273 resultados para 371.102
Resumo:
Purpose The purpose of this study was to investigate the effectiveness of a 10 percent casein phosphopeptide-amorphous calcium phosphate (CPP-ACP) cream to reduce mutans streptococci (MS) colonization and prevent early childhood caries. Methods The cohort was randomized at mean age of 11 days old to receive once-daily CPP-ACP cream (n=102) or no product (comparison group; n=89) from the time of first tooth eruption. All mothers were contacted by telephone at six, 12, and 18 months and advised to brush their children's teeth twice daily with low-dose fluoride toothpaste. At 24 months, all children were examined at a community clinic. Results At 24 months old, one out of 65 (2 percent) children in the CPP-ACP group had caries vs. four out of 58 (seven percent) in the comparison group (difference not statistically significant). There were fewer MS-positive children in the CPP-ACP group (26 percent) vs. the comparison group (47 percent; P=.02). A dose-response effect of CPP-ACP usage on MS was observed, where MS was present in eight percent of regular CPP-ACP users, 28 percent of irregular users, and 47 percent of non-users (P<.02). Conclusions CPP-ACP reduced the percentages of mutans streptococci-positive 24-month-old children, although it did not reduce caries prevalence.
Resumo:
Since Canada’s colonial beginnings, it has become increasingly riddled with classism, racism,sexism, and other damaging outcomes of structured social inequality. In 2006, however,many types of social injustice were turbo‐charged under the federal leadership of the Harper government. For example, a recent southern Ontario study shows that less than half of working people between the ages of 25 and 65 have full‐time jobs with benefits. The main objective of this paper is to critique the dominant Canadian political economic order and the pain and suffering it has caused for millions of people. Informed by left realism and other progressive ways of knowing, I also suggest some ways of turning the tide.
Resumo:
Electronic dance music (EDM) has the capacity of producing not simply individual recordings but also a medium to create new soundtracks through live manipulation of these recordings by disc jockeys (DJs). This immediacy in dance music is in contrast with recorded rock music continuing to be presented in a static form. Research was undertaken to explore the proposition that EDM’s beat-mixing function can be implemented to create immediacy in rock music. The term used in this thesis to refer to the application of beat-mixing in rock music is ‘ClubRock’. Through collaboration between a number of disk jockeys and rock music professionals the research applied the process of beat-mixing standard rock compositions to produce a continuous rock set. DJ techniques created immediacy in the recordings and transformed static renditions into a fluid creative work.
Resumo:
Rakaposhi is a synchronous stream cipher, which uses three main components: a non-linear feedback shift register (NLFSR), a dynamic linear feedback shift register (DLFSR) and a non-linear filtering function (NLF). NLFSR consists of 128 bits and is initialised by the secret key K. DLFSR holds 192 bits and is initialised by an initial vector (IV). NLF takes 8-bit inputs and returns a single output bit. The work identifies weaknesses and properties of the cipher. The main observation is that the initialisation procedure has the so-called sliding property. The property can be used to launch distinguishing and key recovery attacks. The distinguisher needs four observations of the related (K,IV) pairs. The key recovery algorithm allows to discover the secret key K after observing 29 pairs of (K,IV). Based on the proposed related-key attack, the number of related (K,IV) pairs is 2(128 + 192)/4 pairs. Further the cipher is studied when the registers enter short cycles. When NLFSR is set to all ones, then the cipher degenerates to a linear feedback shift register with a non-linear filter. Consequently, the initial state (and Secret Key and IV) can be recovered with complexity 263.87. If DLFSR is set to all zeros, then NLF reduces to a low non-linearity filter function. As the result, the cipher is insecure allowing the adversary to distinguish it from a random cipher after 217 observations of keystream bits. There is also the key recovery algorithm that allows to find the secret key with complexity 2 54.
Resumo:
NTRUEncrypt is a fast and practical lattice-based public-key encryption scheme, which has been standardized by IEEE, but until recently, its security analysis relied only on heuristic arguments. Recently, Stehlé and Steinfeld showed that a slight variant (that we call pNE) could be proven to be secure under chosen-plaintext attack (IND-CPA), assuming the hardness of worst-case problems in ideal lattices. We present a variant of pNE called NTRUCCA, that is IND-CCA2 secure in the standard model assuming the hardness of worst-case problems in ideal lattices, and only incurs a constant factor overhead in ciphertext and key length over the pNE scheme. To our knowledge, our result gives the first IND-CCA2 secure variant of NTRUEncrypt in the standard model, based on standard cryptographic assumptions. As an intermediate step, we present a construction for an All-But-One (ABO) lossy trapdoor function from pNE, which may be of independent interest. Our scheme uses the lossy trapdoor function framework of Peikert and Waters, which we generalize to the case of (k − 1)-of-k-correlated input distributions.
Resumo:
This study considers the role and nature of co-thought gestures when students process map-based mathematics tasks. These gestures are typically spontaneously produced silent gestures which do not accompany speech and are represented by small movements of the hands or arms often directed toward an artefact. The study analysed 43 students (aged 10–12 years) over a 3-year period as they solved map tasks that required spatial reasoning. The map tasks were representative of those typically found in mathematics classrooms for this age group and required route finding and coordinate knowledge. The results indicated that co-thought gestures were used to navigate the problem space and monitor movements within the spatial challenges of the respective map tasks. Gesturing was most influential when students encountered unfamiliar tasks or when they found the tasks spatially demanding. From a teaching and learning perspective, explicit co-thought gesturing highlights cognitive challenges students are experiencing since students tended to not use gesturing in tasks where the spatial demands were low.
Resumo:
At Crypto 2008, Shamir introduced a new algebraic attack called the cube attack, which allows us to solve black-box polynomials if we are able to tweak the inputs by varying an initialization vector. In a stream cipher setting where the filter function is known, we can extend it to the cube attack with annihilators: By applying the cube attack to Boolean functions for which we can find low-degree multiples (equivalently annihilators), the attack complexity can be improved. When the size of the filter function is smaller than the LFSR, we can improve the attack complexity further by considering a sliding window version of the cube attack with annihilators. Finally, we extend the cube attack to vectorial Boolean functions by finding implicit relations with low-degree polynomials.
Resumo:
The Business Process Management domain has evolved at a dramatic pace over the past two decades and the notion of the business process has become a ubiquitous part of the modern business enterprise. Most organizations now view their operations in terms of business processes and manage these business processes in the same way as other corporate assets. In recent years, an increasingly broad range of generic technology has become available for automating business processes. This is part of a growing trend in the software engineering field throughout the past 40 years, where aspects of functionality that are potentially reusable on a widespread basis have coalesced into generic software components. Figure 2.1 illustrates this trend and shows how software systems have evolved from the monolithic applications of the 1960s developed in their entirety often by a single development team to today’s offerings that are based on the integration of a range of generic technologies with only a small component of the application actually being developed from scratch. In the 1990s, generic functionality for the automation of business processes first became commercially available in the form of workflow technology and subsequently evolved in the broader field of business process management systems (BPMS). This technology alleviated the necessity to develop process support within applications from scratch and provided a variety of off-the-shelf options on which these requirements could be based. The demand for this technology was significant and it is estimated that by 2000 there were well over 200 distinct workflow offerings in the market, each with a distinct conceptual foundation. Anticipating the difficulties that would be experienced by organizations seeking to utilize and integrate distinct workflow offerings, the Workflow Management Coalition (WfMC), an industry group formed to advance technology in this area, proposed a standard reference model for workflow technology with an express desire to seek a common platform for achieving workflow interoperation.
Resumo:
This paper addresses the problem of joint identification of infinite-frequency added mass and fluid memory models of marine structures from finite frequency data. This problem is relevant for cases where the code used to compute the hydrodynamic coefficients of the marine structure does not give the infinite-frequency added mass. This case is typical of codes based on 2D-potential theory since most 3D-potential-theory codes solve the boundary value associated with the infinite frequency. The method proposed in this paper presents a simpler alternative approach to other methods previously presented in the literature. The advantage of the proposed method is that the same identification procedure can be used to identify the fluid-memory models with or without having access to the infinite-frequency added mass coefficient. Therefore, it provides an extension that puts the two identification problems into the same framework. The method also exploits the constraints related to relative degree and low-frequency asymptotic values of the hydrodynamic coefficients derived from the physics of the problem, which are used as prior information to refine the obtained models.
Resumo:
Subheadings: What is health promotion? Research and health promotion practice Planning and evaluation as the cornerstones of evidence
Resumo:
Recent information systems development using agile project management has yielded a 50% reduction in effort, together with significant improvements in organisational skills, productivity, quality and business satisfaction.
Resumo:
A graduate psychology student reflects upon the experience of learning psychodynamic psychotherapy exclusively in the classroom. The majority of undergraduate psychology students have scant, and frequently inaccurate, exposure to psychodynamic psychotherapy. This appears to heavily influence students’ choice of postgraduate programs, and to reduce the likelihood that they will expose themselves to psychodynamic therapy at any stage of their careers. It is hoped that the original insights provided by this reflection will inform the development of psychodynamic psychotherapy teaching material that can be imparted effectively in undergraduate programs, even when access to patients and supervisors is not possible, so that more students are inspired to study psychodynamic psychotherapy in postgraduate programs.
Resumo:
Anthocyanin concentration is a primary determinant of plant colour. Fruit anthocyanin biosynthesis is controlled by a distinct clade of R2R3 MYB transcription factors. In apple, three recent papers describe the discovery of MYB genes activating skin, flesh and foliage anthocyanic colour. These findings lead the way to new approaches in the breeding and biotechnological development of fruit with new colour patterns.
Resumo:
High-temperature, low-light (HTLL) treatment of 35S:PAP1 Arabidopsis thaliana over-expressing the PAP1 (Production of Anthocyanin Pigment 1) gene results in reversible reduction of red colouration, suggesting the action of additional anthocyanin regulators. High-performance liquid chromatography (HPLC), liquid chromatography mass spectrometry (LCMS) and Affimetrix®-based microarrays were used to measure changes in anthocyanin, flavonoids, and gene expression in response to HTLL. HTLL treatment of control and 35S:PAP1 A. thaliana resulted in a reversible reduction in the concentrations of major anthocyanins despite ongoing over-expression of the PAP1 MYB transcription factor. Twenty-one anthocyanins including eight cis-coumaryl esters were identified by LCMS. The concentrations of nine anthocyanins were reduced and those of three were increased, consistent with a sequential process of anthocyanin degradation. Analysis of gene expression showed down-regulation of flavonol and anthocyanin biosynthesis and of transport-related genes within 24 h of HTLL treatment. No catabolic genes up-regulated by HTLL were found. Reductions in the concentrations of anthocyanins and down-regulation of the genes of anthocyanin biosynthesis were achieved by environmental manipulation, despite ongoing over-expression of PAP1. Quantitative PCR showed reduced expression of three genes (TT8, TTG1 and EGL3) of the PAP1 transcriptional complex, and increased expression of the potential transcriptional repressors AtMYB3, AtMYB6 and AtMYBL2 coincided with HTLL-induced down-regulation of anthocyanin biosynthesis. HTLL treatment offers a model system with which to explore anthocyanin catabolism and to discover novel genes involved in the environmental control of anthocyanins.