915 resultados para horse, naskh script, prisoner, sword, tree


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Fault tree analysis (FTA) is presented to model the reliability of a railway traction power system in this paper. First, the construction of fault tree is introduced to integrate components in traction power systems into a fault tree; then the binary decision diagram (BDD) method is used to evaluate fault trees qualitatively and quantitatively. The components contributing to the reliability of overall system are identified with their relative importance through sensitivity analysis. Finally, an AC traction power system is evaluated by the proposed methods.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Much of the research on the delivery of advice by professionals such as physicians, health workers and counsellors, both on the telephone and in face to face interaction more generally, has focused on the theme of client resistance and the consequent need for professionals to adopt particular formats to assist in the uptake of the advice. In this paper we consider one setting, Kids Helpline, the national Australian counselling service for children and young people, where there is an institutional mandate not to give explicit advice in accordance with the values of self-direction and empowerment. The paper examines one practice, the use of script proposals by counsellors, which appears to offer a way of providing support which is consistent with these values. Script proposals entail the counsellors packaging their advice as something that the caller might say at some future time to a third party such as a friend, teacher, parent, or partner, and involve the counsellor adopting the speaking position of the caller in what appears as a rehearsal of a forthcoming strip of interaction. Although the core feature of a script proposal is the counsellors use of direct reported speech they appear to be delivered, not so much as exact words to be followed, but as the type of conversation that the client needs to have with the 3rd party. Script proposals, in short, provide models of what to say as well as alluding to how these could be emulated by the client. In their design script proposals invariably incorporate one or more of the most common rhetorical formats for maximising the persuasive force of an utterance such as a three part list or a contrastive pair. Script proposals, moreover, stand in a complex relation to the prior talk and one of their functions appears to be to summarise, respecify or expand upon the clients own ideas or suggestions for problem solving that have emerged in these preceding sequences.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper we present pyktree, an implementation of the K-tree algorithm in the Python programming language. The K-tree algorithm provides highly balanced search trees for vector quantization that scales up to very large data sets. Pyktree is highly modular and well suited for rapid-prototyping of novel distance measures and centroid representations. It is easy to install and provides a python package for library use as well as command line tools.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

New technologies have the potential to both expose children to and protect them from television news footage likely to disturb or frighten. The advent of cheap, portable and widely available digital technology has vastly increased the possibility of violent news events being captured and potentially broadcast. This material has the potential to be particularly disturbing and harmful to young children. But on the flipside, available digital technology could be used to build in protection for young viewers especially when it comes to preserving scheduled television programming and guarding against violent content being broadcast during live crosses from known trouble spots. Based on interviews with news directors, parents and a review of published material two recommendations are put forward: 1. Digital television technology should be employed to prevent news events "overtaking" scheduled children's programming and to protect safe harbours placed in the classifications zones to protect children. 2. Broadcasters should regain control of the images that go to air during "live" feeds from obviously volatile situations by building in short delays in G classification zones.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: Strategies for cancer reduction and management are targeted at both individual and area levels. Area-level strategies require careful understanding of geographic differences in cancer incidence, in particular the association with factors such as socioeconomic status, ethnicity and accessibility. This study aimed to identify the complex interplay of area-level factors associated with high area-specific incidence of Australian priority cancers using a classification and regression tree (CART) approach. Methods: Area-specific smoothed standardised incidence ratios were estimated for priority-area cancers across 478 statistical local areas in Queensland, Australia (1998-2007, n=186,075). For those cancers with significant spatial variation, CART models were used to identify whether area-level accessibility, socioeconomic status and ethnicity were associated with high area-specific incidence. Results: The accessibility of a persons residence had the most consistent association with the risk of cancer diagnosis across the specific cancers. Many cancers were likely to have high incidence in more urban areas, although male lung cancer and cervical cancer tended to have high incidence in more remote areas. The impact of socioeconomic status and ethnicity on these associations differed by type of cancer. Conclusions: These results highlight the complex interactions between accessibility, socioeconomic status and ethnicity in determining cancer incidence risk.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Evidence that our food environment can affect meal size is often taken to indicate a failure of conscious control. By contrast, our research suggests that expected satiation (fullness that a food is expected to confer) predicts self-selected meal size. However, the role of meal planning as a determinant of actual meal size remains unresolved, as does the extent to which meal planning is commonplace outside the laboratory. Here, we quantified meal planning and its relation to meal size in a large-cohort study. Participants (N= 764; 25.6 yrs, 78% female) completed a questionnaire containing items relating to their last meal. The majority (91%) of meals were consumed in their entirety. Furthermore, in 92% of these cases the participants decided to consume the whole meal, even before it began. A second major objective was to explore the prospect that meal plans are revised based on within-meal experience (e.g., development of satiation). Only 8% of participants reported unexpected satiation that caused them to consume less than anticipated. Moreover, at the end of the meal 57% indicated that they were not fully satiated, and 29% continued eating beyond comfortable satiation (often to avoid wasting food). This pattern was neither moderated by BMI nor dieting status, and was observed across meal types. Together, these data indicate that meals are often planned and that planning corresponds closely with amount consumed. By contrast, we find limited evidence for within-meal modification of these plans, suggesting that pre-meal cognition is an important determinant of meal size in humans.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents a general, global approach to the problem of robot exploration, utilizing a topological data structure to guide an underlying Simultaneous Localization and Mapping (SLAM) process. A Gap Navigation Tree (GNT) is used to motivate global target selection and occluded regions of the environment (called gaps) are tracked probabilistically. The process of map construction and the motion of the vehicle alters both the shape and location of these regions. The use of online mapping is shown to reduce the difficulties in implementing the GNT.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The privacy of efficient tree-based RFID authentication protocols is heavily dependent on the branching factor on the top layer. Indefinitely increasing the branching factor, however, is not a viable option. This paper proposes the alternate-tree walking scheme as well as two protocols to circumvent this problem. The privacy of the resulting protocols is shown to be comparable to that of linear-time protocols, where there is no leakage of information, whilst reducing the computational load of the database by one-third of what is required of tree-based protocols during authentication. We also identify and address a limitation in quantifying privacy in RFID protocols.

Relevância:

20.00% 20.00%

Publicador: