247 resultados para Basis-set
Resumo:
In Roberts v Prendergast [2013] QCA 89 the respondent had offered to settle the appeal, purporting to make the offer under Chapter 9 Part 5 of the Uniform Civil Procedure Rules 1999 (Qld) (UCPR). Differing views were expressed in the Court of Appeal regarding the impact in the circumstances of the offer to settle, with the majority concluding that the appellant should pay the respondent’s costs on the standard basis.
Resumo:
Australia lacks a satisfactory, national paradigm for assessing legal capacity in the context of testamentary, enduring power of attorney and advance care directive documents. Capacity assessments are currently conducted on an ad hoc basis by legal and/or medical professionals. The reliability of the assessment process is subject to the skill set and mutual understanding of the legal and/or medical professional conducting the assessment. There is a growth in the prevalence of diseases such as dementia. Such diseases impact upon cognition which increasingly necessitates collaboration between the legal and medical professions when assessing the effect of mentally disabling conditions upon legal capacity. Miscommunication and lack of understanding between legal and medical professionals involved could impede the development of a satisfactory paradigm. This article will discuss legal capacity assessment in Australia and how to strengthen the relationship between legal and medical professionals involved in capacity assessments. The development of a national paradigm would promote consistency and transparency of process, helping to improve the professional relationship and maximising the principles of autonomy, participation and dignity.
Resumo:
Textual document set has become an important and rapidly growing information source in the web. Text classification is one of the crucial technologies for information organisation and management. Text classification has become more and more important and attracted wide attention of researchers from different research fields. In this paper, many feature selection methods, the implement algorithms and applications of text classification are introduced firstly. However, because there are much noise in the knowledge extracted by current data-mining techniques for text classification, it leads to much uncertainty in the process of text classification which is produced from both the knowledge extraction and knowledge usage, therefore, more innovative techniques and methods are needed to improve the performance of text classification. It has been a critical step with great challenge to further improve the process of knowledge extraction and effectively utilization of the extracted knowledge. Rough Set decision making approach is proposed to use Rough Set decision techniques to more precisely classify the textual documents which are difficult to separate by the classic text classification methods. The purpose of this paper is to give an overview of existing text classification technologies, to demonstrate the Rough Set concepts and the decision making approach based on Rough Set theory for building more reliable and effective text classification framework with higher precision, to set up an innovative evaluation metric named CEI which is very effective for the performance assessment of the similar research, and to propose a promising research direction for addressing the challenging problems in text classification, text mining and other relative fields.
Resumo:
Fire incident in buildings is common, so the fire safety design of the framed structure is imperative, especially for the unprotected or partly protected bare steel frames. However, software for structural fire analysis is not widely available. As a result, the performance-based structural fire design is urged on the basis of using user-friendly and conventional nonlinear computer analysis programs so that engineers do not need to acquire new structural analysis software for structural fire analysis and design. The tool is desired to have the capacity of simulating the different fire scenarios and associated detrimental effects efficiently, which includes second-order P-D and P-d effects and material yielding. Also the nonlinear behaviour of large-scale structure becomes complicated when under fire, and thus its simulation relies on an efficient and effective numerical analysis to cope with intricate nonlinear effects due to fire. To this end, the present fire study utilizes a second order elastic/plastic analysis software NIDA to predict structural behaviour of bare steel framed structures at elevated temperatures. This fire study considers thermal expansion and material degradation due to heating. Degradation of material strength with increasing temperature is included by a set of temperature-stress-strain curves according to BS5950 Part 8 mainly, which implicitly allows for creep deformation. This finite element stiffness formulation of beam-column elements is derived from the fifth-order PEP element which facilitates the computer modeling by one member per element. The Newton-Raphson method is used in the nonlinear solution procedure in order to trace the nonlinear equilibrium path at specified elevated temperatures. Several numerical and experimental verifications of framed structures are presented and compared against solutions in literature. The proposed method permits engineers to adopt the performance-based structural fire analysis and design using typical second-order nonlinear structural analysis software.
Resumo:
This paper emphasizes material nonlinear effects on composite beams with recourse to the plastic hinge method. Numerous combinations of steel and concrete sections form arbitrary composite sections. Secondly, the material properties of composite beams vary remarkably across its section from ductile steel to brittle concrete. Thirdly, concrete is weak in tension, so composite section changes are dependent on load distribution. To this end, the plastic zone approach is convenient for inelastic analysis of composite sections that can evaluate member resistance, including material nonlinearities, by routine numerical integration with respect to every fiber across the composite section. As a result, many researchers usually adopt the plastic zone approach for numerical inelastic analyses of composite structures. On the other hand, the plastic hinge method describes nonlinear material behaviour of an overall composite section integrally. Consequently, proper section properties for use in plastic hinge spring stiffness are required to represent the material behaviour across the arbitrary whole composite section. In view of numerical efficiency and convergence, the plastic hinge method is superior to the plastic zone method. Therefore, based on the plastic hinge approach, how to incorporate the material nonlinearities of the arbitrary composite section into the plastic hinge stiffness formulation becomes a prime objective of the present paper. The partial shear connection in this paper is by virtue of the effective flexural rigidity as AISC 1993 [American Institute of Steel Construction (AISC). Load and resistance factor design specifications. 2nd ed., Chicago; 1993]. Nonlinear behaviour of different kinds of composite beam is investigated in this paper, including two simply supported composite beams, a cantilever and a two span continuous composite beam.
Resumo:
Process mining has developed into a popular research discipline and nowadays its associated techniques are widely applied in practice. What is currently ill-understood is how the success of a process mining project can be measured and what the antecedent factors of process mining success are. We consider an improved, grounded understanding of these aspects of value to better manage the effectiveness and efficiency of process mining projects in practice. As such, we advance a model, tailored to the characteristics of process mining projects, which identifies and relates success factors and measures. We draw inspiration from the literature from related fields for the construction of a theoretical, a priori model. That model has been validated and re-specified on the basis of a multiple case study, which involved four industrial process mining projects. The unique contribution of this paper is that it presents the first set of success factors and measures on the basis of an analysis of real process mining projects. The presented model can also serve as a basis for further extension and refinement using insights from additional analyses.
Resumo:
Histological analysis of gill samples taken from individuals of Latris lineata reared in aquaculture in Tasmania, Australia, and those sampled from the wild revealed the presence of epitheliocystis-like basophilic inclusions. Subsequent morphological, in situ hybridization, and molecular analyses were performed to confirm the presence of this disease and discovered a Chlamydia-like organism associated with this condition, and the criteria set by Fredericks and Relman's postulates were used to establish disease causation. Three distinct 16S rRNA genotypes were sequenced from 16 fish, and phylogenetic analyses of the nearly full-length 16S rRNA sequences generated for this bacterial agent indicated that they were nearly identical novel members of the order Chlamydiales. This new taxon formed a well-supported clade with "Candidatus Parilichlamydia carangidicola" from the yellowtail kingfish (Seriola lalandi). On the basis of sequence divergence over the 16S rRNA region relative to all other members of the order Chlamydiales, a new genus and species are proposed here for the Chlamydia-like bacterium from L. lineata, i.e., "Candidatus Similichlamydia latridicola" gen. nov., sp. nov.
Resumo:
We present a technique for delegating a short lattice basis that has the advantage of keeping the lattice dimension unchanged upon delegation. Building on this result, we construct two new hierarchical identity-based encryption (HIBE) schemes, with and without random oracles. The resulting systems are very different from earlier lattice-based HIBEs and in some cases result in shorter ciphertexts and private keys. We prove security from classic lattice hardness assumptions.
Resumo:
In Thomas Mann’s tetralogy of the 1930s and 1940s, Joseph and His Brothers, the narrator declares history is not only “that which has happened and that which goes on happening in time,” but it is also “the stratified record upon which we set our feet, the ground beneath us.” By opening up history to its spatial, geographical, and geological dimensions Mann both predicts and encapsulates the twentieth-century’s “spatial turn,” a critical shift that divested geography of its largely passive role as history’s “stage” and brought to the fore intersections between the humanities and the earth sciences. In this paper, I draw out the relationships between history, narrative, geography, and geology revealed by this spatial turn and the questions these pose for thinking about the disciplinary relationship between geography and the humanities. As Mann’s statement exemplifies, the spatial turn itself has often been captured most strikingly in fiction, and I would argue nowhere more so than in Graham Swift’s Waterland (1983) and Anne Michaels’s Fugitive Pieces (1996), both of which present space, place, and landscape as having a palpable influence on history and memory. The geographical/geological line that runs through both Waterland and Fugitive Pieces continues through Tim Robinson’s non-fictional, two-volume “topographical” history Stones of Aran. Robinson’s Stones of Aran—which is not history, not geography, and not literature, and yet is all three—constructs an imaginative geography that renders inseparable geography, geology, history, memory, and the act of writing.
Resumo:
Numeric set watermarking is a way to provide ownership proof for numerical data. Numerical data can be considered to be primitives for multimedia types such as images and videos since they are organized forms of numeric information. Thereby, the capability to watermark numerical data directly implies the capability to watermark multimedia objects and discourage information theft on social networking sites and the Internet in general. Unfortunately, there has been very limited research done in the field of numeric set watermarking due to underlying limitations in terms of number of items in the set and LSBs in each item available for watermarking. In 2009, Gupta et al. proposed a numeric set watermarking model that embeds watermark bits in the items of the set based on a hash value of the items’ most significant bits (MSBs). If an item is chosen for watermarking, a watermark bit is embedded in the least significant bits, and the replaced bit is inserted in the fractional value to provide reversibility. The authors show their scheme to be resilient against the traditional subset addition, deletion, and modification attacks as well as secondary watermarking attacks. In this paper, we present a bucket attack on this watermarking model. The attack consists of creating buckets of items with the same MSBs and determine if the items of the bucket carry watermark bits. Experimental results show that the bucket attack is very strong and destroys the entire watermark with close to 100% success rate. We examine the inherent weaknesses in the watermarking model of Gupta et al. that leave it vulnerable to the bucket attack and propose potential safeguards that can provide resilience against this attack.
Resumo:
Transposable elements, which are DNA sequences that can move between different sites in genomes, comprise approximately 40% of the genome of mammals and are emerging as important contributors to biological diversity. Here we report a transcription unit lying within intron 1 of the murine Magi1 (membrane associated guanylate kinase inverted 1) gene that codes for a cell-cell junction scaffolding protein. The transcription unit, termed Magi1OS (Magi1 Opposite Strand), originates from a region with tandem B1 short interspersed nuclear elements (SINEs) and is an antisense gene to Magi1. Mag1OS transcription initiates in a proximal B1 element that shows only 4% divergence from the consensus sequence, indicating that it has been recently inserted into the mouse genome and could be replication competent. Moreover, a chimaeric transcript may result from intra-chromosomal interaction and trans-splicing of the Magi1 antisense transcript (Magi1OS) and Ghrl, which codes for the multifunctional peptide hormone ghrelin. These two genes are 20 megabases apart on chromosome 6 and are transcribed in opposite directions. We propose that the Magi1OS locus may serve as a useful model system to study exaptation and retrotransposition of B1 SINEs, as well as to examine the mechanisms of intra-chromosomal trans-splicing.
Resumo:
Motivated by the need of private set operations in a distributed environment, we extend the two-party private matching problem proposed by Freedman, Nissim and Pinkas (FNP) at Eurocrypt’04 to the distributed setting. By using a secret sharing scheme, we provide a distributed solution of the FNP private matching called the distributed private matching. In our distributed private matching scheme, we use a polynomial to represent one party’s dataset as in FNP and then distribute the polynomial to multiple servers. We extend our solution to the distributed set intersection and the cardinality of the intersection, and further we show how to apply the distributed private matching in order to compute distributed subset relation. Our work extends the primitives of private matching and set intersection by Freedman et al. Our distributed construction might be of great value when the dataset is outsourced and its privacy is the main concern. In such cases, our distributed solutions keep the utility of those set operations while the dataset privacy is not compromised. Comparing with previous works, we achieve a more efficient solution in terms of computation. All protocols constructed in this paper are provably secure against a semi-honest adversary under the Decisional Diffie-Hellman assumption.
Resumo:
Techniques for evaluating and selecting multivariate volatility forecasts are not yet understood as well as their univariate counterparts. This paper considers the ability of different loss functions to discriminate between a set of competing forecasting models which are subsequently applied in a portfolio allocation context. It is found that a likelihood-based loss function outperforms its competitors, including those based on the given portfolio application. This result indicates that considering the particular application of forecasts is not necessarily the most effective basis on which to select models.
Resumo:
Medroxyprogesterone acetate (MPA) has widely been used in hormone replacement therapy (HRT), and is associated with an increased risk of breast cancer, possibly due to disruption of androgen receptor (AR) signaling. In contrast, the synthetic HRT Tibolone does not increase breast density, and is rapidly metabolized to estrogenic 3α-OH-tibolone and 3β-OH-tibolone, and a delta-4 isomer (Δ4-TIB) that has both androgenic and progestagenic properties. Here, we show that 5α-dihydrotestosterone (DHT) and Δ4-TIB, but not MPA, stabilize AR protein levels, initiate specific AR intramolecular interactions critical for AR transcriptional regulation, and increase proliferation of AR positive MDA-MB-453 breast cancer cells. Structural modeling and molecular dynamic simulation indicate that Δ4-TIB induces a more stable AR structure than does DHT, and MPA a less stable one. Microarray expression analyses confirms that the molecular actions of Δ4-TIB more closely resembles DHT in breast cancer cells than either ligand does to MPA.
Resumo:
This paper proposes a method for designing set-point regulation controllers for a class of underactuated mechanical systems in Port-Hamiltonian System (PHS) form. A new set of potential shape variables in closed loop is proposed, which can replace the set of open loop shape variables-the configuration variables that appear in the kinetic energy. With this choice, the closed-loop potential energy contains free functions of the new variables. By expressing the regulation objective in terms of these new potential shape variables, the desired equilibrium can be assigned and there is freedom to reshape the potential energy to achieve performance whilst maintaining the PHS form in closed loop. This complements contemporary results in the literature, which preserve the open-loop shape variables. As a case study, we consider a robotic manipulator mounted on a flexible base and compensate for the motion of the base while positioning the end effector with respect to the ground reference. We compare the proposed control strategy with special cases that correspond to other energy shaping strategies previously proposed in the literature.