898 resultados para pacs: computer networks and intercomputer communications in office automation
Resumo:
A series of numerical simulations based on a recurrence-free Vlasov kinetic model using kinetic phase point trajectories are presented. Electron-ion plasmas and three-component (electron-ion-dust) dusty or complex plasmas are considered, via independent simulations. Considering all plasma components modeled through a kinetic approach, the linear and nonlinear behavior of ion-acoustic excitations is investigated. Maxwellian and kappa-type (superthermal) distribution functions are assumed, as initial conditions, in separate simulations for the sake of comparison. The focus is on the parametric dependence of ion-acoustic waves on the electron-to-ion temperature ratio and on the dust concentration. © 2014 EDP Sciences, SIF, Springer-Verlag Berlin Heidelberg.
Resumo:
Learning has an important position in the development of employees and their expertise. This article focuses on the role and utilization of intra and interorganizational formal and informal learning within different types of learning networks. Specifically, we investigate different types of networks (inter- or intraorganizational) and different types of learning (formal or informal) that can occur within such networks. Our qualitative case study is based on 46 expert interviews involving 49 interviewees, through which we explore how formal and informal learning was used in the development and implementation of quality improvement initiatives at a large public teaching hospital in Portugal. Our analysis suggests that formal and informal learning can take place within different types of learning networks that draw on internal resources as well as on the collaboration with external entities. The article argues that it is important for HRD managers, seeking to support organizational learning, to understand how different types of learning take place, and which features of learning networks support these processes.
Resumo:
Cross-cultural education is thought to develop critical consciousness of how unequal distributions of power and privilege affect people’s health. Learners in different sociopolitical settings can join together in developing critical consciousness – awareness of power and privilege dynamics in society – by means of communication technology. The aim of this research was to define strengths and limitations of existing cross-cultural discussions in generating critical consciousness. The setting was the FAIMER international fellowship program for mid-career interdisciplinary health faculty, whose goal is to foster global advancement of health professions education. Fellows take part in participant-led, online, written, task-focused discussions on topics like professionalism, community health, and leadership. We reflexively identified text that brought sociopolitical topics into the online environment during the years 2011 and 2012 and used a discourse analysis toolset to make our content analysis relevant to critical consciousness. While references to participants’ cultures and backgrounds were infrequent, narratives of political-, gender-, religion-, and other culture-related topics did emerge. When participants gave accounts of their experiences and exchanged cross-cultural stories, they were more likely to develop ad hoc networks to support one another in facing those issues than explore issues relating to the development of critical consciousness. We suggest that cross-cultural discussions need to be facilitated actively to transform learners’ frames of reference, create critical consciousness, and develop cultural competence. Further research is needed into how to provide a safe environment for such learning and provide faculty development for the skills needed to facilitate these exchanges.
Resumo:
A number of neural networks can be formulated as the linear-in-the-parameters models. Training such networks can be transformed to a model selection problem where a compact model is selected from all the candidates using subset selection algorithms. Forward selection methods are popular fast subset selection approaches. However, they may only produce suboptimal models and can be trapped into a local minimum. More recently, a two-stage fast recursive algorithm (TSFRA) combining forward selection and backward model refinement has been proposed to improve the compactness and generalization performance of the model. This paper proposes unified two-stage orthogonal least squares methods instead of the fast recursive-based methods. In contrast to the TSFRA, this paper derives a new simplified relationship between the forward and the backward stages to avoid repetitive computations using the inherent orthogonal properties of the least squares methods. Furthermore, a new term exchanging scheme for backward model refinement is introduced to reduce computational demand. Finally, given the error reduction ratio criterion, effective and efficient forward and backward subset selection procedures are proposed. Extensive examples are presented to demonstrate the improved model compactness constructed by the proposed technique in comparison with some popular methods.
Resumo:
Reactions that can damage DNA have been simulated using a combination of molecular dynamics and density functional theory. In particular, the damage caused by the attachment of a low energy electron to the nucleobase. Simulations of anionic single nucleotides of DNA in an aqueous environment that was modeled explicitly have been performed. This has allowed us to examine the role played by the water molecules that surround the DNA in radiation damage mechanisms. Our simulations show that hydrogen bonding and protonation of the nucleotide by the water can have a significant effect on the barriers to strand breaking reactions. Furthermore, these effects are not the same for all four of the bases.
Resumo:
A study was undertaken to determine the effects of different concentrations of arsenic (As) in irrigation water on Boro (dry-season) rice (Oryza sativa) and their residual effects on the following Aman (wet-season) rice. There were six treatments, with 0, 0.1, 0.25, 0.5, 1, and 2 mg As L-1 applied as disodium hydrogen arsenate. All the growth and yield parameters of Boro rice responded positively at lower concentrations of up to 0.25 mg As L-1 in irrigation water but decreased sharply at concentrations more than 0.5 mg As L-1. Arsenic concentrations in grain and straw of Boro rice increased significantly with increasing concentration of As in irrigation water. The grain As concentration was in the range of 0.25 to 0.97 μg g-1 and its concentration in rice straw varied from 2.4 to 9.6 μg g-1 over the treatments. Residual As from previous Boro rice showed a very similar pattern in the following Aman rice, although As concentration in Aman rice grain and straw over the treatments was almost half of the As levels in Boro rice grain. Arsenic concentrations in both grain and straw of Boro and Aman rice were found to correlate with iron and be antagonistic with phosphorus. Copyright © Taylor & Francis Group, LLC.
Resumo:
We present a fully-distributed self-healing algorithm dex that maintains a constant degree expander network in a dynamic setting. To the best of our knowledge, our algorithm provides the first efficient distributed construction of expanders—whose expansion properties holddeterministically—that works even under an all-powerful adaptive adversary that controls the dynamic changes to the network (the adversary has unlimited computational power and knowledge of the entire network state, can decide which nodes join and leave and at what time, and knows the past random choices made by the algorithm). Previous distributed expander constructions typically provide only probabilistic guarantees on the network expansion whichrapidly degrade in a dynamic setting; in particular, the expansion properties can degrade even more rapidly under adversarial insertions and deletions. Our algorithm provides efficient maintenance and incurs a low overhead per insertion/deletion by an adaptive adversary: only O(logn)O(logn) rounds and O(logn)O(logn) messages are needed with high probability (n is the number of nodes currently in the network). The algorithm requires only a constant number of topology changes. Moreover, our algorithm allows for an efficient implementation and maintenance of a distributed hash table on top of dex with only a constant additional overhead. Our results are a step towards implementing efficient self-healing networks that have guaranteed properties (constant bounded degree and expansion) despite dynamic changes.
Gopal Pandurangan has been supported in part by Nanyang Technological University Grant M58110000, Singapore Ministry of Education (MOE) Academic Research Fund (AcRF) Tier 2 Grant MOE2010-T2-2-082, MOE AcRF Tier 1 Grant MOE2012-T1-001-094, and the United States-Israel Binational Science Foundation (BSF) Grant 2008348. Peter Robinson has been supported by Grant MOE2011-T2-2-042 “Fault-tolerant Communication Complexity in Wireless Networks” from the Singapore MoE AcRF-2. Work done in part while the author was at the Nanyang Technological University and at the National University of Singapore. Amitabh Trehan has been supported by the Israeli Centers of Research Excellence (I-CORE) program (Center No. 4/11). Work done in part while the author was at Hebrew University of Jerusalem and at the Technion and supported by a Technion fellowship.
Resumo:
Background The use of technology in healthcare settings is on the increase and may represent a cost-effective means of delivering rehabilitation. Reductions in treatment time, and delivery in the home, are also thought to be benefits of this approach. Children and adolescents with brain injury often experience deficits in memory and executive functioning that can negatively affect their school work, social lives, and future occupations. Effective interventions that can be delivered at home, without the need for high-cost clinical involvement, could provide a means to address a current lack of provision. We have systematically reviewed studies examining the effects of technology-based interventions for the rehabilitation of deficits in memory and executive functioning in children and adolescents with acquired brain injury. Objectives To assess the effects of technology-based interventions compared to placebo intervention, no treatment, or other types of intervention, on the executive functioning and memory of children and adolescents with acquired brain injury. Search methods We ran the search on the 30 September 2015. We searched the Cochrane Injuries Group Specialised Register, the Cochrane Central Register of Controlled Trials (CENTRAL), Ovid MEDLINE(R), Ovid MEDLINE(R) In-Process & Other Non-Indexed Citations, Ovid MEDLINE(R) Daily and Ovid OLDMEDLINE(R), EMBASE Classic + EMBASE (OvidSP), ISI Web of Science (SCI-EXPANDED, SSCI, CPCI-S, and CPSI-SSH), CINAHL Plus (EBSCO), two other databases, and clinical trials registers. We also searched the internet, screened reference lists, and contacted authors of included studies. Selection criteria Randomised controlled trials comparing the use of a technological aid for the rehabilitation of children and adolescents with memory or executive-functioning deficits with placebo, no treatment, or another intervention. Data collection and analysis Two review authors independently reviewed titles and abstracts identified by the search strategy. Following retrieval of full-text manuscripts, two review authors independently performed data extraction and assessed the risk of bias. Main results Four studies (involving 206 participants) met the inclusion criteria for this review. Three studies, involving 194 participants, assessed the effects of online interventions to target executive functioning (that is monitoring and changing behaviour, problem solving, planning, etc.). These studies, which were all conducted by the same research team, compared online interventions against a 'placebo' (participants were given internet resources on brain injury). The interventions were delivered in the family home with additional support or training, or both, from a psychologist or doctoral student. The fourth study investigated the use of a computer program to target memory in addition to components of executive functioning (that is attention, organisation, and problem solving). No information on the study setting was provided, however a speech-language pathologist, teacher, or occupational therapist accompanied participants. Two studies assessed adolescents and young adults with mild to severe traumatic brain injury (TBI), while the remaining two studies assessed children and adolescents with moderate to severe TBI. Risk of bias We assessed the risk of selection bias as low for three studies and unclear for one study. Allocation bias was high in two studies, unclear in one study, and low in one study. Only one study (n = 120) was able to conceal allocation from participants, therefore overall selection bias was assessed as high. One study took steps to conceal assessors from allocation (low risk of detection bias), while the other three did not do so (high risk of detection bias). Primary outcome 1: Executive functioning: Technology-based intervention versus placebo Results from meta-analysis of three studies (n = 194) comparing online interventions with a placebo for children and adolescents with TBI, favoured the intervention immediately post-treatment (standardised mean difference (SMD) -0.37, 95% confidence interval (CI) -0.66 to -0.09; P = 0.62; I2 = 0%). (As there is no 'gold standard' measure in the field, we have not translated the SMD back to any particular scale.) This result is thought to represent only a small to medium effect size (using Cohen’s rule of thumb, where 0.2 is a small effect, 0.5 a medium one, and 0.8 or above is a large effect); this is unlikely to have a clinically important effect on the participant. The fourth study (n = 12) reported differences between the intervention and control groups on problem solving (an important component of executive functioning). No means or standard deviations were presented for this outcome, therefore an effect size could not be calculated. The quality of evidence for this outcome according to GRADE was very low. This means future research is highly likely to change the estimate of effect. Primary outcome 2: Memory One small study (n = 12) reported a statistically significant difference in improvement in sentence recall between the intervention and control group following an eight-week remediation programme. No means or standard deviations were presented for this outcome, therefore an effect size could not be calculated. Secondary outcomes Two studies (n = 158) reported on anxiety/depression as measured by the Child Behavior Checklist (CBCL) and were included in a meta-analysis. We found no evidence of an effect with the intervention (mean difference -5.59, 95% CI -11.46 to 0.28; I2 = 53%). The GRADE quality of evidence for this outcome was very low, meaning future research is likely to change the estimate of effect. A single study sought to record adverse events and reported none. Two studies reported on use of the intervention (range 0 to 13 and 1 to 24 sessions). One study reported on social functioning/social competence and found no effect. The included studies reported no data for other secondary outcomes (that is quality of life and academic achievement). Authors' conclusions This review provides low-quality evidence for the use of technology-based interventions in the rehabilitation of executive functions and memory for children and adolescents with TBI. As all of the included studies contained relatively small numbers of participants (12 to 120), our findings should be interpreted with caution. The involvement of a clinician or therapist, rather than use of the technology, may have led to the success of these interventions. Future research should seek to replicate these findings with larger samples, in other regions, using ecologically valid outcome measures, and reduced clinician involvement.
Resumo:
In this paper, we introduce a statistical data-correction framework that aims at improving the DSP system performance in presence of unreliable memories. The proposed signal processing framework implements best-effort error mitigation for signals that are corrupted by defects in unreliable storage arrays using a statistical correction function extracted from the signal statistics, a data-corruption model, and an application-specific cost function. An application example to communication systems demonstrates the efficacy of the proposed approach.
Resumo:
Comparative research on violent conflict in the Basque Country and Ireland has yielded a sizable body of published academic work. Less well explored is the relationship between conflict transformation and cross-border cooperation in that specific comparative context. This paper provides a comparative examination of Third (not for profit) sector cross-border cooperation as conflict transformation in the Basque (France/Spain) and Irish (UK/Ireland) border regions. To what extent does cross-border cooperation contribute to peacebuilding in the two last violent ethnonationalist conflicts in Western Europe? The comparison is based on the premise that the EU played a different role in both cases. In the Irish case, the EU contributed to the institutionalization of a peace process that included cross-border cooperation between third sector organizations among the policy instruments contributing to conflict transformation. In the Basque case, the unilateral renunciation of violence by ETA (Euskadi eta Askatasuna) in 2010 did not generate the consistent involvement of the EU in a comparable institutional peace process. However, some third sector organizations used EU instruments for cross-border economic, social and cultural cooperation between France and Spain in order to reinforce their cross-border networks, which indirectly impacted on conflict transformation. The effectiveness of this cross-border cooperation for conflict transformation is assessed comparatively. To what extent does this increase in cross-border cooperation “from below” connect to wider institutional and social processes of conflict transformation in Ireland and the Basque Country? Crucially, does the strengthening of cross-border relations on shared issues mollify or sharpen existing identity cleavages? Also considered is the sustainability of such cooperation in these regions in light of the less favourable post-2004 EU funding environment, and the post-2008 economic and political turmoil affecting the relevant EU member states, especially Ireland and Spain.
Resumo:
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Resumo:
The ability to exchange keys between users is vital in any wireless based security system. A key generation technique which exploits the randomness of the wireless channel is a promising alternative to existing key distribution techniques, e.g., public key cryptography. In this paper, a secure key generation scheme based on the subcarriers' channel responses in orthogonal frequency-division multiplexing (OFDM) systems is proposed. We first implement a time-variant multipath channel with its channel impulse response modelled as a wide sense stationary (WSS) uncorrelated scattering random process and demonstrate that each subcarrier's channel response is also a WSS random process. We then define the X% coherence time as the time required to produce an X% correlation coefficient in the autocorrelation function (ACF) of each channel tap, and find that when all the channel taps have the same Doppler power spectrum, all subcarriers' channel responses has the same ACF as the channel taps. The subcarrier's channel response is then sampled every X% coherence time and quantized into key bits. All the key sequences' randomness is tested using National Institute of Standards and Technology (NIST) statistical test suite and the results indicate that the commonly used sampling interval as 50% coherence time cannot guarantee the randomness of the key sequence.