944 resultados para Black-Box Modeling
Resumo:
Increasing efforts exist in integrating different levels of detail in models of the cardiovascular system. For instance, one-dimensional representations are employed to model the systemic circulation. In this context, effective and black-box-type decomposition strategies for one-dimensional networks are needed, so as to: (i) employ domain decomposition strategies for large systemic models (1D-1D coupling) and (ii) provide the conceptual basis for dimensionally-heterogeneous representations (1D-3D coupling, among various possibilities). The strategy proposed in this article works for both of these two scenarios, though the several applications shown to illustrate its performance focus on the 1D-1D coupling case. A one-dimensional network is decomposed in such a way that each coupling point connects two (and not more) of the sub-networks. At each of the M connection points two unknowns are defined: the flow rate and pressure. These 2M unknowns are determined by 2M equations, since each sub-network provides one (non-linear) equation per coupling point. It is shown how to build the 2M x 2M non-linear system with arbitrary and independent choice of boundary conditions for each of the sub-networks. The idea is then to solve this non-linear system until convergence, which guarantees strong coupling of the complete network. In other words, if the non-linear solver converges at each time step, the solution coincides with what would be obtained by monolithically modeling the whole network. The decomposition thus imposes no stability restriction on the choice of the time step size. Effective iterative strategies for the non-linear system that preserve the black-box character of the decomposition are then explored. Several variants of matrix-free Broyden`s and Newton-GMRES algorithms are assessed as numerical solvers by comparing their performance on sub-critical wave propagation problems which range from academic test cases to realistic cardiovascular applications. A specific variant of Broyden`s algorithm is identified and recommended on the basis of its computer cost and reliability. (C) 2010 Elsevier B.V. All rights reserved.
Resumo:
This paper examines the role of powerful entities and coalitions in shaping international accounting standards. Specifically, the focus is on the process by which the International Accounting Standards Board (IASB) developed IFRS 6, Exploration for and Evaluation of Mineral Resources. In its Issues Paper, the IASB recommended that the successful efforts method be mandated for pre-production costs, eliminating the choice previously available between full cost and successful efforts methods. In spite of the endorsement of this view by a majority of the constituents who responded to the Issues Paper, the final outcome changed nothing, with choice being retained. A compelling explanation of this disparity between the visible inputs and outputs of the standard setting process is the existence of a “black box”, in which powerful extractive industries entities and coalitions covertly influenced the IASB to secure their own ends and ensure that the status quo was maintained
Resumo:
This paper seeks to investigate the link between the objective regional opportunity structure (captured by regional data) and individuals’ engagement in different stages in the venture creation process (intention to start a business and engagement in nascent entrepreneurship). We further investigate pathways through which a favourable regional environment could affect entrepreneurial intentions and the propensity to be a nascent entrepreneur. We combine individual level GEM-data for Western Germany with regional level data from the statistical office and use multi-level analysis to test our hypotheses. We find support for our contention that a favourable regional opportunity structure affects entrepreneurial intentions and engagement. As pathways between the region and individual behaviour serve the individual perception of founding opportunities and the individual social capital.
Resumo:
There is an intimate interconnectivity between policy guidelines defining reform and the delineation of what research methods would be subsequently applied to determine reform success. Research is guided as much by the metaphors describing it as by the ensuing empirical definition of actions of results obtained from it. In a call for different reform policy metaphors Lumby and English (2010) note, “The primary responsibility for the parlous state of education... lies with the policy makers that have racked our schools with reductive and dehumanizing processes, following the metaphors of market efficiency, and leadership models based on accounting and the characteristics of machine bureaucracy” (p. 127)
Resumo:
Most previous work on unconditionally secure multiparty computation has focused on computing over a finite field (or ring). Multiparty computation over other algebraic structures has not received much attention, but is an interesting topic whose study may provide new and improved tools for certain applications. At CRYPTO 2007, Desmedt et al introduced a construction for a passive-secure multiparty multiplication protocol for black-box groups, reducing it to a certain graph coloring problem, leaving as an open problem to achieve security against active attacks. We present the first n-party protocol for unconditionally secure multiparty computation over a black-box group which is secure under an active attack model, tolerating any adversary structure Δ satisfying the Q 3 property (in which no union of three subsets from Δ covers the whole player set), which is known to be necessary for achieving security in the active setting. Our protocol uses Maurer’s Verifiable Secret Sharing (VSS) but preserves the essential simplicity of the graph-based approach of Desmedt et al, which avoids each shareholder having to rerun the full VSS protocol after each local computation. A corollary of our result is a new active-secure protocol for general multiparty computation of an arbitrary Boolean circuit.
Resumo:
We study the natural problem of secure n-party computation (in the passive, computationally unbounded attack model) of the n-product function f G (x 1,...,x n ) = x 1 ·x 2 ⋯ x n in an arbitrary finite group (G,·), where the input of party P i is x i ∈ G for i = 1,...,n. For flexibility, we are interested in protocols for f G which require only black-box access to the group G (i.e. the only computations performed by players in the protocol are a group operation, a group inverse, or sampling a uniformly random group element). Our results are as follows. First, on the negative side, we show that if (G,·) is non-abelian and n ≥ 4, then no ⌈n/2⌉-private protocol for computing f G exists. Second, on the positive side, we initiate an approach for construction of black-box protocols for f G based on k-of-k threshold secret sharing schemes, which are efficiently implementable over any black-box group G. We reduce the problem of constructing such protocols to a combinatorial colouring problem in planar graphs. We then give two constructions for such graph colourings. Our first colouring construction gives a protocol with optimal collusion resistance t < n/2, but has exponential communication complexity O(n*2t+1^2/t) group elements (this construction easily extends to general adversary structures). Our second probabilistic colouring construction gives a protocol with (close to optimal) collusion resistance t < n/μ for a graph-related constant μ ≤ 2.948, and has efficient communication complexity O(n*t^2) group elements. Furthermore, we believe that our results can be improved by further study of the associated combinatorial problems.
Resumo:
Issue addressed The paper examines the meanings of food safety among food businesses deemed non-compliant and considers the need for an ‘insider perspective’ to inform a more nuanced health promotion practice. Methods In-depth interviews were conducted with 29 food business operators who had been recently deemed ‘non-compliant’ through Council inspection. Result Paradoxically, these ‘non-compliers’ revealed a strong belief in the importance of food safety as well as a desire to comply with the regulations as communicated to them by Environmental Health Officers (EHOs). Conclusions The evidence base of food safety is largely informed by the science of food hazards, yet there is a very important need to illuminate the ‘insider’ experience of food businesses doing food safety on a daily basis. This requires a more socially nuanced appreciation of food businesses beyond the simple dichotomy of compliant/ non-compliant. So what? Armed with a deeper understanding of the social context surrounding food safety practice, it is anticipated that a more balanced, collaborative mode of food safety health promotion could develop which could add to the current signature model of regulation.
Resumo:
Among different methods, the transmission-line or the impedance tube method has been most popular for the experimental evaluation of the acoustical impedance of any termination. The current state of method involves extrapolation of the measured data to the reflecting surface or exact locations of the pressure maxima, both of which are known to be rather tricky. The present paper discusses a method which makes use of the positions of the pressure minima and the values of the standing-wave ratio at these points. Lippert's concept of enveloping curves has been extended. The use of Smith or Beranek charts, with their inherent inaccuracy, has been altogether avoided. The existing formulas for the impedance have been corrected. Incidentally, certain other errors in the current literature have also been brought to light.Subject Classification: 85.20.
Resumo:
For the experimental evaluation of the acoustical impedance of a termination by the impedance-tube method at low frequencies, the length of the impedance tube is a problem. In the present paper, the method of exact analysis of standing waves developed by the authors for the stationary medium as well as for mean flow, has been extended for measurement of the acoustical impedance of a termination at low frequencies. The values of the tube attenuation factor and the wave number at the low frequency of interest are established from the experiment conducted, with the given impedance tube, at a higher frequency. Then, exciting the tube at the desired low frequency it is sufficient to measure sound pressure at three differenct locations (not necessarily the minima) in order to evaluate reflection coefficient and hence the impedance of the termination at that frequency.
Resumo:
The transmission-line or the impedance-tube method for the measurement of the acoustic impedance of any termination involves a search for various minima and maxima of pressure. For this purpose, arrangement has to be made for the microphone to travel along the length of the impedance tube, and this complicates the design of the tube considerably. The present paper discusses a method which consists in evaluating the tube attenuation factor at any convenient frequency by making use of measured SPL's at two (or more) fixed locations with a rigid termination, calculating the tube attenuation factor and wave number at the required frequency of interest with or without mean flow (as applicable), and finally evaluating the impedance of the given termination by measuring and using SPL's at three (or more) fixed locations. Thus, the required impedance tube is considerably smaller in length, simpler in design, easier to manufacture, cheaper in cost and more convenient to use. The design of the tube is also discussed. Incidentally, it is also possible to evaluate the impedance at any low frequency without having to use a larger impedance tube.
Resumo:
This paper re-examines the determinants of mutual fund fees paid by mutual fund shareholders for management costs and other expenses. There are two novelties with respect to previous studies. First, each type of fee is explained separately. Second, the paper employs a new dataset consisting of Spanish mutual funds, making it the second paper to study mutual fund fees outside the US market. Furthermore, the Spanish market has three interesting characteristics: (i) both distribution and management are highly dominated by banks and savings banks, which points towards potential conflicts of interest; (ii) Spanish mutual fund law imposes caps on all types of fees; and (iii) Spain ranks first in terms of average mutual fund fees among similar countries. We find significant differences in mutual fund fees not explained by the fund’s investment objective. For instance, management companies owned by banks and savings banks charge higher management fees and redemption fees to nonguaranteed funds. Also, investors in older non-guaranteed funds and non-guaranteed funds with a lower average investment are more likely to end up paying higher management fees. Moreover, there is clear evidence that some mutual funds enjoy better conditions from custodial institutions than others. In contrast to evidence from the US market, larger funds are not associated with lower fees, but with higher custody fees for guaranteed funds and higher redemption fees for both types of funds. Finally, fee-setting by mutual funds is not related to fund before-fee performance.
Resumo:
Hourly productivity levels in the UK still remain behind those in some competitor countries. The government devotes much policy attention to enhancing productivity and continues to emphasise its five drivers - investment, innovation, skills, enterprise, and competition. This article argues that it is investment broadly defined that is the key to sustained productivity improvement. The emphasis should be on improving productivity simultaneously with improving the quality of production. Only thus will the gains be widely shared. In achieving these aims there are two prerequisites for policy-makers. The first is to ensure better coordination of policy than appears to be currently achieved by the present departmental structures in Whitehall. The second is to recognize fully the long and complex chain of causation that can be triggered by pulling on one policy lever. Such complexity can only be fully understood by more research on what actually goes on inside the black box of the organization. © 2006 Oxford University Press.
Resumo:
We propose a novel information-theoretic approach for Bayesian optimization called Predictive Entropy Search (PES). At each iteration, PES selects the next evaluation point that maximizes the expected information gained with respect to the global maximum. PES codifies this intractable acquisition function in terms of the expected reduction in the differential entropy of the predictive distribution. This reformulation allows PES to obtain approximations that are both more accurate and efficient than other alternatives such as Entropy Search (ES). Furthermore, PES can easily perform a fully Bayesian treatment of the model hyperparameters while ES cannot. We evaluate PES in both synthetic and real-world applications, including optimization problems in machine learning, finance, biotechnology, and robotics. We show that the increased accuracy of PES leads to significant gains in optimization performance.