumo:

As the virtual world grows more complex, finding a standard way for storing data becomes increasingly important. Ideally, each data item would be brought into the computer system only once. References for data items need to be cryptographically verifiable, so the data can maintain its identity while being passed around. This way there will be only one copy of the users family photo album, while the user can use multiple tools to show or manipulate the album. Copies of users data could be stored on some of his family members computer, some of his computers, but also at some online services which he uses. When all actors operate over one replicated copy of the data, the system automatically avoids a single point of failure. Thus the data will not disappear with one computer breaking, or one service provider going out of business. One shared copy also makes it possible to delete a piece of data from all systems at once, on users request. In our research we tried to find a model that would make data manageable to users, and make it possible to have the same data stored at various locations. We studied three systems, Persona, Freenet, and GNUnet, that suggest different models for protecting user data. The main application areas of the systems studied include securing online social networks, providing anonymous web, and preventing censorship in file-sharing. Each of the systems studied store user data on machines belonging to third parties. The systems differ in measures they take to protect their users from data loss, forged information, censorship, and being monitored. All of the systems use cryptography to secure names used for the content, and to protect the data from outsiders. Based on the gained knowledge, we built a prototype platform called Peerscape, which stores user data in a synchronized, protected database. Data items themselves are protected with cryptography against forgery, but not encrypted as the focus has been disseminating the data directly among family and friends instead of letting third parties store the information. We turned the synchronizing database into peer-to-peer web by revealing its contents through an integrated http server. The REST-like http API supports development of applications in javascript. To evaluate the platform’s suitability for application development we wrote some simple applications, including a public chat room, bittorrent site, and a flower growing game. During our early tests we came to the conclusion that using the platform for simple applications works well. As web standards develop further, writing applications for the platform should become easier. Any system this complex will have its problems, and we are not expecting our platform to replace the existing web, but are fairly impressed with the results and consider our work important from the perspective of managing user data.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As the virtual world grows more complex, finding a standard way for storing data becomes increasingly important. Ideally, each data item would be brought into the computer system only once. References for data items need to be cryptographically verifiable, so the data can maintain its identity while being passed around. This way there will be only one copy of the users family photo album, while the user can use multiple tools to show or manipulate the album. Copies of users data could be stored on some of his family members computer, some of his computers, but also at some online services which he uses. When all actors operate over one replicated copy of the data, the system automatically avoids a single point of failure. Thus the data will not disappear with one computer breaking, or one service provider going out of business. One shared copy also makes it possible to delete a piece of data from all systems at once, on users request. In our research we tried to find a model that would make data manageable to users, and make it possible to have the same data stored at various locations. We studied three systems, Persona, Freenet, and GNUnet, that suggest different models for protecting user data. The main application areas of the systems studied include securing online social networks, providing anonymous web, and preventing censorship in file-sharing. Each of the systems studied store user data on machines belonging to third parties. The systems differ in measures they take to protect their users from data loss, forged information, censorship, and being monitored. All of the systems use cryptography to secure names used for the content, and to protect the data from outsiders. Based on the gained knowledge, we built a prototype platform called Peerscape, which stores user data in a synchronized, protected database. Data items themselves are protected with cryptography against forgery, but not encrypted as the focus has been disseminating the data directly among family and friends instead of letting third parties store the information. We turned the synchronizing database into peer-to-peer web by revealing its contents through an integrated http server. The REST-like http API supports development of applications in javascript. To evaluate the platform s suitability for application development we wrote some simple applications, including a public chat room, bittorrent site, and a flower growing game. During our early tests we came to the conclusion that using the platform for simple applications works well. As web standards develop further, writing applications for the platform should become easier. Any system this complex will have its problems, and we are not expecting our platform to replace the existing web, but are fairly impressed with the results and consider our work important from the perspective of managing user data.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article concentrates on the discursive constmction of success and failure in narratives of post-merger integration. Drawing on extensive interview material from eight Finnish-Swedish mergers and acquisitions, the empirical analysis leads to distinguishing four types of discourse — 'rationalistic', 'cultural', 'role-bound' and 'individualistic' — that narrators employ in recounting their experiences. In particular, the empirical material illustrates how the discursive frameworks enable specific (di.scursive) strategies and moves for (re)framing the success/failure, justification/legitimization of one's own actions, and (re)constniction of responsibility when dealing with socio-psychological pressures associated with success/failtire. The analysis also suggests that, as a result of making use of these discursive strategies and moves, success stories are likely to lead to overly optimistic or, in the case of failure stories, overly pessimistic views on the management's ability to control these change processes. Tliese findings imply that we should take the discursive elements that both constrain our descriptions and explanations seriously, and provide opportunities for more or less intentional (re)interpretations of postmerger integration or other organizational change processes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In Somalia the central government collapsed in 1991 and since then state failure became a widespread phenomenon and one of the greatest political and humanitarian problems facing the world in this century. Thus, the main objective of this research is to answer the following question: What went wrong? Most of the existing literature on the political economy of conflict starts from the assumption that state in Africa is predatory by nature. Unlike these studies, the present research, although it uses predation theory, starts from the social contract approach of state definition. Therefore, rather than contemplating actions and policies of the rulers alone, this approach allows us to deliberately bring the role of the society – as citizens – and other players into the analyses. In Chapter 1, after introducing the study, a simple principal-agent model will be developed to check the logical consistence of the argument and to make the identification of causal mechanism easier. I also identify three main actors in the process of state failure in Somalia: the Somali state, Somali society and the superpowers. In Chapter 2, so as to understand the incentives, preferences and constraints of each player in the state failure game, I in some depth analyse the evolution and structure of three central informal institutions: identity based patronage system of leadership, political tribalism, and the Cold War. These three institutions are considered as the rules of the game in the Somali state failure. Chapter 3 summarises the successive civilian governments’ achievements and failures (1960-69) concerning the main national goals, national unification and socio-economic development. Chapter 4 shows that the military regime, although it assumed power through extralegal means, served to some extent the developmental interest of the citizens in the first five years of its rule. Chapter 5 shows the process, and the factors involved, of the military regime’s self-transformation from being an agent for the developmental interests of the society to a predatory state that not only undermines the interests of the society but that also destroys the state itself. Chapter 6 addresses the process of disintegration of the post-colonial state of Somalia. The chapter shows how the regime’s merciless reactions to political ventures by power-seeking opposition leaders shattered the entire country and wrecked the state institutions. Chapter 7 concludes the study by summarising the main findings: due to the incentive structures generated by the informal institutions, the formal state institutions fell apart.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Antigen specific monoclonal antibodies present in crude hybridoma supernatants are normally screened by ELISA on plates coated with the relevant antigen. Screening for inhibitory monoclonals to enzymes would require the evaluation of purified antibodies or antibody containing supernatants for their inhibition of enzyme activity in a separate assay. However, screening for inhibitory antibodies against DNA transacting enzymes such as topoisomerase I (topo I) cannot be done using hybridoma supernatants due to the presence of nucleases in tissue culture media containing foetal calf serum which degrade the DNA substrates upon addition. We have developed a simple and rapid screening procedure for the identification of clones that secrete inhibitory antibodies against mycobacterial topo I using 96 well ELISA microtiter plates. The principle of the method is the selective capture of monoclonal antibodies from crude hybridoma supernatants by topo I that is tethered to the plate through the use of plate-bound polyclonal anti-topo I antibodies. This step allows the nucleases present in the medium to be washed off leaving the inhibitor bound to the tethered enzyme. The inhibitory activity of the captured antibody is assessed by performing an in situ DNA relaxation assay by the addition of supercoiled DNA substrate directly to the microtiter well followed by the analysis of the reaction products by agarose gel electrophoresis. The validity of this method was confirmed by purification of the identified inhibitory antibody and its evaluation in a DNA relaxation assay. Elimination of all enzyme-inhibitory constituents of the culture medium from the well in which the inhibitory antibody is bound to the tethered enzyme may make this method broadly applicable to enzymes such as DNA gyrases, restriction enzymes and other DNA transaction enzymes. Further, the method is simple and avoids the need of prior antibody purification for testing its inhibitory activity. (C) 2010 Elsevier B.V. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Ramakrishnan A, Chokhandre S, Murthy A. Voluntary control of multisaccade gaze shifts during movement preparation and execution. J Neurophysiol 103: 2400-2416, 2010. First published February 17, 2010; doi: 10.1152/jn.00843.2009. Although the nature of gaze control regulating single saccades is relatively well documented, how such control is implemented to regulate multisaccade gaze shifts is not known. We used highly eccentric targets to elicit multisaccade gaze shifts and tested the ability of subjects to control the saccade sequence by presenting a second target on random trials. Their response allowed us to test the nature of control at many levels: before, during, and between saccades. Although the saccade sequence could be inhibited before it began, we observed clear signs of truncation of the first saccade, which confirmed that it could be inhibited in midflight as well. Using a race model that explains the control of single saccades, we estimated that it took about 100 ms to inhibit a planned saccade but took about 150 ms to inhibit a saccade during its execution. Although the time taken to inhibit was different, the high subject-wise correlation suggests a unitary inhibitory control acting at different levels in the oculomotor system. We also frequently observed responses that consisted of hypometric initial saccades, followed by secondary saccades to the initial target. Given the estimates of the inhibitory process provided by the model that also took into account the variances of the processes as well, the secondary saccades (average latency similar to 215 ms) should have been inhibited. Failure to inhibit the secondary saccade suggests that the intersaccadic interval in a multisaccade response is a ballistic stage. Collectively, these data indicate that the oculomotor system can control a response until a very late stage in its execution. However, if the response consists of multiple movements then the preparation of the second movement becomes refractory to new visual input, either because it is part of a preprogrammed sequence or as a consequence of being a corrective response to a motor error.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Erasure coding techniques are used to increase the reliability of distributed storage systems while minimizing storage overhead. Also of interest is minimization of the bandwidth required to repair the system following a node failure. In a recent paper, Wu et al. characterize the tradeoff between the repair bandwidth and the amount of data stored per node. They also prove the existence of regenerating codes that achieve this tradeoff. In this paper, we introduce Exact Regenerating Codes, which are regenerating codes possessing the additional property of being able to duplicate the data stored at a failed node. Such codes require low processing and communication overheads, making the system practical and easy to maintain. Explicit construction of exact regenerating codes is provided for the minimum bandwidth point on the storage-repair bandwidth tradeoff, relevant to distributed-mail-server applications. A sub-space based approach is provided and shown to yield necessary and sufficient conditions on a linear code to possess the exact regeneration property as well as prove the uniqueness of our construction. Also included in the paper, is an explicit construction of regenerating codes for the minimum storage point for parameters relevant to storage in peer-to-peer systems. This construction supports a variable number of nodes and can handle multiple, simultaneous node failures. All constructions given in the paper are of low complexity, requiring low field size in particular.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This dissertation empirically explores the relations among three theoretical perspectives: university students approaches to learning, self-regulated learning, as well as cognitive and attributional strategies. The relations were quantitatively studied from both variable- and person-centered perspectives. In addition, the meaning that students gave to their disciplinary choices was examined. The general research questions of the study were: 1) What kinds of relationships exist among approaches to learning, regulation of learning, and cognitive and attributional strategies? What kinds of cognitive-motivational profiles can be identified among university students, and how are such profiles related to study success and well-being? 3) How do university students explain their disciplinary choices? Four empirical studies addressed these questions. Studies I, II, and III were quantitative, applying self-report questionnaires, and Study IV was qualitative in nature. Study I explored relations among cognitive strategies, approaches to learning, regulation of learning, and study success by using correlations and a K-means cluster analysis. The participants were 366 students from various faculties at different phases of their studies. The results showed that all the measured constructs were logically related to each other in both variable- and person-centered approaches. Study II further examined what kinds of cognitive-motivational profiles could be identified among first-year university students (n=436) in arts, law, and agriculture and forestry. Differences in terms of study success, exhaustion, and stress among students with differing profiles were also looked at. By using a latent class cluster analysis (LCCA), three groups of students were identified: non-academic (34%), self-directed (35%), and helpless students (31%). Helpless students reported the highest levels of stress and exhaustion. Self-directed students received the highest grades. In Study III, cognitive-motivational profiles were identified among novice teacher students (n=213) using LCCA. Well-being, epistemological beliefs, and study success were looked at in relation to the profiles. Three groups of students were found: non-regulating (50%), self-directed (35%), and non-reflective (22%). Self-directed students again received the best grades. Non-regulating students reported the highest levels of stress and exhaustion, the lowest level of interest, and showed the strongest preference for certain and practical knowledge. Study IV, which was qualitative in nature, explored how first-year students (n = 536 ) in three fields of studies, arts, law, and veterinary medicine explained their disciplinary choices. Content analyses showed that interest appeared to be a common concept in students description of their choices across the three faculties. However, the objects of interest of the freshmen appeared rather unspecified. Veterinary medicine and law students most often referred to future work or a profession, whereas only one-fifth of the arts students did so. The dissertation showed that combining different theoretical perspectives and methodologies enabled us to build a rich picture of university students cognitive and motivational predispositions towards studying and learning. Further, cognitive-emotional aspects played a significant role in studying, not only in relation to study success, but also in terms of well-being. Keywords: approaches to learning, self-regulation, cognitive and attributional strategies, university students

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This Working Paper reports the background to the first stage of the ongoing research project, The Quest for Well-being in Growth Industries: A Collaborative Study in Finland and Scotland, conducted under the auspices of the Academy of Finland research programme The Future of Work and Well-being (2008-2011). This collaborative project provides national and transnational data, analysis and outputs. The study is being conducted in the Department of Management and Organisation, Hanken School of Economics, Finland, in collaboration with Glasgow Caledonian University, University of East London, Heriot-Watt University and Reading University, UK. The project examines policies and practices towards the enhancement of work-related well-being in growth industries, and contradictory pressures and tensions posed in this situation. The overall aim is to evaluate the development, implementation and use of work-related well-being policies in four selected growth industries. These sectors – electronics, care, finance and accounting, and tourism – have been selected on the basis of European Union and national forecasts, and demographic and socio-economic trends in employment. In this working paper we outline the background to the research study, the initial research plan, and how the survey of employers has been constructed. The working paper concludes with a brief discussion of general ongoing research issues arising in the project.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we present a generic method/model for multi-objective design optimization of laminated composite components, based on Vector Evaluated Artificial Bee Colony (VEABC) algorithm. VEABC is a parallel vector evaluated type, swarm intelligence multi-objective variant of the Artificial Bee Colony algorithm (ABC). In the current work a modified version of VEABC algorithm for discrete variables has been developed and implemented successfully for the multi-objective design optimization of composites. The problem is formulated with multiple objectives of minimizing weight and the total cost of the composite component to achieve a specified strength. The primary optimization variables are the number of layers, its stacking sequence (the orientation of the layers) and thickness of each layer. The classical lamination theory is utilized to determine the stresses in the component and the design is evaluated based on three failure criteria: failure mechanism based failure criteria, maximum stress failure criteria and the tsai-wu failure criteria. The optimization method is validated for a number of different loading configurations-uniaxial, biaxial and bending loads. The design optimization has been carried for both variable stacking sequences, as well fixed standard stacking schemes and a comparative study of the different design configurations evolved has been presented. Finally the performance is evaluated in comparison with other nature inspired techniques which includes Particle Swarm Optimization (PSO), Artificial Immune System (AIS) and Genetic Algorithm (GA). The performance of ABC is at par with that of PSO, AIS and GA for all the loading configurations. (C) 2009 Elsevier B.V. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The k-colouring problem is to colour a given k-colourable graph with k colours. This problem is known to be NP-hard even for fixed k greater than or equal to 3. The best known polynomial time approximation algorithms require n(delta) (for a positive constant delta depending on k) colours to colour an arbitrary k-colourable n-vertex graph. The situation is entirely different if we look at the average performance of an algorithm rather than its worst-case performance. It is well known that a k-colourable graph drawn from certain classes of distributions can be ii-coloured almost surely in polynomial time. In this paper, we present further results in this direction. We consider k-colourable graphs drawn from the random model in which each allowed edge is chosen independently with probability p(n) after initially partitioning the vertex set into ii colour classes. We present polynomial time algorithms of two different types. The first type of algorithm always runs in polynomial time and succeeds almost surely. Algorithms of this type have been proposed before, but our algorithms have provably exponentially small failure probabilities. The second type of algorithm always succeeds and has polynomial running time on average. Such algorithms are more useful and more difficult to obtain than the first type of algorithms. Our algorithms work as long as p(n) greater than or equal to n(-1+is an element of) where is an element of is a constant greater than 1/4.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Ketoprofeeni on yleisesti käytetty ei-steroidinen tulehduskipulääke (NSAID) lampaiden ja sikojen kivunlievityksessä. Tietoa ketoprofeenin oikeista annosmääristä eri eläinlajeilla on saatavilla rajallisesti. Oikeaa lääkeainemäärää ei voida luotettavasti ekstrapoloida toisten eläinlajien tai ihmisten perusteella. Epäillyissä tulehduskipulääkemyrkytyksissä ongelmana on tietää, oliko eläimen saama lääkeannos toksinen. Lampailla tehdyn tutkimuksen tavoitteena oli selvittää, muuttuuko ketoprofeenin kinetiikka kymmenkertaisella yliannoksella, tutkia yliannoksen vaikutusta munuaisiin ja löytää yksinkertainen tapa diagnosoida yliannos virtsasta. Sioilla tehdyn tutkimuksen tavoitteena oli selvittää ketoprofeenin biologista käytettävyyttä ja ketoprofeenin farmakokinetiikkaa sioilla intravaskulaarisella, intramuskulaarisella ja peroraalisella annolla. Keskeiset tutkimuksessa määritettävät muuttujat olivat AUC0-_, Cmax ja tmax. Hyötyosuus laskettiin i.v. -annon perusteella. Kuudelle lampaalle annettiin 30 mg/kg i.v. -ketoprofeenia. Ketoprofeenin pitoisuuksia seurattiin 24 tunnin ajan plasmanäytteillä, joiden perusteella määritettiin farmakokineettiset parametrit. Veri- ja virtsanäytteistä tutkittiin muun muassa mahdollisesta munuaisvauriosta kertovia entsyymejä. 24 tunnin kuluttua lääkkeenannosta lampaat lopetettiin ja munuaiset tutkittiin histologisesti. Tutkittaville kahdeksalle sialle annosteltiin 3 mg/kg intravaskulaarista, intramuskulaarista ja oraalista ketoprofeenia sekä 6 mg/kg oraalista ketoprofeenia. Tutkimus suoritettiin satunnaistettuna vaihtovuorotutkimuksena. Ketoprofeenin pitoisuuksia seurattiin plasmanäytteillä 48 tunnin ajan lääkkeenannosta ja kaikille antotavoille laskettiin farmakokineettiset parametrit. Lisäksi tutkittiin valmisteiden biologinen samanarvoisuus. Molempien tutkimusten in vivo -kokeet suoritettiin Eläinlääketieteellisessä tiedekunnassa. Samoin munuaisten histologinen tutkimus ja virtsasta ja verestä tehdyt määritykset, lukuun ottamatta ketoprofeeninpitoisuuden analysointia. Plasman ketoprofeenipitoisuus analysoitiin korkean erotuskyvyn nestekromatografialla (HPLC). Ketoprofeenimääritykset ja farmakokineettinen analyysi suoritettiin Farmasian tiedekunnassa. Lampaiden kymmenkertainen ketoprofeeniyliannos oli toksinen. Seerumin urea- ja kreatiniinipitoisuus nousivat ja histologisissa näytteissä näkyi akuutti munuaistiehyen vaurio. Useiden entsyymien pitoisuus nousi virtsassa. Selvimmin ja nopeimmin nousi virtsan laktaattidehydrogenaasipitoisuus, jonka määrittäminen vaikuttaa potentiaaliselta tavalta diagnosoida ketoprofeenin toksinen annos. Ketoprofeenin eliminaation puoliintumisaika toksisella annoksella oli samaa suuruusluokkaa kuin aiemmissa tutkimuksissa terapeuttisella annoksella, joten yliannos ei muuttanut ketoprofeenin kinetiikkaa. AUC- ja Cmax -arvot olivat suhteessa suurempia kuin terapeuttisella annoksella, joten tutkimuksen perusteella kyseiset arvot eivät nousseet lineaarisesti annoksen noustessa toksiseksi. Sioille annetut ketoprofeenivalmisteet eivät olleet biologisesti samanarvoisia keskenään. Hyötyosuus oli erittäin hyvä kaikilla antotavoilla. tmax oli kaikilla antotavoilla hieman yli tunnin kuluttua lääkkeenannosta. Oraalisen 3 mg/kg -annoksen Cmax oli 5,1 mg/l ja AUC 32 mg l-1 h ja intramuskulaarisen vastaavat arvot olivat 7,6 mg/l ja 37 mg l-1 h. Oraalisen ketoprofeenin annostasojen AUC- ja Cmax -arvot korreloivat keskenään, joten ketoprofeenin kinetiikka oli lineaarista. Intravaskulaarisen ja oraalisen annon puoliintumisajoissa oli tilastollisesti merkitsevä ero. Ketoprofeenin jakautumistilavuudessa ja puhdistumassa ei ollut tilastollisesti merkitsevää eroa eri antotapojen välillä.