228 resultados para Volvo 244 DL.


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose Most studies that use either a single exercise session, exercise training, or a cross-sectional design have failed to find a relationship between exercise and plasma lipoprotein(a) [Lp(a)] concentrations. However, a few studies investigating the effects of longer and/or more strenuous exercise have shown elevated Lp(a) concentrations, possibly as an acute-phase reactant to muscle damage. Based on the assumption that greater muscle damage would occur with exercise of longer duration, the purpose of the present study was to determine whether exercise of longer duration would increase Lp(a) concentration and creatine kinase. (CK) activity more than exercise of shorter duration. Methods Ten endurance-trained men (mean +/- SD: age, 27 +/- 6 yr; maximal oxygen consumption [(V)over dotO(2max)], 57 +/- 7 mL(.)kg(-1) min(-1)) completed two separate exercise sessions at 70% (V)over dotO(2max). One session required 900 kcal of energy expenditure (60 +/- 6 min), and the other required 1500 kcal (112 +/- 12 min). Fasted blood samples were taken immediately before (0-pre), immediately after (0-post), 1 d after (1-post), and 2 d after (2-post) each exercise session. Results CK activity increased after both exercise sessions (mean +/- SE; 800 kcal: 0-pre 55 +/- 11, 1-post 168 +/- 64 U(.)L(-1.)min(-1); 1500 kcal: 0-pre 51 +/- 5, 1-post 187 +/- 30, 2-post 123 +/- 19 U(.)L(-1.)min(-1); P < 0.05). However, median Lp(a) concentrations were not altered by either exercise session (800 kcal: 0-pre 5.0 mg(.)dL(-1), 0-post 3.2 mg(.)dL(-1), 1-post 4.0 mg(.)dL(-1), 2-post 3.4 mg(.)dL(-1); 1500 kcal: 0-pre 5.8 mg(.)dL(-1), 0-post 4.3 mg(.)dL(-1), 1-post 3.2 mg(.)dL(-1), 2-post 5.3 mg(.)dL(-1)). In addition, no relationship existed between exercise-induced changes in CK activity and Lp(a) concentration (800 kcal: r = -0.26; 1500 kcal: r = -0.02). Conclusion These results suggest that plasma Lp(a) concentration will not increase in response to minor exercise-induced muscle damage in endurance-trained runners.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Lipoprotein(a) (Lp(a)) is bound to apolipoprotein B-100 by disulfide linkage and is associated in the upper density range of low density lipoprotein cholesterol. Persons with elevated concentrations of Lp(a) are regarded as having an increased risk for premature coronary artery disease. Although many studies exist evaluating the effects of a single session of exercise on lipids and lipoproteins, little information is available concerning the effects of exercise on Lp(a). Therefore, the purpose of this study was to determine the effects of a single exercise session on plasma Lp(a). Twelve physically active men completed two 30-min submaximal treadmill exercise sessions: low intensity (LI, 50% VO2max) and high intensity (HI, 80% VO2max). Blood samples were obtained immediately before and after exercise. Total cholesterol (LI: before 4.22 +/- 0.26, after 4.24 +/- 0.28; HI: before 4.24 +/- 0.31, after 4.11 +/- 0.28 mmol . l(-1), mean +/- SE) and triglyceride (LI: before 1.14 +/- 0.16, after 1.06 +/- 0.16; HI: before 1.12 +/- 0.19, after 1.21 +/- 0.19 mmol . l(-1)) concentrations did not differ immediately after either exercise session, nor did Lp(a) concentrations differ immediately after either exercise session (LI: before 4.1 +/- 2.2, after 4.0 +/- 2.1; HI: before 3.9 +/- 2.2, after 3.7 +/- 2.0 mg . dl(-1)). These results suggest that neither a low nor a high intensity exercise session lasting 30 min in duration has an immediate effect on plasma Lp(a).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents Sequence Matching Across Route Traversals (SMART); a generally applicable sequence-based place recognition algorithm. SMART provides invariance to changes in illumination and vehicle speed while also providing moderate pose invariance and robustness to environmental aliasing. We evaluate SMART on vehicles travelling at highly variable speeds in two challenging environments; firstly, on an all-terrain vehicle in an off-road, forest track and secondly, using a passenger car traversing an urban environment across day and night. We provide comparative results to the current state-of-the-art SeqSLAM algorithm and investigate the effects of altering SMART’s image matching parameters. Additionally, we conduct an extensive study of the relationship between image sequence length and SMART’s matching performance. Our results show viable place recognition performance in both environments with short 10-metre sequences, and up to 96% recall at 100% precision across extreme day-night cycles when longer image sequences are used.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This chapter addresses the radical paucity of empirical data about the career destinations of journalism, media and communications graduates from degree programs. We report findings from a study of ten years of graduates from Queensland University of Technology’s courses in journalism, media, and communication studies, using a ‘Creative Trident’ lens to analyse micro individual survey data. The study findings engage with creative labour precarity discussions, and also assertions of creative graduate oversupply suggested by national graduate outcome statistics. We describe the graduates’ employment outcomes, characterise their early career movements into and out of embedded and specialist employment, and compare the capability requirements and degree of course relevance reported by graduates employed in the different Trident segments. Given that in general the graduates in this study enjoyed very positive employment outcomes, but that there were systematic differences in reported course relevance by segment of employment and role, we also consider how university programs can best engage with the task of educating students for a surprisingly diverse range of media and communication-related occupational outcomes within and outside the creative industries.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A newspaper numbers game based on simple arithmetic relationships is discussed. Its potential to give students of elementary algebra practice in semi-ad hoc reasoning and to build general arithmetic reasoning skills is explored.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We present a text watermarking scheme that embeds a bitstream watermark Wi in a text document P preserving the meaning, context, and flow of the document. The document is viewed as a set of paragraphs, each paragraph being a set of sentences. The sequence of paragraphs and sentences used to embed watermark bits is permuted using a secret key. Then, English language sentence transformations are used to modify sentence lengths, thus embedding watermarking bits in the Least Significant Bits (LSB) of the sentences’ cardinalities. The embedding and extracting algorithms are public, while the secrecy and security of the watermark depends on a secret key K. The probability of False Positives is extremely small, hence avoiding incidental occurrences of our watermark in random text documents. Majority voting provides security against text addition, deletion, and swapping attacks, further reducing the probability of False Positives. The scheme is secure against the general attacks on text watermarks such as reproduction (photocopying, FAX), reformatting, synonym substitution, text addition, text deletion, text swapping, paragraph shuffling and collusion attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The work addresses the problem of cheating prevention in secret sharing. Two cheating scenarios are considered. In the first one, the cheaters always submit invalid shares to the combiner. In the second one, the cheaters collectively decide which shares are to be modified so the combiner gets a mixture of valid and invalid shares from the cheaters. The secret scheme is said to be k-cheating immune if any group of k cheaters has no advantage over honest participants. The paper investigates cryptographic properties of the defining function of secret sharing so the scheme is k-cheating immune. Constructions of secret sharing immune against k cheaters are given.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Food neophobia is a highly heritable trait characterized by the rejection of foods that are novel or unknown and potentially limits dietary variety, with lower intake and preference particularly for fruits and vegetables. Understanding non-genetic (environmental) factors that may influence the expression of food neophobia is essential to improving children’s consumption of fruits and vegetables and encouraging the adoption of healthier diets. The aim of this study was to examine whether maternal infant feeding beliefs (at four months) were associated with the expression of food neophobia in toddlers and whether controlling feeding practices mediated this relationship. Participants were 244 first-time mothers (M = 30.4, SD = 5.1 years) allocated to the control group of the NOURISH randomized controlled trial. The relationships between infant feeding beliefs (Infant Feeding Questionnaire) at four months and controlling child feeding practices (Child Feeding Questionnaire) and food neophobia (Child Food Neophobia Scale) at 24 months were tested using correlational and multiple linear regression models (adjusted for significant covariates). Higher maternal Concern about infant under-eating and becoming underweight at four months was associated with higher child food neophobia at two years. Similarly, lower Awareness of infant hunger and satiety cues was associated with higher child food neophobia. Both associations were significantly mediated by mothers’ use of Pressure to eat. Intervening early to promote positive feeding practices to mothers may help reduce the use of controlling practices as children develop. Further research that can further elucidate the bi-directional nature of the mother-child feeding relationship is still required.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Australasian Information Security Conference (AISC) 2011 was held on 18th-19th January 2011 in Perth, Australia, as a part of the Australasian Computer Science Week 2011. AISC grew out of the Australasian Information Security Workshop and officially changed the name to Australasian Information Security Conference in 2008. The main aim of the AISC is to provide a venue for Australasian and other researchers to present their work on all aspects of information security and promote collaboration between academic and industrial researchers working in this area.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Australasian Information Security Conference (AISC) 2012 was held at RMIT University in Melbourne, Australia, as a part of the Australasian Computer Science Week, January 30 - February 3, 2012. AISC grew out of the Australasian Information Security Workshop and officially changed the name to Australasian Information Security Conference in 2008. The main aim of the AISC is to provide a venue for researchers to present their work on all aspects of information security and promote collaboration between academic and industrial researchers working in this area.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The work presents a new method for the design of ideal secret sharing. The method uses regular mappings that are well suited for construction of perfect secret sharing. The restriction of regular mappings to permutations gives a convenient tool for investigation of the relation between permutations and ideal secret sharing generated by them.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This research proposes the development of interfaces to support collaborative, community-driven inquiry into data, which we refer to as Participatory Data Analytics. Since the investigation is led by local communities, it is not possible to anticipate which data will be relevant and what questions are going to be asked. Therefore, users have to be able to construct and tailor visualisations to their own needs. The poster presents early work towards defining a suitable compositional model, which will allow users to mix, match, and manipulate data sets to obtain visual representations with little-to-no programming knowledge. Following a user-centred design process, we are subsequently planning to identify appropriate interaction techniques and metaphors for generating such visual specifications on wall-sized, multi-touch displays.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A challenge for regulators and the courts has been establishing the boundary between behaviour is exclusionary and should be condemned under s 46 of the then Trade Practices Act 1974 (Cth) (TPA), now s 46 of the Competition and Consumer Act 2010 (Cth) (CCA), and behaviour that is not exclusionary and might even be pro-competitive. This boundary can be especially difficult to draw in the case of entry deterring strategies. Section 46(1) prohibits corporations with a substantial degree of market power from taking advantage of that market power for one of the statutorily proscribed purposes which include preventing the entry of a person into that or any other market. Section 45(2) separately prohibits corporations from making and giving effect to contracts arrangements and understandings that have the purpose, effect or likely effect of substantially lessening competition in a market. The latest case in which the ACCC has failed to satisfy the s 46 criteria is the decision of Greenwood J in ACCC v Cement Australia Pty Ltd [2013] FCA 909 (Cement Australia case). Final orders were published in a separate judgment, in ACCC v Cement Australia Pty Ltd [2014] FCA 148 (28 February 2014). The case concerned an entry deterring strategy, namely the pre-emptive buying of input factors in an upstream market to protect an incumbent with substantial market power in a downstream market and to prevent new entry in the downstream market. Greenwood J found that while Cement Australia Pty Ltd, formerly known as Queensland Cement Ltd (QCL), had substantial market power, its conduct in entering into the pre-emptive contracts was not a contravention of s 46, because Cement Australia had not “taken advantage” of its market power. However, since Cement Australia’s purpose in entering into the pre-emptive contracts was anti-competitive, they were held to contravene s 45(2) of the TPA. The purpose of this Note is to consider only the reasons for judgment in the Cement Australia case in relation to the “taking advantage” element. The judgment was handed down on 10 September 2013. The final hearing date was 15 July 2011, so it was long-awaited. At 714 pages, it is carefully drafted.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Interaction topologies in service-oriented systems are usually classified into two styles: choreographies and orchestrations. In a choreography, services interact in a peer-to-peer manner and no service plays a privileged role. In contrast, interactions in an orchestration occur between one particular service, the orchestrator, and a number of subordinated services. Each of these topologies has its trade-offs. This paper considers the problem of migrating a service-oriented system from a choreography style to an orchestration style. Specifically, the paper presents a tool chain for synthesising orchestrators from choreographies. Choreographies are initially represented as communicating state machines. Based on this representation, an algorithm is presented that synthesises the behaviour of an orchestrator, which is also represented as a state machine. Concurrent regions are then identified in the synthesised state machine to obtain a more compact representation in the form of a Petri net. Finally, it is shown how the resulting Petri nets can be transformed into notations supported by commercial tools, such as the Business Process Modelling Notation (BPMN).