518 resultados para source encoder identification


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose: Colorectal cancer patients diagnosed with stage I or II disease are not routinely offered adjuvant chemotherapy following resection of the primary tumor. However, up to 10% of stage I and 30% of stage II patients relapse within 5 years of surgery from recurrent or metastatic disease. The aim of this study was to determine if tumor-associated markers could detect disseminated malignant cells and so identify a subgroup of patients with early-stage colorectal cancer that were at risk of relapse. Experimental Design: We recruited consecutive patients undergoing curative resection for early-stage colorectal cancer. Immunobead reverse transcription-PCR of five tumor-associated markers (carcinoembryonic antigen, laminin 2, ephrin B4, matrilysin, and cytokeratin 20) was used to detect the presence of colon tumor cells in peripheral blood and within the peritoneal cavity of colon cancer patients perioperatively. Clinicopathologic variables were tested for their effect on survival outcomes in univariate analyses using the Kaplan-Meier method. A multivariate Cox proportional hazards regression analysis was done to determine whether detection of tumor cells was an independent prognostic marker for disease relapse. Results: Overall, 41 of 125 (32.8%) early-stage patients were positive for disseminated tumor cells. Patients who were marker positive for disseminated cells in post-resection lavage samples showed a significantly poorer prognosis (hazard ratio, 6.2; 95% confidence interval, 1.9-19.6; P = 0.002), and this was independent of other risk factors. Conclusion: The markers used in this study identified a subgroup of early-stage patients at increased risk of relapse post-resection for primary colorectal cancer. This method may be considered as a new diagnostic tool to improve the staging and management of colorectal cancer. 2006 American Association for Cancer Research.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In keeping with the proliferation of free software development initiatives and the increased interest in the business process management domain, many open source workflow and business process management systems have appeared during the last few years and are now under active development. This upsurge gives rise to two important questions: What are the capabilities of these systems? and How do they compare to each other and to their closed source counterparts? In other words: What is the state-of-the-art in the area?. To gain an insight into these questions, we have conducted an in-depth analysis of three of the major open source workflow management systems jBPM, OpenWFE, and Enhydra Shark, the results of which are reported here. This analysis is based on the workflow patterns framework and provides a continuation of the series of evaluations performed using the same framework on closed source systems, business process modelling languages, and web-service composition standards. The results from evaluations of the three open source systems are compared with each other and also with the results from evaluations of three representative closed source systems: Staffware, WebSphere MQ, and Oracle BPEL PM. The overall conclusion is that open source systems are targeted more toward developers rather than business analysts. They generally provide less support for the patterns than closed source systems, particularly with respect to the resource perspective, i.e. the various ways in which work is distributed amongst business users and managed through to completion.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Damage detection in structures has become increasingly important in recent years. While a number of damage detection and localization methods have been proposed, very few attempts have been made to explore the structure damage with noise polluted data which is unavoidable effect in real world. The measurement data are contaminated by noise because of test environment as well as electronic devices and this noise tend to give error results with structural damage identification methods. Therefore it is important to investigate a method which can perform better with noise polluted data. This paper introduces a new damage index using principal component analysis (PCA) for damage detection of building structures being able to accept noise polluted frequency response functions (FRFs) as input. The FRF data are obtained from the function datagen of MATLAB program which is available on the web site of the IASC-ASCE (International Association for Structural Control American Society of Civil Engineers) Structural Health Monitoring (SHM) Task Group. The proposed method involves a five-stage process: calculation of FRFs, calculation of damage index values using proposed algorithm, development of the artificial neural networks and introducing damage indices as input parameters and damage detection of the structure. This paper briefly describes the methodology and the results obtained in detecting damage in all six cases of the benchmark study with different noise levels. The proposed method is applied to a benchmark problem sponsored by the IASC-ASCE Task Group on Structural Health Monitoring, which was developed in order to facilitate the comparison of various damage identification methods. The illustrated results show that the PCA-based algorithm is effective for structural health monitoring with noise polluted FRFs which is of common occurrence when dealing with industrial structures.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The design-build (DB) system has been demonstrated as an effective delivery method and has gained popularity worldwide. However it is observed that a number of operational variations of DB system have emerged since the last decade to cater for different clients requirements. After the client decides to procure his project through the DB system, he still has to choose an appropriate configuration to deliver their projects optimally. However, there is little research on the selection of DB operational variations. One of the main reasons for this is the lack of evaluation criteria for determining the appropriateness of each operational variation. To obtain such criteria, a three-round Delphi survey has been conducted with 20 construction experts in the Peoples Republic of China (PRC). Seven top selection criteria were identified. These are: (1) availability of competent design-builders; (2) clients capabilities; (3) project complexity; (4) clients control of project; (5) early commencement & short duration; (6) reduced responsibility or involvement; and (7) clearly defined end users requirements. These selection criteria were found to have a statistically significant agreement. These findings may furnish various stakeholders, DB clients in particular, with better insight to understand and compare the different operational variations of the DB system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Design-builders play a vital role in the success of DB projects. In the construction market of the Peoples Republic of China, most of the design-builders, however, lack adequate competences to conduct the DB projects successfully. The objective of this study is, therefore, to identify the key competences that design-builders should possess to not only ensure the success of DB projects but also acquire the competitive advantages in the DB market. Five semi-structured face-to-face interviews and two rounds of Delphi questionnaire survey were conducted to identify the key competences of design-builders. Rankings have been assigned to these key competences on the basis of their relative importance. Six ranked key competences of design-builders have been identified, which are, namely, (1) experience with similar DB projects; (2) capability of corporate management; (3) combination of building techniques and design expertise; (4) financial capability for DB projects; (5) enterprise qualification and scale; and (6) credit records and reputation in the industry. The design-builders can make use of the research findings as guidelines to improve their DB competence. These research findings will also be useful to clients during the selection of design-builders.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The design-build system has been demonstrated as an effective delivery method and gained popularity worldwide. Although there are an increasing number of clients adopting DB method in China, most of them remain inexperienced with method. The objective of this study is therefore to identify the key competences that a client or its consultant should possess to ensure the success of DB projects. Face-to-face interviews and a two-round Delphi questionnaire survey were conducted to find the following six key competences of clients, which include the (1) ability to clearly articulate project scope and objectives; (2) financial capacity for DB projects; (3) capability in contract management; (4) adequate staff or consulting team; (5) effective coordination with contractors and (6) experience with similar DB projects. This study will hopefully provide clients with measures to evaluate their DB competence and further promote their understanding of DB system in the PRC.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Successful identification and exploitation of opportunities has been an area of interest to many entrepreneurship researchers. Since Shane and Venkataramans seminal work (e.g. Shane and Venkataraman, 2000; Shane, 2000), several scholars have theorised on how firms identify, nurture and develop opportunities. The majority of this literature has been devoted to understanding how entrepreneurs search for new applications of their technological base or discover opportunities based on prior knowledge (Zahra, 2008; Sarasvathy et al., 2003). In particular, knowledge about potential customer needs and problems that may present opportunities is vital (Webb et al., 2010). Whereas the role of prior knowledge of customer problems (Shane, 2003; Shepherd and DeTienne, 2005) and positioning oneself in a so-called knowledge corridor (Fiet, 1996) has been researched, the role of opportunity characteristics and their interaction with customer-related mechanisms that facilitate and hinder opportunity identification has received scant attention.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents an overview of NTCIR-9 Cross-lingual Link Discovery (Crosslink) task. The overview includes: the motivation of cross-lingual link discovery; the Crosslink task definition; the run submission specification; the assessment and evaluation framework; the evaluation metrics; and the evaluation results of submitted runs. Cross-lingual link discovery (CLLD) is a way of automatically finding potential links between documents in different languages. The goal of this task is to create a reusable resource for evaluating automated CLLD approaches. The results of this research can be used in building and refining systems for automated link discovery. The task is focused on linking between English source documents and Chinese, Korean, and Japanese target documents.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Significant numbers of children are severely abused and neglected by parents and caregivers. Infants and very young children are the most vulnerable and are unable to seek help. To identify these situations and enable child protection and the provision of appropriate assistance, many jurisdictions have enacted mandatory reporting laws requiring designated professionals such as doctors, nurses, police and teachers to report suspected cases of severe child abuse and neglect. Other jurisdictions have not adopted this legislative approach, at least partly motivated by a concern that the laws produce dramatic increases in unwarranted reports, which, it is argued, lead to investigations which infringe on peoples privacy, cause trauma to innocent parents and families, and divert scarce government resources from deserving cases. The primary purpose of this paper is to explore the extent to which opposition to mandatory reporting laws is valid based on the claim that the laws produce overreporting. The first part of this paper revisits the original mandatory reporting laws, discusses their development into various current forms, explains their relationship with policy and common law reporting obligations, and situates them in the context of their place in modern child protection systems. This part of the paper shows that in general, contemporary reporting laws have expanded far beyond their original conceptualisation, but that there is also now a deeper understanding of the nature, incidence, timing and effects of different types of severe maltreatment, an awareness that the real incidence of maltreatment is far higher than that officially recorded, and that there is strong evidence showing the majority of identified cases of severe maltreatment are the result of reports by mandated reporters. The second part of this paper discusses the apparent effect of mandatory reporting laws on overreporting by referring to Australian government data about reporting patterns and outcomes, with a particular focus on New South Wales. It will be seen that raw descriptive data about report numbers and outcomes appear to show that reporting laws produce both desirable consequences (identification of severe cases) and problematic consequences (increased numbers of unsubstantiated reports). Yet, to explore the extent to which the data supports the overreporting claim, and because numbers of unsubstantiated reports alone cannot demonstrate overreporting, this part of the paper asks further questions of the data. Who makes reports, about which maltreatment types, and what are the outcomes of those reports? What is the nature of these reports; for example, to what extent are multiple numbers of reports made about the same child? What meaning can be attached to an unsubstantiated report, and can such reports be used to show flaws in reporting effectiveness and problems in reporting laws? It will be suggested that available evidence from Australia is not sufficiently detailed or strong to demonstrate the overreporting claim. However, it is also apparent that, whether adopting an approach based on public health and or other principles, much better evidence about reporting needs to be collected and analyzed. As well, more nuanced research needs to be conducted to identify what can reasonably be said to constitute overreports, and efforts must be made to minimize unsatisfactory reporting practice, informed by the relevant jurisdictions context and aims. It is also concluded that, depending on the jurisdiction, the available data may provide useful indicators of positive, negative and unanticipated effects of specific components of the laws, and of the strengths, weaknesses and needs of the child protection system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we report on many phosphate containing natural minerals found in the Jenolan Caves - Australia. Such minerals are formed by the reaction of bat guano and clays from the caves. Among these cave minerals is the montgomeryite mineral [Ca4MgAl4(PO4)6.(OH)4.12H2O]. The presence of montgomeryite in deposits of the Jenolan Caves - Australia has been identified by X-ray diffraction (XRD). Raman spectroscopy complimented with infrared spectroscopy has been used to characterize the crystal structure of montgomeryite. The Raman spectrum of a standard montgomeryite mineral is identical to that of the Jenolan Caves sample. Bands are assigned to H2PO4-, OH and NH stretching vibrations. By using a combination of XRD and Raman spectroscopy, the existence of montgomeryite in the Jenolan Caves - Australia has been proven. A mechanism for the formation of montgomeryite is proposed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Precise identification of the time when a change in a hospital outcome has occurred enables clinical experts to search for a potential special cause more effectively. In this paper, we develop change point estimation methods for survival time of a clinical procedure in the presence of patient mix in a Bayesian framework. We apply Bayesian hierarchical models to formulate the change point where there exists a step change in the mean survival time of patients who underwent cardiac surgery. The data are right censored since the monitoring is conducted over a limited follow-up period. We capture the effect of risk factors prior to the surgery using a Weibull accelerated failure time regression model. Markov Chain Monte Carlo is used to obtain posterior distributions of the change point parameters including location and magnitude of changes and also corresponding probabilistic intervals and inferences. The performance of the Bayesian estimator is investigated through simulations and the result shows that precise estimates can be obtained when they are used in conjunction with the risk-adjusted survival time CUSUM control charts for different magnitude scenarios. The proposed estimator shows a better performance where a longer follow-up period, censoring time, is applied. In comparison with the alternative built-in CUSUM estimator, more accurate and precise estimates are obtained by the Bayesian estimator. These superiorities are enhanced when probability quantification, flexibility and generalizability of the Bayesian change point detection model are also considered.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose: The construction industry is well known for its high accident rate and many practitioners consider a preventative approach to be the most important means of bringing about improvements. This paper addresses previous research and the weaknesses of existing preventative approaches and a new application is described and illustrated involving the use of a multi-dimensional simulation tool - Construction Virtual Prototyping (CVP). Methodology: A literature review was conducted to investigate previous studies of hazard identification and safety management and to develop the new approach. Due to weaknesses in current practice, the research study explored the use of computer simulation techniques to create virtual environments where users can explore and identify construction hazards. Specifically, virtual prototyping technology was deployed to develop typical construction scenarios in which unsafe or hazardous incidents occur. In a case study, the users performance was evaluated their responses to incidents within the virtual environment and the effectiveness of the computer simulation system established though interviews with the safety project management team. Findings: The opinions and suggestions provided by the interviewees led to the initial conclusion that the simulation tool was useful in assisting the safety management teams hazard identification process during the early design stage. Originality: The research introduces an innovative method to support the management teams reviews of construction site safety. The system utilises three-dimensional modelling and four-dimensional simulation of worker behaviour, a configuration that has previously not been employed in construction simulations. An illustration of the methods use is also provided, together with a consideration of its strengths and weaknesses.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Diaspora philanthropy is a popular buzzword; however, what the term encompasses or how institutionalised the phenomenon is remains an open question. There are as many views and definitions of diaspora philanthropy as there are diaspora communities involved. It is often seen as a potential source of funding for geographic regions, religions or ethnic communities globally. But identifying a framework for diaspora philanthropy is difficult. Unlike the literature on international philanthropy (including ethnic philanthropy and cross-border philanthropy), which has been a predominant topic of interest in recent years, the literature on diaspora philanthropy is scarce. There is a variety of opinion on what should and should not be considered under this scribe, which makes it impossible to provide a definitive description of diaspora philanthropy that suits everyone. The term diaspora has different meanings for different individuals and groups of people. Some see it as relating only to exiled and ejected communities of people; others use the term to refer to individuals or groups who are living in a new homeland whether by choice or circumstance. This paper defines diaspora in terms of an individual or group which identifies with an original homeland, (either theirs or a member of their familys such as a grandparent), and is in the diaspora whether through their choice or a circumstance beyond their control. This obligatory identification towards a homeland differentiates this study on diaspora philanthropy from those that define it as an affiliation with a religious community and not necessarily a specific homeland.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We report an inverse Spatially Offset Raman Spectrometer capable of non-invasively identifying packaged substances from a distance. Usual inverse SORS spectrometer has a non-contact distance that is equivalent to the focal distance of the collection system. In this work we demonstrate the defocused geometry with a modified data analysis method capable of making inverse SORS measurements from a distance greater than the focal distance of the collection lenses. With the defocused geometry we were able to detect acetaminophen, concealed inside a 2 mm thick plastic bottle, at a non-contact distance of 30 cm.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Experts views and commentary have been highly respected in every discipline. However, unlike traditional disciplines like medicine, mathematics and engineering, Information System (IS) expertise is difficult to define. Despite seeking expert advice and views is common in the areas of IS project management, system implementations and evaluations. This research-in-progress paper attempts to understand the characteristics of IS-expert through a comprehensive literature review of analogous disciplines and then derives a formative research model with three main constructs. A validated construct of expertise of IS will have a wide range of implications for research and practice.