69 resultados para KIMUR5 (Computer program)


Relevância:

90.00% 90.00%

Publicador:

Resumo:

At St Thomas' Hospital, we have developed a computer program on a Titan graphics supercomputer to plan the stereotactic implantation of iodine-125 seeds for the palliative treatment of recurrent malignant gliomas. Use of the Gill-Thomas-Cosman relocatable frame allows planning and surgery to be carried out at different hospitals on different days. Stereotactic computed tomography (CT) and positron emission tomography (PET) scans are performed and the images transferred to the planning computer. The head, tumour and frame fiducials are outlined on the relevant images, and a three-dimensional model generated. Structures which could interfere with the surgery or radiotherapy, such as major vessels, shunt tubing etc., can also be outlined and included in the display. Catheter target and entry points are set using a three-dimensional cursor controlled by a set of dials attached to the computer. The program calculates and displays the radiation dose distribution within the target volume for various catheter and seed arrangements. The CT co-ordinates of the fiducial rods are used to convert catheter co-ordinates from CT space to frame space and to calculate the catheter insertion angles and depths. The surgically implanted catheters are after-loaded the next day and the seeds left in place for between 4 and 6 days, giving a nominal dose of 50 Gy to the edge of the target volume. 25 patients have been treated so far.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This paper describes the development of an analytical model used to simulate the fatigue behaviour of roof cladding during the passage of a tropical cyclone. The model incorporated into a computer program uses wind pressure data from wind tunnel tests in combination with time history information on wind speed and direction during a tropical cyclone, and experimental fatigue characteristics data of roof claddings. The wind pressure data is analysed using a rainflow form of analysis, and a fatigue damage index calculated using a modified form of Miner's rule. Some of the results obtained to date and their significance in relation to the review of current fatigue tests are presented. The model appears to be reasonable for comparative estimation of fatigue life, but an improvement of Miner's rule is required for the prediction of actual fatigue life.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Australian law similar to that of United States -- Australian law requires copyright must subsist in plaintiff's material and defendent's work must infringe plaintiff's copyright to find defendent liable for illegal copying -- subsistence -- infringement -- two cases that touch on 'look and feel' issue -- passing-off -- look and feel of computer program deserves protection

Relevância:

90.00% 90.00%

Publicador:

Resumo:

A description of a computer program to analyse cine angiograms of the heart and pressure waveforms to calculate valve gradients.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Most advanced musicians are able to identify and label a heard pitch if given an opportunity to compare it to a known reference note. This is called ‘relative pitch’ (RP). A much rarer skill is the ability to identify and label a heard pitch without the need for a reference. This is colloquially referred to as ‘perfect pitch’, but appears in the academic literature as ‘absolute pitch’ (AP). AP is considered by many as a remarkable skill. As people do not seem able to develop it intentionally, it is generally regarded as innate. It is often seen as a unitary skill and that a set of identifiable criteria can distinguish those who possess the skill from those who do not. However, few studies have interrogated these notions. The present study developed and applied an interactive computer program to map pitch-labelling responses to various tonal stimuli without a known reference tone available to participants. This approach enabled the identification of the elements of sound that impacted on AP. Pitch-labelling responses of 14 participants with AP were recorded for their accuracy. Each participant’s response to the stimuli was unique. Their accuracy of labelling varied across dimensions such as timbre, range and tonality. The diversity of performance between individuals appeared to reflect their personal musical experience histories.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Security-critical communications devices must be evaluated to the highest possible standards before they can be deployed. This process includes tracing potential information flow through the device's electronic circuitry, for each of the device's operating modes. Increasingly, however, security functionality is being entrusted to embedded software running on microprocessors within such devices, so new strategies are needed for integrating information flow analyses of embedded program code with hardware analyses. Here we show how standard compiler principles can augment high-integrity security evaluations to allow seamless tracing of information flow through both the hardware and software of embedded systems. This is done by unifying input/output statements in embedded program execution paths with the hardware pins they access, and by associating significant software states with corresponding operating modes of the surrounding electronic circuitry.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Context The School of Information Technology at QUT has recently undertaken a major restructuring of their Bachelor of Information Technology (BIT) course. Some of the aims of this restructuring include a reduction in first year attrition and to provide an attractive degree course that meets both student and industry expectations. Emphasis has been placed on the first semester in the context of retaining students by introducing a set of four units that complement one another and provide introductory material on technology, programming and related skills, and generic skills that will aid the students throughout their undergraduate course and in their careers. This discussion relates to one of these four fist semester units, namely Building IT Systems. The aim of this unit is to create small Information Technology (IT) systems that use programming or scripting, databases as either standalone applications or web applications. In the prior history of teaching introductory computer programming at QUT, programming has been taught as a stand alone subject and integration of computer applications with other systems such as databases and networks was not undertaken until students had been given a thorough grounding in those topics as well. Feedback has indicated that students do not believe that working with a database requires programming skills. In fact, the teaching of the building blocks of computer applications have been compartmentalized and taught in isolation from each other. The teaching of introductory computer programming has been an industry requirement of IT degree courses as many jobs require at least some knowledge of the topic. Yet, computer programming is not a skill that all students have equal capabilities of learning (Bruce et al., 2004) and this is clearly shown by the volume of publications dedicated to this topic in the literature over a broad period of time (Eckerdal & Berglund, 2005; Mayer, 1981; Winslow, 1996). The teaching of this introductory material has been done pretty much the same way over the past thirty years. During this period of time that introductory computer programming courses have been taught at QUT, a number of different programming languages and programming paradigms have been used and different approaches to teaching and learning have been attempted in an effort to find the golden thread that would allow students to learn this complex topic. Unfortunately, computer programming is not a skill that can be learnt in one semester. Some basics can be learnt but it can take many years to master (Norvig, 2001). Faculty data typically has shown a bimodal distribution of results for students undertaking introductory programming courses with a high proportion of students receiving a high mark and a high proportion of students receiving a low or failing mark. This indicates that there are students who understand and excel with the introductory material while there is another group who struggle to understand the concepts and practices required to be able to translate a specification or problem statement into a computer program that achieves what is being requested. The consequence of a large group of students failing the introductory programming course has been a high level of attrition amongst first year students. This attrition level does not provide good continuity in student numbers in later years of the degree program and the current approach is not seen as sustainable.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Bananas are susceptible to a diverse range of biotic and abiotic stresses, many of which cause serious production constraints worldwide. One of the most destructive banana diseases is Fusarium wilt caused by the soil-borne fungus, Fusarium oxysporum f. sp. cubense (Foc). No effective control strategy currently exists for this disease which threatens global banana production. Although disease resistance exists in some wild bananas, attempts to introduce resistance into commercially acceptable bananas by conventional breeding have been hampered by low fertility, long generation times and association of poor agronomical traits with resistance genes. With the advent of reliable banana transformation protocols, molecular breeding is now regarded as a viable alternative strategy to generate disease-resistant banana plants. Recently, a novel strategy involving the expression of anti-apoptosis genes in plants was shown to result in resistance against several necrotrophic fungi. Further, the transgenic plants showed increased resistance to a range of abiotic stresses. In this thesis, the use of anti-apoptosis genes to generate transgenic banana plants with resistance to Fusarium wilt was investigated. Since water stress is an important abiotic constraint to banana production, the resistance of the transgenic plants to water stress was also examined. Embryogenic cell suspensions (ECS) of two commercially important banana cultivars, Grand Naine (GN) and Lady Finger (LF), were transformed using Agrobacterium with the anti-apoptosis genes, Bcl-xL, Bcl-xL G138A, Ced-9 and Bcl- 2 3’ UTR. An interesting, and potentially important, outcome was that the use of anti-apoptosis genes resulted in up to a 50-fold increase in Agrobacterium-mediated transformation efficiency of both LF and GN cells over vector controls. Regenerated plants were subjected to a complete molecular characterisation in order to detect the presence of the transgene (PCR), transcript (RT-PCR) and gene product (Western blot) and to determine the gene copy number (Southern blot). A total of 36 independently-transformed GN lines (8 x Bcl-xL, 5 x Bcl-xL G138A, 15 x Ced-9 and 8 x Bcl-2 3’ UTR) and 41 independently-transformed LF lines (8 x Bcl-xL, 7 x BclxL G138A, 13 x Ced-9 and 13 x Bcl-2 3’ UTR) were identified. The 41 transgenic LF lines were multiplied and clones from each line were acclimatised and grown under glasshouse conditions for 8 weeks to allow monitoring for phenotypic abnormalities. Plants derived from 3 x Bcl-xL, 2 x Ced-9 and 5 x Bcl-2 3’ UTR lines displayed a variety of aberrant phenotypes. However, all but one of these abnormalities were off-types commonly observed in tissue-cultured, non-transgenic banana plants and were therefore unlikely to be transgene-related. Prior to determining the resistance of the transgenic plants to Foc race 1, the apoptotic effects of the fungus on both wild-type and Bcl-2 3’ UTR-transgenic LF banana cells were investigated using rapid in vitro root assays. The results from these assays showed that apoptotic-like cell death was elicited in wild-type banana root cells as early as 6 hours post-exposure to fungal spores. In contrast, these effects were attenuated in the root cells of Bcl-2 3’ UTR-transgenic lines that were exposed to fungal spores. Thirty eight of the 41 transgenic LF lines were subsequently assessed for resistance to Foc race 1 in small-plant glasshouse bioassays. To overcome inconsistencies in rating the internal (vascular discolouration) disease symptoms, a MatLab-based computer program was developed to accurately and reliably assess the level of vascular discolouration in banana corms. Of the transgenic LF banana lines challenged with Foc race 1, 2 x Bcl-xL, 3 x Ced-9, 2 x Bcl-2 3’ UTR and 1 x Bcl-xL G138A-transgenic line were found to show significantly less external and internal symptoms than wild-type LF banana plants used as susceptible controls at 12 weeks post-inoculation. Of these lines, Bcl-2 3’ UTR-transgenic line #6 appeared most resistant, displaying very mild symptoms similar to the wild-type Cavendish banana plants that were included as resistant controls. This line remained resistant for up to 23 weeks post-inoculation. Since anti-apoptosis genes have been shown to confer resistance to various abiotic stresses in other crops, the ability of these genes to confer resistance against water stress in banana was also investigated. Clonal plants derived from each of the 38 transgenic LF banana plants were subjected to water stress for a total of 32 days. Several different lines of transgenic plants transformed with either Bcl-xL, Bcl-xL G138A, Ced-9 or Bcl-2 3’ UTR showed a delay in visual water stress symptoms compared with the wild-type control plants. These plants all began producing new growth from the pseudostem following daily rewatering for one month. In an attempt to determine whether the protective effect of anti-apoptosis genes in transgenic banana plants was linked with reactive oxygen species (ROS)-associated programmed cell death (PCD), the effect of the chloroplast-targeting, ROS-inducing herbicide, Paraquat, on wild-type and transgenic LF was investigated. When leaf discs from wild-type LF banana plants were exposed to 10 ìM Paraquat, complete decolourisation occurred after 48 hours which was confirmed to be associated with cell death and ROS production by trypan blue and 3,3-diaminobenzidine (DAB) staining, respectively. When leaf discs from the transgenic lines were exposed to Paraquat, those derived from some lines showed a delay in decolourisation, suggesting only a weak protective effect from the transgenes. Finally, the protective effect of anti-apoptosis genes against juglone, a ROS-inducing phytotoxin produced by the causal agent of black Sigatoka, Mycosphaerella fijiensis, was investigated. When leaf discs from wild-type LF banana plants were exposed to 25 ppm juglone, complete decolourisation occurred after 48 hours which was again confirmed to be associated with cell death and ROS production by trypan blue and DAB staining, respectively. Further, TdT-mediated dUTP nick-end labelling (TUNEL) assays on these discs suggested that the cell death was apoptotic. When leaf discs from the transgenic lines were exposed to juglone, discs from some lines showed a clear delay in decolourisation, suggesting a protective effect. Whether these plants are resistant to black Sigatoka is unknown and will require future glasshouse and field trials. The work presented in this thesis provides the first report of the use of anti-apoptosis genes as a strategy to confer resistance to Fusarium wilt and water stress in a nongraminaceous monocot, banana. Such a strategy may be exploited to generate resistance to necrotrophic pathogens and abiotic stresses in other economically important crop plants.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

There has been a worldwide trend to increase axle loads and train speeds. This means that railway track degradation will be accelerated, and track maintenance costs will be increased significantly. There is a need to investigate the consequences of increasing traffic load. The aim of the research is to develop a model for the analysis of physical degradation of railway tracks in response to changes in traffic parameters, especially increased axle loads and train speeds. This research has developed an integrated track degradation model (ITDM) by integrating several models into a comprehensive framework. Mechanistic relationships for track degradation hav~ ?een used wherever possible in each of the models contained in ITDM. This overcc:mes the deficiency of the traditional statistical track models which rely heavily on historical degradation data, which is generally not available in many railway systems. In addition statistical models lack the flexibility of incorporating future changes in traffic patterns or maintenance practices. The research starts with reviewing railway track related studies both in Australia and overseas to develop a comprehensive understanding of track performance under various traffic conditions. Existing railway related models are then examined for their suitability for track degradation analysis for Australian situations. The ITDM model is subsequently developed by modifying suitable existing models, and developing new models where necessary. The ITDM model contains four interrelated submodels for rails, sleepers, ballast and subgrade, and track modulus. The rail submodel is for rail wear analysis and is developed from a theoretical concept. The sleeper submodel is for timber sleepers damage prediction. The submodel is developed by modifying and extending an existing model developed elsewhere. The submodel has also incorporated an analysis for the likelihood of concrete sleeper cracking. The ballast and subgrade submodel is evolved from a concept developed in the USA. Substantial modifications and improvements have been made. The track modulus submodel is developed from a conceptual method. Corrections for more global track conditions have been made. The integration of these submodels into one comprehensive package has enabled the interaction between individual track components to be taken into account. This is done by calculating wheel load distribution with time and updating track conditions periodically in the process of track degradation simulation. A Windows-based computer program ~ssociated with ITDM has also been developed. The program enables the user to carry out analysis of degradation of individual track components and to investigate the inter relationships between these track components and their deterioration. The successful implementation of this research has provided essential information for prediction of increased maintenance as a consequence of railway trackdegradation. The model, having been presented at various conferences and seminars, has attracted wide interest. It is anticipated that the model will be put into practical use among Australian railways, enabling track maintenance planning to be optimized and potentially saving Australian railway systems millions of dollars in operating costs.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Environmental education is a field which has only come of age since the late nineteen sixties. While its content and practice have been widely debated and researched, its leadership has been minimally studied and, therefore, is only partially understood. The role of mentoring in the development of leaders has been alluded to, but has attracted scant research. Therefore, this study explores the importance of mentoring during the personal and professional development of leaders in environmental education. Four major research questions were investigated. Firstly, have leaders been men to red during their involvement with environmental education? Secondly, when and how has that mentoring taken place? Thirdly, what was the personal and professional effectiveness of the mentoring relationship? Fourthly, is there any continuation of the mentoring process which might be appropriate for professional development within the field of environmental education? Leaders were solicited from a broad field of environmental educators including teachers, administrators, academics, natural resource personnel, business and community persons. They had to be recognized as active leaders across several environmental education networks. The research elicited qualitative and quantitative survey data from fifty seven persons in Queensland, Australia and Colorado, USA. Seventeen semi-structured interviews were subsequently conducted with selected leaders who had nominated their mentors. This led to a further thirteen 'linked interviews' with some of the mentors' mentors and new mentorees. The interview data is presented as four cases reflecting pairs, triads, chains and webs of relationships- a major finding of the research process. The analysis of the data from the interviews and the surveys was conducted according to a grounded theory approach and was facilitated by NUD.IST, a computer program for non-numerical text analysis. The findings of the study revealed many variations on the classical mentoring patterns found in the literature. Gender and age were not seen as mportant factors, as there were examples of contemporaries in age, older men to younger women, older women to younger men, and women to women. Personal compatibility, professional respect and philosophical congruence were critical. Mentoring was initiated from early, mid and late career stages with the average length of the relationship being fourteen years. There was seldom an example of the mentoree using the mentor for hierarchical career climbing, although frequent career changes were made. However, leadership actions were found to increase after the intervention of a mentoring relationship. Three major categories of informal mentoring were revealed - perceived,acknowledged and deliberate. Further analysis led to the evolution of the core concept, a 'cascade of influence'. The major finding of this study was that this sample of leaders, mentors and new mentorees moved from the perception of having been mentored to the acknowledgment of these relationships and an affirmation of their efficacy for both personal and professional growth. Hence, the participants were more likely to continue future mentoring, not as a serendipitous happening, but through a deliberate choice. Heightened awareness and more frequent 'cascading' of mentoring have positive implications for the professional development of future leaders in environmental education in both formal and informal settings. Effective mentoring in environmental education does not seek to create 'clones' of the mentors, but rather to foster the development of autonomous mentorees who share a philosophical grounding. It is a deliberate invitation to 'join the clan'.

Relevância:

80.00% 80.00%

Publicador:

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Usability in HCI (Human-Computer Interaction) is normally understood as the simplicity and clarity with which the interaction with a computer program or a web site is designed. Identity management systems need to provide adequate usability and should have a simple and intuitive interface. The system should not only be designed to satisfy service provider requirements but it has to consider user requirements, otherwise it will lead to inconvenience and poor usability for users when managing their identities. With poor usability and a poor user interface with regard to security, it is highly likely that the system will have poor security. The rapid growth in the number of online services leads to an increasing number of different digital identities each user needs to manage. As a result, many people feel overloaded with credentials, which in turn negatively impacts their ability to manage them securely. Passwords are perhaps the most common type of credential used today. To avoid the tedious task of remembering difficult passwords, users often behave less securely by using low entropy and weak passwords. Weak passwords and bad password habits represent security threats to online services. Some solutions have been developed to eliminate the need for users to create and manage passwords. A typical solution is based on generating one-time passwords, i.e. passwords for single session or transaction usage. Unfortunately, most of these solutions do not satisfy scalability and/or usability requirements, or they are simply insecure. In this thesis, the security and usability aspects of contemporary methods for authentication based on one-time passwords (OTP) are examined and analyzed. In addition, more scalable solutions that provide a good user experience while at the same time preserving strong security are proposed.