928 resultados para Message
Resumo:
We present DRASync, a region-based allocator that implements a global address space abstraction for MPI programs with pointer-based data structures. The main features of DRASync are: (a) it amortizes communication among nodes to allow efficient parallel allocation in a global address space; (b) it takes advantage of bulk deallocation and good locality with pointer-based data structures; (c) it supports ownership semantics of regions by nodes akin to reader–writer locks, which makes for a high-level, intuitive synchronization tool in MPI programs, without sacrificing message-passing performance. We evaluate DRASync against a state-of-the-art distributed allocator and find that it produces comparable performance while offering a higher-level abstraction to programmers.
Resumo:
Electing a leader is a fundamental task in distributed computing. In its implicit version, only the leader must know who is the elected leader. This article focuses on studying the message and time complexity of randomized implicit leader election in synchronous distributed networks. Surprisingly, the most "obvious" complexity bounds have not been proven for randomized algorithms. In particular, the seemingly obvious lower bounds of Ω(m) messages, where m is the number of edges in the network, and Ω(D) time, where D is the network diameter, are nontrivial to show for randomized (Monte Carlo) algorithms. (Recent results, showing that even Ω(n), where n is the number of nodes in the network, is not a lower bound on the messages in complete networks, make the above bounds somewhat less obvious). To the best of our knowledge, these basic lower bounds have not been established even for deterministic algorithms, except for the restricted case of comparison algorithms, where it was also required that nodes may not wake up spontaneously and that D and n were not known. We establish these fundamental lower bounds in this article for the general case, even for randomized Monte Carlo algorithms. Our lower bounds are universal in the sense that they hold for all universal algorithms (namely, algorithms that work for all graphs), apply to every D, m, and n, and hold even if D, m, and n are known, all the nodes wake up simultaneously, and the algorithms can make any use of node's identities. To show that these bounds are tight, we present an O(m) messages algorithm. An O(D) time leader election algorithm is known. A slight adaptation of our lower bound technique gives rise to an Ω(m) message lower bound for randomized broadcast algorithms.
An interesting fundamental problem is whether both upper bounds (messages and time) can be reached simultaneously in the randomized setting for all graphs. The answer is known to be negative in the deterministic setting. We answer this problem partially by presenting a randomized algorithm that matches both complexities in some cases. This already separates (for some cases) randomized algorithms from deterministic ones. As first steps towards the general case, we present several universal leader election algorithms with bounds that tradeoff messages versus time. We view our results as a step towards understanding the complexity of universal leader election in distributed networks.
Resumo:
Social marketing has become a key component of policy initiatives aimed at reducing the incidence of domestic abuse. However, its efficacy remains debated, with most measures of effectiveness being somewhat crude. More subtle effects of social marketing, such as the boomerang effect whereby the message engenders the opposite effect to that intended, have been detected, suggesting a need for modes of analysis sensitive to the multiple ways in which viewers react to social opprobrium. This article attempts to deliver just this. It begins with a short history and critique of the concept of social marketing. It then proceeds to explore the utility of the more complex notion that viewers often identify with the subject positions thrown open by social marketing on a quite temporary basis, before reconfiguring them. Using the responses of domestic abuse perpetrators exposed to the UK Government’s This is Abuse campaign film, the article shows how contradictory identifications with both anti-violence messages and victim-blaming discourses are negotiated by those young men prone to perpetrating domestic abuse. The article concludes by exploring how effectiveness might be better conceptualised and assessed with regard to the impact of anti-violence social marketing that speaks to domestic abuse perpetrators.
Resumo:
The increasing popularity of the social networking service, Twitter, has made it more involved in day-to-day communications, strengthening social relationships and information dissemination. Conversations on Twitter are now being explored as indicators within early warning systems to alert of imminent natural disasters such earthquakes and aid prompt emergency responses to crime. Producers are privileged to have limitless access to market perception from consumer comments on social media and microblogs. Targeted advertising can be made more effective based on user profile information such as demography, interests and location. While these applications have proven beneficial, the ability to effectively infer the location of Twitter users has even more immense value. However, accurately identifying where a message originated from or author’s location remains a challenge thus essentially driving research in that regard. In this paper, we survey a range of techniques applied to infer the location of Twitter users from inception to state-of-the-art. We find significant improvements over time in the granularity levels and better accuracy with results driven by refinements to algorithms and inclusion of more spatial features.
Resumo:
This chapter explores whether ethical cultures can be created within a financial market context. Ongoing regulatory and legal actions, and press coverage of these, suggest that a definition of ethical problems in terms of ‘rogue traders’ and ‘bad apples’ would be inadequate, since entire business areas have been resorting to collusive illegal behaviour. The concept of ‘bad barrels’ seems to capture the situation rather better: the culture of firms fails to discourage transgression and indeed supports it. Unpacking the links between regulatory objectives and the cultural settings of firms and their employees, this chapter questions the chances of success of measures such as enhanced controls on individuals and restructured reward mechanisms. Financial firms typically have very flat, nodal structures, within which traders conceptualise themselves as an elite, in contrast to back office staff and also in contrast to managers. Traders’ functions and their occupational mobility mean that their linkages and attachments may be much stronger with others outside ‘their’ firm than their firm and those within it. Performance, camaraderie and their linkages are important in all work situations, yet all the more so for traders in financial markets. Thus, whether regulators and senior management combine to send a clear and consistent message to traders – or whether the logic of the financial marketplace leads some firms to continue send conflicting or ambivalent messages to them – misconduct is likely to continue to be a tough nut to crack.
Resumo:
We present an extensive optical and near-infrared photometric and spectroscopic campaign of the Type IIP supernova SN 2012aw. The data set densely covers the evolution of SN 2012aw shortly after the explosion through the end of the photospheric phase, with two additional photometric observations collected during the nebular phase, to fit the radioactive tail and estimate the 56Ni mass. Also included in our analysis is the previously published Swift UV data, therefore providing a complete view of the ultraviolet-optical- infrared evolution of the photospheric phase. On the basis of our data set, we estimate all the relevant physical parameters of SN 2012aw with our radiation-hydrodynamics code: envelope mass M env ∼ 20 M ⊙, progenitor radius R ∼ 3 × 1013 cm (∼430 R⊙), explosion energy E ∼ 1.5 foe, and initial 56Ni mass ∼0.06 M⊙. These mass and radius values are reasonably well supported by independent evolutionary models of the progenitor, and may suggest a progenitor mass higher than the observational limit of 16.5 ± 1.5 M ⊙of the Type IIP events.
Resumo:
Cyber-attacks against Smart Grids have been found in the real world. Malware such as Havex and BlackEnergy have been found targeting industrial control systems (ICS) and researchers have shown that cyber-attacks can exploit vulnerabilities in widely used Smart Grid communication standards. This paper addresses a deep investigation of attacks against the manufacturing message specification of IEC 61850, which is expected to become one of the most widely used communication services in Smart Grids. We investigate how an attacker can build a custom tool to execute man-in-the-middle attacks, manipulate data, and affect the physical system. Attack capabilities are demonstrated based on NESCOR scenarios to make it possible to thoroughly test these scenarios in a real system. The goal is to help understand the potential for such attacks, and to aid the development and testing of cyber security solutions. An attack use-case is presented that focuses on the standard for power utility automation, IEC 61850 in the context of inverter-based distributed energy resource devices; especially photovoltaic (PV) generators.
Resumo:
A relay network in which a source wishes to convey a confidential message to a legitimate destination with the assistance of trusted relays is considered. In particular, cooperative beamforming and user selection techniques are applied to protect the confidential message. The secrecy rate (SR) and secrecy outage probability (SOP) of the network are investigated first, and a tight upper bound for the SR and an exact formula for the SOP are derived. Next, asymptotic approximations for the SR and SOP in the high signal-to-noise ratio (SNR) regime are derived for two different schemes: i) cooperative beamforming and ii) multiuser selection. Further, a new concept of cooperative diversity gain, namely, adapted cooperative diversity gain (ACDG), which can be used to evaluate security level of a cooperative relaying network, is investigated. It is shown that the ACDG of cooperative beamforming is equal to the conventional cooperative diversity gain of traditional multiple-input single-output networks, while the ACDG of the multiuser scenario is equal to that of traditional single-input multiple-output networks.
Resumo:
In this paper, we study a two-phase underlay cognitive relay network, where there exists an eavesdropper who can overhear the message. The secure data transmission from the secondary source to secondary destination is assisted by two decode-and-forward (DF) relays. Although the traditional opportunistic relaying technique can choose one relay to provide the best secure performance, it needs to continuously have the channel state information (CSI) of both relays, and may result in a high relay switching rate. To overcome these limitations, a secure switch-and-stay combining (SSSC) protocol is proposed where only one out of the two relays is activated to assist the secure data transmission, and the secure relay switching occurs when the relay cannot support the secure communication any longer. This security switching is assisted by either instantaneous or statistical eavesdropping CSI. For these two cases, we study the system secure performance of SSSC protocol, by deriving the analytical secrecy outage probability as well as an asymptotic expression for the high main-to-eavesdropper ratio (MER) region. We show that SSSC can substantially reduce the system complexity while achieving or approaching the full diversity order of opportunistic relaying in the presence of the instantaneous or statistical eavesdropping CSI.
Resumo:
Background: Clostridium difficile (C. difficile) is a leading cause of infectious diarrhoea in hospitals. Sending faecal samples for testing expedites diagnosis and appropriate treatment. Clinical suspicion of C. difficile based on patient history, signs and symptoms is the basis for sampling. Sending faecal samples from patients with diarrhoea ‘just in case’ the patient has C. difficile may be an indication of poor clinical management.
Aim: To evaluate the effectiveness of an intervention by an Infection Prevention and Control Team (IPCT) in reducing inappropriate faecal samples sent for C. difficile testing.
Method: An audit of numbers of faecal samples sent before and after a decision-making algorithm was introduced. The number of samples received in the laboratory was retrospectively counted for 12-week periods before and after an algorithm was introduced.
Findings: There was a statistically significant reduction in the mean number of faecal samples sent post the algorithm. Results were compared to a similar intervention carried out in 2009 in which the same message was delivered by a memorandum. In 2009 the memorandum had no effect on the overall number of weekly samples being sent.
Conclusion: An algorithm intervention had an effect on the number of faecal samples being sent for C. difficile testing and thus contributed to the effective use of the laboratory service.
Resumo:
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Resumo:
The next generation sequencing revolution has enabled rapid discovery of genetic markers, however, development of fully functioning new markers still requires a long and costly process of marker validation. This study reports a rapid and economical approach for the validation and deployment of polymorphic microsatellite markers obtained from a 454 pyrosequencing library of Atlantic cod, Gadus morhua, Linnaeus 1758. Primers were designed from raw reads to amplify specific amplicon size ranges, allowing effective PCR multiplexing. Multiplexing was combined with a three-primer PCR approach using four universal tails to label amplicons with separate fluorochromes. A total of 192 primer pairs were tested, resulting in 73 polymorphic markers. Of these, 55 loci were combined in six multiplex panels each containing between six and eleven markers. Variability of the loci was assessed on G. morhua from the Celtic Sea (n 46) and the Scotian Shelf (n 46), two locations that have shown genetic differentiation in previous studies. Multilocus FST between the two samples was estimated at 0.067 (P 0.001). After three loci potentially under selection were excluded, the global FST was estimated at 0.043 (P 0.001). Our technique combines three- primer and multiplex PCR techniques, allowing simultaneous screening and validation of relatively large numbers of microsatellite loci.
Resumo:
The positive relationships between urban green space and health have been well documented. Little is known, however, about the role of residents’ emotional attachment to local green spaces in these relationships, and how attachment to green spaces and health may be promoted by the availability of accessible and usable green spaces. The present research aimed to examine the links between self-reported health, attachment to green space, and the availability of accessible and usable green spaces. Data were collected via paper-mailed surveys in two neighborhoods (n = 223) of a medium-sized Dutch city in the Netherlands. These neighborhoods differ in the perceived and objectively measured accessibility and usability of green spaces, but are matched in the physically available amount of urban green space, as well as in demographic and socio-economic status, and housing conditions. Four dimensions of green space attachment were identified through confirmatory factor analysis: place dependence, affective attachment, place identity and social bonding. The results show greater attachment to local green space and better self-reported mental health in the neighborhood with higher availability of accessible and usable green spaces. The two neighborhoods did not differ, however, in physical and general health. Structural Equation Modelling confirmed the neighborhood differences in green space attachment and mental health, and also revealed a positive path from green space attachment to mental health. These findings convey the message that we should make green places, instead of green spaces.
Resumo:
Os sistemas distribuídos embarcados (Distributed Embedded Systems – DES) têm sido usados ao longo dos últimos anos em muitos domínios de aplicação, da robótica, ao controlo de processos industriais passando pela aviónica e pelas aplicações veiculares, esperando-se que esta tendência continue nos próximos anos. A confiança no funcionamento é uma propriedade importante nestes domínios de aplicação, visto que os serviços têm de ser executados em tempo útil e de forma previsível, caso contrário, podem ocorrer danos económicos ou a vida de seres humanos poderá ser posta em causa. Na fase de projecto destes sistemas é impossível prever todos os cenários de falhas devido ao não determinismo do ambiente envolvente, sendo necessária a inclusão de mecanismos de tolerância a falhas. Adicionalmente, algumas destas aplicações requerem muita largura de banda, que também poderá ser usada para a evolução dos sistemas, adicionandolhes novas funcionalidades. A flexibilidade de um sistema é uma propriedade importante, pois permite a sua adaptação às condições e requisitos envolventes, contribuindo também para a simplicidade de manutenção e reparação. Adicionalmente, nos sistemas embarcados, a flexibilidade também é importante por potenciar uma melhor utilização dos, muitas vezes escassos, recursos existentes. Uma forma evidente de aumentar a largura de banda e a tolerância a falhas dos sistemas embarcados distribuídos é a replicação dos barramentos do sistema. Algumas soluções existentes, quer comerciais quer académicas, propõem a replicação dos barramentos para aumento da largura de banda ou para aumento da tolerância a falhas. No entanto e quase invariavelmente, o propósito é apenas um, sendo raras as soluções que disponibilizam uma maior largura de banda e um aumento da tolerância a falhas. Um destes raros exemplos é o FlexRay, com a limitação de apenas ser permitido o uso de dois barramentos. Esta tese apresentada e discute uma proposta para usar a replicação de barramentos de uma forma flexível com o objectivo duplo de aumentar a largura de banda e a tolerância a falhas. A flexibilidade dos protocolos propostos também permite a gestão dinâmica da topologia da rede, sendo o número de barramentos apenas limitado pelo hardware/software. As propostas desta tese foram validadas recorrendo ao barramento de campo CAN – Controller Area Network, escolhido devido à sua grande implantação no mercado. Mais especificamente, as soluções propostas foram implementadas e validadas usando um paradigma que combina flexibilidade com comunicações event-triggered e time-triggered: o FTT – Flexible Time- Triggered. No entanto, uma generalização para CAN nativo é também apresentada e discutida. A inclusão de mecanismos de replicação do barramento impõe a alteração dos antigos protocolos de replicação e substituição do nó mestre, bem como a definição de novos protocolos para esta finalidade. Este trabalho tira partido da arquitectura centralizada e da replicação do nó mestre para suportar de forma eficiente e flexível a replicação de barramentos. Em caso de ocorrência de uma falta num barramento (ou barramentos) que poderia provocar uma falha no sistema, os protocolos e componentes propostos nesta tese fazem com que o sistema reaja, mudando para um modo de funcionamento degradado. As mensagens que estavam a ser transmitidas nos barramentos onde ocorreu a falta são reencaminhadas para os outros barramentos. A replicação do nó mestre baseia-se numa estratégia líder-seguidores (leaderfollowers), onde o líder (leader) controla todo o sistema enquanto os seguidores (followers) servem como nós de reserva. Se um erro ocorrer no nó líder, um dos nós seguidores passará a controlar o sistema de uma forma transparente e mantendo as mesmas funcionalidades. As propostas desta tese foram também generalizadas para CAN nativo, tendo sido para tal propostos dois componentes adicionais. É, desta forma possível ter as mesmas capacidades de tolerância a falhas ao nível dos barramentos juntamente com a gestão dinâmica da topologia de rede. Todas as propostas desta tese foram implementadas e avaliadas. Uma implementação inicial, apenas com um barramento foi avaliada recorrendo a uma aplicação real, uma equipa de futebol robótico onde o protocolo FTT-CAN foi usado no controlo de movimento e da odometria. A avaliação do sistema com múltiplos barramentos foi feita numa plataforma de teste em laboratório. Para tal foi desenvolvido um sistema de injecção de faltas que permite impor faltas nos barramentos e nos nós mestre, e um sistema de medida de atrasos destinado a medir o tempo de resposta após a ocorrência de uma falta.
Resumo:
Este estudo teve como finalidade compreender os efeitos da estimulação auditiva com uma voz desconhecida e familiar, na pessoa em coma nos parâmetros e curvas monitorizados em ambiente de cuidados intensivos. A revisão da literatura acerca da comunicação verbal em cuidados intensivos e consequente análise de conteúdo foi utilizada para construir a mensagem estímulo, que foi refinada e validada por um grupo de peritos. Esta mensagem é constituída por três partes: apresentação e orientação, informação e avaliação funcional e estimulação, e serviu como referência para a gravação das mensagens no estudo que se seguiu. Neste estudo também foi traduzida, adaptada para a realidade Portuguesa e convertida em linguagem CIPE® a Coma Recovery Scale – Revised, que deu origem ao Instrumento de Avaliação da Recuperação do Coma da Universidade de Aveiro (IARCUA), que foi sujeito a testes de fiabilidade.Os resultados da análise sugerem que o referido instrumento pode ser utilizado com fiabilidade, mesmo quando existem algumas flutuações no estado clínico das pessoas. A correlação dos scores das subescalas foi elevada e superior aos resultados apresentados para a escala original, indicando que esta escala é um instrumento indicado para a avaliação da função neuro-comportamental. O estudo da influência da estimulação auditiva foi realizado com uma amostra de 10 pessoas em coma internadas no Serviço de Cuidados Intensivos do Hospital de Santo António, no ano de 2009, com total autorização da Comissão de Ética do referido Hospital, sendo a selecção baseada numa avaliação preliminar através do instrumento referido e avaliação dos potenciais evocados auditivos do tronco cerebral. A pessoa significativa foi seleccionada através da aplicação de testes sociométricos. A todos os participantes foram dadas informações escritas acerca do estudo e foi concedido um período de tempo para reflexão e posterior decisão acerca da autorização ou não da aplicação do estudo. O tempo total de recolha de dados foi de 45 minutos distribuídos equitativamente por três períodos: pré-estimulação, estimulação e pós-estimulação. Os valores recolhidos foram os das curvas de ECG, das pressões arteriais e pletismografia de pulso e dos parâmetros de frequência cardíaca, pressão arterial sistólica, diastólica e média, temperatura corporal periférica e saturação parcial de oxigénio, utilizando-se o programa Datex-Ohmeda S/5 Collect para o efeito. A análise estatística e clínica dos dados, foi realizada por períodos de estimulação e fases da mensagem estímulo, aplicando-se testes estatísticos e uma análise baseada em critérios de relevância clínica.Os resultados demonstraram que na estimulação com uma voz desconhecida se verificou um aumento dos valores da frequência cardíaca, dos valores das pressões arteriais sistólicas, diastólicas e médias, na transição entre os períodos de préestimulação e estimulação e que estes valores tendem a normalizar quando termina a estimulação. Estas alterações foram corroboradas pela análise dos intervalos RR e da curva de pressões arteriais. Em relação à estimulação com uma voz familiar, as pessoas também reagiram aquando da estimulação com aumento dos valores da frequência cardíaca e dos valores das pressões arteriais sistólicas, diastólicas e médias. No entanto em alguns casos verificámos que os valores destes parâmetros continuaram a aumentar no período de pós-estimulação, o que revela que os utentes desenvolveram episódios de ansiedade de separação. Relativamente à temperatura corporal periférica e saturação parcial de oxigénio, em ambos os casos, não verificámos alterações aquando da estimulação. Relativamente às fases da mensagem estímulo, durante a estimulação com uma voz desconhecida, os participantes apresentaram uma maior variabilidade nos valores da frequência cardíaca, pressões arteriais sistólica, diastólica e média na fase de avaliação funcional e estimulação. Esta constatação é corroborada pela análise das curvas monitorizadas. Em relação à estimulação com uma voz familiar, além de reagirem nos mesmos parâmetros com maior intensidade na fase de avaliação funcional e estimulação, os participantes também reagiram de forma relevante na fase de apresentação e orientação. Este estudo contribui para a reflexão sobre a prática comunicacional com as pessoas inconscientes, no sentido de sensibilizar os enfermeiros e outros profissionais de saúde para a importância da comunicação nas unidades de cuidados intensivos e contribuir igualmente para a melhoria da qualidade de cuidados.