225 resultados para binary mask
Resumo:
Objectives: This study examines the hypothesis that a past history of heart interventions will moderate the relationship between psychosocial factors (stressful life events, social support, perceived stress, having a current partner, having a past diagnosis of depression or anxiety over the past 3 years, time pressure, education level, and the mental health index) and the presence of chest pain in a sample of older women. Design: Longitudinal survey over a 3-year period. Methods: The sample was taken from a prospective cohort study of 10,432 women initially aged between 70 and 75 years, who were surveyed in 1996 and then again in 1999. Two groups of women were identified: those reporting to have heart disease but no past history of heart interventions (i.e., coronary artery bypass graft/angioplasty) and those reporting to have heart disease with a past history of heart interventions. Results: Binary logistic regression analysis was used to show that for the women with self-reported coronary heart disease but without a past history of heart intervention, feelings of time pressure as well as the number of stressful life events experienced in the 12 months prior to 1996 were independent risk factors for the presence of chest pain, even after accounting for a range of traditional risk factors. In comparison, for the women with self-reported coronary heart disease who did report a past history of heart interventions, a diagnosis of depression in the previous 3 years was the significant independent risk factor for chest pain even after accounting for traditional risk factors. Conclusion: The results indicate that it is important to consider a history of heart interventions as a moderator of the associations between psychosocial variables and the frequency of chest pain in older women. Statement of Contribution: What is already known on this subject? Psychological factors have been shown to be independent predictors of a range of health outcomes in individuals with coronary heart disease, including the presence of chest pain. Most research has been conducted with men or with small samples of women; however, the evidence does suggest that these relationships exist in women as well as in men. What does this study add? Most studies have looked at overall relationships between psychological variables and health outcomes. The few studies that have looked at moderators have mainly examined gender as a moderator. To our knowledge, this is the first published study to examine a history of heart interventions as a moderator of the relationship between psychological variables and the presence of chest pain.
Resumo:
This research identifies residential mobility behaviour impacts of residential dissonance in Transit Oriented Developments (TODs) vs. non-TODs in Brisbane, Australia. Based on the characteristics of living environments (density, diversity, connectivity, and accessibility) and the travel preferences of 4545 individuals, respondents in 2009 were classified into one of four categories including: TOD consonants, TOD dissonants, non-TOD dissonants, and non-TOD consonants. Binary logistic regression analyses were employed to identify residential mobility behaviour of groups between 2009 and 2011; controlling for time varying covariates. The findings show that both TOD dissonants and TOD consonants move residences at an equal rate. However, TOD dissonants are more likely to move residences to their preferred non-TOD areas. In contrast, non-TOD dissonants not only moved residences at a lower rate, but their rate of mobility to their preferred TOD neighbourhood is also significantly lower due to costs and other associated factors. The findings suggest that discrete land use policy development is required to integrate non-TOD dissonant and TOD dissonant behaviours to support TOD development in Brisbane.
Resumo:
Dhaka, which is the capital of Bangladesh, is facing serious traffic congestion and whole traffic situation in Dhaka is in chaos. Government has initiated some projects; such as BRT, MRT and elevated expressway; to improve the situation. Road pricing is very popular concept, which can be implemented in Dhaka with BRT and MRT as an integrated manner. Even though it is very popular concept not many countries except some developed countries implemented road pricing practically. None of the developing countries adopted this policy. For success of road pricing it has to be acceptable among the stakeholders. Public are the main stakeholders for road pricing. This paper will explore whether road pricing will be acceptable in Dhaka considering only work trip in Dhaka. A sample of workers had been surveyed randomly. They were asked some demographic questions, such as age, gender, income and educational qualification; how they travelled to work; and whether they would accept road pricing; and if they would not accept road pricing the reasons behind that. Also respondents were given several hypothetical choices to see how respondents react with different road charge by choosing travel mode for their work trip. The methodological approach taken for analysis is qualitative and quantitative analysis. For quantitative analysis Binary Logit Regression analysis was carried out to find out the significant factors for accepting or not accepting road pricing.
Resumo:
miRDeep and its varieties are widely used to quantify known and novel micro RNA (miRNA) from small RNA sequencing (RNAseq). This article describes miRDeep*, our integrated miRNA identification tool, which is modeled off miRDeep, but the precision of detecting novel miRNAs is improved by introducing new strategies to identify precursor miRNAs. miRDeep* has a user-friendly graphic interface and accepts raw data in FastQ and Sequence Alignment Map (SAM) or the binary equivalent (BAM) format. Known and novel miRNA expression levels, as measured by the number of reads, are displayed in an interface, which shows each RNAseq read relative to the pre-miRNA hairpin. The secondary pre-miRNA structure and read locations for each predicted miRNA are shown and kept in a separate figure file. Moreover, the target genes of known and novel miRNAs are predicted using the TargetScan algorithm, and the targets are ranked according to the confidence score. miRDeep* is an integrated standalone application where sequence alignment, pre-miRNA secondary structure calculation and graphical display are purely Java coded. This application tool can be executed using a normal personal computer with 1.5 GB of memory. Further, we show that miRDeep* outperformed existing miRNA prediction tools using our LNCaP and other small RNAseq datasets. miRDeep* is freely available online at http://www.australianprostatecentre.org/research/software/mirdeep-star
Resumo:
Background subtraction is a fundamental low-level processing task in numerous computer vision applications. The vast majority of algorithms process images on a pixel-by-pixel basis, where an independent decision is made for each pixel. A general limitation of such processing is that rich contextual information is not taken into account. We propose a block-based method capable of dealing with noise, illumination variations, and dynamic backgrounds, while still obtaining smooth contours of foreground objects. Specifically, image sequences are analyzed on an overlapping block-by-block basis. A low-dimensional texture descriptor obtained from each block is passed through an adaptive classifier cascade, where each stage handles a distinct problem. A probabilistic foreground mask generation approach then exploits block overlaps to integrate interim block-level decisions into final pixel-level foreground segmentation. Unlike many pixel-based methods, ad-hoc postprocessing of foreground masks is not required. Experiments on the difficult Wallflower and I2R datasets show that the proposed approach obtains on average better results (both qualitatively and quantitatively) than several prominent methods. We furthermore propose the use of tracking performance as an unbiased approach for assessing the practical usefulness of foreground segmentation methods, and show that the proposed approach leads to considerable improvements in tracking accuracy on the CAVIAR dataset.
Resumo:
Many state of the art vision-based Simultaneous Localisation And Mapping (SLAM) and place recognition systems compute the salience of visual features in their environment. As computing salience can be problematic in radically changing environments new low resolution feature-less systems have been introduced, such as SeqSLAM, all of which consider the whole image. In this paper, we implement a supervised classifier system (UCS) to learn the salience of image regions for place recognition by feature-less systems. SeqSLAM only slightly benefits from the results of training, on the challenging real world Eynsham dataset, as it already appears to filter less useful regions of a panoramic image. However, when recognition is limited to specific image regions performance improves by more than an order of magnitude by utilising the learnt image region saliency. We then investigate whether the region salience generated from the Eynsham dataset generalizes to another car-based dataset using a perspective camera. The results suggest the general applicability of an image region salience mask for optimizing route-based navigation applications.
Resumo:
Objective: To establish risk factors for moderate and severe microbial keratitis among daily contact lens (CL) wearers in Australia. Design: A prospective, 12-month, population-based, case-control study. Participants: New cases of moderate and severe microbial keratitis in daily wear CL users presenting in Australia over a 12-month period were identified through surveillance of all ophthalmic practitioners. Case detection was augmented by record audits at major ophthalmic centers. Controls were users of daily wear CLs in the community identified using a national telephone survey. Testing: Cases and controls were interviewed by telephone to determine subject demographics and CL wear history. Multiple binary logistic regression was used to determine independent risk factors and univariate population attributable risk percentage (PAR%) was estimated for each risk factor.; Main Outcome Measures: Independent risk factors, relative risk (with 95% confidence intervals [CIs]), and PAR%. Results: There were 90 eligible moderate and severe cases related to daily wear of CLs reported during the study period. We identified 1090 community controls using daily wear CLs. Independent risk factors for moderate and severe keratitis while adjusting for age, gender, and lens material type included poor storage case hygiene 6.4× (95% CI, 1.9-21.8; PAR, 49%), infrequent storage case replacement 5.4× (95% CI, 1.5-18.9; PAR, 27%), solution type 7.2× (95% CI, 2.3-22.5; PAR, 35%), occasional overnight lens use (<1 night per week) 6.5× (95% CI, 1.3-31.7; PAR, 23%), high socioeconomic status 4.1× (95% CI, 1.2-14.4; PAR, 31%), and smoking 3.7× (95% CI, 1.1-12.8; PAR, 31%). Conclusions: Moderate and severe microbial keratitis associated with daily use of CLs was independently associated with factors likely to cause contamination of CL storage cases (frequency of storage case replacement, hygiene, and solution type). Other factors included occasional overnight use of CLs, smoking, and socioeconomic class. Disease load may be considerably reduced by attention to modifiable risk factors related to CL storage case practice.
Resumo:
The selection of optimal camera configurations (camera locations, orientations etc.) for multi-camera networks remains an unsolved problem. Previous approaches largely focus on proposing various objective functions to achieve different tasks. Most of them, however, do not generalize well to large scale networks. To tackle this, we introduce a statistical formulation of the optimal selection of camera configurations as well as propose a Trans-Dimensional Simulated Annealing (TDSA) algorithm to effectively solve the problem. We compare our approach with a state-of-the-art method based on Binary Integer Programming (BIP) and show that our approach offers similar performance on small scale problems. However, we also demonstrate the capability of our approach in dealing with large scale problems and show that our approach produces better results than 2 alternative heuristics designed to deal with the scalability issue of BIP.
Resumo:
This thesis examines online spoof videos in China. It shows the relationship between user-created content and change and how such videos are impacting on social memory. In the West, we are witnessing two outstanding trends in media. On the one hand, media are turning more "demotic" (Turner, 2006) and "participatory" (Jenkins, 2006), whereby lay audiences use popular media for identity formation, representation and association, reconfiguring the media and cultural landscape, and rendering invalid the old paradigm based on the dichotomy of audience and author, creator and consumer, expert and amateur. On the other hand, in both mainstream media and user-creation online there is a trend towards "silly citizenship", with comedy, send-ups and spoofs that used to reside in the margin propelled to the central stage in both pleasure and politics (Hartley, 2010), as is shown in the rising popularity of the Daily Show, Colbert Report, and spoof videos in elections ,e.g. the 2008 presidential election in US (Gray, Jones, & Thompson, 2009; Tryon, 2008). User generated content—and spoof subcultures—is now much a debated phenomenon in China. However, with different political (one party rule and censorship) and cultural (media regarded mainly as instrument for education and social stabilization instead of a critical fourth estate) configurations, will the social and cultural impacts of the two trends in the West be as the same in China? If not, what will be the specificities in the China context? The project starts with a historical review of popular culture and user-created content in China, before turning to spoof videos and looking at how they are produced and shared, travel and diffused on the Internet, and how the communities and sub-cultures forming and emerging around spoof videos are changing the overall cultural landscape in China. By acting as a participant observer in online video sharing sites and conducting face-to face as well as online interviews, I identify lead users and creators of spoof videos and the social networks emerging around them. I call these lead users "skill hubs" and their networks "liquid communities", foregrounding the fact that their appeal doesn’t come from their amicable personality, but rather from their creative skills; and that the networks surrounding them are in a permanent flux, with members coming and going as they see fit. I argue that the "liquidness" (Bauman, 2000) of these communities is what makes them constantly creative and appealing. Textual analysis of online videos, their comments and derivatives are conducted to tease out the uses that that can be made of spoof videos, namely as phatic communication, as alternative memory and as political engagement. Through these analyses I show that spoof videos constitute not only a space where young generations can engage with each other, communicate their anger and dissatisfaction, fun and hope, and where they participate in socio-cultural and political debates, but also create a space where they can experiment with their new skills, new ideas, and new citizenship. The rise of spoof videos heralds the beginning of a trend in popular culture in contemporary China towards the "canonization of the jester" and the dethroning of the establishment. I also argue that a historical perspective is needed to understand the current surge of use creativity and user activism in China, and that many forms of popular media we experience today have their antecedents in various stages of Chinese history. The entrenched "control-resistance" binary is inadequate in interpreting the rich, flux and multilayered Internet space in China.
Resumo:
In the last decade, smartphones have gained widespread usage. Since the advent of online application stores, hundreds of thousands of applications have become instantly available to millions of smart-phone users. Within the Android ecosystem, application security is governed by digital signatures and a list of coarse-grained permissions. However, this mechanism is not fine-grained enough to provide the user with a sufficient means of control of the applications' activities. Abuse of highly sensible private information such as phone numbers without users' notice is the result. We show that there is a high frequency of privacy leaks even among widely popular applications. Together with the fact that the majority of the users are not proficient in computer security, this presents a challenge to the engineers developing security solutions for the platform. Our contribution is twofold: first, we propose a service which is able to assess Android Market applications via static analysis and provide detailed, but readable reports to the user. Second, we describe a means to mitigate security and privacy threats by automated reverse-engineering and refactoring binary application packages according to the users' security preferences.
Resumo:
Fouling of industrial surfaces by silica and calcium oxalate can be detrimental to a number of process streams. Solution chemistry plays a large roll in the rate and type of scale formed on industrial surfaces. This study is on the kinetics and thermodynamics of SiO2 and calcium oxalate composite formation in solutions containing Mg2+ ions, trans-aconitic acid and sucrose, to mimic factory sugar cane juices. The induction time (ti) of silicic acid polymerization is found to be dependent on the sucrose concentration and SiO2 supersaturation ratio (SS). Generalized kinetic and solubility models are developed for SiO2 and calcium oxalate in binary systems using response surface methodology. The role of sucrose, Mg, trans-aconitic acid, a mixture of Mg and trans-aconitic acid, SiO2 SS ratio and Ca in the formation of com- posites is explained using the solution properties of these species including their ability to form complexes.
Resumo:
Since the introduction of Medicare in 1984, the proportion of the Australian population with private health insurance has declined considerably. Insurance for health care consumption is compulsory for the public health sector but optional for the private health sector. In this paper, we explore a number of important issues in the demand for private health insurance in Australia. The socio-economic variables which influence demand are examined using a binary logic model. A number of simulations are performed to highlight the influence and relative importance of various characteristics such as age, income, health status and geographical location on demand. A number of important policy issues in the private health insurance market are highlighted. First, evidence is provided of adverse selection in the private health insurance pool, second, the notion of the wealthy uninsured is refuted, and finally it is confirmed that there are significant interstate differences in the demand for private health insurance.
Resumo:
Eleven Pro-Am curators of Australian television history were interviewed about their practice. The data helps us to understand the relationship between professional and Pro-Am approaches to Australian television history. There is no simple binary – the lines are blurred – but there are some differences. Pro-Am curators of Australian television history are not paid for their work and present other motivations for practice – particularly being that ‘weird child’ who was obsessed with gathering information and objects related to television. They have freedom to curate only programs and genres that interest them, and they tend to collect merchandise as much as program texts themselves. And they have less interest in formally cataloguing their material than do professional curators of Australian television history.
Resumo:
Abstract: Texture enhancement is an important component of image processing, with extensive application in science and engineering. The quality of medical images, quantified using the texture of the images, plays a significant role in the routine diagnosis performed by medical practitioners. Previously, image texture enhancement was performed using classical integral order differential mask operators. Recently, first order fractional differential operators were implemented to enhance images. Experiments conclude that the use of the fractional differential not only maintains the low frequency contour features in the smooth areas of the image, but also nonlinearly enhances edges and textures corresponding to high-frequency image components. However, whilst these methods perform well in particular cases, they are not routinely useful across all applications. To this end, we applied the second order Riesz fractional differential operator to improve upon existing approaches of texture enhancement. Compared with the classical integral order differential mask operators and other fractional differential operators, our new algorithms provide higher signal to noise values, which leads to superior image quality.
Resumo:
This paper explores the similarities and differences between bicycle and motorcycle crashes with other motor vehicles. If similar treatments can be effective for both bicycle and motorcycle crashes, then greater benefits in terms crash costs saved may be possible for the same investment in treatments. To reduce the biases associated with under-reporting of these crashes to police, property damage and minor injury crashes were excluded. The most common crash type for both bicycles (31.1%) and motorcycles (24.5%) was intersection from adjacent approaches. Drivers of other vehicles were coded most at fault in the majority of two-unit bicycle (57.0%) and motorcycle crashes (62.7%). The crash types, patterns of fault and factors affecting fault were generally similar for bicycle and motorcycle crashes. This confirms the need to combat the factors contributing to failure of other drivers to yield right of way to two-wheelers, and suggest that some of these actions should prove beneficial to the safety of both motorized and non-motorized two-wheelers. In contrast, child bicyclists were more often at fault, particularly in crashes involving a vehicle leaving the driveway or footpath. The greater reporting of violations by riders and drivers in motorcycle crashes also deserves further investigation.