123 resultados para Becker, Kurt
Resumo:
Aims: To investigate the change that occurs in intraocular pressure (IOP) and ocular pulse amplitude (OPA) with accommodation in young adult myopes and emmetropes. Methods: Fifteen progressing myopic and 17 emmetropic young adult subjects had their IOP and OPA measured using the Pascal dynamic contour tonometer. Measurements were taken initially with accommodation relaxed, and then following 2 min of near fixation (accommodative demand 3 D). Baseline measurements of axial length and corneal thickness were also collected prior to the IOP measures. Results: IOP significantly decreased with accommodation in both the myopic and emmetropic subjects (mean change 1.861.1 mm Hg, p<0.0001). There was no significant difference (p>0.05) between myopes and emmetropes in terms of baseline IOP or the magnitude of change in IOP with accommodation. OPA also decreased significantly with accommodation (mean change for all subjects 0.560.5, p<0.0001). The myopic subjects (baseline OPA 2.060.7 mm Hg) exhibited a significantly lower baseline OPA (p¼0.004) than the emmetropes (baseline OPA 3.261.3 mm Hg),and a significantly lower magnitude of change in OPA with accommodation. Conclusion: IOP decreases significantly with accommodation, and changes similarly in progressing myopic and emmetropic subjects. However, differences found between progressing myopes and emmetropes in the mean OPA levels and the decrease in OPA associated with accommodation suggested some changes in IOP dynamics associated with myopia.
Resumo:
For most of the 20th Century a ‘closed’ system of adoption was practised throughout Australia and other modern Western societies. This ‘closed’ system was characterised by sealed records; amended birth certificates to conceal the adoption, and prohibited contact with all biological family. Despite claims that these measures protected these children from the taint of illegitimacy the central motivations were far more complex, involving a desire to protect couples from the stigma of infertility and to provide a socially acceptable family structure (Triseliotis, Feast, & Kyle, 2005; Marshall & McDonald, 2001). From the 1960s significant evidence began to emerge that many adopted children and adults were experiencing higher incidences of psychological difficulties, characterised by problems with psychological adjustment, building self-esteem and forming a secure personal identity. These difficulties became grouped under the term ‘genealogical bewilderment’. As a result, new policies and practices were introduced to try to place the best interests of the child at the forefront. These changes reflected new understandings of adoption; as not only an individual process but also as a social and relational process that continues throughout life. Secrecy and the withholding of birth information are now prohibited in the overwhelming majority of all domestic adoptions processed in Australia (Marshall & McDonald, 2001). One little known consequence of this ‘closed’ system of adoption was the significant number of children who were never told of their adoptive status. As a consequence, some have discovered or had this information disclosed to them, as adults. The first study that looked at the late discovery of genetic origins experiences was conducted by the Post Adoption Resource Centre in New South Wales in 1999. This report found that the participants in their study expressed feelings of disbelief, confusion, anger, sorrow and loss. Further, the majority of participants continued to struggle with issues arising from this intentional concealment of their genetic origins (Perl & Markham, 1999). A second and more recent study (Passmore, Feeney & Foulstone, 2007) looked at the issue of secrecy in adoptive families as part of a broader study of 144 adult adoptees. This study found that secrecy and/or lies or misinformation on the part of adoptive parents had negative effects on both personal identity and relationships with others. The authors noted that those adoptees who found out about their adoption as adults were ‘especially likely to feel a sense of betrayal’ (p.4). Over recent years, stories of secrecy and late discovery have also started to emerge from sperm donor conceived adults (Spencer, 2007; Turner & Coyle, 2000). Current research evidence shows that although a majority of couples during the donor assisted conception process indicate that they intend to tell the offspring about their origins, as many as two-thirds or more of couples continue to withhold this information from their children (Akker, 2006; Gottlieb, A. McWhinnie, 2001; Salter-Ling, Hunter, & Glover, 2001). Why do they keep this secret? Infertility involves a range of complex factors that are often left unresolved or poorly understood by those choosing insemination by donor as a form of family building (Schaffer, J. A., & Diamond, R., 1993). These factors may only impact after the child is born, when resemblance talk becomes most pronounced. Resemblance talk is an accepted form of public discourse and a social convention that legitimises the child as part of the family and is part of the process of constructing the child’s identity within the family. Couples tend to become focused on resemblance as this is where they feel most vulnerable, and the lack of resemblance to the parenting father may trigger his sense of loss (Becker, Butler, & Nachtigall, 2005).
Resumo:
Much research has investigated the differences between option implied volatilities and econometric model-based forecasts. Implied volatility is a market determined forecast, in contrast to model-based forecasts that employ some degree of smoothing of past volatility to generate forecasts. Implied volatility has the potential to reflect information that a model-based forecast could not. This paper considers two issues relating to the informational content of the S&P 500 VIX implied volatility index. First, whether it subsumes information on how historical jump activity contributed to the price volatility, followed by whether the VIX reflects any incremental information pertaining to future jump activity relative to model-based forecasts. It is found that the VIX index both subsumes information relating to past jump contributions to total volatility and reflects incremental information pertaining to future jump activity. This issue has not been examined previously and expands our understanding of how option markets form their volatility forecasts.
Resumo:
uring periods of market stress, electricity prices can rise dramatically. Electricity retailers cannot pass these extreme prices on to customers because of retail price regulation. Improved prediction of these price spikes therefore is important for risk management. This paper builds a time-varying-probability Markov-switching model of Queensland electricity prices, aimed particularly at forecasting price spikes. Variables capturing demand and weather patterns are used to drive the transition probabilities. Unlike traditional Markov-switching models that assume normality of the prices in each state, the model presented here uses a generalised beta distribution to allow for the skewness in the distribution of electricity prices during high-price episodes.
Resumo:
Purpose – One of the critical issues for change management, particularly in relation to the implementation of new technologies, is the existence of prior knowledge and established mental models which may hinder change efforts. Understanding unlearning and how it might assist during organizational change is a way to address this resistance. The purpose of this paper is to present research designed to identify specific factors that facilitate unlearning. Design/methodology/approach – Drawing together issues identified as potential influencers of unlearning, a survey questionnaire was developed and administered in an Australian corporation undergoing large-scale change due to the implementation of an enterprise information system. The results were analyzed to identify specific factors that impact on unlearning. Findings – Findings from this paper identify factors that hinder or help the unlearning process during times of change including understanding the need for change, the level of organizational support and training, assessment of the change, positive experience and informal support, the organization's history of change, individual's prior outlooks, and individuals' feelings and expectations. Research limitations/implications – The use of only one organization does not allow for comparisons between organizations of different sizes, cultures or industries and therefore extension of this research is recommended. Practical implications – For practitioners, this paper provides specific elements at both the level of individuals and the organization that need to be considered for optimal unlearning during times of change. Originality/value – Previous literature on unlearning has been predominantly conceptual and theoretical. These empirical findings serve to further an earlier model based on qualitative research into potential influencers of unlearning.
Resumo:
The paper examines whether there was an excess of deaths and the relative role of temperature and ozone in a heatwave during 7–26 February 2004 in Brisbane, Australia, a subtropical city accustomed to warm weather. The data on daily counts of deaths from cardiovascular disease and non-external causes, meteorological conditions, and air pollution in Brisbane from 1 January 2001 to 31 October 2004 were supplied by the Australian Bureau of Statistics, Australian Bureau of Meteorology, and Queensland Environmental Protection Agency, respectively. The relationship between temperature and mortality was analysed using a Poisson time series regression model with smoothing splines to control for nonlinear effects of confounding factors. The highest temperature recorded in the 2004 heatwave was 42°C compared with the highest recorded temperature of 34°C during the same periods of 2001–2003. There was a significant relationship between exposure to heat and excess deaths in the 2004 heatwave estimated increase in non-external deaths: 75 [(95% confidence interval, CI: 11–138; cardiovascular deaths: 41 (95% CI: −2 to 84)]. There was no apparent evidence of substantial short-term mortality displacement. The excess deaths were mainly attributed to temperature but exposure to ozone also contributed to these deaths.
Resumo:
One approach to reducing the yield losses caused by banana viral diseases is the use of genetic engineering and pathogen-derived resistance strategies to generate resistant cultivars. The development of transgenic virus resistance requires an efficient banana transformation method, particularly for commercially important 'Cavendish' type cultivars such as 'Grand Nain'. Prior to this study, only two examples of the stable transformation of banana had been reported, both of which demonstrated the principle of transformation but did not characterise transgenic plants in terms of the efficiency at which individual transgenic lines were generated, relative activities of promoters in stably transformed plants, and the stability of transgene expression. The aim of this study was to develop more efficient transformation methods for banana, assess the activity of some commonly used and also novel promoters in stably transformed plants, and transform banana with genes that could potentially confer resistance to banana bunchy top nanovirus (BBTV) and banana bract mosaic potyvirus (BBrMV). A regeneration system using immature male flowers as the explant was established. The frequency of somatic embryogenesis in male flower explants was influenced by the season in which the inflorescences were harvested. Further, the media requirements of various banana cultivars in respect to the 2,4-D concentration in the initiation media also differed. Following the optimisation of these and other parameters, embryogenic cell suspensions of several banana (Musa spp.) cultivars including 'Grand Nain' (AAA), 'Williams' (AAA), 'SH-3362' (AA), 'Goldfinger' (AAAB) and 'Bluggoe' (ABB) were successfully generated. Highly efficient transformation methods were developed for both 'Bluggoe' and 'Grand Nain'; this is the first report of microprojectile bombardment transformation of the commercially important 'Grand Nain' cultivar. Following bombardment of embryogenic suspension cells, regeneration was monitored from single transfom1ed cells to whole plants using a reporter gene encoding the green fluorescent protein (gfp). Selection with kanamycin enabled the regeneration of a greater number of plants than with geneticin, while still preventing the regeneration of non-transformed plants. Southern hybridisation confirmed the neomycin phosphotransferase gene (npt II) was stably integrated into the banana genome and that multiple transgenic lines were derived from single bombardments. The activity, stability and tissue specificity of the cauliflower mosaic virus 358 (CaMV 35S) and maize polyubiquitin-1 (Ubi-1) promoters were examined. In stably transformed banana, the Ubi-1 promoter provided approximately six-fold higher p-glucuronidase (GUS) activity than the CaMV 35S promoter, and both promoters remained active in glasshouse grown plants for the six months they were observed. The intergenic regions ofBBTV DNA-I to -6 were isolated and fused to either the uidA (GUS) or gfjJ reporter genes to assess their promoter activities. BBTV promoter activity was detected in banana embryogenic cells using the gfp reporter gene. Promoters derived from BBTV DNA-4 and -5 generated the highest levels of transient activity, which were greater than that generated by the maize Ubi-1 promoter. In transgenic banana plants, the activity of the BBTV DNA-6 promoter (BT6.1) was restricted to the phloem of leaves and roots, stomata and root meristems. The activity of the BT6.1 promoter was enhanced by the inclusion of intron-containing fragments derived from the maize Ubi-1, rice Act-1, and sugarcane rbcS 5' untranslated regions in GUS reporter gene constructs. In transient assays in banana, the rice Act-1 and maize Ubi-1 introns provided the most significant enhancement, increasing expression levels 300-fold and 100-fold, respectively. The sugarcane rbcS intron increased expression about 10-fold. In stably transformed banana plants, the maize Ubi-1 intron enhanced BT6.1 promoter activity to levels similar to that of the CaMV 35S promoter, but did not appear to alter the tissue specificity of the promoter. Both 'Grand Nain' and 'Bluggoe' were transformed with constructs that could potentially confer resistance to BBTV and BBrMV, including constructs containing BBTV DNA-1 major and internal genes, BBTV DNA-5 gene, and the BBrMV coat protein-coding region all under the control of the Ubi-1 promoter, while the BT6 promoter was used to drive the npt II selectable marker gene. At least 30 transgenic lines containing each construct were identified and replicates of each line are currently being generated by micropropagation in preparation for virus challenge.
Resumo:
This paper describes a number of techniques for GNSS navigation message authentication. A detailed analysis of the security facilitated by navigation message authentication is given. The analysis takes into consideration the risk of critical applications that rely on GPS including transportation, finance and telecommunication networks. We propose a number of cryptographic authentication schemes for navigation data authentication. These authentication schemes provide authenticity and integrity of the navigation data to the receiver. Through software simulation, the performance of the schemes is quantified. The use of software simulation enables the collection of authentication performance data of different data channels, and the impact of various schemes on the infrastructure and receiver. Navigation message authentication schemes have been simulated at the proposed data rates of Galileo and GPS services, for which the resulting performance data is presented. This paper concludes by making recommendations for optimal implementation of navigation message authentication for Galileo and next generation GPS systems.
Resumo:
Tracking/remote monitoring systems using GNSS are a proven method to enhance the safety and security of personnel and vehicles carrying precious or hazardous cargo. While GNSS tracking appears to mitigate some of these threats, if not adequately secured, it can be a double-edged sword allowing adversaries to obtain sensitive shipment and vehicle position data to better coordinate their attacks, and to provide a false sense of security to monitoring centers. Tracking systems must be designed with the ability to perform route-compliance and thwart attacks ranging from low-level attacks such as the cutting of antenna cables to medium and high-level attacks involving radio jamming and signal / data-level simulation, especially where the goods transported have a potentially high value to terrorists. This paper discusses the use of GNSS in critical tracking applications, addressing the mitigation of GNSS security issues, augmentation systems and communication systems in order to provide highly robust and survivable tracking systems.
Resumo:
This paper describes a secure framework for tracking applications that use the Galileo signal authentication services. First a number of limitations that affect the trust of critical tracking applications, even in presence of authenticated GNSS signals, are detailed. Requirements for secure tracking are then introduced; detailing how the integrity characteristics of the Galileo authentication could enhance the security of active tracking applications. This paper concludes with a discussion of our existing tracking technology using a Siemens TC45 GSM/GPRS module and future development utilizing our previously proposed trusted GNSS receiver.
Resumo:
The paper describes a number of requirements for enhancing the trust of location acquisition from Satellite Navigation Systems, particularly for those applications where the location is monitored through a remote GNSS receiver. We discuss how the trust of a location acquisition could be propagated to an application through the use of a proposed tamper-resistant GNSS receiver which quantifies the trust of a location solution from the signaling used (ie. P(Y) code, Galileo SOL, PRS, CS) and provides a cryptographic proof of this to a remote application. The tamper-resistance state of the receiver is also included in this cryptographic proof.
Resumo:
The notion of routines as mechanisms for achieving stability and change in organisations is well established in the organisational theory literature (Becker, 2004). However the relationship between the dynamics of selection, adaptation and retention and the increase or decrease in the varieties of routines which are the result of these processes, is not as well established theoretically or empirically. This paper investigates the processes associated with the evolution of an inter-organisational routine over time. The paper contributes to theory by advancing a conceptual clarification between the dynamics of organisational routines which produce variation, and the varieties of routines which are generated as a result of such processes; and an explanation for the relationship between selection, adaptation and retention dynamics and the creation of variety. The research is supported by analysis of empirical data pertaining to the procurement of engineering assets in a large asset intensive organisation.