920 resultados para use pattern analysis
Resumo:
This work presents a method for predicting resource availability in opportunistic grids by means of use pattern analysis (UPA), a technique based on non-supervised learning methods. This prediction method is based on the assumption of the existence of several classes of computational resource use patterns, which can be used to predict the resource availability. Trace-driven simulations validate this basic assumptions, which also provide the parameter settings for the accurate learning of resource use patterns. Experiments made with an implementation of the UPA method show the feasibility of its use in the scheduling of grid tasks with very little overhead. The experiments also demonstrate the method`s superiority over other predictive and non-predictive methods. An adaptative prediction method is suggested to deal with the lack of training data at initialization. Further adaptative behaviour is motivated by experiments which show that, in some special environments, reliable resource use patterns may not always be detected. Copyright (C) 2009 John Wiley & Sons, Ltd.
Resumo:
BACKGROUND: In equine laminitis, the deep digital flexor muscle (DDFM) appears to have increased muscle force, but evidence-based confirmation is lacking. OBJECTIVES: The purpose of this study was to test if the DDFM of laminitic equines has an increased muscle force detectable by needle electromyography interference pattern analysis (IPA). ANIMALS AND METHODS: The control group included six Royal Dutch Sport horses, three Shetland ponies and one Welsh pony [10 healthy, sound adults weighing 411 ± 217 kg (mean ± SD) and aged 10 ± 5 years]. The laminitic group included three Royal Dutch Sport horses, one Friesian, one Haflinger, one Icelandic horse, one Welsh pony, one miniature Appaloosa and six Shetland ponies (14 adults, weight 310 ± 178 kg, aged 13 ± 6 years) with acute/chronic laminitis. The electromyography IPA measurements included firing rate, turns/second (T), amplitude/turn (M) and M/T ratio. Statistical analysis used a general linear model with outcomes transformed to geometric means. RESULTS: The firing rate of the total laminitic group was higher than the total control group. This difference was smaller for the ponies compared to the horses; in the horses, the geometric mean difference of the laminitic group was 1.73 [geometric 95% confidence interval (CI) 1.29-2.32], and in the ponies this value was 1.09 (geometric 95% CI 0.82-1.45). CONCLUSION AND CLINICAL RELEVANCE: In human medicine, an increased firing rate is characteristic of increased muscle force. Thus, the increased firing rate of the DDFM in the context of laminitis suggests an elevated muscle force. However, this seems to be only a partial effect as in this study, the unchanged turns/second and amplitude/turn failed to prove the recruitment of larger motor units with larger amplitude motor unit potentials in laminitic equids.
Resumo:
Dissertation submitted in partial fulfilment of the requirements for the Degree of Master of Science in Geospatial Technologies
Resumo:
Tutkielma käyttää automaattista kuviontunnistusalgoritmia ja yleisiä kahden liukuvan keskiarvon leikkauspiste –sääntöjä selittääkseen Stuttgartin pörssissä toimivien yksityissijoittajien myynti-osto –epätasapainoa ja siten vastatakseen kysymykseen ”käyttävätkö yksityissijoittajat teknisen analyysin menetelmiä kaupankäyntipäätöstensä perustana?” Perusolettama sijoittajien käyttäytymisestä ja teknisen analyysin tuottavuudesta tehtyjen tutkimusten perusteella oli, että yksityissijoittajat käyttäisivät teknisen analyysin metodeja. Empiirinen tutkimus, jonka aineistona on DAX30 yhtiöiden data vuosilta 2009 – 2013, ei tuottanut riittävän selkeää vastausta tutkimuskysymykseen. Heikko todistusaineisto näyttää kuitenkin osoittavan, että yksityissijoittajat muuttavat kaupankäyntikäyttäytymistänsä eräiden kuvioiden ja leikkauspistesääntöjen ohjastamaan suuntaan.
Resumo:
Protecting confidential information from improper disclosure is a fundamental security goal. While encryption and access control are important tools for ensuring confidentiality, they cannot prevent an authorized system from leaking confidential information to its publicly observable outputs, whether inadvertently or maliciously. Hence, secure information flow aims to provide end-to-end control of information flow. Unfortunately, the traditionally-adopted policy of noninterference, which forbids all improper leakage, is often too restrictive. Theories of quantitative information flow address this issue by quantifying the amount of confidential information leaked by a system, with the goal of showing that it is intuitively "small" enough to be tolerated. Given such a theory, it is crucial to develop automated techniques for calculating the leakage in a system. ^ This dissertation is concerned with program analysis for calculating the maximum leakage, or capacity, of confidential information in the context of deterministic systems and under three proposed entropy measures of information leakage: Shannon entropy leakage, min-entropy leakage, and g-leakage. In this context, it turns out that calculating the maximum leakage of a program reduces to counting the number of possible outputs that it can produce. ^ The new approach introduced in this dissertation is to determine two-bit patterns, the relationships among pairs of bits in the output; for instance we might determine that two bits must be unequal. By counting the number of solutions to the two-bit patterns, we obtain an upper bound on the number of possible outputs. Hence, the maximum leakage can be bounded. We first describe a straightforward computation of the two-bit patterns using an automated prover. We then show a more efficient implementation that uses an implication graph to represent the two- bit patterns. It efficiently constructs the graph through the use of an automated prover, random executions, STP counterexamples, and deductive closure. The effectiveness of our techniques, both in terms of efficiency and accuracy, is shown through a number of case studies found in recent literature. ^
Resumo:
Code patterns, including programming patterns and design patterns, are good references for programming language feature improvement and software re-engineering. However, to our knowledge, no existing research has attempted to detect code patterns based on code clone detection technology. In this study, we build upon the previous work and propose to detect and analyze code patterns from a collection of open source projects using NiPAT technology. Because design patterns are most closely associated with object-oriented languages, we choose Java and Python projects to conduct our study. The tool we use for detecting patterns is NiPAT, a pattern detecting tool originally developed for the TXL programming language based on the NiCad clone detector. We extend NiPAT for the Java and Python programming languages. Then, we try to identify all the patterns from the pattern report and classify them into several different categories. In the end of the study, we analyze all the patterns and compare the differences between Java and Python patterns.
Resumo:
This study investigates tourists’ expenditure patterns in the city of Évora, a world heritage site (WHS) classified by UNESCO. The use of chi-squared automatic interaction detection (CHAID) was chosen, allowing the identification of distinct segments based on expenditure patterns. Visitors’ expenditure patterns have proven to be a pertinent element for a broader understanding of visitors’ behaviour at cultural destinations. Visitors’ expenditure patterns were revealed to be increasing within years studied.
Resumo:
Long-term vegetation restoration carried out on the slopes of the Loess Plateau of China employed different spatial and temporal land-use patterns but very little is known about the effects of these patterns on soil water-content variability. For this study the small Donggou catchment was selected to investigate soil water-content distributions for three spatial scales, including the entire catchment area, sampling transects, and land-use systems. Gravimetric soil water contents were determined incrementally to a soil depth of 1.20 m, on 10 occasions from April to October, 2007, at approximately 20-day intervals. Results indicated that soil water contents were affected by the six land-use types, resulting in four distinct patterns of vertical distribution of soil moisture (uniform, increasing, decreasing, and fluctuating with soil depth). The soil water content and its variation were also influenced in a complex manner by five land-use patterns distributed along transects following the gradients of five similar slopes. These patterns with contrasting hydrological responses in different components, such as forage land (alfalfa)-cropland-shrubland or shrubland-grassland (bunge needlegrass)-cropland-grassland, showed the highest soil water-content variability. Soil water at the catchment scale exhibited a moderate variability for each measurement date, and the variability of soil water content decreased exponentially with increasing soil water content. The minimum sample size for accurate data for use in a hydrological model for the catchment, for example, required many more samples for drier (69) than for wet (10) conditions. To enhance erosion and runoff control, this study suggested two strategies for land management: (i) to create a mosaic pattern by land-use arrangement that located units with higher infiltration capacities downslope from those with lower soil infiltrabilities; and (ii) raising the soil-infiltration capacity of units within the spatial mosaic pattern where possible.
Resumo:
Dissertation submitted in partial fulfillment of the requirements for the Degree of Master of Science in Geospatial Technologies.
Resumo:
Magdeburg, Univ., Fak. für Naturwiss., Diss., 2009
Resumo:
Magdeburg, Univ., Fak. für Informatik, Diss., 2013
Resumo:
The objective of the study is to develop a hand written character recognition system that could recognisze all the characters in the mordern script of malayalam language at a high recognition rate
Resumo:
Agro-ecological resource use pattern in a traditional hill agricultural watershed in Garhwal Himalaya was analysed along an altitudinal transect. Thirty one food crops were found, although only 0.5% agriculture land is under irrigation in the area. Fifteen different tree species within agroforestry systems were located and their density varied from 30-90 trees/ha. Grain yield, fodder from agroforest trees and crop residue were observed to be highest between 1200 and 1600 m a.s.l. Also the annual energy input- output ratio per hectare was highest between 1200 and 1600 m a.s.l. (1.46). This higher input- output ratio between 1200-1600 m a.s.l. was attributed to the fact that green fodder, obtained from agroforestry trees, was considered as farm produce. The energy budget across altitudinal zones revealed 95% contribution of the farmyard manure and the maximum output was in terms of either crop residue (35%) or fodder (55%) from the agroforestry component. Presently on average 23%, 29% and 41% cattle were dependent on stall feeding in villages located at higher, lower and middle altitudes respectively. Similarly, fuel wood consumption was greatly influenced by altitude and family size. The efficiency and sustainability of the hill agroecosystem can be restored by strengthening of the agroforestry component. The approach will be appreciated by the local communities and will readily find their acceptance and can ensure their effective participation in the programme.