1000 resultados para state scalability


Relevância:

20.00% 20.00%

Publicador:

Resumo:

PySSM is a Python package that has been developed for the analysis of time series using linear Gaussian state space models (SSM). PySSM is easy to use; models can be set up quickly and efficiently and a variety of different settings are available to the user. It also takes advantage of scientific libraries Numpy and Scipy and other high level features of the Python language. PySSM is also used as a platform for interfacing between optimised and parallelised Fortran routines. These Fortran routines heavily utilise Basic Linear Algebra (BLAS) and Linear Algebra Package (LAPACK) functions for maximum performance. PySSM contains classes for filtering, classical smoothing as well as simulation smoothing.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As 2001 was the International Year of the Volunteer as it seemed timely to look at the legal, social and political frameworks which provide for the long term growth of volunteers. The focus of this research is on the nature and extent of volunteers in the Queensland State Government. The social capital debate (expanded by Robert Putnam in 1995) is about citizens’ participation in extracurricular activities and has been extended to mean a collective intelligence – a capacity as a people to create the society we want. The volunteer phenomenon has been used to indicate social and ethical concern.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A novel concept of producing high dc voltage for pulsed-power applications is proposed in this paper. The topology consists of an LC resonant circuit supplied through a tuned alternating waveform that is produced by an inverter. The control scheme is based on the detection of variations in the resonant frequency and adjustment of the switching signal patterns for the inverter to produce a square waveform with exactly the same frequencies. Therefore the capacitor voltage oscillates divergently with an increasing amplitude. A simple one-stage capacitor-diode voltage multiplier (CDVM) connected to the resonant capacitor then rectifies the alternating voltage and gives a dc level equal to twice the input voltage amplitude. The produced high voltage appears then in the form of high-voltage pulses across the load. A basic model is simulated by Simulink platform of MATLAB and the results are included in the paper.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

'A Simple Plan' is a deceptively complex and multilayered film, combining elements of Celtic mythology with the morality play and the windfall fantasy gone disastrously wrong. Despite its blending of realism and heavyhanded symbolism, and its abundant trans-textual gestures, 'A Simple Plan' is in many ways defiantly not a 90s movie: its leading characters are fashionably flawed, but they are neither sensitive, nor honourable, nor heroic; there are no startling special effects or intricate timeshifts; and it desperately gives the impression of depth, of being emphatically more than mere superficial excess. At a stretch it almost appears to be a throwback to the 1930s Production Code emphasis on the role of cinema in moral instruction; while good hardly triumphs over evil, venality is painfully and emphatically punished. But in other ways it is a quintessential late 90s film: an American/British/Japanese/German/French co-production, 'A Simple Plan' acts most palpably as a commentary on the moral, economic and social condition of the United States at the end of the American century.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

EMR (Electronic Medical Record) is an emerging technology that is highly-blended between non-IT and IT area. One methodology is to link the non-IT and IT area is to construct databases. Nowadays, it supports before and after-treatment for patients and should satisfy all stakeholders such as practitioners, nurses, researchers, administrators and financial departments and so on. In accordance with the database maintenance, DAS (Data as Service) model is one solution for outsourcing. However, there are some scalability and strategy issues when we need to plan to use DAS model properly. We constructed three kinds of databases such as plan-text, MS built-in encryption which is in-house model and custom AES (Advanced Encryption Standard) - DAS model scaling from 5K to 2560K records. To perform custom AES-DAS better, we also devised Bucket Index using Bloom Filter. The simulation showed the response times arithmetically increased in the beginning but after a certain threshold, exponentially increased in the end. In conclusion, if the database model is close to in-house model, then vendor technology is a good way to perform and get query response times in a consistent manner. If the model is DAS model, it is easy to outsource the database, however, some techniques like Bucket Index enhances its utilization. To get faster query response times, designing database such as consideration of the field type is also important. This study suggests cloud computing would be a next DAS model to satisfy the scalability and the security issues.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Electronic Health Record (EHR) retrieval processes are complex demanding Information Technology (IT) resources exponentially in particular memory usage. Database-as-a-service (DAS) model approach is proposed to meet the scalability factor of EHR retrieval processes. A simulation study using ranged of EHR records with DAS model was presented. The bucket-indexing model incorporated partitioning fields and bloom filters in a Singleton design pattern were used to implement custom database encryption system. It effectively provided faster responses in the range query compared to different types of queries used such as aggregation queries among the DAS, built-in encryption and the plain-text DBMS. The study also presented with constraints around the approach should consider for other practical applications.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background Screening tests of basic cognitive status or ‘mental state’ have been shown to predict mortality and functional outcomes in adults. This study examined the relationship between mental state and outcomes in children with type 1 diabetes. Objective We aimed to determine whether mental state at diagnosis predicts longer term cognitive function of children with a new diagnosis of type 1 diabetes. Methods Mental state of 87 patients presenting with newly diagnosed type 1 diabetes was assessed using the School-Years Screening Test for the Evaluation of Mental Status. Cognitive abilities were assessed 1 wk and 6 months postdiagnosis using standardized tests of attention, memory, and intelligence. Results Thirty-seven children (42.5%) had reduced mental state at diagnosis. Children with impaired mental state had poorer attention and memory in the week following diagnosis, and, after controlling for possible confounding factors, significantly lower IQ at 6 months compared to those with unimpaired mental state (p < 0.05). Conclusions Cognition is impaired acutely in a significant number of children presenting with newly diagnosed type 1 diabetes. Mental state screening is an effective method of identifying children at risk of ongoing cognitive difficulties in the days and months following diagnosis. Clinicians may consider mental state screening for all newly diagnosed diabetic children to identify those at risk of cognitive sequelae.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A Cooperative Collision Warning System (CCWS) is an active safety techno- logy for road vehicles that can potentially reduce traffic accidents. It provides a driver with situational awareness and early warnings of any possible colli- sions through an on-board unit. CCWS is still under active research, and one of the important technical problems is safety message dissemination. Safety messages are disseminated in a high-speed mobile environment using wireless communication technology such as Dedicated Short Range Communication (DSRC). The wireless communication in CCWS has a limited bandwidth and can become unreliable when used inefficiently, particularly given the dynamic nature of road traffic conditions. Unreliable communication may significantly reduce the performance of CCWS in preventing collisions. There are two types of safety messages: Routine Safety Messages (RSMs) and Event Safety Messages (ESMs). An RSM contains the up-to-date state of a vehicle, and it must be disseminated repeatedly to its neighbouring vehicles. An ESM is a warning message that must be sent to all the endangered vehi- cles. Existing RSM and ESM dissemination schemes are inefficient, unscalable, and unable to give priority to vehicles in the most danger. Thus, this study investigates more efficient and scalable RSM and ESM dissemination schemes that can make use of the context information generated from a particular traffic scenario. Therefore, this study tackles three technical research prob- lems, vehicular traffic scenario modelling and context information generation, context-aware RSM dissemination, and context-aware ESM dissemination. The most relevant context information in CCWS is the information about possible collisions among vehicles given a current vehicular traffic situation. To generate the context information, this study investigates techniques to model interactions among multiple vehicles based on their up-to-date motion state obtained via RSM. To date, there is no existing model that can represent interactions among multiple vehicles in a speciffic region and at a particular time. The major outcome from the first problem is a new interaction graph model that can be used to easily identify the endangered vehicles and their danger severity. By identifying the endangered vehicles, RSM and ESM dis- semination can be optimised while improving safety at the same time. The new model enables the development of context-aware RSM and ESM dissemination schemes. To disseminate RSM efficiently, this study investigates a context-aware dis- semination scheme that can optimise the RSM dissemination rate to improve safety in various vehicle densities. The major outcome from the second problem is a context-aware RSM dissemination protocol. The context-aware protocol can adaptively adjust the dissemination rate based on an estimated channel load and danger severity of vehicle interactions given by the interaction graph model. Unlike existing RSM dissemination schemes, the proposed adaptive scheme can reduce channel congestion and improve safety by prioritising ve- hicles that are most likely to crash with other vehicles. The proposed RSM protocol has been implemented and evaluated by simulation. The simulation results have shown that the proposed RSM protocol outperforms existing pro- tocols in terms of efficiency, scalability and safety. To disseminate ESM efficiently, this study investigates a context-aware ESM dissemination scheme that can reduce unnecessary transmissions and deliver ESMs to endangered vehicles as fast as possible. The major outcome from the third problem is a context-aware ESM dissemination protocol that uses a multicast routing strategy. Existing ESM protocols use broadcast rout- ing, which is not efficient because ESMs may be sent to a large number of ve- hicles in the area. Using multicast routing improves efficiency because ESMs are sent only to the endangered vehicles. The endangered vehicles can be identified using the interaction graph model. The proposed ESM protocol has been implemented and evaluated by simulation. The simulation results have shown that the proposed ESM protocol can prevent potential accidents from occurring better than existing ESM protocols. The context model and the RSM and ESM dissemination protocols can be implemented in any CCWS development to improve the communication and safety performance of CCWS. In effect, the outcomes contribute to the realisation of CCWS that will ultimately improve road safety and save lives.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents an analysis of the stream cipher Mixer, a bit-based cipher with structural components similar to the well-known Grain cipher and the LILI family of keystream generators. Mixer uses a 128-bit key and 64-bit IV to initialise a 217-bit internal state. The analysis is focused on the initialisation function of Mixer and shows that there exist multiple key-IV pairs which, after initialisation, produce the same initial state, and consequently will generate the same keystream. Furthermore, if the number of iterations of the state update function performed during initialisation is increased, then the number of distinct initial states that can be obtained decreases. It is also shown that there exist some distinct initial states which produce the same keystream, resulting in a further reduction of the effective key space

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There is limited understanding about business strategies related to parliamentary government's departments. This study focuses on the strategies of departments of two state governments in Australia. The strategies are derived from department strategic plans available in public domain and collected from respective websites. The results of this research indicate that strategies fall into seven categories: internal, development, political, partnership, environment, reorientation and status quo. The strategies of the departments are mainly internal or development where development strategy is mainly the focus of departments such as transport, and infrastructure. Political strategy is prevalent for departments related to communities, and education and training. Further three layers of strategies are identified as kernel, cluster and individual, which are mapped to the developed taxonomy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Many contend that the logical solution to woman abuse in marriage/cohabitation is for women to exit through legal separation, divorce, or other means. However, a growing body of empirical work shows that separation or divorce does not necessarily solve the problem of woman abuse. For example, in addition to experiencing lethal or nonlethal forms of physical violence and psychological abuse, many women who try to leave, or who have left their male partners, are sexually assaulted. The main objective of this paper is to critically review the extant empirical and theoretical work on separation/divorcesexual assault. Suggestions for future research and theorizing are also provided.