901 resultados para sensor location problem


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The two-impurity Kondo problem is studied by use of perturbative scaling techniques. The physics is determined by the interplay between the Ruderman-Kittel-Kasuya-Yosida (RKKY) interaction between the two impurity spins and the Kondo effect. In particular, for a strong ferromagnetic RKKY interaction the susceptibility exhibits three structures as the temperature is lowered, corresponding to the ferromagnetic locking together of the two impurity spins followed by a two-stage freezing out of their local moments by the conduction electrons due to the Kondo effect.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Location management problem that arise in mobile computing networks is addressed. One method used in location management is to designate sonic of the cells in the network as "reporting cells". The other cells in the network are "non-reporting cells". Finding an optimal set of reporting cells (or reporting cell configuration) for a given network. is a difficult combinatorial optimization problem. In fact this is shown to be an NP-complete problem. in an earlier study. In this paper, we use the selective paging strategy and use an ant colony optimization method to obtain the best/optimal set of reporting cells for a given a network.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The usual assumption made in time minimising transportation problem is that the time for transporting a positive amount in a route is independent of the actual amount transported in that route. In this paper we make a more general and natural assumption that the time depends on the actual amount transported. We assume that the time function for each route is an increasing piecewise constant function. Four algorithms - (1) a threshold algorithm, (2) an upper bounding technique, (3) a primal dual approach, and (4) a branch and bound algorithm - are presented to solve the given problem. A method is also given to compute the minimum bottle-neck shipment corresponding to the optimal time. A numerical example is solved illustrating the algorithms presented in this paper.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background Despite decades of research, bullying in all its forms is still a significant problem within schools in Australia, as it is internationally. Anti-bullying policies and guidelines are thought to be one strategy as part of a whole school approach to reduce bullying. However, although Australian schools are required to have these policies, their effectiveness is not clear. As policies and guidelines about bullying and cyberbullying are developed within education departments, this paper explores the perspectives of those who are involved in their construction. Purpose This study examined the perspectives of professionals involved in policy construction, across three different Australian states. The aim was to determine how their relative jurisdictions define bullying and cyberbullying, the processes for developing policy, the bullying prevention and intervention recommendations given to schools and the content considered essential in current policies. Sample Eleven key stakeholders from three Australian states with similar education systems were invited to participate. The sample selection criteria included professionals with experience and training in education, cyber-safety and the responsibility to contribute to or make decisions which inform policy in this area for schools in their state. Design and methods Participants were interviewed about the definitions of bullying they used in their state policy frameworks; the extent to which cyberbullying was included; and the content they considered essential for schools to include in anti-bullying policies. Data were collected through in-depth, semi-structured interviews and analysed thematically. Findings Seven themes were identified in the data: - (1) Definition of bullying and cyberbullying; - (2) Existence of a policy template; - (3) Policy location; - (4) Adding cyberbullying; - (5) Distinguishing between bullying and cyberbullying; - (6) Effective policy, and; - (7) Policy as a prevention or intervention tool. The results were similar both across state boundaries and also across different disciplines. Conclusion Analysis of the data suggested that, across the themes, there was some lack of information about bullying and cyberbullying. This limitation could affect the subsequent development, dissemination and sustainability of school anti-bullying policies, which have implications for the translation of research to inform better student outcomes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The problem of recovering information from measurement data has already been studied for a long time. In the beginning, the methods were mostly empirical, but already towards the end of the sixties Backus and Gilbert started the development of mathematical methods for the interpretation of geophysical data. The problem of recovering information about a physical phenomenon from measurement data is an inverse problem. Throughout this work, the statistical inversion method is used to obtain a solution. Assuming that the measurement vector is a realization of fractional Brownian motion, the goal is to retrieve the amplitude and the Hurst parameter. We prove that under some conditions, the solution of the discretized problem coincides with the solution of the corresponding continuous problem as the number of observations tends to infinity. The measurement data is usually noisy, and we assume the data to be the sum of two vectors: the trend and the noise. Both vectors are supposed to be realizations of fractional Brownian motions, and the goal is to retrieve their parameters using the statistical inversion method. We prove a partial uniqueness of the solution. Moreover, with the support of numerical simulations, we show that in certain cases the solution is reliable and the reconstruction of the trend vector is quite accurate.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The object of this dissertation is to study globally defined bounded p-harmonic functions on Cartan-Hadamard manifolds and Gromov hyperbolic metric measure spaces. Such functions are constructed by solving the so called Dirichlet problem at infinity. This problem is to find a p-harmonic function on the space that extends continuously to the boundary at inifinity and obtains given boundary values there. The dissertation consists of an overview and three published research articles. In the first article the Dirichlet problem at infinity is considered for more general A-harmonic functions on Cartan-Hadamard manifolds. In the special case of two dimensions the Dirichlet problem at infinity is solved by only assuming that the sectional curvature has a certain upper bound. A sharpness result is proved for this upper bound. In the second article the Dirichlet problem at infinity is solved for p-harmonic functions on Cartan-Hadamard manifolds under the assumption that the sectional curvature is bounded outside a compact set from above and from below by functions that depend on the distance to a fixed point. The curvature bounds allow examples of quadratic decay and examples of exponential growth. In the final article a generalization of the Dirichlet problem at infinity for p-harmonic functions is considered on Gromov hyperbolic metric measure spaces. Existence and uniqueness results are proved and Cartan-Hadamard manifolds are considered as an application.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Indigofera linnaei (or Birdsville Indigo) is a native legume with widespread abundance in pastures across northern Australian, and occurs in all northern regions of Australia from the tropical Kimberleys and arid central Australia to subhumid coastal Queensland (Figure 1). I. linnaei in central Australia has been linked to canine fatalities due to the toxin indospicine. Indospicine, an analog of arginine, is an unusual non-protein amino acid found only in a number of Indigofera species including I. linnaei. Dogs are particularly sensitive to the heptatoxicity of indospicine, and while they do not themselves consume the plant, dogs have been poisoned indirectly through the consumption of indospicine-contaminated meat from horses and camels grazing in regions where I. linnaei is common (Hegarty and Pound 1988, FitzGerald et al 2011). I. linnaei is observed to occur in various forms from strongly prostrate in south-east Queensland to an erect shrub-like form growing to more than 50cm in height in some northern regions. It mostly occurs as a minor proportion of native pasture but denser stands develop under certain circumstances. The indospicine content of I. linnaei has not previously been reported outside of central Australia, and in this study we investigate the indospicine content of plant samples collected across various regions, including both prostrate and upright forms. All samples were collected in March-July, dried, milled and analysed by UPLC-MS/MS in an adaption of our method (Tan et al 2014). Indospicine was determined in all I. linnaei plant samples regardless of region or growth form (Table 1). Measured levels were in the range 159.5 to 658.8 mg/kg DM and indicate that this plant may pose a similar problem in all areas dependent on local seasonal abundance.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

By deriving the equations for an error analysis of modeling inaccuracies for the combined estimation and control problem, it is shown that the optimum estimation error is orthogonal to the actual suboptimum estimate.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The time minimising assignment problem is the problem of finding an assignment of n jobs to n facilities, one to each, which minimises the total time for completing all the jobs. The usual assumption made in these problems is that all the jobs are commenced simultaneously. In this paper two generalisations of this assumption are considered, and algorithms are presented to solve these general problems. Numerical examples are worked out illustrating the algorithms.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An experimental study is presented to show the effect of the cowl location and shape on the shock interaction phenomena in the inlet region for a 2D, planar scramjet inlet model. Investigations include schlieren visualization around the cowl region and heat transfer rate measurement inside the inlet chamber.Both regular and Mach reflections are observed when the forebody ramp shock reflects from the cowl plate. Mach stem heights of 3.3 mm and 4.1 mm are measured in 18.5 mm and 22.7 mm high inlet chambers respecively. Increased heat transfer rate is measured at the same location of chamber for cowls of longer lenghs is indicating additional mass flow recovery by the inlet.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Radiant frost is a significant production constraint to wheat (Triticum aestivum) and barley (Hordeum vulgare), particularly in regions where spring-habit cereals are grown through winter, maturing in spring. However, damage to winter-habit cereals in reproductive stages is also reported. Crops are particularly susceptible to frost once awns or spikes emerge from the protection of the flag leaf sheath. Post-head-emergence frost (PHEF) is a problem distinct from other cold-mediated production constraints. To date, useful increased PHEF resistance in cereals has not been identified. Given the renewed interest in reproductive frost damage in cereals, it is timely to review the problem. Here we update the extent and impacts of PHEF and document current management options to combat this challenge. We clarify terminology useful for discussing PHEF in relation to chilling and other freezing stresses. We discuss problems characterizing radiant frost, the environmental conditions leading to PHEF damage, and the effects of frost at different growth stages. PHEF resistant cultivars would be highly desirable, to both reduce the incidence of direct frost damage and to allow the timing of crop maturity to be managed to maximize yield potential. A framework of potential adaptation mechanisms is outlined. Clarification of these critical issues will sharpen research focus, improving opportunities to identify genetic sources for improved PHEF resistance.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Radiant frost is a significant production constraint to wheat (Triticum aestivum) and barley (Hordeum vulgare), particularly in regions where spring-habit cereals are grown through winter, maturing in spring. However, damage to winter-habit cereals in reproductive stages is also reported. Crops are particularly susceptible to frost once awns or spikes emerge from the protection of the flag leaf sheath. Post-head-emergence frost (PHEF) is a problem distinct from other cold-mediated production constraints. To date, useful increased PHEF resistance in cereals has not been identified. Given the renewed interest in reproductive frost damage in cereals, it is timely to review the problem. Here we update the extent and impacts of PHEF and document current management options to combat this challenge. We clarify terminology useful for discussing PHEF in relation to chilling and other freezing stresses. We discuss problems characterizing radiant frost, the environmental conditions leading to PHEF damage, and the effects of frost at different growth stages. PHEF resistant cultivars would be highly desirable, to both reduce the incidence of direct frost damage and to allow the timing of crop maturity to be managed to maximize yield potential. A framework of potential adaptation mechanisms is outlined. Clarification of these critical issues will sharpen research focus, improving opportunities to identify genetic sources for improved PHEF resistance.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this thesis we study a series of multi-user resource-sharing problems for the Internet, which involve distribution of a common resource among participants of multi-user systems (servers or networks). We study concurrently accessible resources, which for end-users may be exclusively accessible or non-exclusively. For all kinds we suggest a separate algorithm or a modification of common reputation scheme. Every algorithm or method is studied from different perspectives: optimality of protocols, selfishness of end users, fairness of the protocol for end users. On the one hand the multifaceted analysis allows us to select the most suited protocols among a set of various available ones based on trade-offs of optima criteria. On the other hand, the future Internet predictions dictate new rules for the optimality we should take into account and new properties of the networks that cannot be neglected anymore. In this thesis we have studied new protocols for such resource-sharing problems as the backoff protocol, defense mechanisms against Denial-of-Service, fairness and confidentiality for users in overlay networks. For backoff protocol we present analysis of a general backoff scheme, where an optimization is applied to a general-view backoff function. It leads to an optimality condition for backoff protocols in both slot times and continuous time models. Additionally we present an extension for the backoff scheme in order to achieve fairness for the participants in an unfair environment, such as wireless signal strengths. Finally, for the backoff algorithm we suggest a reputation scheme that deals with misbehaving nodes. For the next problem -- denial-of-service attacks, we suggest two schemes that deal with the malicious behavior for two conditions: forged identities and unspoofed identities. For the first one we suggest a novel most-knocked-first-served algorithm, while for the latter we apply a reputation mechanism in order to restrict resource access for misbehaving nodes. Finally, we study the reputation scheme for the overlays and peer-to-peer networks, where resource is not placed on a common station, but spread across the network. The theoretical analysis suggests what behavior will be selected by the end station under such a reputation mechanism.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Place identification refers to the process of analyzing sensor data in order to detect places, i.e., spatial areas that are linked with activities and associated with meanings. Place information can be used, e.g., to provide awareness cues in applications that support social interactions, to provide personalized and location-sensitive information to the user, and to support mobile user studies by providing cues about the situations the study participant has encountered. Regularities in human movement patterns make it possible to detect personally meaningful places by analyzing location traces of a user. This thesis focuses on providing system level support for place identification, as well as on algorithmic issues related to the place identification process. The move from location to place requires interactions between location sensing technologies (e.g., GPS or GSM positioning), algorithms that identify places from location data and applications and services that utilize place information. These interactions can be facilitated using a mobile platform, i.e., an application or framework that runs on a mobile phone. For the purposes of this thesis, mobile platforms automate data capture and processing and provide means for disseminating data to applications and other system components. The first contribution of the thesis is BeTelGeuse, a freely available, open source mobile platform that supports multiple runtime environments. The actual place identification process can be understood as a data analysis task where the goal is to analyze (location) measurements and to identify areas that are meaningful to the user. The second contribution of the thesis is the Dirichlet Process Clustering (DPCluster) algorithm, a novel place identification algorithm. The performance of the DPCluster algorithm is evaluated using twelve different datasets that have been collected by different users, at different locations and over different periods of time. As part of the evaluation we compare the DPCluster algorithm against other state-of-the-art place identification algorithms. The results indicate that the DPCluster algorithm provides improved generalization performance against spatial and temporal variations in location measurements.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

By applying the theory of the asymptotic distribution of extremes and a certain stability criterion to the question of the domain of convergence in the probability sense, of the renormalized perturbation expansion (RPE) for the site self-energy in a cellularly disordered system, an expression has been obtained in closed form for the probability of nonconvergence of the RPE on the real-energy axis. Hence, the intrinsic mobility mu (E) as a function of the carrier energy E is deduced to be given by mu (E)= mu 0exp(-exp( mod E mod -Ec) Delta ), where Ec is a nominal 'mobility edge' and Delta is the width of the random site-energy distribution. Thus mobility falls off sharply but continuously for mod E mod >Ec, in contradistinction with the notion of an abrupt 'mobility edge' proposed by Cohen et al. and Mott. Also, the calculated electrical conductivity shows a temperature dependence in qualitative agreement with experiments on disordered semiconductors.