991 resultados para Tool path computing
Resumo:
Modern automobiles are no longer just mechanical tools. The electronics and computing services they are shipping with are making them not less than a computer. They are massive kinetic devices with sophisticated computing power. Most of the modern vehicles are made with the added connectivity in mind which may be vulnerable to outside attack. Researchers have shown that it is possible to infiltrate into a vehicle’s internal system remotely and control the physical entities such as steering and brakes. It is quite possible to experience such attacks on a moving vehicle and unable to use the controls. These massive connected computers can be life threatening as they are related to everyday lifestyle. First part of this research studied the attack surfaces in the automotive cybersecurity domain. It also illustrated the attack methods and capabilities of the damages. Online survey has been deployed as data collection tool to learn about the consumers’ usage of such vulnerable automotive services. The second part of the research portrayed the consumers’ privacy in automotive world. It has been found that almost hundred percent of modern vehicles has the capabilities to send vehicle diagnostic data as well as user generated data to their manufacturers, and almost thirty five percent automotive companies are collecting them already. Internet privacy has been studies before in many related domain but no privacy scale were matched for automotive consumers. It created the research gap and motivation for this thesis. A study has been performed to use well established consumers privacy scale – IUIPC to match with the automotive consumers’ privacy situation. Hypotheses were developed based on the IUIPC model for internet consumers’ privacy and they were studied by the finding from the data collection methods. Based on the key findings of the research, all the hypotheses were accepted and hence it is found that automotive consumers’ privacy did follow the IUIPC model under certain conditions. It is also found that a majority of automotive consumers use the services and devices that are vulnerable and prone to cyber-attacks. It is also established that there is a market for automotive cybersecurity services and consumers are willing to pay certain fees to avail that.
Resumo:
by Ilan Averbuch presented to Brock in 1988.
Resumo:
Path running next to the Mackenzie Chown Complex.
Resumo:
View of the Complex and the path running along it from the east.
Resumo:
This study attempted to determine whether or not dialogue journal writing encouraged critical reflection in the adult ESL (English as a Second Language) learner. According to research in adult education and anecdotal evidence, the process ofdialogue journal writing can facilitate critical reflection in the adult learner. However, little research has been conducted to examine whether or not journal writing can facilitate critical reflection in the second language learner. As a result, ten low-intermediate level adult ESL students from Brock University's Intensive English Language Programme participated in a dialogue journal writing programme in their writing class. The participants wrote journal entries over a 10-week period, and were interviewed once throughout the process to determine their perceptions ofthe journal writing experience. They also were observed by the researcher throughout the journal writing sessions to establish whether any behaviours or intrusions might affect the participants' writing processes. After the content ofthe journals and the interviews, and the observations made by the researcher were analysed, it was confirmed that, for these participants, dialogue journal writing did not necessarily encourage critical reflection. Moreover, the participants' perceptions ofjournal writing were that it helped them to practise the syntax, vocabulary, and rhetorical patterns ofEnglish; nevertheless, it did not foster critical reflection or thinking.
Resumo:
Optimization of wave functions in quantum Monte Carlo is a difficult task because the statistical uncertainty inherent to the technique makes the absolute determination of the global minimum difficult. To optimize these wave functions we generate a large number of possible minima using many independently generated Monte Carlo ensembles and perform a conjugate gradient optimization. Then we construct histograms of the resulting nominally optimal parameter sets and "filter" them to identify which parameter sets "go together" to generate a local minimum. We follow with correlated-sampling verification runs to find the global minimum. We illustrate this technique for variance and variational energy optimization for a variety of wave functions for small systellls. For such optimized wave functions we calculate the variational energy and variance as well as various non-differential properties. The optimizations are either on par with or superior to determinations in the literature. Furthermore, we show that this technique is sufficiently robust that for molecules one may determine the optimal geometry at tIle same time as one optimizes the variational energy.
Resumo:
Four problems of physical interest have been solved in this thesis using the path integral formalism. Using the trigonometric expansion method of Burton and de Borde (1955), we found the kernel for two interacting one dimensional oscillators• The result is the same as one would obtain using a normal coordinate transformation, We next introduced the method of Papadopolous (1969), which is a systematic perturbation type method specifically geared to finding the partition function Z, or equivalently, the Helmholtz free energy F, of a system of interacting oscillators. We applied this method to the next three problems considered• First, by summing the perturbation expansion, we found F for a system of N interacting Einstein oscillators^ The result obtained is the same as the usual result obtained by Shukla and Muller (1972) • Next, we found F to 0(Xi)f where A is the usual Tan Hove ordering parameter* The results obtained are the same as those of Shukla and Oowley (1971), who have used a diagrammatic procedure, and did the necessary sums in Fourier space* We performed the work in temperature space• Finally, slightly modifying the method of Papadopolous, we found the finite temperature expressions for the Debyecaller factor in Bravais lattices, to 0(AZ) and u(/K/ j,where K is the scattering vector* The high temperature limit of the expressions obtained here, are in complete agreement with the classical results of Maradudin and Flinn (1963) .
Resumo:
In response to a looming leadership shortage, leadership development for teachers has become an increasingly important area of interest around the world. A review of the literature identified the key components of educational leadership development programs as effective curriculum, leadership practice, relationship building, and reflection. A gap in the research was found regarding the use of voluntary committee work as a vehicle for leadership practice. The purpose of this study was to explore teachers' perceptions of their experiences within board-level committees to determine the key factors that contributed, positively or negatively, to their leadership,pevelopment. A qualitative research design was employed using semistructured interviews with 8 participants. The key findings included a list of factors perceived by teachers as either supporting or hindering their leadership development. The supporting factors were: (a) leadership practice, (b) mentors and role models, (c) relationships and networks, and (d) positive outcomes for students. The hindering factors were: (a) lack of follow through and support, (b) committee members with a careerist approach to the experience, (c) personal and political agendas, and (d) overcommitment leading to burnout. Recommendations for practice focused on strategies to enhanc~_ the committee experience as a tool for leadership development. Recommendations for theory and research suggested more research be done on each of the 8 key factors, perceptions associated with teachers choosing to follow a leadership path, and how school boards can structure the committee process as an effective leadership development tool. This study provides a starting point for educators to begin to intentionally design, develop, and deliver voluntary committee experiences as a tool for leadership development.
Resumo:
Variations in different types of genomes have been found to be responsible for a large degree of physical diversity such as appearance and susceptibility to disease. Identification of genomic variations is difficult and can be facilitated through computational analysis of DNA sequences. Newly available technologies are able to sequence billions of DNA base pairs relatively quickly. These sequences can be used to identify variations within their specific genome but must be mapped to a reference sequence first. In order to align these sequences to a reference sequence, we require mapping algorithms that make use of approximate string matching and string indexing methods. To date, few mapping algorithms have been tailored to handle the massive amounts of output generated by newly available sequencing technologies. In otrder to handle this large amount of data, we modified the popular mapping software BWA to run in parallel using OpenMPI. Parallel BWA matches the efficiency of multithreaded BWA functions while providing efficient parallelism for BWA functions that do not currently support multithreading. Parallel BWA shows significant wall time speedup in comparison to multithreaded BWA on high-performance computing clusters, and will thus facilitate the analysis of genome sequencing data.
Resumo:
The purpose of this project is to provide social service practitioners with tools and perspectives to engage young people in a process of developing and connecting with their own personal narratives, and storytelling with others. This project extensively reviews the literature to explore Why Story, What Is Story, Future Directions of Story, and Challenges of Story. Anchoring this exploration is Freire’s (1970/2000) intentional uncovering and decoding. Taking a phenomenological approach, I draw additionally on Brookfield’s (1995) critical reflection; Delgado (1989) and McLaren (1998) for subversive narrative; and Robin (2008) and Sadik (2008) for digital storytelling. The recommendations provided within this project include a practical model built upon Baxter Magolda and King’s (2004) process towards self-authorship for engaging an exercise of storytelling that is accessible to practitioners and young people alike. A personal narrative that aims to help connect lived experience with the theoretical content underscores this project. I call for social service practitioners to engage their own personal narratives in an inclusive and purposeful storytelling method that enhances their ability to help the young people they serve develop and share their stories.
Resumo:
Two synthetic projects were embarked upon, both fraught with protecting group nuance and reaction selectivity. Transformations of the opiate skeleton remain a valuable tool for the development of new medicines. Thebaine, a biosynthetic intermediate in the expression of morphine, was converted in three steps to oripavine through two parallel modes. Through the use of protecting group manipulations, two irreversible scaffold rearrangements were avoided during aryl methyl ether bond cleavage. This chemistry constitutes a new path in manipulations of the morphinan scaffold through protective groups. A new compound family, the flacourtosides, contains an unusual cyclohexenone fragment. The newly described compounds show in preliminary tests antiviral activity against dengue and chikungunya. This aglycone was approached on three pathways, all beginning with the chemoenzymatic dihydroxylation of benzoic acid. A first attempt from a known vinyl epoxide failed to epimerize and cooperate under deprotective conditions. A second and third attempt made use of a diastereoselective dihydroxylation reaction, which was critical in reaching the correct stereochemistry and oxidation state. The methyl ester of the aglycone was prepared, constituting the first synthesis of the non-trivial natural product framework.
Resumo:
The KCube interconnection network was first introduced in 2010 in order to exploit the good characteristics of two well-known interconnection networks, the hypercube and the Kautz graph. KCube links up multiple processors in a communication network with high density for a fixed degree. Since the KCube network is newly proposed, much study is required to demonstrate its potential properties and algorithms that can be designed to solve parallel computation problems. In this thesis we introduce a new methodology to construct the KCube graph. Also, with regard to this new approach, we will prove its Hamiltonicity in the general KC(m; k). Moreover, we will find its connectivity followed by an optimal broadcasting scheme in which a source node containing a message is to communicate it with all other processors. In addition to KCube networks, we have studied a version of the routing problem in the traditional hypercube, investigating this problem: whether there exists a shortest path in a Qn between two nodes 0n and 1n, when the network is experiencing failed components. We first conditionally discuss this problem when there is a constraint on the number of faulty nodes, and subsequently introduce an algorithm to tackle the problem without restrictions on the number of nodes.
Resumo:
Moulin (1999) characterizes the fixed-path rationing methods by efficiency, strategy-proofness, consistency, and resource-monotonicity. In this note, we give a straightforward proof of his result.
Resumo:
Affiliation: Centre Robert-Cedergren de l'Université de Montréal en bio-informatique et génomique & Département de biochimie, Université de Montréal
Resumo:
Affiliation: Département de Biochimie, Université de Montréal