• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 4
  • 3
  • 3
  • 2
  • 2
  • 1
  • Tagged with
  • 16
  • 6
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Prioritized data synchronization with applications

Jin, Jiaxi January 2013 (has links)
We are interested on the problem of synchronizing data on two distinct devices with differed priorities using minimum communication. A variety of distributed sys- tems require communication efficient and prioritized synchronization, for example, where the bandwidth is limited or certain information is more time sensitive than others. Our particular approach, P-CPI, involving the interactive synchronization of prioritized data, is efficient both in communication and computation. This protocol sports some desirable features, including (i) communication and computational com- plexity primarily tied to the number of di erences between the hosts rather than the amount of the data overall and (ii) a memoryless fast restart after interruption. We provide a novel analysis of this protocol, with proved high-probability performance bound and fast-restart in logarithmic time. We also provide an empirical model for predicting the probability of complete synchronization as a function of time and symmetric differences. We then consider two applications of our core algorithm. The first is a string reconciliation protocol, for which we propose a novel algorithm with online time com- plexity that is linear in the size of the string. Our experimental results show that our string reconciliation protocol can potentially outperform existing synchroniza- tion tools such like rsync in some cases. We also look into the benefit brought by our algorithm to delay-tolerant networks(DTNs). We propose an optimized DTN routing protocol with P-CPI implemented as middleware. As a proof of concept, we demonstrate improved delivery rate, reduced metadata and reduced average delay.
2

Intelligent Goal-Oriented Feedback for Java Programming Assignments

Kandru, Nischel 12 July 2018 (has links)
Within computer science education, goal-oriented feedback motivates beginners to be engaged in learning programming. As the number of students increases, it is challenging for teaching assistants to cater to all the doubts of students and provide goals. This problem is addressed by intelligent visual feedback which guides beginners formulate effective goals to resolve all the errors they would incur while solving a programming assignment. Most current automated feedback mechanisms provide feedback without categorization, prioritization, or goal formulation in mind. Students may overlook important issues, and high priority issues might be hidden among other issues. Also, beginners are not well equipped in formulating goals to resolve the issues provided in the feedback. In this research, we address the problem of providing an effective, intelligent goal-oriented feedback to student's code to resolve all the issues in their code while ensuring that the code is well tested. The goal-oriented feedback would eventually implicitly navigate the students to write a logically correct solution. The code feedback is summarized into four categories in the descending order of priority: Coding, Student's Testing, Behavior, and Style. Each category is further classified into subcategories, and a simple visual summary of the student's code is also provided. Each of the above-mentioned categories has detailed feedback on each error in that category to provide a better understanding of the errors. We also offer enhanced error messages and diagnosis of errors to make the feedback very useful. This intelligent feedback has been integrated into Web-CAT, an open-source automated grading tool developed at Virginia Tech that is widely used by many universities. A user survey was collected after the students have utilized this feedback for a couple of programming assignments and we obtained promising results to claim that our intelligent feedback is effective. / Master of Science
3

Implementing a prioritized logic programming system : thesis

Wu, Cheng-min, University of Western Sydney, Nepean, School of Computing and Information Technology January 2000 (has links)
Rule based knowledge representation and reasoning often face a problem of conflict with rules. One common way of solving conflicts is to introduce priorities associate with rules. The thesis describes the underlying algorithm to implement prioritized logic programs (PLPs) proposed by Zhang and Foo in 1997. PLPs are proposed as an extension of Gelfond and Lifschitz's extended logic programs by introducing preferences associatied with rules to the program, where answer sets provide a semantics of PLPs. Major algorithms are presented in detail, and how answer sets can be derived from the algorithm demonstrated. Under this implementation, a PLP is computed efficiently based on previous Niemela and Simons' method of computing stable models of logic programs. Finally, world wide web interface has been employed and embedded to the system to provide great accessibility to the public. / Master of Science (Hons) (Computing)
4

An implementation of prioritized queries using the Google SOAP search API

Kerins, David 10 September 2007 (has links)
In this thesis, we provide an implementation of prioritized queries using the Google SOAP Search API. These prioritized queries are generated from the parsing of valid prioritized constraint expressions (PCE). Prioritized constraint expressions use two unary operators ( μ and ω ) to enhance an infinitesimal logic framework to allow preferential constraints and backup constraints respectively. The Perl CGI algorithm parses valid prioritized constraint expressions using a grammar and then generates a prioritized list of standard Google search queries. These standard Google queries are sent one at a time to Google via the Google SOAP Search API. The results of the search are returned as structured data to the user with their associated Truth value.
5

Calculating power for the Finkelstein and Schoenfeld test statistic

Zhou, Thomas J. 07 March 2022 (has links)
The Finkelstein and Schoenfeld (FS) test is a popular generalized pairwise comparison approach to analyze prioritized composite endpoints (e.g., components are assessed in order of clinical importance). Power and sample size estimation for the FS test, however, are generally done via simulation studies. This simulation approach can be extremely computationally burdensome, compounded by an increasing number of composite endpoints and with increasing sample size. We propose an analytic solution to calculate power and sample size for commonly encountered two-component hierarchical composite endpoints. The power formulas are derived assuming underlying distributions in each of the component outcomes on the population level, which provide a computationally efficient and practical alternative to the standard simulation approach. The proposed analytic approach is extended to derive conditional power formulas, which are used in combination with the promising zone methodology to perform sample size re-estimation in the setting of adaptive clinical trials. Prioritized composite endpoints with more than two components are also investigated. Extensive Monte Carlo simulation studies were conducted to demonstrate that the performance of the proposed analytic approach is consistent with that of the standard simulation approach. We also demonstrate through simulations that the proposed methodology possesses generally desirable objective properties including robustness to mis-specified underlying distributional assumptions. We illustrate our proposed methods through application of the proposed formulas by calculating power and sample size for the Transthyretin Amyloidosis Cardiomyopathy Clinical Trial (ATTR-ACT) and the EMPULSE trial for empagliozin treatment of acute heart failure.
6

Sårbar, riskfylld, eller missgynnad? : Utsatthet bland ungdomar i Västerås stad

Medina, Darinka, Jatta, Mariama January 2009 (has links)
<p>Ungdomsåren är en omtumlande period av förändring och identitetsutveckling. När det rör sig om utsatta ungdomars hälsa är denna grupp exponerad för en eller flera riskfaktorer samtidigt. Enligt internationella och nationella styrdokument är ungdomar en prioriterad grupp då det finns studier som visar på en ojämlikhet i hälsa bland målgruppen. Studiens referensram innefattar tre olika dimensioner av begreppet utsatthet, vilka är sårbar, riskfylld och missgynnad. Syftet med denna studie var att få en ökad förståelse för nyckelpersoners uppfattningar gällande social utsatthet bland ungdomar i åldern 13-19 år. Studiens avsikt har även varit att identifiera utsatta ungdomars behov samt nuvarande och framtida insatser inom problemområdet. Tio enskilda djupintervjuer genomfördes inom sex olika arenor i Västerås stad. Resultatet visade att nyckelpersonernas uppfattningar överensstämde inom många aspekter när det rör sig om social utsatthet bland ungdomar. Resultatet visade vidare på att alla ungdomar är utsatta på ett eller annat sätt men att utsattheten är mer påtaglig bland ungdomar med bristande skyddsnät och ett negativt socialt nätverk. Vidare efterfrågades empowerment och meningsfulla fritidsaktiviteter av nyckelpersonerna samt ett ökat samarbete mellan olika aktörer i syfte att motverka denna utsatthet i Västerås.</p> / <p>The adolescence years can be seen as a critical period due to developmental changes. When it comes to the situation of vulnerable and disadvantaged adolescents, this group is often exposed to several risk factors simultaneously. According to international and national public health documents inequalities in health among adolescents prevail and they are therefore seen as a prioritized group in society. The study's frame of reference includes three dimensions such as vulnerable, hazardous and disadvantaged adolescents. Furthermore the purpose of the study was to explore different key persons' understanding of the target group in the age of 13-19, as well their knowledge of present activities to counteract this problem. In addition, the need for new activities and initiatives are identified within the purpose of the study. Ten indepth interviews were conducted at six different arenas which were associated with adolescents in one way or another. The result of the study indicated that most of the adolescents were negatively exposed in one way or another. However the most exposed were the adolescents with a lack of social support and a negative social network. The different key persons' concept of vulnerable and disadvantaged adolescents is mutual in many aspects. According to the study objects there is consequently a need for empowerment and meaningful recreational activities, as well as a need for an extended collaboration between different actors regarding the prevalent youth work in Västerås.</p>
7

Sårbar, riskfylld, eller missgynnad? : Utsatthet bland ungdomar i Västerås stad

Medina, Darinka, Jatta, Mariama January 2009 (has links)
Ungdomsåren är en omtumlande period av förändring och identitetsutveckling. När det rör sig om utsatta ungdomars hälsa är denna grupp exponerad för en eller flera riskfaktorer samtidigt. Enligt internationella och nationella styrdokument är ungdomar en prioriterad grupp då det finns studier som visar på en ojämlikhet i hälsa bland målgruppen. Studiens referensram innefattar tre olika dimensioner av begreppet utsatthet, vilka är sårbar, riskfylld och missgynnad. Syftet med denna studie var att få en ökad förståelse för nyckelpersoners uppfattningar gällande social utsatthet bland ungdomar i åldern 13-19 år. Studiens avsikt har även varit att identifiera utsatta ungdomars behov samt nuvarande och framtida insatser inom problemområdet. Tio enskilda djupintervjuer genomfördes inom sex olika arenor i Västerås stad. Resultatet visade att nyckelpersonernas uppfattningar överensstämde inom många aspekter när det rör sig om social utsatthet bland ungdomar. Resultatet visade vidare på att alla ungdomar är utsatta på ett eller annat sätt men att utsattheten är mer påtaglig bland ungdomar med bristande skyddsnät och ett negativt socialt nätverk. Vidare efterfrågades empowerment och meningsfulla fritidsaktiviteter av nyckelpersonerna samt ett ökat samarbete mellan olika aktörer i syfte att motverka denna utsatthet i Västerås. / The adolescence years can be seen as a critical period due to developmental changes. When it comes to the situation of vulnerable and disadvantaged adolescents, this group is often exposed to several risk factors simultaneously. According to international and national public health documents inequalities in health among adolescents prevail and they are therefore seen as a prioritized group in society. The study's frame of reference includes three dimensions such as vulnerable, hazardous and disadvantaged adolescents. Furthermore the purpose of the study was to explore different key persons' understanding of the target group in the age of 13-19, as well their knowledge of present activities to counteract this problem. In addition, the need for new activities and initiatives are identified within the purpose of the study. Ten indepth interviews were conducted at six different arenas which were associated with adolescents in one way or another. The result of the study indicated that most of the adolescents were negatively exposed in one way or another. However the most exposed were the adolescents with a lack of social support and a negative social network. The different key persons' concept of vulnerable and disadvantaged adolescents is mutual in many aspects. According to the study objects there is consequently a need for empowerment and meaningful recreational activities, as well as a need for an extended collaboration between different actors regarding the prevalent youth work in Västerås.
8

Experimentální ověření prioritizace zvířecích stimulů u člověka / Experimental evaluation of prioritization of animal stimuli by human

Kočková-Amortová, Eliška January 2019 (has links)
In some previous studies, felines were evaluated as one of the most beautiful groups of mammals, but at the same time, they were rated as dangerous. Some studies suggest that felines may be among those dangerous animals that are prioritized by humans in terms of faster neural response and preferential processing of visual information. This thesis tests the prioritization of potentially dangerous animals with each other while trying to identify the factors that influence the positive evaluation of felines. It has been found that felines are prioritized among potentially dangerous animals, but the experimental design is very important. Prioritization has not been proven when respondents have followed a different task and the animals have only acted as distractors. Big cats were evaluated as the most beautiful and most feared felines, with morphology, especially the weight of the animal, influencing both of these ratings. The ranking of beauty was also influenced by the presence of the pattern and saturation and lightness of the colors. Compared to viverrids, felines were rated both as more beautiful and more feared. Felines would be more likely protected and treated as pets than viverrids. Furthermore, large felines are relatively well-known among humans, while respondents basically did not know any...
9

Predicting Residential Heating Energy Consumption and Savings Using Neural Network Approach

Al Tarhuni, Badr 30 May 2019 (has links)
No description available.
10

Mécanismes de traitement des données dans les réseaux de capteurs sans fils dans les cas d'accès intermittent à la station de base / Data Management in Wireless Sensor Networks with Intermittent Sink Access

Dini, Cosmin 21 December 2010 (has links)
Les réseaux des capteurs sans fil sont considérés comme une alternative aux réseaux câblés afin de permettre l'installation dans des zones peu accessibles. Par conséquent, de nouveaux protocoles ont été conçus pour supporter le manque des ressources qui est spécifique à ce type de réseau. La communication entre les nœuds est réalisée par des protocoles spécifiques pour la gestion efficace de l'énergie. La gestion des données collectées par ces nœuds doit être également prise en compte car la communication entre les nœuds engendre un coût non négligeable en termes d'énergie. De plus, l'installation de ce type de réseau dans des régions lointaines facilite les attaques sur la structure des réseaux ainsi que sur les données collectées. Les mesures de sécurité envisagées amènent des coûts d'énergie supplémentaires. Un aspect souvent négligé concerne le cas où un nœud ne peut pas communiquer avec la station de base (sink node) qui collectionne et traite les données. Cependant, les nœuds continuent à accumuler des informations en suivant les plans de collection. Si la situation continue, l'espace de mémoire (storage) diminue à un point où la collection de nouvelles données n'est plus possible.Nous proposons des mécanismes pour la réduction contrôlée de données en considérant leur priorité relative. Les données sont divisées dans des unités auxquelles un niveau d'importance est alloué, en fonction des considérations d'utilité et de missions qui les utilisent. Nous proposons un ensemble de primitives (opérations) qui permettent la réduction d'espace de stockage nécessaire, tout en préservant un niveau raisonnable de résolution des informations collectées. Pour les larges réseaux à multiple nœuds, nous proposons des mécanismes pour le partage de données (data load sharing) ainsi que la redondance. Des algorithmes ont été proposés pour évaluer l'efficacité de ces techniques de gestion de données vis-à-vis de l'énergie nécessaire pour transférer les données.A travers des simulations, nous avons validé le fait que les résultats sont très utiles dans les cas à mémoire limitée (wireless nades) et pour les communications intermittentes. / Wireless Sensor Networks have evolved as an alternative to wired networks fit for quick deployments in areas with limited access. New protocols have been deviees to deal with the inherent scarcity of resources that characterizes such netvorks. Energy efficient network protocols are used for communication between nades. Data collected by wireless nades is transmitted at an energy cost and therefore carefully managed. The remote deployment of wireless networks opens the possibility of malicious attacks on the data and on the infrastructure itself. Security measures have also been devised, but they come at an energy cost. One item that has received little attention is the situation of the data sink becoming unreachable. The nodes still collect data as instructed and accumulate it. Under prolonged unavailability of the sink node, the storage space on sensor nades is used up and collecting new data is no longer feasible. Our proposal for a prioritized data reduction alleviates this problem. The collected data is divided into data units who are assigned an importance level calculated in agreement with the business case. We have proposed data reduction primitive operations that reduce the needed space while only losing a limited amount of data resolution. A multi-node deployment opens the possibility for data load sharing between the nodes as well as redundancy. Algorithms were proposed to evaluate the potential gain ofthese approaches in relation to the amount of energy spent for data transfer. The proposed approach works well in coping with fixed size data storage by trimming the low interest data in a manner that data is still usable.

Page generated in 0.0767 seconds