982 resultados para Classifying Party Systems


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper proposes a new method for stabilizing disturbed power systems using wide area measurement and FACTS devices. The approach focuses on both first swing and damping stability of power systems following large disturbances. A two step control algorithm based on Lyapunov Theorem is proposed to be applied on the controllers to improve the power systems stability. The proposed approach is simulated on two test systems and the results show significant improvement in the first swing and damping stability of the test systems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The scientific job market has evolved to a truly globalized market. This is epitomized not only by the English language being the de facto scientific language but also by the increasing share of native language journals that are being offered in multiple languages or have or will fully converted to English (such as, for example, the BISE journal in 2015). Similarly, a plethora of exchange programs exists that allow students and academic staff to visit other institutions and exchange knowledge, ideas, and learning opportunities. While student migration across scientific institutions is an established phenomenon (Gribble, 2008) with ample structures, policies, and schemes such as ERASMUS1 in place, academic staff migration between countries is still a challenge, even if exchange programs exist (Enders, 1998). One reason may be that different career paths, varying teaching loads and different evaluation schemes for what constitutes scientific excellence are notable. This also influences the decision of where to start and continue an academic career. While the university systems themselves have been examined previously (Galliers and Whitley, 2007; Lyytinen et al., 2007) and while there is knowledge about career requirements in different university systems (Dennis et al., 2006; Dean et al., 2011; Loos et al., 2013; Recker, 2013), we still do not know much about individual and contextual decisions of academics that either consider or execute a migration between university systems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Distributed generation (DG) resources are commonly used in the electric systems to obtain minimum line losses, as one of the benefits of DG, in radial distribution systems. Studies have shown the importance of appropriate selection of location and size of DGs. This paper proposes an analytical method for solving optimal distributed generation placement (ODGP) problem to minimize line losses in radial distribution systems using loss sensitivity factor (LSF) based on bus-injection to branch-current (BIBC) matrix. The proposed method is formulated and tested on 12 and 34 bus radial distribution systems. The classical grid search algorithm based on successive load flows is employed to validate the results. The main advantages of the proposed method as compared with the other conventional methods are the robustness and no need to calculate and invert large admittance or Jacobian matrices. Therefore, the simulation time and the amount of computer memory, required for processing data especially for the large systems, decreases.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study investigates the variation of photon field penumbra shape with initial electron beam diameter, for very narrow beams. A Varian Millenium MLC (Varian Medical Systems, Palo Alto, USA) and a Brainlab m3 microMLC (Brainlab AB. Feldkirchen, Germany) were used, with one Varian iX linear accelerator, to produce fields that were (nominally) 0.20 cm across. Dose profiles for these fields were measured using radiochromic film and compared with the results of simulations completed using BEAMnrc and DOSXYZnrc, where the initial electron beam was set to FWHM = 0.02, 0.10, 0.12, 0.15, 0.20 and 0.50 cm. Increasing the electron-beam FWHM produced increasing occlusion of the photon source by the closely spaced collimator leaves and resulted in blurring of the simulated profile widths from 0.26 to 0.64 cm, for the MLC, from 0.12 to 0.43 cm, for the microMLC. Comparison with measurement data suggested that the electron spot size in the clinical linear accelerator was between FWHM = 0.10 and 0.15 cm, encompassing the result of our previous output-factor based work, which identified a FWHM of 0.12. Investigation of narrow-beam penumbra variation has been found to be a useful procedure, with results varying noticeably with linear accelerator spot size and allowing FWHM estimates obtained using other methods to be verified.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objective To develop and evaluate machine learning techniques that identify limb fractures and other abnormalities (e.g. dislocations) from radiology reports. Materials and Methods 99 free-text reports of limb radiology examinations were acquired from an Australian public hospital. Two clinicians were employed to identify fractures and abnormalities from the reports; a third senior clinician resolved disagreements. These assessors found that, of the 99 reports, 48 referred to fractures or abnormalities of limb structures. Automated methods were then used to extract features from these reports that could be useful for their automatic classification. The Naive Bayes classification algorithm and two implementations of the support vector machine algorithm were formally evaluated using cross-fold validation over the 99 reports. Result Results show that the Naive Bayes classifier accurately identifies fractures and other abnormalities from the radiology reports. These results were achieved when extracting stemmed token bigram and negation features, as well as using these features in combination with SNOMED CT concepts related to abnormalities and disorders. The latter feature has not been used in previous works that attempted classifying free-text radiology reports. Discussion Automated classification methods have proven effective at identifying fractures and other abnormalities from radiology reports (F-Measure up to 92.31%). Key to the success of these techniques are features such as stemmed token bigrams, negations, and SNOMED CT concepts associated with morphologic abnormalities and disorders. Conclusion This investigation shows early promising results and future work will further validate and strengthen the proposed approaches.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive adversary indicate that every n-variate function can be computed by n participants, such that no set of size t < n/2 participants learns any additional information other than what they could derive from their private inputs and the output of the protocol. We study unconditionally secure MPC protocols in the presence of a passive adversary in the trusted setup (‘semi-ideal’) model, in which the participants are supplied with some auxiliary information (which is random and independent from the participant inputs) ahead of the protocol execution (such information can be purchased as a “commodity” well before a run of the protocol). We present a new MPC protocol in the trusted setup model, which allows the adversary to corrupt an arbitrary number t < n of participants. Our protocol makes use of a novel subprotocol for converting an additive secret sharing over a field to a multiplicative secret sharing, and can be used to securely evaluate any n-variate polynomial G over a field F, with inputs restricted to non-zero elements of F. The communication complexity of our protocol is O(ℓ · n 2) field elements, where ℓ is the number of non-linear monomials in G. Previous protocols in the trusted setup model require communication proportional to the number of multiplications in an arithmetic circuit for G; thus, our protocol may offer savings over previous protocols for functions with a small number of monomials but a large number of multiplications.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Social Media Analytics ist ein neuer Forschungsbereich, in dem interdisziplinäre Methoden kombiniert, erweitert und angepasst werden, um Social-Media-Daten auszuwerten. Neben der Beantwortung von Forschungsfragen ist es ebenfalls ein Ziel, Architekturentwürfe für die Entwicklung neuer Informationssysteme und Anwendungen bereitzustellen, die auf sozialen Medien basieren. Der Beitrag stellt die wichtigsten Aspekte des Bereichs Social Media Analytics vor und verweist auf die Notwendigkeit einer fächerübergreifenden Forschungsagenda, für deren Erstellung und Bearbeitung der Wirtschaftsinformatik eine wichtige Rolle zukommt.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Social Media Analytics is an emerging interdisciplinary research field that aims on combining, extending, and adapting methods for analysis of social media data. On the one hand it can support IS and other research disciplines to answer their research questions and on the other hand it helps to provide architectural designs as well as solution frameworks for new social media-based applications and information systems. The authors suggest that IS should contribute to this field and help to develop and process an interdisciplinary research agenda.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper discusses the idea and demonstrates an early prototype of a novel method of interacting with security surveillance footage using natural user interfaces in place of traditional mouse and keyboard interaction. Current surveillance monitoring stations and systems provide the user with a vast array of video feeds from multiple locations on a video wall, relying on the user’s ability to distinguish locations of the live feeds from experience or list based key-value pair of location and camera IDs. During an incident, this current method of interaction may cause the user to spend increased amounts time obtaining situational and location awareness, which is counter-productive. The system proposed in this paper demonstrates how a multi-touch screen and natural interaction can enable the surveillance monitoring station users to quickly identify the location of a security camera and efficiently respond to an incident.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

"The focus of this chapter is on context-resonant systems perspectives in career theory and their implications for practice in diverse cultural and contextual settings. For over two decades, the potential of systems theory to offer a context-resonant approach to career development has been acknowledged. Career development theory and practice, however, have been dominated for most of their history by more narrowly defined theories informed by a trait-and-factor tradition of matching the characteristics of individuals to occupations. In contrast, systems theory challenges this parts-in-isolation approach and offers a response that can accommodate the complexity of both the lives of individuals and the world of the 21st century by taking a more holistic approach that considers individuals in context. These differences in theory and practice may be attributed to the underlying philosophies that inform them. For example, the philosophy informing the trait-and-factor theoretical position, logical positivism, places value on: studying individuals in isolation from their environments; content over process; facts over feelings; objectivity over subjectivity; and views individual behavior as observable, measurable, and linear. In practice, this theory base manifests in expert-driven practices founded on the assessment of personal traits such as interests, personality, values, or beliefs which may be matched to particular occupations. The philosophy informing more recent theoretical positions, constructivism, places value on: studying individuals in their contexts; making meaning of experience through the use of subjective narrative accounts; and a belief in the capacity of individuals known as agency. In practice, this theory base manifests in practices founded on collaborative relationships with clients, narrative approaches, and a reduced emphasis on expert-driven linear processes. Thus, the tenets of constructivism which inform the systems perspectives in career theory are context-resonant. Systems theory stresses holism where the interconnectedness of all elements of a system is considered. Systems may be open or closed. Closed systems have no relationship with their external environment whereas open systems interact with their external environment and are open to external influence which is necessary for regeneration. Congruent with general systems theory, the systems perspectives emerging within career theory are based on open systems. Such systems are complex and dynamic and comprise many elements and subsystems which recursively interact with each other as well as with influences from the surrounding environment. As elements of a system should not be considered in isolation, a systems approach is holistic. Patterns of behavior are found in the relationships between the elements of dynamic systems. Because of the multiplicity of relationships within and between elements of subsystems, the possibility of linear causal explanations is reduced. Story is the mechanism through which the relationships and patterns within systems are recounted by individuals. Thus the career guidance practices emanating from theories informed by systems perspectives are inherently narrative in orientation. Narrative career counseling encourages career development to be understood from the subjective perspective of clients. The application of systemic thinking in practice takes greater account of context. In so doing, practices informed by systems theory may facilitate relevance to a diverse client group in diverse settings. In a world that has become increasingly global and diverse it seems that context-resonant systems perspectives in career theory are essential to ensure the future of career development. Translating context-resonant systems perspectives into practice offers important possibilities for methods and approaches that are respectful of diversity."--publisher website

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Although recommender systems and reputation systems have quite different theoretical and technical bases, both types of systems have the purpose of providing advice for decision making in e-commerce and online service environments. The similarity in purpose makes it natural to integrate both types of systems in order to produce better online advice, but their difference in theory and implementation makes the integration challenging. In this paper, we propose to use mappings to subjective opinions from values produced by recommender systems as well as from scores produced by reputation systems, and to combine the resulting opinions within the framework of subjective logic.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this survey, we review a number of the many “expressive” encryption systems that have recently appeared from lattices, and explore the innovative techniques that underpin them.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An increasing number of countries are faced with an aging population increasingly needing healthcare services. For any e-health information system, the need for increased trust by such clients with potentially little knowledge of any security scheme involved is paramount. In addition notable scalability of any system has become a critical aspect of system design, development and ongoing management. Meanwhile cryptographic systems provide the security provisions needed for confidentiality, authentication, integrity and non-repudiation. Cryptographic key management, however, must be secure, yet efficient and effective in developing an attitude of trust in system users. Digital certificate-based Public Key Infrastructure has long been the technology of choice or availability for information security/assurance; however, there appears to be a notable lack of successful implementations and deployments globally. Moreover, recent issues with associated Certificate Authority security have damaged trust in these schemes. This paper proposes the adoption of a centralised public key registry structure, a non-certificate based scheme, for large scale e-health information systems. The proposed structure removes complex certificate management, revocation and a complex certificate validation structure while maintaining overall system security. Moreover, the registry concept may be easier for both healthcare professionals and patients to understand and trust.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents the blast response, damage mechanism and evaluation of residual load capacity of a concrete–steel composite (CSC) column using dynamic computer simulation techniques. This study is an integral part of a comprehensive research program which investigated the vulnerability of structural framing systems to catastrophic and progressive collapse under blast loading and is intended to provide design information on blast mitigation and safety evaluation of load bearing vulnerable columns that are key elements in a building. The performance of the CSC column is compared with that of a reinforced concrete (RC) column with the same dimensions and steel ratio. Results demonstrate the superior performance of the CSC column, compared to the RC column in terms of residual load carrying capacity, and its potential for use as a key element in structural systems. The procedure and results presented herein can be used in the design and safety evaluation of key elements of multi-storey buildings for mitigating the impact of blast loads.