958 resultados para Control Identification.


Relevância:

20.00% 20.00%

Publicador:

Resumo:

A Networked Control System (NCS) is a feedback-driven control system wherein the control loops are closed through a real-time network. Control and feedback signals in an NCS are exchanged among the system’s components in the form of information packets via the network. Nowadays, wireless technologies such as IEEE802.11 are being introduced to modern NCSs as they offer better scalability, larger bandwidth and lower costs. However, this type of network is not designed for NCSs because it introduces a large amount of dropped data, and unpredictable and long transmission latencies due to the characteristics of wireless channels, which are not acceptable for real-time control systems. Real-time control is a class of time-critical application which requires lossless data transmission, small and deterministic delays and jitter. For a real-time control system, network-introduced problems may degrade the system’s performance significantly or even cause system instability. It is therefore important to develop solutions to satisfy real-time requirements in terms of delays, jitter and data losses, and guarantee high levels of performance for time-critical communications in Wireless Networked Control Systems (WNCSs). To improve or even guarantee real-time performance in wireless control systems, this thesis presents several network layout strategies and a new transport layer protocol. Firstly, real-time performances in regard to data transmission delays and reliability of IEEE 802.11b-based UDP/IP NCSs are evaluated through simulations. After analysis of the simulation results, some network layout strategies are presented to achieve relatively small and deterministic network-introduced latencies and reduce data loss rates. These are effective in providing better network performance without performance degradation of other services. After the investigation into the layout strategies, the thesis presents a new transport protocol which is more effcient than UDP and TCP for guaranteeing reliable and time-critical communications in WNCSs. From the networking perspective, introducing appropriate communication schemes, modifying existing network protocols and devising new protocols, have been the most effective and popular ways to improve or even guarantee real-time performance to a certain extent. Most previously proposed schemes and protocols were designed for real-time multimedia communication and they are not suitable for real-time control systems. Therefore, devising a new network protocol that is able to satisfy real-time requirements in WNCSs is the main objective of this research project. The Conditional Retransmission Enabled Transport Protocol (CRETP) is a new network protocol presented in this thesis. Retransmitting unacknowledged data packets is effective in compensating for data losses. However, every data packet in realtime control systems has a deadline and data is assumed invalid or even harmful when its deadline expires. CRETP performs data retransmission only in the case that data is still valid, which guarantees data timeliness and saves memory and network resources. A trade-off between delivery reliability, transmission latency and network resources can be achieved by the conditional retransmission mechanism. Evaluation of protocol performance was conducted through extensive simulations. Comparative studies between CRETP, UDP and TCP were also performed. These results showed that CRETP significantly: 1). improved reliability of communication, 2). guaranteed validity of received data, 3). reduced transmission latency to an acceptable value, and 4). made delays relatively deterministic and predictable. Furthermore, CRETP achieved the best overall performance in comparative studies which makes it the most suitable transport protocol among the three for real-time communications in a WNCS.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Investigates the use of temporal lip information, in conjunction with speech information, for robust, text-dependent speaker identification. We propose that significant speaker-dependent information can be obtained from moving lips, enabling speaker recognition systems to be highly robust in the presence of noise. The fusion structure for the audio and visual information is based around the use of multi-stream hidden Markov models (MSHMM), with audio and visual features forming two independent data streams. Recent work with multi-modal MSHMMs has been performed successfully for the task of speech recognition. The use of temporal lip information for speaker identification has been performed previously (T.J. Wark et al., 1998), however this has been restricted to output fusion via single-stream HMMs. We present an extension to this previous work, and show that a MSHMM is a valid structure for multi-modal speaker identification

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In dynamic and uncertain environments such as healthcare, where the needs of security and information availability are difficult to balance, an access control approach based on a static policy will be suboptimal regardless of how comprehensive it is. The uncertainty stems from the unpredictability of users’ operational needs as well as their private incentives to misuse permissions. In Role Based Access Control (RBAC), a user’s legitimate access request may be denied because its need has not been anticipated by the security administrator. Alternatively, even when the policy is correctly specified an authorised user may accidentally or intentionally misuse the granted permission. This paper introduces a novel approach to access control under uncertainty and presents it in the context of RBAC. By taking insights from the field of economics, in particular the insurance literature, we propose a formal model where the value of resources are explicitly defined and an RBAC policy (entailing those predictable access needs) is only used as a reference point to determine the price each user has to pay for access, as opposed to representing hard and fast rules that are always rigidly applied.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In dynamic and uncertain environments, where the needs of security and information availability are difficult to balance, an access control approach based on a static policy will be suboptimal regardless of how comprehensive it is. Risk-based approaches to access control attempt to address this problem by allocating a limited budget to users, through which they pay for the exceptions deemed necessary. So far the primary focus has been on how to incorporate the notion of budget into access control rather than what or if there is an optimal amount of budget to allocate to users. In this paper we discuss the problems that arise from a sub-optimal allocation of budget and introduce a generalised characterisation of an optimal budget allocation function that maximises organisations expected benefit in the presence of self-interested employees and costly audit.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Germline mutations within the cyclin-dependent kinase inhibitor 2A (CDKN2A) gene and one of its targets, the cyclin dependent kinase 4 (CDK4) gene, have been identified in a proportion of melanoma kindreds. In the case of CDK4, only one specific mutation, resulting in the substitution of a cysteine for an arginine at codon 24 (R24C), has been found to be associated with melanoma. We have previously reported the identification of germline CDKN2A mutations in 7/18 Australian melanoma kindreds and the absence of the R24C CDK4 mutation in 21 families lacking evidence of a CDKN2A mutation. The current study represents an expansion of these efforts and includes a total of 48 melanoma families from Australia. All of these families have now been screened for mutations within CDKN2A and CDK4, as well as for mutations within the CDKN2A homolog and 9p21 neighbor, the CDKN2B gene, and the alternative exon 1 (E1beta) of CDKN2A. Families lacking CDKN2A mutations, but positive for a polymorphism(s) within this gene, were further evaluated to determine if their disease was associated with transcriptional silencing of one CDKN2A allele. Overall, CDKN2A mutations were detected in 3/30 (10%) of the new kindreds. Two of these mutations have been observed previously: a 24 bp duplication at the 5' end of the gene and a G to C transversion in exon 2 resulting in an M531 substitution. A novel G to A transition in exon 2, resulting in a D108N substitution was also detected. Combined with our previous findings, we have now detected germline CDKN2A mutations in 10/48 (21%) of our melanoma kindreds. In none of the 'CDKN2A-negative' families was melanoma found to segregate with either an untranscribed CDKN2A allele, an R24C CDK4 mutation, a CDKN2B mutation, or an E1beta mutation. The last three observations suggest that these other cell cycle control genes (or alternative gene products) are either not involved at all, or to any great extent, in melanoma predisposition.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Once melanoma metastasizes, no effective treatment modalities prolong survival in most patients. This notorious refractoriness to therapy challenges investigators to identify agents that overcome melanoma resistance to apoptosis. Whereas many survival pathways contribute to the death-defying phenotype in melanoma, a defect in apoptotic machinery previously highlighted inactivation of Apaf-1, an apoptosome component engaged after mitochondrial damage. During studies involving Notch signaling in melanoma, we observed a gamma-secretase tripeptide inhibitor (GSI; z-Leu-Leu-Nle-CHO), selected from a group of compounds originally used in Alzheimer's disease, induced apoptosis in nine of nine melanoma lines. GSI only induced G2-M growth arrest (but not killing) in five of five normal melanocyte cultures tested. Effective killing of melanoma cells by GSI involved new protein synthesis and a mitochondrial-based pathway mediated by up-regulation of BH3-only members (Bim and NOXA). p53 activation was not necessary for up-regulation of NOXA in melanoma cells. Blocking GSI-induced NOXA using an antisense (but not control) oligonucleotide significantly reduced the apoptotic response. GSI also killed melanoma cell lines with low Apaf-1 levels. We conclude that GSI is highly effective in killing melanoma cells while sparing normal melanocytes. Direct enhancement of BH3-only proteins executes an apoptotic program overcoming resistance of this lethal tumor. Identification of a p53-independent apoptotic pathway in melanoma cells, including cells with low Apaf-1, bypasses an impediment to current cytotoxic therapy and provides new targets for future therapeutic trials involving chemoresistant tumors.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The hexagonal resonator characteristics of an individual ZnO-nanonail’s head were investigated via spatially resolved cathodoluminescence (CL) at room temperature. The positions of most of distinct CL peaks in visible range were well matched to those of whispering gallery modes (WGMs) of a hexagonal dielectric cavity when we took birefringence and dispersion of refractive indices into account. The broad and weak peaks for TE polarization in long wavelength range were consistent with refractive-index values below the threshold for total internal inflection. CL peaks that were not matched to WGMs were identified as either triangular quasi-WGM or Fabry–Pérot resonance modes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Current knowledge about the relationship between transport disadvantage and activity space size is limited to urban areas, and as a result, very little is known about this link in a rural context. In addition, although research has identified transport disadvantaged groups based on their size of activity space, these studies have, however, not empirically explained such differences and the result is often a poor identification of the problems facing disadvantaged groups. Research has shown that transport disadvantage varies over time. The static nature of analysis using the activity space concept in previous research studies has lacked the ability to identify transport disadvantage in time. Activity space is a dynamic concept; and therefore possesses a great potential in capturing temporal variations in behaviour and access opportunities. This research derives measures of the size and fullness of activity spaces for 157 individuals for weekdays, weekends, and for a week using weekly activity-travel diary data from three case study areas located in rural Northern Ireland. Four focus groups were also conducted in order to triangulate quantitative findings and to explain the differences between different socio-spatial groups. The findings of this research show that despite having a smaller sized activity space, individuals were not disadvantaged because they were able to access their required activities locally. Car-ownership was found to be an important life line in rural areas. Temporal disaggregation of the data reveals that this is true only on weekends due to a lack of public transport services. In addition, despite activity spaces being at a similar size, the fullness of activity spaces of low-income individuals was found to be significantly lower compared to their high-income counterparts. Focus group data shows that financial constraint, poor connections both between public transport services and between transport routes and opportunities forced individuals to participate in activities located along the main transport corridors.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Grocery shopping is a routine activity widely considered the responsibility of the female spouse, yet modern social and demographic shifts are causing men to engage in this task. This study develops a retail shopping typology of male grocery shoppers, employing a cluster analysis technique. Five distinct cohorts emerge from the data of eight constructs, measured by seventy one items. One new shopper type emerges from this research. This shopper presented as a younger man, at the commencement of their family lifecycle, attracted by a strong value offer, focusing on price and promotional discounts. Our research offers a contribution to the marketing, consumer behaviour and supermarket retailing disciplines in three ways. By examining and identifying male shopping behaviour in the context of grocery shopping, the development of a retail shopping typology of male grocery shoppers and the extension and employment of a cluster analysis in identifying distinct groups. This research has implications for gender, segmentation studies and consumer behaviour disciplines in regard to grocery shopping. The identification of specific groups of male grocery shoppers will enable grocery retailers to effectively implement important, targeted marketing strategies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Real-time networked control systems (NCSs) over data networks are being increasingly implemented on a massive scale in industrial applications. Along with this trend, wireless network technologies have been promoted for modern wireless NCSs (WNCSs). However, popular wireless network standards such as IEEE 802.11/15/16 are not designed for real-time communications. Key issues in real-time applications include limited transmission reliability and poor transmission delay performance. Considering the unique features of real-time control systems, this paper develops a conditional retransmission enabled transport protocol (CRETP) to improve the delay performance of the transmission control protocol (TCP) and also the reliability performance of the user datagram protocol (UDP) and its variants. Key features of the CRETP include a connectionless mechanism with acknowledgement (ACK), conditional retransmission and detection of ineffective data packets on the receiver side.