221 resultados para tp-Kadec Norm
Resumo:
Recent studies suggest that genetic and environmental factors do not account for all the schizophrenia risk and epigenetics also plays a role in disease susceptibility. DNA methylation is a heritable epigenetic modification that can regulate gene expression. Genome-Wide DNA methylation analysis was performed on post-mortem human brain tissue from 24 patients with schizophrenia and 24 unaffected controls. DNA methylation was assessed at over 485 000 CpG sites using the Illumina Infinium Human Methylation450 Bead Chip. After adjusting for age and post-mortem interval (PMI), 4 641 probes corresponding to 2 929 unique genes were found to be differentially methylated. Of those genes, 1 291 were located in a CpG island and 817 were in a promoter region. These include NOS1, AKT1, DTNBP1, DNMT1, PPP3CC and SOX10 which have previously been associated with schizophrenia. More than 100 of these genes overlap with a previous DNA methylation study of peripheral blood from schizophrenia patients in which 27 000 CpG sites were analysed. Unsupervised clustering analysis of the top 3 000 most variable probes revealed two distinct groups with significantly more people with schizophrenia in cluster one compared to controls (p = 1.74x10-4). The first cluster was composed of 88% of patients with schizophrenia and only 12% controls while the second cluster was composed of 27% of patients with schizophrenia and 73% controls. These results strongly suggest that differential DNA methylation is important in schizophrenia etiology and add support for the use of DNA methylation profiles as a future prognostic indicator of schizophrenia.
Resumo:
Flows of cultural heritage in textual practices are vital to sustaining Indigenous communities. Indigenous heritage, whether passed on by oral tradition or ubiquitous social media, can be seen as a “conversation between the past and the future” (Fairclough, 2012, xv). Indigenous heritage involves appropriating memories within a cultural flow to pass on a spiritual legacy. This presentation reports ethnographic research of social media practices in a small independent Aboriginal school in Southeast Queensland, Australia that is resided over by the Yugambeh elders and an Aboriginal principal. The purpose was to rupture existing notions of white literacies in schools, and to deterritorialize the uses of digital media by dominant cultures in the public sphere. Examples of learning experiences included the following: i. Integrating Indigenous language and knowledge into media text production; ii. Using conversations with Indigenous elders and material artifacts as an entry point for storytelling; iii. Dadirri – spiritual listening in the yarning circle to develop storytelling (Ungunmerr-Baumann, 2002); and iv. Writing and publicly sharing oral histories through digital scrapbooking shared via social media. The program aligned with the Australian National Curriculum English (ACARA, 2012), which mandates the teaching of multimodal text creation. Data sources included a class set of digital scrapbooks collaboratively created in a multi-age primary classroom. The digital scrapbooks combined digitally encoded words, images of material artifacts, and digital music files. A key feature of the writing and digital design task was to retell and digitally display and archive a cultural narrative of significance to the Indigenous Australian community and its memories and material traces of the past for the future. Data analysis of the students’ digital stories involved the application of key themes of negotiated, material, and digitally mediated forms of heritage practice. It drew on Australian Indigenous research by Keddie et al. (2013) to guard against the homogenizing of culture that can arise from a focus on a static view of culture. The interpretation of findings located Indigenous appropriation of social media within broader racialized politics that enables Indigenous literacy to be understood as a dynamic, negotiated, and transgenerational flows of practice. The findings demonstrate that Indigenous children’s use of media production reflects “shifting and negotiated identities” in response to changing media environments that can function to sustain Indigenous cultural heritages (Appadurai, 1696, xv). It demonstrated how the children’s experiences of culture are layered over time, as successive generations inherit, interweave, and hear others’ cultural stories or maps. It also demonstrated how the children’s production of narratives through multimedia can provide a platform for the flow and reconstruction of performative collective memories and “lived traces of a common past” (Giaccardi, 2012). It disrupts notions of cultural reductionism and racial incommensurability that fix and homogenize Indigenous practices within and against a dominant White norm. Recommendations are provided for an approach to appropriating social media in schools that explicitly attends to the dynamic nature of Indigenous practices, negotiated through intercultural constructions and flows, and opening space for a critical anti-racist approach to multimodal text production.
Resumo:
The Responsibility to Protect (R2P) is a major new international principle, adopted unanimously in 2005 by Heads of State and Government. Whilst it is broadly acknowledged that the principle has an important and intimate relationship with international law, especially the law relating to sovereignty, peace and security, human rights and armed conflict, there has yet to be a volume dedicated to this question. The Responsibility to Protect and International Law fills that gap by bringing together leading scholars from North America, Europe and Australia to examine R2P’s legal content. The Responsibility to Protect and International Law focuses on questions relating to R2P’s legal quality, its relationship with sovereignty, and the question of whether the norm establishes legal obligations. It also aims to introduce readers to different legal perspectives, including feminism, and pressing practical questions such as how the law might be used to prevent genocide and mass atrocities, and punish the perpetrators.
Resumo:
We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution) phase, without further communication between the dealer and the shareholders. Previous solutions to this problem require one to start off with a nonstandard scheme designed specifically for this purpose, or to have communication between shareholders. In contrast, we show how to increase the threshold parameter of the standard Shamir secret-sharing scheme without communication between the shareholders. Our technique can thus be applied to existing Shamir schemes even if they were set up without consideration to future threshold increases. Our method is a new positive cryptographic application for lattice reduction algorithms, inspired by recent work on lattice-based list decoding of Reed-Solomon codes with noise bounded in the Lee norm. We use fundamental results from the theory of lattices (geometry of numbers) to prove quantitative statements about the information-theoretic security of our construction. These lattice-based security proof techniques may be of independent interest.
Resumo:
The current research extends our knowledge of the main effects of attitude, subjective norm, and perceived control over the individual’s technology adoption. We propose a critical buffering role of social influence on the collectivistic culture in the relationship between attitude, perceived behavioral control, and Information Technology (IT) adoption. Adoption behavior was studied among 132 college students being introduced to a new virtual learning system. While past research mainly treated these three variables as being in parallel relationships, we found a moderating role for subjective norm on technology attitude and perceived control on adoption intent. Implications and limitations for understating the role of social influence in the collectivistic society are discussed.
Resumo:
Many commentators argue that domestic food waste is strongly influenced by consumer behaviours. This article reports on a study using mixed-methods to identify key factors responsible for promoting consumer behaviours that lead to domestic food waste through the lens of the Value-Belief-Norm (VBN) theory. Based on the study’s findings, three factors are proposed that cause behaviours that lead to food waste: supply knowledge – does a consumer know what food they have available; location knowledge – does a consumer know where to locate food items, and; food literacy – to what degree do past experience and acquired knowledge impact on a consumer’s food consumption and wastage practices. We analyse the study’s findings in light of a review of literature about consumer food wastage behaviours and in turn, present new insights into consumer behaviour, food waste, and the use of technology to reduce food waste.
Resumo:
CIB is developing a priority theme, now termed Improving Construction and Use through Integrated Design & Delivery Solutions (IDDS). The IDDS working group for this theme adopted the following definition: Integrated Design and Delivery Solutions use collaborative work processes and enhanced skills, with integrated data, information, and knowledge management to minimize structural and process inefficiencies and to enhance the value delivered during design, build, and operation, and across projects. The design, construction, and commissioning sectors have been repeatedly analysed as inefficient and may or may not be quite as bad as portrayed; however, there is unquestionably significant scope for IDDS to improve the delivery of value to clients, stakeholders (including occupants), and society in general, simultaneously driving down cost and time to deliver operational constructed facilities. Although various initiatives developed from computer‐aided design and manufacturing technologies, lean construction, modularization, prefabrication and integrated project delivery are currently being adopted by some sectors and specialisations in construction; IDDS provides the vision for a more holistic future transformation. Successful use of IDDS requires improvements in work processes, technology, and people’s capabilities to span the entire construction lifecycle from conception through design, construction, commissioning, operation, refurbishment/ retrofit and recycling, and considering the building’s interaction with its environment. This vision extends beyond new buildings to encompass modifications and upgrades, particularly those aimed at improved local and area sustainability goals. IDDS will facilitate greater flexibility of design options, work packaging strategies and collaboration with suppliers and trades, which will be essential to meet evolving sustainability targets. As knowledge capture and reuse become prevalent, IDDS best practice should become the norm, rather than the exception.
Resumo:
Existing multi-model approaches for image set classification extract local models by clustering each image set individually only once, with fixed clusters used for matching with other image sets. However, this may result in the two closest clusters to represent different characteristics of an object, due to different undesirable environmental conditions (such as variations in illumination and pose). To address this problem, we propose to constrain the clustering of each query image set by forcing the clusters to have resemblance to the clusters in the gallery image sets. We first define a Frobenius norm distance between subspaces over Grassmann manifolds based on reconstruction error. We then extract local linear subspaces from a gallery image set via sparse representation. For each local linear subspace, we adaptively construct the corresponding closest subspace from the samples of a probe image set by joint sparse representation. We show that by minimising the sparse representation reconstruction error, we approach the nearest point on a Grassmann manifold. Experiments on Honda, ETH-80 and Cambridge-Gesture datasets show that the proposed method consistently outperforms several other recent techniques, such as Affine Hull based Image Set Distance (AHISD), Sparse Approximated Nearest Points (SANP) and Manifold Discriminant Analysis (MDA).
Resumo:
This study examines the process by which newly recruited nuclear engineering and technical staff came to understand, define, think, feel and behave within a distinct group that has a direct contribution to the organization's overall emphasis on a culture of reliability and system safety. In the field of organizational behavior the interactive model of social identity formation has been recently proposed to explain the process by which the internalization of shared norms and values occurs, an element critical in identity formation. Using this rich model of organizational behavior we analyzed multiple sources of data from nine new hires over a period of three years. This was done from the time they were employed to investigate the construction of social identity by new entrants entering into a complex organizational setting reflected in the context of a nuclear facility. Informed by our data analyses, we found support for the interactive model of social identity development and report the unexpected finding that a newly appointed member's age and level of experience appears to influence the manner in which they adapt, and assimilate into their surroundings. This study represents an important contribution to the safety and reliability literature as it provides a rich insight into the way newly recruited employees enact the process by which their identities are formed and hence act, particularly under conditions of duress or significant organizational disruption in complex organizational settings.
Resumo:
Background Promoting participation physical activity (PA) is an important means of promoting healthy growth and development in children with cerebral palsy (CP). The ActiGraph is a uniaxial accelerometer that provides a realtime measure of PA intensity, duration and frequency. Its small, light weight design makes it a promising measure of activity in children with CP. To date no study has validated the use of accelerometry as a measure of PA in ambulant adolescents with CP. Objectives To evaluate the validity of the ActiGraph accelerometer for measuring PA intensity in adolescents with CP, using oxygen consumption (VO2), measured using portable indirect calorimetry (Cosmed K4b2), as the criterion measure. Design Validation Study Participants/Setting: Ambulant adolescents with CP aged 10–16 years, GMFCS rating of I-III. The recruitment target is 30 (10 in each GMFCS level). Materials/Methods Participants wore the ActiGraph (counts/min) and a Cosmed K4b2 indirect calorimeter (mL/kg/min) during six activity trials: quiet sitting (QS), comfortable paced walking (CPW), brisk paced walking (BPW), fast paced walking (FPW), a ball-kicking protocol (KP) and a ball-throwing protocol (TP). MET levels (multiples of resting metabolism) for each activity were predicted from ActiGraph counts using the Freedson age-specific equation (Freedson et al. 2005) and compared with actual MET levels measured by the Cosmed. Predicted and measured METs for each activity trial were classified as light (> 1.5 METs and <4.6 METs) or moderate to vigorous intensity (≥ 4.6 METs). Results To date 36 bouts of activity have been completed (6 participants x 6 activities). Mean VO2 increased linearly as the intensity of the walking activity increased (CPW=9.47±2.16, BPW=14.06±4.38, FPW=19.21±5.68 ml/kg/min) and ActiGraph counts reflected this pattern (CPW=1099±574, BPW=2233±797 FPW=4707±1013 counts/min). The throwing protocol recording the lowest VO2 (TP=7.50±3.86 ml/kg/min) and lowest overall counts/min (TP=31±27 counts/min). When each of the 36 bouts were classified as either light or moderate to vigorous intensity using measured VO2 as the criterion measure, the Freedson equation correctly classified 28 from 36 bouts (78%). Conclusion/Clinical Implications These preliminary findings suggest that there is a relationship between the intensity of PA and direct measure of oxygen consumption and that therefore the ActiGraph may be a promising tool for accurately measuring free living PA in the community. Further data collection of the complete sample will enable secondary analysis of the relationship between PA and severity of CP (GMFCS level).
Resumo:
Since the severe acute respiratory syndrome outbreak in 2003, it has been argued that there has been a substantial revision to the norm dictating the behaviour of states in the event of a disease outbreak. This article examines the evolution of the norm to ‘report and verify’ disease outbreaks and evaluates the extent to which this revised norm has begun to guide state behaviour. Examination of select East Asian countries affected by human infections of the H5N1 (avian influenza) virus strain reveals the need to further understand the mutually constitutive relationship between the value attached to prompt reporting against the capacity to report, and how states manage both in fulfilling their duty to report.
Resumo:
"The Responsibility to Protect (R2P) is a major new international principle, adopted unanimously in 2005 by Heads of State and Government. Whilst it is broadly acknowledged that the principle has an important and intimate relationship with international law, especially the law relating to sovereignty, peace and security, human rights and armed conflict, there has yet to be a volume dedicated to this question. The Responsibility to Protect and International Law fills that gap by bringing together leading scholars from North America, Europe and Australia to examine R2P’s legal content. The Responsibility to Protect and International Law focuses on questions relating to R2P’s legal quality, its relationship with sovereignty, and the question of whether the norm establishes legal obligations. It also aims to introduce readers to different legal perspectives, including feminism, and pressing practical questions such as how the law might be used to prevent genocide and mass atrocities, and punish the perpetrators."--publisher website
Resumo:
We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution) phase, without further communication between the dealer and the shareholders. Previous solutions to this problem require one to start off with a non-standard scheme designed specifically for this purpose, or to have communication between shareholders. In contrast, we show how to increase the threshold parameter of the standard Shamir secret-sharing scheme without communication between the shareholders. Our technique can thus be applied to existing Shamir schemes even if they were set up without consideration to future threshold increases. Our method is a new positive cryptographic application for lattice reduction algorithms, inspired by recent work on lattice-based list decoding of Reed-Solomon codes with noise bounded in the Lee norm. We use fundamental results from the theory of lattices (Geometry of Numbers) to prove quantitative statements about the information-theoretic security of our construction. These lattice-based security proof techniques may be of independent interest.
Resumo:
In this paper we demonstrate that existing cooperative spectrum sensing formulated for static primary users cannot accurately detect dynamic primary users regardless of the information fusion method. Performance error occurs as the sensing parameters calculated by the conventional detector result in sensing performance that violates the sensing requirements. Furthermore, the error is accumulated and compounded by the number of cooperating nodes. To address this limitation, we design and implement the duty cycle detection model for the context of cooperative spectrum sensing to accurately calculate the sensing parameters that satisfy the sensing requirements. We show that longer sensing duration is required to compensate for dynamic primary user traffic.
Resumo:
Using a case study approach, this paper presents a robust methodology for assessing the compatibility of stormwater treatment performance data between two geographical regions in relation to a treatment system. The desktop analysis compared data derived from a field study undertaken in Florida, USA, with South East Queensland (SEQ) rainfall and pollutant characteristics. The analysis was based on the hypothesis that when transposing treatment performance information from one geographical region to another, detailed assessment of specific rainfall and stormwater quality parameters is required. Accordingly, characteristics of measured rainfall events and stormwater quality in the Florida study were compared with typical characteristics for SEQ. Rainfall events monitored in the Florida study were found to be similar to events that occur in SEQ in terms of their primary characteristics of depth, duration and intensity. Similarities in total suspended solids (TSS) and total nitrogen (TN) concentration ranges for Florida and SEQ suggest that TSS and TN removal performances would not be very different if the treatment system is installed in SEQ. However, further investigations are needed to evaluate the treatment performance of total phosphorus (TP). The methodology presented also allows comparison of other water quality parameters.