247 resultados para zero divisione


Relevância:

10.00% 10.00%

Publicador:

Resumo:

BACKGROUND: Variations in 'slope' (how steep or flat the ground is) may be good for health. As walking up hills is a physiologically vigorous physical activity and can contribute to weight control, greater neighbourhood slopes may provide a protective barrier to weight gain, and help prevent Type 2 diabetes onset. We explored whether living in 'hilly' neighbourhoods was associated with diabetes prevalence among the Australian adult population. METHODS: Participants ([greater than or equal to]25years; n=11,406) who completed the Western Australian Health and Wellbeing Surveillance System Survey (2003-2009) were asked whether or not they had medically-diagnosed diabetes. Geographic Information Systems (GIS) software was used to calculate a neighbourhood mean slope score, and other built environment measures at 1600m around each participant's home. Logistic regression models were used to predict the odds of self-reported diabetes after progressive adjustment for individual measures (i.e., age, sex), socioeconomic status (i.e., education, income), built environment, destinations, nutrition, and amount of walking. RESULTS: After full adjustment, the odds of self-reported diabetes was 0.72 (95% CI 0.55-0.95) and 0.52 (95% CI 0.39-0.69) for adults living in neighbourhoods with moderate and higher levels of slope, respectively, compared with adults living in neighbourhoods with the lowest levels of slope. The odds of having diabetes was 13% lower (odds ratio 0.87; 95% CI 0.80-0.94) for each increase of one percent in mean slope. CONCLUSIONS: Living in a hilly neighbourhood may be protective of diabetes onset or this finding is spurious. Nevertheless, the results are promising and have implications for future research and the practice of flattening land in new housing developments.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This research was commissioned by Metecno Pty Ltd, trading as Bondor®. The InsulLiving house was designed and constructed by Bondor®. The house instrumentation (electricity circuits, indoor environment, weather station) was provided by Bondor and supplied and installed by independent contractors. This report contains analysis of data collected from the InsulLiving house at Burpengary during 1 year of occupancy by a family of four for the period 1 April 2012 – 31 March 2013. The data shows a daily average electricity consumption 48% less than the regional average. The analysis confirms that the 9 star house performed thermally slightly better than the simulated performance. The home was 'near zero energy', with its modest 2.1kW solar power system meeting all of the needs for space heating and cooling, lighting and most water heating.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Dermal wound repair involves complex interactions between cells, cytokines and mechanics to close injuries to the skin. In particular, we investigate the contribution of fibroblasts, myofibroblasts, TGFβ, collagen and local tissue mechanics to wound repair in the human dermis. We develop a morphoelastic model where a realistic representation of tissue mechanics is key, and a fibrocontractive model that involves a reasonable approximation to the true kinetics of the important bioactive species. We use each of these descriptions to elucidate the mechanisms that generate pathologies such as hypertrophic scars, contractures and keloids. We find that for hypertrophic scar and contracture development, factors regulating the myofibroblast phenotype are critical, with heightened myofibroblast activation, reduced myofibroblast apoptosis or prolonged inflammation all predicted as mediators for scar hypertrophy and contractures. Prevention of these pathologies is predicted when myofibroblast apoptosis is induced, myofibroblast activation is blocked or TGFβ is neutralised. To investigate keloid invasion, we develop a caricature representation of the fibrocontractive model and find that TGFβ spread is the driving factor behind keloid growth. Blocking activation of TGFβ is found to cause keloid regression. Thus, we recommend myofibroblasts and TGFβ as targets for clinicians when developing intervention strategies for prevention and cure of fibrotic scars.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background The effects of exposure to ultraviolet radiation are a significant concern in Australia which has one of the highest incidences of skin cancer in the world. Despite most skin cancers being preventable by encouraging consistent adoption of sun-protective behaviours, incidence rates are not decreasing. There is a dearth of research examining the factors involved in engaging in sun-protective behaviours. Further, online multi-behavioural theory-based interventions have yet to be explored fully as a medium for improving sun-protective behaviour in adults. This paper presents the study protocol of a randomised controlled trial of an online intervention based on the Theory of Planned Behaviour (TPB) that aims to improve sun safety among Australian adults. Methods/Design Approximately 420 adults aged 18 and over and predominantly from Queensland, Australia, will be recruited and randomised to the intervention (n = 200), information only (n = 200) or the control group (n = 20). The intervention focuses on encouraging supportive attitudes and beliefs toward sun-protective behaviour, fostering perceptions of normative support for sun protection, and increasing perceptions of control/self-efficacy over sun protection. The intervention will be delivered online over a single session. Data will be collected immediately prior to the intervention (Time 1), immediately following the intervention (Time 1b), and one week (Time 2) and one month (Time 3) post-intervention. Primary outcomes are intentions to sun protect and sun-protective behaviour. Secondary outcomes are the participants’ attitudes toward sun protection, perceptions of normative support for sun protection (i.e. subjective norms, group norms, personal norms and image norms) and perceptions of control/self-efficacy toward sun protection. Discussion The study will contribute to an understanding of the effectiveness of a TPB-based online intervention to improve Australian adults’ sun-protective behaviour. Trials registry Australian and New Zealand Trials Registry number ACTRN12613000470796

Relevância:

10.00% 10.00%

Publicador:

Resumo:

BACKGROUND: The increasing number of assembled mammalian genomes makes it possible to compare genome organisation across mammalian lineages and reconstruct chromosomes of the ancestral marsupial and therian (marsupial and eutherian) mammals. However, the reconstruction of ancestral genomes requires genome assemblies to be anchored to chromosomes. The recently sequenced tammar wallaby (Macropus eugenii) genome was assembled into over 300,000 contigs. We previously devised an efficient strategy for mapping large evolutionarily conserved blocks in non-model mammals, and applied this to determine the arrangement of conserved blocks on all wallaby chromosomes, thereby permitting comparative maps to be constructed and resolve the long debated issue between a 2n=14 and 2n=22 ancestral marsupial karyotype. RESULTS: We identified large blocks of genes conserved between human and opossum, and mapped genes corresponding to the ends of these blocks by fluorescence in situ hybridization (FISH). A total of 242 genes was assigned to wallaby chromosomes in the present study, bringing the total number of genes mapped to 554 and making it the most densely cytogenetically mapped marsupial genome. We used these gene assignments to construct comparative maps between wallaby and opossum, which uncovered many intrachromosomal rearrangements, particularly for genes found on wallaby chromosomes X and 3. Expanding comparisons to include chicken and human permitted the putative ancestral marsupial (2n=14) and therian mammal (2n=19) karyotypes to be reconstructed. CONCLUSIONS: Our physical mapping data for the tammar wallaby has uncovered the events shaping marsupial genomes and enabled us to predict the ancestral marsupial karyotype, supporting a 2n=14 ancestor. Futhermore, our predicted therian ancestral karyotype has helped to understand the evolution of the ancestral eutherian genome.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background Drink driving among women is a growing problem in many motorised countries. While research has shown that male and female drink drivers differ on a number of characteristics, few studies have addressed the circumstances surrounding women’s drink driving offences specifically. Aim To add to previous research by comparing apprehension characteristics among men and women and to extend the understanding of the female drink driving problem by investigating the drink driving characteristics that are unique to women. Results The sample consisted of the 248,173 (21.5% women) drink drivers apprehended between 2000 and 2011 in Queensland, Australia. Gender comparisons showed that women were older, had lower levels of reoffending, and were more likely to be apprehended in Major Cities compared to men. Comparisons of age group and reoffending and non-reoffending among female drink drivers only revealed that higher BAC readings were more common among younger women. Moreover, a substantial minority (13.7%) of women aged 24 years or younger were apprehended with a BAC below0.05%, reflecting a breach of the zero tolerance BAC for provisional licence holders in Australia. Older women were more likely to be charged with a ‘failure to provide a test’ offence as a result of refusing to provide a breath or blood sample, indicating that drink driving is associated high levels of stigma for this group. Reoffending occurred among 16.2% of the female drink drivers and these drivers were more likely than non-reoffending drivers to record a mid to high range BAC, to be aged 30-39 or below 21years, and to be apprehended in Inner Regional or Remote locations. Conclusion Findings highlight the unique circumstances and divergent needs of female drink drivers compared to male drivers and for different groups of female drivers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Distributed-password public-key cryptography (DPwPKC) allows the members of a group of people, each one holding a small secret password only, to help a leader to perform the private operation, associated to a public-key cryptosystem. Abdalla et al. recently defined this tool [1], with a practical construction. Unfortunately, the latter applied to the ElGamal decryption only, and relied on the DDH assumption, excluding any recent pairing-based cryptosystems. In this paper, we extend their techniques to support, and exploit, pairing-based properties: we take advantage of pairing-friendly groups to obtain efficient (simulation-sound) zero-knowledge proofs, whose security relies on the Decisional Linear assumption. As a consequence, we provide efficient protocols, secure in the standard model, for ElGamal decryption as in [1], but also for Linear decryption, as well as extraction of several identity-based cryptosystems [6,4]. Furthermore, we strenghten their security model by suppressing the useless testPwd queries in the functionality.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

An encryption scheme is non-malleable if giving an encryption of a message to an adversary does not increase its chances of producing an encryption of a related message (under a given public key). Fischlin introduced a stronger notion, known as complete non-malleability, which requires attackers to have negligible advantage, even if they are allowed to transform the public key under which the related message is encrypted. Ventre and Visconti later proposed a comparison-based definition of this security notion, which is more in line with the well-studied definitions proposed by Bellare et al. The authors also provide additional feasibility results by proposing two constructions of completely non-malleable schemes, one in the common reference string model using non-interactive zero-knowledge proofs, and another using interactive encryption schemes. Therefore, the only previously known completely non-malleable (and non-interactive) scheme in the standard model, is quite inefficient as it relies on generic NIZK approach. They left the existence of efficient schemes in the common reference string model as an open problem. Recently, two efficient public-key encryption schemes have been proposed by Libert and Yung, and Barbosa and Farshim, both of them are based on pairing identity-based encryption. At ACISP 2011, Sepahi et al. proposed a method to achieve completely non-malleable encryption in the public-key setting using lattices but there is no security proof for the proposed scheme. In this paper we review the mentioned scheme and provide its security proof in the standard model. Our study shows that Sepahi’s scheme will remain secure even for post-quantum world since there are currently no known quantum algorithms for solving lattice problems that perform significantly better than the best known classical (i.e., non-quantum) algorithms.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive adversary indicate that every n-variate function can be computed by n participants, such that no set of size t < n/2 participants learns any additional information other than what they could derive from their private inputs and the output of the protocol. We study unconditionally secure MPC protocols in the presence of a passive adversary in the trusted setup (‘semi-ideal’) model, in which the participants are supplied with some auxiliary information (which is random and independent from the participant inputs) ahead of the protocol execution (such information can be purchased as a “commodity” well before a run of the protocol). We present a new MPC protocol in the trusted setup model, which allows the adversary to corrupt an arbitrary number t < n of participants. Our protocol makes use of a novel subprotocol for converting an additive secret sharing over a field to a multiplicative secret sharing, and can be used to securely evaluate any n-variate polynomial G over a field F, with inputs restricted to non-zero elements of F. The communication complexity of our protocol is O(ℓ · n 2) field elements, where ℓ is the number of non-linear monomials in G. Previous protocols in the trusted setup model require communication proportional to the number of multiplications in an arithmetic circuit for G; thus, our protocol may offer savings over previous protocols for functions with a small number of monomials but a large number of multiplications.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We show that the LASH-x hash function is vulnerable to attacks that trade time for memory, including collision attacks as fast as 2(4x/11) and preimage attacks as fast as 2(4x/7). Moreover, we briefly mention heuristic lattice based collision attacks that use small memory but require very long messages that are expected to find collisions much faster than 2 x/2. All of these attacks exploit the designers’ choice of an all zero IV. We then consider whether LASH can be patched simply by changing the IV. In this case, we show that LASH is vulnerable to a 2(7x/8) preimage attack. We also show that LASH is trivially not a PRF when any subset of input bytes is used as a secret key. None of our attacks depend upon the particular contents of the LASH matrix – we only assume that the distribution of elements is more or less uniform.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background Directed cell migration is essential for normal development. In most of the migratory cell populations that have been analysed in detail to date, all of the cells migrate as a collective from one location to another. However, there are also migratory cell populations that must populate the areas through which they migrate, and thus some cells get left behind while others advance. Very little is known about how individual cells behave to achieve concomitant directional migration and population of the migratory route. We examined the behavior of enteric neural crest-derived cells (ENCCs), which must both advance caudally to reach the anal end and populate each gut region. Results The behaviour of individual ENCCs was examined using live imaging and mice in which ENCCs express a photoconvertible protein. We show that individual ENCCs exhibit very variable directionalities and speed; as the migratory wavefront of ENCCs advances caudally, each gut region is populated primarily by some ENCCs migrating non-directionally. After populating each region, ENCCs remain migratory for at least 24 hours. Endothelin receptor type B (EDNRB) signaling is known to be essential for the normal advance of the ENCC population. We now show that perturbation of EDNRB principally affects individual ENCC speed rather than directionality. The trajectories of solitary ENCCs, which occur transiently at the wavefront, were consistent with an unbiased random walk and so cell-cell contact is essential for directional migration. ENCCs migrate in close association with neurites. We showed that although ENCCs often use neurites as substrates, ENCCs lead the way, neurites are not required for chain formation and neurite growth is more directional than the migration of ENCCs as a whole. Conclusions Each gut region is initially populated by sub-populations of ENCCs migrating non-directionally, rather than stopping. This might provide a mechanism for ensuring a uniform density of ENCCs along the growing gut.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Zero valent iron (ZVI) was prepared by reducing natural goethite (NG-ZVI) and synthetic goethite (SG-ZVI) in hydrogen at 550 °C. XRD, TEM, FESEM/EDS and specific surface area (SSA) and pore analyser were used to characterize goethites and reduced goethites. Both NG-ZVI and SG-ZVI with a size of nanoscale to several hundreds of nanometers were obtained by reducing goethites at 550 °C. The reductive capacity of the ZVIs was assessed by removal of Cr(VI) at ambient temperature in comparison with that of commercial iron powder (CIP). The effect of contact time, initial concentration and reaction temperature on Cr(VI) removal was investigated. Furthermore, the uptake mechanism was discussed according to isotherms, thermodynamic analysis and the results of XPS. The results showed that SG-ZVI had the best reductive capacity to Cr(VI) and reduced Cr(VI) to Cr(III). The results suggest that hydrogen reduction is a good approach to prepare ZVI and this type of ZVI is potentially useful in remediating heavy metals as a material of permeable reaction barrier.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we provide an account-centric analysis of the tweeting activity of, and public response to, Pope Benedict XVI via the @pontifex Twitter account(s). We focus our investigation on the particular phase around Pope Benedict XVI’s resignation to generate insights into the use of Twitter in response to a celebrity crisis event. Through a combined qualitative and quantitative methodological approach we generate an overview of the follower-base and tweeting activity of the @pontifex account. We identify a very one-directional communication pattern (many @mentions by followers yet zero @replies from the papal account itself), which prompts us to enquire further into what the public resonance of the @pontifex account is. We also examine reactions to the resurrection of the papal Twitter account by Pope Benedict XVI’s successor. In this way, we provide a comprehensive analysis of the public response to the immediate events around the crisis event of Pope Benedict XVI’s resignation and its aftermath via the network of users involved in the @pontifex account.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Introduction The acute health effects of heatwaves in a subtropical climate and their impact on emergency departments (ED) are not well known. The purpose of this study is to examine overt heat-related presentations to EDs associated with heatwaves in Brisbane. Methods Data were obtained for the summer seasons (December to February) from 2000-2012. Heatwave events were defined as two or more successive days with daily maximum temperature >=34[degree sign]C (HWD1) or >=37[degree sign]C (HWD2). Poisson generalised additive model was used to assess the effect of heatwaves on heat-related visits (International Classification of Diseases (ICD) 10 codes T67 and X30; ICD 9 codes 992 and E900.0). Results Overall, 628 cases presented for heat-related illnesses. The presentations significantly increased on heatwave days based on HWD1 (relative risk (RR) = 4.9, 95% confidence interval (CI): 3.8, 6.3) and HWD2 (RR = 18.5, 95% CI: 12.0, 28.4). The RRs in different age groups ranged between 3-9.2 (HWD1) and 7.5-37.5 (HWD2). High acuity visits significantly increased based on HWD1 (RR = 4.7, 95% CI: 2.3, 9.6) and HWD2 (RR = 81.7, 95% CI: 21.5, 310.0). Average length of stay in ED significantly increased by >1 hour (HWD1) and >2 hours (HWD2). Conclusions Heatwaves significantly increase ED visits and workload even in a subtropical climate. The degree of impact is directly related to the extent of temperature increases and varies by socio-demographic characteristics of the patients. Heatwave action plans should be tailored according to the population needs and level of vulnerability. EDs should have plans to increase their surge capacity during heatwaves.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The application of artificial neural networks (ANN) in finance is relatively new area of research. We employed ANNs that used both fundamental and technical inputs to predict future prices of widely held Australian stocks and used these predicted prices for stock portfolio selection over a 10-year period (2001-2011). We found that the ANNs generally do well in predicting the direction of stock price movements. The stock portfolios selected by the ANNs with median accuracy are able to generate positive alpha over the 10-year period. More importantly, we found that a portfolio based on randomly selected network configuration had zero chance of resulting in a significantly negative alpha but a 27% chance of yielding a significantly positive alpha. This is in stark contrast to the findings of the research on mutual fund performance where active fund managers with negative alphas outnumber those with positive alphas.