352 resultados para Zero-One Matrices
Resumo:
Background The effects of exposure to ultraviolet radiation are a significant concern in Australia which has one of the highest incidences of skin cancer in the world. Despite most skin cancers being preventable by encouraging consistent adoption of sun-protective behaviours, incidence rates are not decreasing. There is a dearth of research examining the factors involved in engaging in sun-protective behaviours. Further, online multi-behavioural theory-based interventions have yet to be explored fully as a medium for improving sun-protective behaviour in adults. This paper presents the study protocol of a randomised controlled trial of an online intervention based on the Theory of Planned Behaviour (TPB) that aims to improve sun safety among Australian adults. Methods/Design Approximately 420 adults aged 18 and over and predominantly from Queensland, Australia, will be recruited and randomised to the intervention (n = 200), information only (n = 200) or the control group (n = 20). The intervention focuses on encouraging supportive attitudes and beliefs toward sun-protective behaviour, fostering perceptions of normative support for sun protection, and increasing perceptions of control/self-efficacy over sun protection. The intervention will be delivered online over a single session. Data will be collected immediately prior to the intervention (Time 1), immediately following the intervention (Time 1b), and one week (Time 2) and one month (Time 3) post-intervention. Primary outcomes are intentions to sun protect and sun-protective behaviour. Secondary outcomes are the participants’ attitudes toward sun protection, perceptions of normative support for sun protection (i.e. subjective norms, group norms, personal norms and image norms) and perceptions of control/self-efficacy toward sun protection. Discussion The study will contribute to an understanding of the effectiveness of a TPB-based online intervention to improve Australian adults’ sun-protective behaviour. Trials registry Australian and New Zealand Trials Registry number ACTRN12613000470796
Resumo:
Newman and Nelson (2012) describe three ‘dances’ to explain the vacillating psychological states of trauma survivors: the dance of approach and avoidance; the dance of fragmentation and integration; and the dance of resilience and vulnerability. The first pair of seemingly opposite responses describes how survivors at times cope by ‘approaching’ the trauma, for example by gathering information about what happened; whilst at other times, the same person will cope by ‘avoiding’ the trauma by engaging in activities which distract them from the memory of the trauma or having to deal with the consequences of it. The ‘dance’ of fragmentation and integration describes the opposing individual or group experiences encountered after traumas or disasters. Individuals may experience fragmentation, or emotional disconnection, from the trauma as an adaptive means of survival. The ‘dance’ of resilience and vulnerability refers to an individual’s ability to ‘process’ trauma and return to a resilient state in which they re-learn to trust people and the world around them and ‘bounce back’ to a state of being resilient again. This paper will illustrate how an understanding of the three dances can be used to enable survivors of child sexual assault to engage with the media to tell their stories. I will give current examples from six months of journalism research, collaboration and writing of a series of news stories and features which broke an exclusive story simultaneously in The Australian and The Times in London during 2013.
Resumo:
Recent expansion in research in the field of lipidomics has been driven by the development of new mass spectrometric tools and protocols for the identification and quantification of molecular lipids in complex matrices. Although there are similarities between the field of lipidomics and the allied field of mass spectrometry (e.g., proteomics), lipids present some unique advantages and challenges for mass spectrometric analysis. The application of electrospray ionization to crude lipid extracts without prior fractionation-the so-called shotgun approach-is one such example, as it has perhaps been more successfully applied in lipidomics than in any other discipline. Conversely, the diverse molecular structure of lipids means that collision-induced dissociation alone may be limited in providing unique descriptions of complex lipid structures, and the development of additional, complementary tools for ion activation and analysis is required to overcome these challenges. In this article, we discuss the state of the art in lipid mass spectrometry and highlight several areas in which current approaches are deficient and further innovation is required.
Resumo:
Distributed generation (DG) resources are commonly used in the electric systems to obtain minimum line losses, as one of the benefits of DG, in radial distribution systems. Studies have shown the importance of appropriate selection of location and size of DGs. This paper proposes an analytical method for solving optimal distributed generation placement (ODGP) problem to minimize line losses in radial distribution systems using loss sensitivity factor (LSF) based on bus-injection to branch-current (BIBC) matrix. The proposed method is formulated and tested on 12 and 34 bus radial distribution systems. The classical grid search algorithm based on successive load flows is employed to validate the results. The main advantages of the proposed method as compared with the other conventional methods are the robustness and no need to calculate and invert large admittance or Jacobian matrices. Therefore, the simulation time and the amount of computer memory, required for processing data especially for the large systems, decreases.
Resumo:
Distributed-password public-key cryptography (DPwPKC) allows the members of a group of people, each one holding a small secret password only, to help a leader to perform the private operation, associated to a public-key cryptosystem. Abdalla et al. recently defined this tool [1], with a practical construction. Unfortunately, the latter applied to the ElGamal decryption only, and relied on the DDH assumption, excluding any recent pairing-based cryptosystems. In this paper, we extend their techniques to support, and exploit, pairing-based properties: we take advantage of pairing-friendly groups to obtain efficient (simulation-sound) zero-knowledge proofs, whose security relies on the Decisional Linear assumption. As a consequence, we provide efficient protocols, secure in the standard model, for ElGamal decryption as in [1], but also for Linear decryption, as well as extraction of several identity-based cryptosystems [6,4]. Furthermore, we strenghten their security model by suppressing the useless testPwd queries in the functionality.
Resumo:
An encryption scheme is non-malleable if giving an encryption of a message to an adversary does not increase its chances of producing an encryption of a related message (under a given public key). Fischlin introduced a stronger notion, known as complete non-malleability, which requires attackers to have negligible advantage, even if they are allowed to transform the public key under which the related message is encrypted. Ventre and Visconti later proposed a comparison-based definition of this security notion, which is more in line with the well-studied definitions proposed by Bellare et al. The authors also provide additional feasibility results by proposing two constructions of completely non-malleable schemes, one in the common reference string model using non-interactive zero-knowledge proofs, and another using interactive encryption schemes. Therefore, the only previously known completely non-malleable (and non-interactive) scheme in the standard model, is quite inefficient as it relies on generic NIZK approach. They left the existence of efficient schemes in the common reference string model as an open problem. Recently, two efficient public-key encryption schemes have been proposed by Libert and Yung, and Barbosa and Farshim, both of them are based on pairing identity-based encryption. At ACISP 2011, Sepahi et al. proposed a method to achieve completely non-malleable encryption in the public-key setting using lattices but there is no security proof for the proposed scheme. In this paper we review the mentioned scheme and provide its security proof in the standard model. Our study shows that Sepahi’s scheme will remain secure even for post-quantum world since there are currently no known quantum algorithms for solving lattice problems that perform significantly better than the best known classical (i.e., non-quantum) algorithms.
Resumo:
Background Directed cell migration is essential for normal development. In most of the migratory cell populations that have been analysed in detail to date, all of the cells migrate as a collective from one location to another. However, there are also migratory cell populations that must populate the areas through which they migrate, and thus some cells get left behind while others advance. Very little is known about how individual cells behave to achieve concomitant directional migration and population of the migratory route. We examined the behavior of enteric neural crest-derived cells (ENCCs), which must both advance caudally to reach the anal end and populate each gut region. Results The behaviour of individual ENCCs was examined using live imaging and mice in which ENCCs express a photoconvertible protein. We show that individual ENCCs exhibit very variable directionalities and speed; as the migratory wavefront of ENCCs advances caudally, each gut region is populated primarily by some ENCCs migrating non-directionally. After populating each region, ENCCs remain migratory for at least 24 hours. Endothelin receptor type B (EDNRB) signaling is known to be essential for the normal advance of the ENCC population. We now show that perturbation of EDNRB principally affects individual ENCC speed rather than directionality. The trajectories of solitary ENCCs, which occur transiently at the wavefront, were consistent with an unbiased random walk and so cell-cell contact is essential for directional migration. ENCCs migrate in close association with neurites. We showed that although ENCCs often use neurites as substrates, ENCCs lead the way, neurites are not required for chain formation and neurite growth is more directional than the migration of ENCCs as a whole. Conclusions Each gut region is initially populated by sub-populations of ENCCs migrating non-directionally, rather than stopping. This might provide a mechanism for ensuring a uniform density of ENCCs along the growing gut.
Resumo:
In this paper, we provide an account-centric analysis of the tweeting activity of, and public response to, Pope Benedict XVI via the @pontifex Twitter account(s). We focus our investigation on the particular phase around Pope Benedict XVI’s resignation to generate insights into the use of Twitter in response to a celebrity crisis event. Through a combined qualitative and quantitative methodological approach we generate an overview of the follower-base and tweeting activity of the @pontifex account. We identify a very one-directional communication pattern (many @mentions by followers yet zero @replies from the papal account itself), which prompts us to enquire further into what the public resonance of the @pontifex account is. We also examine reactions to the resurrection of the papal Twitter account by Pope Benedict XVI’s successor. In this way, we provide a comprehensive analysis of the public response to the immediate events around the crisis event of Pope Benedict XVI’s resignation and its aftermath via the network of users involved in the @pontifex account.
Resumo:
This paper presents ongoing work toward constructing efficient completely non-malleable public-key encryption scheme based on lattices in the standard (common reference string) model. An encryption scheme is completely non-malleable if it requires attackers to have negligible advantage, even if they are allowed to transform the public key under which the related message is encrypted. Ventre and Visconti proposed two inefficient constructions of completely non-malleable schemes, one in the common reference string model using non-interactive zero-knowledge proofs, and another using interactive encryption schemes. Recently, two efficient public-key encryption schemes have been proposed, both of them are based on pairing identity-based encryption.
Resumo:
The lower limb of military vehicle occupants has been the most injured body part due to undervehicle explosions in recent conflicts. Understanding the injury mechanism and causality of injury severity could aid in developing better protection. Therefore, we tested 4 different occupant postures (seated, brace, standing, standing with knee locked in hyper‐extension) in a simulated under‐vehicle explosion (solid blast) using our traumatic injury simulator in the laboratory; we hypothesised that occupant posture would affect injury severity. No skeletal injury was observed in the specimens in seated and braced postures. Severe, impairing injuries were observed in the foot of standing and hyper‐extended specimens. These results demonstrate that a vehicle occupant whose posture at the time of the attack incorporates knee flexion is more likely to be protected against severe skeletal injury to the lower leg.
Resumo:
Contrast-matching ultrasmall-angle neutron scattering (USANS) and small-angle neutron scattering (SANS) techniques were used for the first time to determine both the total pore volume and the fraction of the pore volume that is inaccessible to deuterated methane, CD4, in four bituminous coals in the range of pore sizes between ∼10 Å and ∼5 μm. Two samples originated from the Illinois Basin in the U.S.A., and the other two samples were commercial Australian bituminous coals from the Bowen Basin. The total and inaccessible porosity were determined in each coal using both Porod invariant and the polydisperse spherical particle (PDSP) model analysis of the scattering data acquired from coals both in vacuum and at the pressure of CD4, at which the scattering length density of the pore-saturating fluid is equal to that of the solid coal matrix (zero average contrast pressure). The total porosity of the coals studied ranged from 7 to 13%, and the volume of pores inaccessible to CD4 varied from ∼13 to ∼36% of the total pore volume. The volume fraction of inaccessible pores shows no correlation with the maceral composition; however, it increases with a decreasing total pore volume. In situ measurements of the structure of one coal saturated with CO2 and CD4 were conducted as a function of the pressure in the range of 1−400 bar. The neutron scattering intensity from small pores with radii less than 35 Å in this coal increased sharply immediately after the fluid injection for both gases, which demonstrates strong condensation and densification of the invading subcritical CO2 and supercritical methane in small pores.
Resumo:
Titanium oxide films with trilayer structure grown on fluorine doped tin oxide substrate were prepared from one-step hydrothermal process. The trilayer structure consists of microflowers, nanorod array and compact nanoparticulates, which is expected to possess the merits of good light harvesting, a high electron transport rate, while avoiding the issues of electron shunting. The photovoltaic performance was comprehensively studied and a 60% enhancement in short circuit photocurrent density was found from microflowers contribution as a light scattering layer. This unique trilayer structure exhibits great potential application in future dye-sensitized solar cells.
Resumo:
LiteSteel beam (LSB) is a new cold-formed steel hollow flange channel section produced using a patented manufacturing process involving simultaneous cold-forming and dual electric resistance welding. The LSBs were commonly used as floor joists and bearers with web openings in residential, industrial and commercial buildings. Due to the unique geometry of LSBs, as well as its unique residual stress characteristics and initial geometric imperfections resultant of manufacturing processes, much of the existing research for common cold-formed steel sections is not directly applicable to LSBs. Many research studies have been carried out to evaluate the behaviour and design of LSBs subject to pure bending actions, predominant shear and combined actions. However, to date, no investigation has been conducted into the web crippling behaviour and strength of LSB sections. Hence detailed experimental studies were conducted to investigate the web crippling behaviour and strengths of LSBs under EOF (End One Flange) and IOF (Interior One Flange) load cases. A total of 26 web crippling tests was conducted and the results were compared with current AS/NZS 4600 design rules. This comparison showed that AS/NZS 4600 (SA, 2005) design rules are very conservative for LSB sections under EOF and IOF load cases. Suitable design equations have been proposed to determine the web crippling capacity of LSBs based on experimental results. This paper presents the details of this experimental study on the web crippling behaviour and strengths of LiteSteel beams under EOF and IOF load cases.
Resumo:
The dynamics describing the motion response of a marine structure in waves can be represented within a linear framework by the Cummins Equation. This equation contains a convolution term that represents the component of the radiation forces associated with fluid memory effects. Several methods have been proposed in the literature for the identification of parametric models to approximate and replace this convolution term. This replacement can facilitate the model implementation in simulators and the analysis of motion control designs. Some of the reported identification methods consider the problem in the time domain while other methods consider the problem in the frequency domain. This paper compares the application of these identification methods. The comparison is based not only on the quality of the estimated models, but also on the ease of implementation, ease of use, and the flexibility of the identification method to incorporate prior information related to the model being identified. To illustrate the main points arising from the comparison, a particular example based on the coupled vertical motion of a modern containership vessel is presented.
Resumo:
Imines were synthesized from benzyl alcohol and amines by using catalysts of gold nanoparticles supported on ZrO2 (Au/ZrO2). The effects of reaction time, temperature, gold loadings and base were investigated. High yields were achieved under moderate conditions (60 °C) in the presence of KOCH3. For instance, the yield of N-benzylidenebenzylamine produced from benzyl alcohol and benzylamine on 3 wt% Au/ZrO2 is 87 %. The synthesis of imine involves two reaction steps: selective oxidation of benzyl alcohol to benzaldehyde and the coupling reaction of amines with benzaldehyde. In the first step, the base promotes the selective oxidation. The reactions of benzyl alcohol with three different amines, aniline, n-butylamine and benzylamine, were conducted to produce corresponding imines. The results show that the amine with stronger nucleophilicity has better ability to react with benzaldehyde in the second step, resulting in higher yield of the corresponding imine. We proposed a tentative mechanism for the synthesis process.