927 resultados para Time Complexity
Resumo:
In this paper we present a new simulation methodology in order to obtain exact or approximate Bayesian inference for models for low-valued count time series data that have computationally demanding likelihood functions. The algorithm fits within the framework of particle Markov chain Monte Carlo (PMCMC) methods. The particle filter requires only model simulations and, in this regard, our approach has connections with approximate Bayesian computation (ABC). However, an advantage of using the PMCMC approach in this setting is that simulated data can be matched with data observed one-at-a-time, rather than attempting to match on the full dataset simultaneously or on a low-dimensional non-sufficient summary statistic, which is common practice in ABC. For low-valued count time series data we find that it is often computationally feasible to match simulated data with observed data exactly. Our particle filter maintains $N$ particles by repeating the simulation until $N+1$ exact matches are obtained. Our algorithm creates an unbiased estimate of the likelihood, resulting in exact posterior inferences when included in an MCMC algorithm. In cases where exact matching is computationally prohibitive, a tolerance is introduced as per ABC. A novel aspect of our approach is that we introduce auxiliary variables into our particle filter so that partially observed and/or non-Markovian models can be accommodated. We demonstrate that Bayesian model choice problems can be easily handled in this framework.
Resumo:
Lignocellulosic materials, such as sugar cane bagasse, a waste product of the sugarcane processing industry, agricultural residues and herbaceous crops, may serve as an abundant and comparatively cheap feedstock for largescale industrial fermentation, resulting in the production of marketable end-products. However, the complex structure of lignocellulosic materials, the presence of various hexose and pentose sugars in the hemicellulose component, and the presence of various compounds that inhibit the organisms selected for the fermentation process, all constitute barriers that add to the production costs and make full scale industrial production economically less feasible. The work presented in this thesis was conducted in order to screen microorganisms for ability to utilize pentose sugars derived from the sugar mill industrial waste. A large number of individual bacterial strains were investigated from hemi-cellulose rich material collected at the Proserpine and Maryborough sugar mills, notably soil samples from the mill sites. The research conducted to isolation of six pentose-capable Gram-positive organisms from the actinomycetes group by using pentose as a sole carbon source in the cultivation process. The isolates were identified as Corynebacterium glutamicum, Actinomyces odontolyticus, Nocardia elegans, and Propionibacterium freudenreichii all of which were isolated from the hemicellulose-enriched soil. Pentose degrading microbes are very rare in the environment, so this was a significant discovery. Previous research indicated that microbes could degrade pentose after genetic modification but the microbes discovered in this research were able to naturally utilize pentose. Six isolates, identified as four different genera, were investigated for their ability to utilize single sugars as substrates (glucose, xylose, arabinose or ribose), and also dual sugars as substrates (a hexose plus a pentose). The results demonstrated that C. glutamicum, A. odontolyticus, N. elegans, and P. freudenreichii were pentose-capable (able to grow using xylose or other pentose sugar), and also showed diauxie growth characteristics during the dual-sugar (glucose, in combination with xylose, arabinose or ribose) carbon source tests. In addition, it was shown that the isolates displayed very small differences in growth rates when grown on dual sugars as compared to single sugars, whether pentose or hexose in nature. The anabolic characteristics of C. glutamicum, A. odontolyticus, N. elegans and P. freudenreichii were subsequently investigated by qualitative analysis of their end-products, using high performance liquid chromatography (HPLC). All of the organisms produced arginine and cysteine after utilization of the pentose substrates alone. In addition, P. freudenreichii produced alanine and glycine. The end-product profile arising from culture with dual carbon sources was also tested. Interestingly, this time the product was different. All of them produced the amino acid glycine, when grown on a combination substrate-mix of glucose with xylose, and also glucose with arabinose. Only N. elegans was able to break down ribose, either singly or in combination with glucose, and the end-product of metabolism of the glucose plus ribose substrate combination was glutamic acid. The ecological analysis of microbial abundance in sugar mill waste was performed using denaturing gradient gel electrophoresis (DGGE) and also the metagenomic microarray PhyloChip method. Eleven solid samples and seven liquid samples were investigated. A very complex bacterial ecosystem was demonstrated in the seven liquid samples after testing with the PhyloChip method. It was also shown that bagasse leachate was the most different, compared to all of the other samples, by virtue of its richness in variety of taxa and the complexity of its bacterial community. The bacterial community in solid samples from Proserpine, Mackay and Maryborough sugar mills showed huge diversity. The information found from 16S rDNA sequencing results was that the bacterial genera Brevibacillus, Rhodospirillaceae, Bacillus, Vibrio and Pseudomonas were present in greatest abundance. In addition, Corynebacterium was also found in the soil samples. The metagenomic studies of the sugar mill samples demonstrate two important outcomes: firstly that the bagasse leachate, as potentially the most pentose-rich sample tested, had the most complex and diverse bacterial community; and secondly that the pentose-capable isolates that were initially discovered at the beginning of this study, were not amongst the most abundant taxonomic groups discovered in the sugar mill samples, and in fact were, as suspected, very rare. As a bioprospecting exercise, therefore, the study has discovered organisms that are naturally present, but in very small numbers, in the appropriate natural environment. This has implications for the industrial application of E-PUB, in that a seeding process using a starter culture will be necessary for industrial purposes, rather than simply assuming that natural fermentation might occur.
Resumo:
Introduction: Participants may respond to phases of a workplace walking program at different rates. This study evaluated the factors that contribute to the number of steps through phases of the program. The intervention was automated through a web-based program designed to increase workday walking. Methods: The study reviewed independent variable influences throughout phases I–III. A convenience sample of university workers (n=56; 43.6±1.7 years; BMI 27.44±.2.15 kg/m2; 48 female) were recruited at worksites in Australia. These workers were given a pedometer (Yamax SW 200) and access to the website program. For analyses, step counts entered by workers into the website were downloaded and mean workday steps were compared using a seemingly unrelated regression. This model was employed to capture the contemporaneous correlation within individuals in the study across observed time periods. Results: The model predicts that the 36 subjects with complete information took an average 7460 steps in the baseline two week period. After phase I, statistically significance increases in steps (from baseline) were explained by age, working status (full or part time), occupation (academic or professional), and self reported public transport (PT) use (marginally significant). Full time workers walked more than part time workers by about 440 steps, professionals walked about 300 steps more than academics, and PT users walked about 400 steps more than non-PT users. The ability to differentiate steps after two weeks among participants suggests a differential affect of the program after only two weeks. On average participants increased steps from week two to four by about 525 steps, but regular auto users had nearly 750 steps less than non-auto users at week four. The effect of age was diminished in the 4th week of observation and accounted for 34 steps per year of age. In phase III, discriminating between participants became more difficult, with only age effects differentiating their increase over baseline. The marginal effect of age by phase III compared to phase I, increased from 36 to 50, suggesting a 14 step per year increase from the 2nd to 6th week. Discussion: The findings suggest that participants responded to the program at different rates, with uniformity of effect achieved by the 6th week. Participants increased steps, however a tapering off occurred over time. Age played the most consistent role in predicting steps over the program. PT use was associated with increased step counts, while Auto use was associated with decreased step counts.
Resumo:
Deploying wireless networks in networked control systems (NCSs) has become more and more popular during the last few years. As a typical type of real-time control systems, an NCS is sensitive to long and nondeterministic time delay and packet losses. However, the nature of the wireless channel has the potential to degrade the performance of NCS networks in many aspects, particularly in time delay and packet losses. Transport layer protocols could play an important role in providing both reliable and fast transmission service to fulfill NCS’s real-time transmission requirements. Unfortunately, none of the existing transport protocols, including the Transport Control Protocol (TCP) and the User Datagram Protocol (UDP), was designed for real-time control applications. Moreover, periodic data and sporadic data are two types of real-time data traffic with different priorities in an NCS. Due to the lack of support for prioritized transmission service, the real-time performance for periodic and sporadic data in an NCS network is often degraded significantly, particularly under congested network conditions. To address these problems, a new transport layer protocol called Reliable Real-Time Transport Protocol (RRTTP) is proposed in this thesis. As a UDP-based protocol, RRTTP inherits UDP’s simplicity and fast transmission features. To improve the reliability, a retransmission and an acknowledgement mechanism are designed in RRTTP to compensate for packet losses. They are able to avoid unnecessary retransmission of the out-of-date packets in NCSs, and collisions are unlikely to happen, and small transmission delay can be achieved. Moreover, a prioritized transmission mechanism is also designed in RRTTP to improve the real-time performance of NCS networks under congested traffic conditions. Furthermore, the proposed RRTTP is implemented in the Network Simulator 2 for comprehensive simulations. The simulation results demonstrate that RRTTP outperforms TCP and UDP in terms of real-time transmissions in an NCS over wireless networks.
Resumo:
Objective: To estimate the time spent by the researchers for preparing grant proposals, and to examine whether spending more time increase the chances of success. Design: Observational study. Setting: The National Health and Medical Research Council (NHMRC) of Australia. Participants: Researchers who submitted one or more NHMRC Project Grant proposals in March 2012. Main outcome measures: Total researcher time spent preparing proposals; funding success as predicted by the time spent. Results: The NHMRC received 3727 proposals of which 3570 were reviewed and 731 (21%) were funded. Among our 285 participants who submitted 632 proposals, 21% were successful. Preparing a new proposal took an average of 38 working days of researcher time and a resubmitted proposal took 28 working days, an overall average of 34 days per proposal. An estimated 550 working years of researchers' time (95% CI 513 to 589) was spent preparing the 3727 proposals, which translates into annual salary costs of AU$66 million. More time spent preparing a proposal did not increase the chances of success for the lead researcher (prevalence ratio (PR) of success for 10 day increase=0.91, 95% credible interval 0.78 to 1.04) or other researchers (PR=0.89, 95% CI 0.67 to 1.17). Conclusions: Considerable time is spent preparing NHMRC Project Grant proposals. As success rates are historically 20–25%, much of this time has no immediate benefit to either the researcher or society, and there are large opportunity costs in lost research output. The application process could be shortened so that only information relevant for peer review, not administration, is collected. This would have little impact on the quality of peer review and the time saved could be reinvested into research.
Resumo:
Australian airports have emerged as important urban activity centres over the past decade as a result of privatisation. A range of reciprocal airport and regional impacts now pose considerable challenges for both airport operation and the surrounding urban and regional environment. The airport can no longer be managed solely as a specialised transport entity in isolation from the metropolis that it serves. In 2007 a multidisciplinary Australian Research Council Linkage Project (LP 0775225) was funded to investigate the changing role of airports in Australia. This thesis is but one component of this collaborative research effort. Here the issues surrounding the policy and practice of airport and regional land use planning are explored, analysed and detailed. This research, for the first time, assembles a distinct progression of the wider social, economic, technological and environmental roles of the airport within the Australian airport literature from 1914 – 2011. It recognises that while the list of airport and regional impacts has grown through time, treatment within practice and the literature has largely remained highly specialised and contained within disciplinary paradigms. The first publication of the thesis (Chapter 2) acknowledges that the changing role of airports demands the establishment of new models of airport planning and development. It argues that practice and research requires a better understanding of the reciprocal impacts of airports and their urban catchments. The second publication (Chapter 3) highlights that there is ad hoc examination and media attention of high profile airport and regional conflict, but little empirical analysis or understanding of the extent to which all privatised Australian airports are intending to develop. The conceptual and methodological significance of this research is the development of a national land use classification system for on-airport development. This paper establishes the extent of on-airport development in Australia, providing insight into the changing land use and economic roles of privatised airports. The third publication (Chapter 4) details new and significant interdependencies for airport and regional development in consideration of the progression of airports as activity centres. Here the model of an ‘airport metropolis’ is offered as an organising device and theoretical contribution for comprehending the complexity and planning of airport and regional development. It delivers a conceptual framework for both research and policy, which acknowledges the reciprocal impacts of economic development, land use, infrastructure and governance ‘interfaces’. In a timely and significant concurrence with this research the Australian Government announced and delivered a National Aviation Policy Review (2008 – 2009). As such the fourth publication (Chapter 5) focuses on the airport and urban planning aspects of the review. This paper also highlights the overall policy intention of facilitating broader airport and regional collaborative processes. This communicative turn in airport policy is significant in light of the communicative theoretical framework of the thesis. The fifth paper of the thesis (Chapter 6) examines three Australian case studies (Brisbane, Adelaide and Canberra) to detail the context of airport and regional land use planning and to apply the airport metropolis model as a framework for research. Through the use of Land Use Forums, over 120 airport and regional stakeholders are brought together to detail their perspectives and interactions with airport and regional land use planning. An inductive thematic analysis of the results identifies three significant themes which contribute to the fragmentation of airport and regional and land use planning: 1) inadequate coordination and disjointed decision-making; 2) current legislative and policy frameworks; and 3) competing stakeholder priorities and interests. Building on this new knowledge, Chapter 7 details the perceptions of airport and local, state and territory government stakeholders to land use relationships, processes and outcomes. A series of semi-structured interviews are undertaken in each of the case studies to inform this research. The potential implications for ongoing communicative practice are discussed in conclusion. The following thesis represents an incremental and cumulative research process which delivers new knowledge for the practical understanding and research interpretation of airport and regional land use planning practice and policy. It has developed and applied a robust conceptual framework which delivers significant direction for all stakeholders to better comprehend the relevance of airports in the urban character and design of our cities.
Resumo:
Predicate encryption (PE) is a new primitive which supports exible control over access to encrypted data. In PE schemes, users' decryption keys are associated with predicates f and ciphertexts encode attributes a that are specified during the encryption procedure. A user can successfully decrypt if and only if f(a) = 1. In this thesis, we will investigate several properties that are crucial to PE. We focus on expressiveness of PE, Revocable PE and Hierarchical PE (HPE) with forward security. For all proposed systems, we provide a security model and analysis using the widely accepted computational complexity approach. Our first contribution is to explore the expressiveness of PE. Existing PE supports a wide class of predicates such as conjunctions of equality, comparison and subset queries, disjunctions of equality queries, and more generally, arbitrary combinations of conjunctive and disjunctive equality queries. We advance PE to evaluate more expressive predicates, e.g., disjunctive comparison or disjunctive subset queries. Such expressiveness is achieved at the cost of computational and space overhead. To improve the performance, we appropriately revise the PE to reduce the computational and space cost. Furthermore, we propose a heuristic method to reduce disjunctions in the predicates. Our schemes are proved in the standard model. We then introduce the concept of Revocable Predicate Encryption (RPE), which extends the previous PE setting with revocation support: private keys can be used to decrypt an RPE ciphertext only if they match the decryption policy (defined via attributes encoded into the ciphertext and predicates associated with private keys) and were not revoked by the time the ciphertext was created. We propose two RPE schemes. Our first scheme, termed Attribute- Hiding RPE (AH-RPE), offers attribute-hiding, which is the standard PE property. Our second scheme, termed Full-Hiding RPE (FH-RPE), offers even stronger privacy guarantees, i.e., apart from possessing the Attribute-Hiding property, the scheme also ensures that no information about revoked users is leaked from a given ciphertext. The proposed schemes are also proved to be secure under well established assumptions in the standard model. Secrecy of decryption keys is an important pre-requisite for security of (H)PE and compromised private keys must be immediately replaced. The notion of Forward Security (FS) reduces damage from compromised keys by guaranteeing confidentiality of messages that were encrypted prior to the compromise event. We present the first Forward-Secure Hierarchical Predicate Encryption (FS-HPE) that is proved secure in the standard model. Our FS-HPE scheme offers some desirable properties: time-independent delegation of predicates (to support dynamic behavior for delegation of decrypting rights to new users), local update for users' private keys (i.e., no master authority needs to be contacted), forward security, and the scheme's encryption process does not require knowledge of predicates at any level including when those predicates join the hierarchy.
Resumo:
Objective To evaluate the time course of the recovery of transverse strain in the Achilles and patellar tendon following a bout of resistance exercise. Methods Seventeen healthy adults underwent sonographic examination of the right patellar (n=9) and Achilles (n=8) tendons immediately prior to and following 90 repetitions of weight-bearing quadriceps and gastrocnemius-resistance exercise performed against an effective resistance of 175% and 250% body weight, respectively. Sagittal tendon thickness was determined 20 mm from the enthesis and transverse strain, as defined by the stretch ratio, was repeatedly monitored over a 24 h recovery period. Results Resistance exercise resulted in an immediate decrease in Achilles (t7=10.6, p<0.01) and patellar (t8=8.9, p<0.01) tendon thickness, resulting in an average transverse stretch ratio of 0.86±0.04 and 0.82±0.05, which was not significantly different between tendons. The magnitude of the immediate transverse strain response, however, was reduced with advancing age (r=0.63, p<0.01). Recovery in transverse strain was prolonged compared with the duration of loading and exponential in nature. The average primary recovery time was not significantly different between the Achilles (6.5±3.2 h) and patellar (7.1±3.2 h) tendons. Body weight accounted for 62% and 64% of the variation in recovery time, respectively. Conclusions Despite structural and biochemical differences between the Achilles and patellar tendon, the mechanisms underlying transverse creep recovery in vivo appear similar and are highly time dependent. These novel findings have important implications concerning the time required for the mechanical recovery of high-stress tendons following an acute bout of exercise.
Resumo:
Mobile/tower cranes are the most essential forms of construction plant in use in the construction industry but are also the subject of several safety issues. Of these, blind lifting has been found to be one of the most hazardous of crane operations. To improve the situation, a real-time monitoring system that integrates the use of a Global Positioning System (GPS) and Radio Frequency Identification (RFID) is developed. This system aims to identify unauthorized work or entrance of personnel within a pre-defined risk zone by obtaining positioning data of both site workers and the crane. The system alerts to the presence of unauthorized workers within a risk zone——currently defined as 3m from the crane. When this happens, the system suspends the power of the crane and a warning signal is generated to the safety management team. In this way the system assists the safety management team to manage the safety of hundreds of workers simultaneously. An onsite trial with debriefing interviews is presented to illustrate and validate the system in use.
Resumo:
In Australia, as in some other western nations, governments impose accountability measures on educational institutions (Earl, 2005). One such accountability measure is the National Assessment Program - Literacy and Numeracy (NAPLAN) from which high-stakes assessment data is generated. In this article, a practical method of data analysis known as the Over Time Assessment Data Analysis (OTADA) is offered as an analytical process by which schools can monitor their current and over time performances. This analysis developed by the author, is currently used extensively in schools throughout Queensland. By Analysing in this way, teachers, and in particular principals, can obtain a quick and insightful performance overview. For those seeking to track the achievements and progress of year level cohorts, the OTADA should be considered.
Resumo:
This project researched the performance of emerging digital technology for high voltage electricity substations that significantly improves safety for staff and reduces the potential impact on the environment of equipment failure. The experimental evaluation used a scale model of a substation control system that incorporated real substation control and networking equipment with real-time simulation of the power system. The outcomes confirm that it is possible to implement Ethernet networks in high voltage substations that meet the needs of utilities; however component-level testing of devices is necessary to achieve this. The assessment results have been used to further develop international standards for substation communication and precision timing.
Resumo:
The statutory demand procedure has been a part of our corporate law from its earliest modern formulations and it has been suggested, albeit anecdotally, that under the current regime, it gives rise to more litigation than any other part of the Corporations Act. Despite this there has been a lack of consideration of the underlying policy behind the procedure in both the case law and literature; both of which are largely centred on the technical aspects of the process. The purpose of this article is to examine briefly the process of the statutory demand in the context of the current insolvency law in Australia.
Resumo:
The application of different EMS current thresholds on muscle activates not only the muscle but also peripheral sensory axons that send proprioceptive and pain signals to the cerebral cortex. A 32-channel time-domain fNIRS instrument was employed to map regional cortical activities under varied EMS current intensities applied on the right wrist extensor muscle. Eight healthy volunteers underwent four EMS at different current thresholds based on their individual maximal tolerated intensity (MTI), i.e., 10 % < 50 % < 100 % < over 100 % MTI. Time courses of the absolute oxygenated and deoxygenated hemoglobin concentrations primarily over the bilateral sensorimotor cortical (SMC) regions were extrapolated, and cortical activation maps were determined by general linear model using the NIRS-SPM software. The stimulation-induced wrist extension paradigm significantly increased activation of the contralateral SMC region according to the EMS intensities, while the ipsilateral SMC region showed no significant changes. This could be due in part to a nociceptive response to the higher EMS current intensities and result also from increased sensorimotor integration in these cortical regions.
Resumo:
Health complaint commissions in Australia: Time for a national approach • There is considerable variation between jurisdictions in the ways complaint data are defined, collected and recorded by the Health complaint commissions. • Complaints from the public are an important accountability mechanism and an indicator of service quality. • The lack of a consistent approach leads to fragmentation of complaint data and a lost opportunity to use national data to assist policy development and identify the main areas causing consumers to complain. • We need a national approach to complaints data collection by the Health complaints commissions in order to better respond to patients’ concerns
Resumo:
Criminal intelligence is an area of expertise highly sought-after internationally and within a variety of justice-related professions; however, producing university graduates with the requisite professional knowledge, as well as analytical, organisational and technical skills presents a pedagogical and technical challenge to university educators. The situation becomes even more challenging when students are undertaking their studies by distance education. This best practice session showcases the design of an online undergraduate unit for final year justice students which uses an evolving real-time criminal scenario as the focus of authentic learning activities in order to prepare students for graduate roles within the criminal intelligence and justice professions. Within the unit, students take on the role of criminal intelligence analysts, applying relevant theories, models and strategies to solve a complex but realistic crime and complete briefings and documentation to industry standards as their major summative assessment task. The session will demonstrate how the design of the online unit corresponds to authentic learning principles, and will specifically map the elements of the unit design to Herrington & Oliver’s instructional design framework for authentic learning (2000; Herrington & Herrington 2006). The session will show how a range of technologies was used to create a rich learning experience for students that could be easily maintained over multiple unit iterations without specialist technical support. The session will also discuss the unique pedagogical affordances and challenges implicated in the location of the unit within an online learning environment, and will reflect on some of the lessons learned from the development which may be relevant to other authentic online learning contexts.