949 resultados para Generalized Brackets


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Generalized fractional partial differential equations have now found wide application for describing important physical phenomena, such as subdiffusive and superdiffusive processes. However, studies of generalized multi-term time and space fractional partial differential equations are still under development. In this paper, the multi-term time-space Caputo-Riesz fractional advection diffusion equations (MT-TSCR-FADE) with Dirichlet nonhomogeneous boundary conditions are considered. The multi-term time-fractional derivatives are defined in the Caputo sense, whose orders belong to the intervals [0, 1], [1, 2] and [0, 2], respectively. These are called respectively the multi-term time-fractional diffusion terms, the multi-term time-fractional wave terms and the multi-term time-fractional mixed diffusion-wave terms. The space fractional derivatives are defined as Riesz fractional derivatives. Analytical solutions of three types of the MT-TSCR-FADE are derived with Dirichlet boundary conditions. By using Luchko's Theorem (Acta Math. Vietnam., 1999), we proposed some new techniques, such as a spectral representation of the fractional Laplacian operator and the equivalent relationship between fractional Laplacian operator and Riesz fractional derivative, that enabled the derivation of the analytical solutions for the multi-term time-space Caputo-Riesz fractional advection-diffusion equations. © 2012.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

his paper formulates an edge-based smoothed conforming point interpolation method (ES-CPIM) for solid mechanics using the triangular background cells. In the ES-CPIM, a technique for obtaining conforming PIM shape functions (CPIM) is used to create a continuous and piecewise quadratic displacement field over the whole problem domain. The smoothed strain field is then obtained through smoothing operation over each smoothing domain associated with edges of the triangular background cells. The generalized smoothed Galerkin weak form is then used to create the discretized system equations. Numerical studies have demonstrated that the ES-CPIM possesses the following good properties: (1) ES-CPIM creates conforming quadratic PIM shape functions, and can always pass the standard patch test; (2) ES-CPIM produces a quadratic displacement field without introducing any additional degrees of freedom; (3) The results of ES-CPIM are generally of very high accuracy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents two novel concepts to enhance the accuracy of damage detection using the Modal Strain Energy based Damage Index (MSEDI) with the presence of noise in the mode shape data. Firstly, the paper presents a sequential curve fitting technique that reduces the effect of noise on the calculation process of the MSEDI, more effectively than the two commonly used curve fitting techniques; namely, polynomial and Fourier’s series. Secondly, a probability based Generalized Damage Localization Index (GDLI) is proposed as a viable improvement to the damage detection process. The study uses a validated ABAQUS finite-element model of a reinforced concrete beam to obtain mode shape data in the undamaged and damaged states. Noise is simulated by adding three levels of random noise (1%, 3%, and 5%) to the mode shape data. Results show that damage detection is enhanced with increased number of modes and samples used with the GDLI.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Road traffic accidents can be reduced by providing early warning to drivers through wireless ad hoc networks. When a vehicle detects an event that may lead to an imminent accident, the vehicle disseminates emergency messages to alert other vehicles that may be endangered by the accident. In many existing broadcast-based dissemination schemes, emergency messages may be sent to a large number of vehicles in the area and can be propagated to only one direction. This paper presents a more efficient context aware multicast protocol that disseminates messages only to endangered vehicles that may be affected by the emergency event. The endangered vehicles can be identified by calculating the interaction among vehicles based on their motion properties. To ensure fast delivery, the dissemination follows a routing path obtained by computing a minimum delay tree. The multicast protocol uses a generalized approach that can support any arbitrary road topology. The performance of the multicast protocol is compared with existing broadcast protocols by simulating chain collision accidents on a typical highway. Simulation results show that the multicast protocol outperforms the other protocols in terms of reliability, efficiency, and latency.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background Previous studies have found that high and cold temperatures increase the risk of childhood diarrhea. However, little is known about whether the within-day variation of temperature has any effect on childhood diarrhea. Methods A Poisson generalized linear regression model combined with a distributed lag non-linear model was used to examine the relationship between diurnal temperature range and emergency department admissions for diarrhea among children under five years in Brisbane, from 1st January 2003 to 31st December 2009. Results There was a statistically significant relationship between diurnal temperature range and childhood diarrhea. The effect of diurnal temperature range on childhood diarrhea was the greatest at one day lag, with a 3% (95% confidence interval: 2%–5%) increase of emergency department admissions per 1°C increment of diurnal temperature range. Conclusion Within-day variation of temperature appeared to be a risk factor for childhood diarrhea. The incidence of childhood diarrhea may increase if climate variability increases as predicted.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In their recent review of prior studies examining firm performance, Klapper and Parker (2010, p.7) conclude that “women entrepreneurs tend to underperform relative to their male counterparts.” However, Robb and Watson (2011) argue that much of this prior research is based on inappropriate performance measures and/or does not adequately control (due to data limitations) for important demographic differences. Given the conflicting findings reported in the literature, the aim of this study is to replicate the study by Robb and Watson (2011) to see if their findings can be generalized to another geographical location. Our results, based on an analysis of 209 female-owned and 263 male-owned young Australian firms, confirm those of Robb and Watson (2011). We believe that this outcome should help dispel the female underperformance myth; which if left unchallenged could result in inappropriate policy decisions and, more importantly, could discourage women from establishing new ventures.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The relationship between design process and business systems has been of interest to both practitioners and researchers exploring the numerous opportunities and challenges of this unlikely relationship. Often the relationship is presented as building design thinking capability within an organization, which can be broadly described as the union of design and strategy. Brown (2008) notes that design thinking is ‘‘a discipline that uses the designer’s sensibility and methods to match people’s needs with what is technically feasible and what business strategy can convert into customer value and market opportunities’’ (p. 1). The value that design thinking brings to an organization is a different way of framing situations and possibilities, doing things, and tackling problems: essentially a cultural transformation of the way it undertakes its business. The work of Martin (2009) has clearly shown the generalized differences between design thinking and business thinking, highlighting many instances in which these differences have been overcome, but also noting the many obstacles of trying to unify both approaches within an organization. Liedtka (2010) encourages firms to try and persist in overcoming these barriers, as she has noted that ‘‘business strategy desperately needs design ... because design is all about action and business strategy too often turns out to be only about talk ... fewer than 10 percent of new strategies are ever fully executed’’ (p. 9).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a combined structure for using real, complex, and binary valued vectors for semantic representation. The theory, implementation, and application of this structure are all significant. For the theory underlying quantum interaction, it is important to develop a core set of mathematical operators that describe systems of information, just as core mathematical operators in quantum mechanics are used to describe the behavior of physical systems. The system described in this paper enables us to compare more traditional quantum mechanical models (which use complex state vectors), alongside more generalized quantum models that use real and binary vectors. The implementation of such a system presents fundamental computational challenges. For large and sometimes sparse datasets, the demands on time and space are different for real, complex, and binary vectors. To accommodate these demands, the Semantic Vectors package has been carefully adapted and can now switch between different number types comparatively seamlessly. This paper describes the key abstract operations in our semantic vector models, and describes the implementations for real, complex, and binary vectors. We also discuss some of the key questions that arise in the field of quantum interaction and informatics, explaining how the wide availability of modelling options for different number fields will help to investigate some of these questions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Dual-mode vibration of nanowires has been reported experimentally through actuation of the nanowire at its resonance frequency, which is expected to open up a variety of new modalities for the NEMS that could operate in the nonlinear regime. In the present work, we utilize large scale molecular dynamics simulations to investigate the dual-mode vibration of <110> Ag nanowires with triangular, rhombic and truncated rhombic cross-sections. By incorporating the generalized Young-Laplace equation into Euler-Bernoulli beam theory, the influence of surface effects on the dual-mode vibration is studied. Due to the different lattice spacing in principal axes of inertia of the {110} atomic layers, the NW is also modeled as a discrete system to reveal the influence from such specific atomic arrangement. It is found that the <110> Ag NW will under a dual-mode vibration if the actuation direction is deviated from the two principal axes of inertia. The predictions of the two first mode natural frequencies by the classical beam model appear underestimated comparing with the MD results, which are found to be enhanced by the discrete model. Particularly, the predictions by the beam theory with the contribution of surface effects are uniformly larger than the classical beam model, which exhibit better agreement with MD results for larger cross-sectional size. However, for ultrathin NWs, current consideration of surface effects is still experiencing certain inaccuracy. In all, for all different cross-sections, the inclusion of surface effects is found to reduce the difference between the two first mode natural frequencies. This trend is observed consistent with MD results. This study provides a first comprehensive investigation on the dual-mode vibration of <110> oriented Ag NWs, which is supposed to benefit the applications of NWs that acting as a resonating beam.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Abstract—In this paper we investigate the capacity of a general class of the slotted amplify and forward (SAF) relaying protocol where multiple, though a finite number of relays may transmit in a given cooperative slot and the relay terminals being half-duplex have a finite slot memory capacity. We derive an expression for the capacity per channel use of this generalized SAF channel assuming all source to relay, relay to destination and source to destination channel gains are independent and modeled as complex Gaussian. We show through the analysis of eigenvalue distributions that the increase in limiting capacity per channel use is marginal with the increase of relay terminals.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Secure communications in wireless sensor networks operating under adversarial conditions require providing pairwise (symmetric) keys to sensor nodes. In large scale deployment scenarios, there is no prior knowledge of post deployment network configuration since nodes may be randomly scattered over a hostile territory. Thus, shared keys must be distributed before deployment to provide each node a key-chain. For large sensor networks it is infeasible to store a unique key for all other nodes in the key-chain of a sensor node. Consequently, for secure communication either two nodes have a key in common in their key-chains and they have a wireless link between them, or there is a path, called key-path, among these two nodes where each pair of neighboring nodes on this path have a key in common. Length of the key-path is the key factor for efficiency of the design. This paper presents novel deterministic and hybrid approaches based on Combinatorial Design for deciding how many and which keys to assign to each key-chain before the sensor network deployment. In particular, Balanced Incomplete Block Designs (BIBD) and Generalized Quadrangles (GQ) are mapped to obtain efficient key distribution schemes. Performance and security properties of the proposed schemes are studied both analytically and computationally. Comparison to related work shows that the combinatorial approach produces better connectivity with smaller key-chain sizes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

BACKGROUND: Hot and cold temperatures have been associated with childhood asthma. However, the relationship between daily temperature variation and childhood asthma is not well understood. This study aimed to examine the relationship between diurnal temperature range (DTR) and childhood asthma. METHODS: A Poisson generalized linear model combined with a distributed lag non-linear model was used to examine the relationship between DTR and emergency department admissions for childhood asthma in Brisbane, from January 1st 2003 to December 31st 2009. RESULTS: There was a statistically significant relationship between DTR and childhood asthma. The DTR effect on childhood asthma increased above a DTR of 10[degree sign]C. The effect of DTR on childhood asthma was the greatest for lag 0--9 days, with a 31% (95% confidence interval: 11% -- 58%) increase of emergency department admissions per 5[degree sign]C increment of DTR. Male children and children aged 5--9 years appeared to be more vulnerable to the DTR effect than others. CONCLUSIONS: Large DTR may trigger childhood asthma. Future measures to control and prevent childhood asthma should include taking temperature variability into account. More protective measures should be taken after a day of DTR above10[degree sign]C.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In recent years considerable attention has been paid to the numerical solution of stochastic ordinary differential equations (SODEs), as SODEs are often more appropriate than their deterministic counterparts in many modelling situations. However, unlike the deterministic case numerical methods for SODEs are considerably less sophisticated due to the difficulty in representing the (possibly large number of) random variable approximations to the stochastic integrals. Although Burrage and Burrage [High strong order explicit Runge-Kutta methods for stochastic ordinary differential equations, Applied Numerical Mathematics 22 (1996) 81-101] were able to construct strong local order 1.5 stochastic Runge-Kutta methods for certain cases, it is known that all extant stochastic Runge-Kutta methods suffer an order reduction down to strong order 0.5 if there is non-commutativity between the functions associated with the multiple Wiener processes. This order reduction down to that of the Euler-Maruyama method imposes severe difficulties in obtaining meaningful solutions in a reasonable time frame and this paper attempts to circumvent these difficulties by some new techniques. An additional difficulty in solving SODEs arises even in the Linear case since it is not possible to write the solution analytically in terms of matrix exponentials unless there is a commutativity property between the functions associated with the multiple Wiener processes. Thus in this present paper first the work of Magnus [On the exponential solution of differential equations for a linear operator, Communications on Pure and Applied Mathematics 7 (1954) 649-673] (applied to deterministic non-commutative Linear problems) will be applied to non-commutative linear SODEs and methods of strong order 1.5 for arbitrary, linear, non-commutative SODE systems will be constructed - hence giving an accurate approximation to the general linear problem. Secondly, for general nonlinear non-commutative systems with an arbitrary number (d) of Wiener processes it is shown that strong local order I Runge-Kutta methods with d + 1 stages can be constructed by evaluated a set of Lie brackets as well as the standard function evaluations. A method is then constructed which can be efficiently implemented in a parallel environment for this arbitrary number of Wiener processes. Finally some numerical results are presented which illustrate the efficacy of these approaches. (C) 1999 Elsevier Science B.V. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We consider Cooperative Intrusion Detection System (CIDS) which is a distributed AIS-based (Artificial Immune System) IDS where nodes collaborate over a peer-to-peer overlay network. The AIS uses the negative selection algorithm for the selection of detectors (e.g., vectors of features such as CPU utilization, memory usage and network activity). For better detection performance, selection of all possible detectors for a node is desirable but it may not be feasible due to storage and computational overheads. Limiting the number of detectors on the other hand comes with the danger of missing attacks. We present a scheme for the controlled and decentralized division of detector sets where each IDS is assigned to a region of the feature space. We investigate the trade-off between scalability and robustness of detector sets. We address the problem of self-organization in CIDS so that each node generates a distinct set of the detectors to maximize the coverage of the feature space while pairs of nodes exchange their detector sets to provide a controlled level of redundancy. Our contribution is twofold. First, we use Symmetric Balanced Incomplete Block Design, Generalized Quadrangles and Ramanujan Expander Graph based deterministic techniques from combinatorial design theory and graph theory to decide how many and which detectors are exchanged between which pair of IDS nodes. Second, we use a classical epidemic model (SIR model) to show how properties from deterministic techniques can help us to reduce the attack spread rate.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The interaction of bare graphene nanoribbons (GNRs) was investigated by ab initio density functional theory calculations with both the local density approximation (LDA) and the generalized gradient approximation (GGA). Remarkably, two bare 8-GNRs with zigzag-shaped edges are predicted to form an (8, 8) armchair single-wall carbon nanotube (SWCNT) without any obvious activation barrier. The formation of a (10, 0) zigzag SWCNT from two bare 10-GNRs with armchair-shaped edges has activation barriers of 0.23 and 0.61 eV for using the LDA and the revised PBE exchange correlation functional, respectively, Our results suggest a possible route to control the growth of specific types SWCNT via the interaction of GNRs.