53 resultados para Exponential and trigonometrical octoniônic functions


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Problem-solving courts appear to achieve outcomes that are not common in mainstream courts. There are increasing calls for the adoption of more therapeutic and problem-solving practices by mainstream judges in civil and criminal courts in a number of jurisdictions, most notably in the United States and Australia. Currently, a judge who sets out to exercise a significant therapeutic function is likely to be doing so in a specialist court or jurisdiction, outside the mainstream court system, and arguably, outside the adversarial paradigm itself. To some extent, this work is tolerated but marginalised. However, do therapeutic and problem-solving functions have the potential to help define, rather than simply complement, the role of judicial officers? The core question addressed in this thesis is whether the judicial role could evolve to be not just less adversarial, but fundamentally non-adversarial. In other words, could we see—or are we seeing—a juristic paradigm shift not just in the colloquial, casual sense of the word, but in the strong, worldview changing sense meant by Thomas Kuhn? This thesis examines the current relationship between adversarialism and therapeutic jurisprudence in the context of Kuhn’s conception of the transition from periods of ‘normal science’, through periods of anomaly and disciplinary crises to paradigm shifts. It considers whether therapeutic jurisprudence and adversarialism are incommensurable in the Kuhnian sense, and if so, what this means for the relationship between the two, and for the agenda to mainstream therapeutic jurisprudence. The thesis asserts that Kuhnian incommensurability is, in fact, a characteristic of the relationship between adversarialism and therapeutic jurisprudence, but that the possibility of a therapeutic paradigm shift in law can be reconciled with many adversarial and due process principles by relating this incommensurability to a broader disciplinary matrix.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Adopting a traffic safety culture approach, this paper identifies and discusses the ongoing challenge of promoting the road safety message in Australia. It is widely acknowledged that mass media and public education initiatives have played a critical role in the significant positive changes witnessed in community attitudes to road safety in the last three to four decades. It could be argued that mass media and education have had a direct influence on behaviours and attitudes, as well as an indirect influence through signposting and awareness raising functions in conjunction with enforcement. Great achievements have been made in reducing fatalities on Australia’s roads; a concept which is well understood among the international road safety fraternity. How well these achievements are appreciated by the general Australian community however, is not clear. This paper explores the lessons that can be learnt from successes in attitudinal and behaviour change in regard to seatbelt use and drink driving in Australia. It also identifies and discusses key challenges associated with achieving further positive changes in community attitudes and behaviours, particularly in relation to behaviours that may not be perceived by the community as dangerous, such as speeding and mobile phone use while driving. Potential strategies for future mass media and public education campaigns to target these challenges are suggested, including ways of harnessing the power of contemporary traffic law enforcement techniques, such as point-to-point speed enforcement and in-vehicle technologies, to help spread the road safety message.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A home is an embodiment of human privacy, apart from providing shelter, security and several other functions. Achieving the desired level of privacy at home is very important in Muslim societies. Privacy is intended to protect the female members of the family from strangers, especially while entertaining guests at home. One way of controlling levels of exposure of the domestic domains to strangers is by controlling privacy levels. This research will investigate perceptions of privacy among Australian Muslims when entertaining guests at their homes. This research will also investigate the extent that modesty (achieved through both appearance and design) acts as the balancing factor in achieving a family’s desired levels of privacy while also affording them the capacity to be hospitable to guests. This research will use a qualitative approach to investigate Australian Muslim homes around Queensland, predominantly in the Brisbane area. A total number of 20 to 60 participants (10 to 30 males, 10 to 30 females) ranging from 25 to 55 years old will be interviewed. Ideally, participants will be those who have children or extended families (parents or siblings) living in the house. The data will be coded and analysed for the purpose of generating new knowledge for architects and designers when designing Muslim homes. It will also extend the current body of knowledge related to privacy mechanisms in housing designs, thereby benefitting architects and designers in the future.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Ground-penetrating radar (GPR) is widely used for assessment of soil moisture variability in field soils. Because GPR does not measure soil water content directly, it is common practice to use calibration functions that describe its relationship with the soil dielectric properties and textural parameters. However, the large variety of models complicates the selection of the appropriate function. In this article an overview is presented of the different functions available, including volumetric models, empirical functions, effective medium theories, and frequency-specific functions. Using detailed information presented in summary tables, the choice for which calibration function to use can be guided by the soil variables available to the user, the frequency of the GPR equipment, and the desired level of detail of the output. This article can thus serve as a guide for GPR practitioners to obtain soil moisture values and to estimate soil dielectric properties.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In the present study, we examined a panel of human breast cancer cell lines with regard to their expression of CD44 and ability to bind and degrade hyaluronan. The cell lines expressed varying amounts of different molecular weight forms of CD44 (85-200 kDa) and, in general, those that expressed the greatest amounts of CD44 were the most invasive as judged by in vitro assays. In addition, the ability to bind and degrade hyaluronan was restricted to the cell lines expressing high levels of CD44, and both these functions were blocked by an antibody to CD44 (Hermes-1). Moreover, the rate of [3H]hyaluronan degradation was highly correlated with the amount of CD44 (r = 0.951, P < 0.0001), as well as with the invasive potential of the cells. Scatchard analysis of the [3H]hyaluronan binding of these cells revealed the existence of significant differences in both their binding capacity and their dissociation constant. To determine the source of this deviation, the different molecular weight forms of CD44 were partially separated by gel filtration chromatography. In all cell lines, the 85 kDa form was able to bind hyaluronan, although with different affinities. In contrast, not all of the high molecular weight forms of CD44 had this ability. These results illustrate the diversity of CD44 molecules in invasive tumor cells, and suggest that one of their major functions is to degrade hyaluronan.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Senataxin, mutated in the human genetic disorder ataxia with oculomotor apraxia type 2 (AOA2), plays an important role in maintaining genome integrity by coordination of transcription, DNA replication, and the DNA damage response. We demonstrate that senataxin is essential for spermatogenesis and that it functions at two stages in meiosis during crossing-over in homologous recombination and in meiotic sex chromosome inactivation (MSCI). Disruption of the Setx gene caused persistence of DNA double-strand breaks, a defect in disassembly of Rad51 filaments, accumulation of DNA:RNA hybrids (R-loops), and ultimately a failure of crossing-over. Senataxin localised to the XY body in a Brca1-dependent manner, and in its absence there was incomplete localisation of DNA damage response proteins to the XY chromosomes and ATR was retained on the axial elements of these chromosomes, failing to diffuse out into chromatin. Furthermore persistence of RNA polymerase II activity, altered ubH2A distribution, and abnormal XY-linked gene expression in Setx⁻/⁻ revealed an essential role for senataxin in MSCI. These data support key roles for senataxin in coordinating meiotic crossing-over with transcription and in gene silencing to protect the integrity of the genome.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Purpose This paper seeks to investigate the conditions and processes affecting the operation and potential effectiveness of audit committees (ACs), with particular focus on the interaction between the AC, individuals from financial reporting and internal audit functions and the external auditors. Design/methodology/approach A case study approach is employed, based on direct engagement with participants in AC activities, including the AC chair, external auditors, internal auditors, and senior management. Findings The authors find that informal networks between AC participants condition the impact of the AC and that the most significant effects of the AC on governance outcomes occur outside the formal structures and processes. An AC has pervasive behavioural effects within the organization and may be used as a threat, an ally and an arbiter in bringing solutions to issues and conflicts. ACs are used in organizational politics, communication processes and power plays and also affect interpretations of events and cultural values. Research limitations/implications Further research on AC and governance processes is needed to develop better understanding of effectiveness. Longitudinal studies, focusing on the organizational and institutional context of AC operations, can examine how historical events in an organization and significant changes in the regulatory environment affect current structures and processes. Originality/value The case analysis highlights a number of significant factors which are not fully recognised either in theorizing the governance role of ACs or in the development of policy and regulations concerning ACs but which impinge on their governance contribution. They include the importance of informal processes around the AC; its influence on power relations between organizational participants; the relevance of the historical development of governance in an organization; and the possibility that the AC’s impact on governance may be greatest in non-routine situations.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

BACKGROUND: The evaluation of retinal image quality in cataract eyes has gained importance and the clinical modulation transfer functions (MTF) can obtained by aberrometer and double pass (DP) system. This study aimed to compare MTF derived from a ray tracing aberrometer and a DP system in early cataractous and normal eyes. METHODS: There were 128 subjects with 61 control eyes and 67 eyes with early cataract defined according to the Lens Opacities Classification System III. A laser ray-tracing wavefront aberrometer (iTrace) and a double pass (DP) system (OQAS) assessed ocular MTF for 6.0 mm pupil diameters following dilation. Areas under the MTF (AUMTF) and their correlations were analyzed. Stepwise multiple regression analysis assessed factors affecting the differences between iTrace- and OQAS-derived AUMTF for the early cataract group. RESULTS: For both early cataract and control groups, iTrace-derived MTFs were higher than OQAS-derived MTFs across a range of spatial frequencies (P < 0.01). No significant difference between the two groups occurred for iTrace-derived AUMTF, but the early cataract group had significantly smaller OQAS-derived AUMTF than did the control group (P < 0.01). AUMTF determined from both the techniques demonstrated significant correlations with nuclear opacities, higher-order aberrations (HOAs), visual acuity, and contrast sensitivity functions, while the OQAS-derived AUMTF also demonstrated significant correlations with age and cortical opacity grade. The factors significantly affecting the difference between iTrace and OQAS AUMTF were root-mean-squared HOAs (standardized beta coefficient = -0.63, P < 0.01) and age (standardized beta coefficient = 0.26, P < 0.01). CONCLUSIONS: MTFs determined from a iTrace and a DP system (OQAS) differ significantly in early cataractous and normal subjects. Correlations with visual performance were higher for the DP system. OQAS-derived MTF may be useful as an indicator of visual performance in early cataract eyes.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We analyse the security of iterated hash functions that compute an input dependent checksum which is processed as part of the hash computation. We show that a large class of such schemes, including those using non-linear or even one-way checksum functions, is not secure against the second preimage attack of Kelsey and Schneier, the herding attack of Kelsey and Kohno and the multicollision attack of Joux. Our attacks also apply to a large class of cascaded hash functions. Our second preimage attacks on the cascaded hash functions improve the results of Joux presented at Crypto’04. We also apply our attacks to the MD2 and GOST hash functions. Our second preimage attacks on the MD2 and GOST hash functions improve the previous best known short-cut second preimage attacks on these hash functions by factors of at least 226 and 254, respectively. Our herding and multicollision attacks on the hash functions based on generic checksum functions (e.g., one-way) are a special case of the attacks on the cascaded iterated hash functions previously analysed by Dunkelman and Preneel and are not better than their attacks. On hash functions with easily invertible checksums, our multicollision and herding attacks (if the hash value is short as in MD2) are more efficient than those of Dunkelman and Preneel.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The von Bertalanffy growth model is extended to incorporate explanatory variables. The generalized model includes the switched growth model and the seasonal growth model as special cases, and can also be used to assess the tagging effect on growth. Distribution-free and consistent estimating functions are constructed for estimation of growth parameters from tag-recapture data in which age at release is unknown. This generalizes the work of James (1991, Biometrics 47 1519-1530) who considered the classical model and allowed for individual variability in growth. A real dataset from barramundi (Lates calcarifer) is analysed to estimate the growth parameters and possible effect of tagging on growth.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Radio frequency (R.F.) glow discharge polyterpenol thin films were prepared on silicon wafers and irradiated with I10+ ions to fluences of 1 × 1010 and 1 × 1012 ions/cm2. Post-irradiation characterisation of these films indicated the development of well-defined nano-scale ion entry tracks, highlighting prospective applications for ion irradiated polyterpenol thin films in a variety of membrane and nanotube-fabrication functions. Optical characterisation showed the films to be optically transparent within the visible spectrum and revealed an ability to selectively control the thin film refractive index as a function of fluence. This indicates that ion irradiation processing may be employed to produce plasma-polymer waveguides to accommodate a variety of wavelengths. XRR probing of the substrate-thin film interface revealed interfacial roughness values comparable to those obtained for the uncoated substrate's surface (i.e., both on the order of 5 Å), indicating minimal substrate etching during the plasma deposition process.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

“SOH see significant benefit in digitising its drawings and operation and maintenance manuals. Since SOH do not currently have digital models of the Opera House structure or other components, there is an opportunity for this national case study to promote the application of Digital Facility Modelling using standardized Building Information Models (BIM)”. The digital modelling element of this project examined the potential of building information models for Facility Management focusing on the following areas: • The re-usability of building information for FM purposes • BIM as an Integrated information model for facility management • Extendibility of the BIM to cope with business specific requirements • Commercial facility management software using standardised building information models • The ability to add (organisation specific) intelligence to the model • A roadmap for SOH to adopt BIM for FM The project has established that BIM – building information modelling - is an appropriate and potentially beneficial technology for the storage of integrated building, maintenance and management data for SOH. Based on the attributes of a BIM, several advantages can be envisioned: consistency in the data, intelligence in the model, multiple representations, source of information for intelligent programs and intelligent queries. The IFC – open building exchange standard – specification provides comprehensive support for asset and facility management functions, and offers new management, collaboration and procurement relationships based on sharing of intelligent building data. The major advantages of using an open standard are: information can be read and manipulated by any compliant software, reduced user “lock in” to proprietary solutions, third party software can be the “best of breed” to suit the process and scope at hand, standardised BIM solutions consider the wider implications of information exchange outside the scope of any particular vendor, information can be archived as ASCII files for archival purposes, and data quality can be enhanced as the now single source of users’ information has improved accuracy, correctness, currency, completeness and relevance. SOH current building standards have been successfully drafted for a BIM environment and are confidently expected to be fully developed when BIM is adopted operationally by SOH. There have been remarkably few technical difficulties in converting the House’s existing conventions and standards to the new model based environment. This demonstrates that the IFC model represents world practice for building data representation and management (see Sydney Opera House – FM Exemplar Project Report Number 2005-001-C-3, Open Specification for BIM: Sydney Opera House Case Study). Availability of FM applications based on BIM is in its infancy but focussed systems are already in operation internationally and show excellent prospects for implementation systems at SOH. In addition to the generic benefits of standardised BIM described above, the following FM specific advantages can be expected from this new integrated facilities management environment: faster and more effective processes, controlled whole life costs and environmental data, better customer service, common operational picture for current and strategic planning, visual decision-making and a total ownership cost model. Tests with partial BIM data – provided by several of SOH’s current consultants – show that the creation of a SOH complete model is realistic, but subject to resolution of compliance and detailed functional support by participating software applications. The showcase has demonstrated successfully that IFC based exchange is possible with several common BIM based applications through the creation of a new partial model of the building. Data exchanged has been geometrically accurate (the SOH building structure represents some of the most complex building elements) and supports rich information describing the types of objects, with their properties and relationships.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Health care accounts for a substantial and growing share of national expenditures, and Australia’s health-care system faces some unprecedented pressures. This paper examines the contribution of creative expertise and services to Australian health care. They are found to be making a range of contributions to the development and delivery of health-care goods and services, the initial training and ongoing professionalism of doctors and nurses, and the effective functioning of health-care buildings. Creative activities within health-care services are also undertaken by medical professionals and patients. Key functions that creative activities address are innovation and service delivery in information management and analysis, and making complex information comprehensible or more useful, assisting communication and reducing psycho-social and distance-mediated barriers, and improving the efficiency and effectiveness of services.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Internet presents a constantly evolving frontier for criminology and policing, especially in relation to online predators – paedophiles operating within the Internet for safer access to children, child pornography and networking opportunities with other online predators. The goals of this qualitative study are to undertake behavioural research – identify personality types and archetypes of online predators and compare and contrast them with behavioural profiles and other psychological research on offline paedophiles and sex offenders. It is also an endeavour to gather intelligence on the technological utilisation of online predators and conduct observational research on the social structures of online predator communities. These goals were achieved through the covert monitoring and logging of public activity within four Internet Relay Chat(rooms) (IRC) themed around child sexual abuse and which were located on the Undernet network. Five days of monitoring was conducted on these four chatrooms between Wednesday 1 to Sunday 5 April 2009; this raw data was collated and analysed. The analysis identified four personality types – the gentleman predator, the sadist, the businessman and the pretender – and eight archetypes consisting of the groomers, dealers, negotiators, roleplayers, networkers, chat requestors, posters and travellers. The characteristics and traits of these personality types and archetypes, which were extracted from the literature dealing with offline paedophiles and sex offenders, are detailed and contrasted against the online sexual predators identified within the chatrooms, revealing many similarities and interesting differences particularly with the businessman and pretender personality types. These personality types and archetypes were illustrated by selecting users who displayed the appropriate characteristics and tracking them through the four chatrooms, revealing intelligence data on the use of proxies servers – especially via the Tor software – and other security strategies such as Undernet’s host masking service. Name and age changes, which is used as a potential sexual grooming tactic was also revealed through the use of Analyst’s Notebook software and information on ISP information revealed the likelihood that many online predators were not using any safety mechanism and relying on the anonymity of the Internet. The activities of these online predators were analysed, especially in regards to child sexual grooming and the ‘posting’ of child pornography, which revealed a few of the methods in which online predators utilised new Internet technologies to sexually groom and abuse children – using technologies such as instant messengers, webcams and microphones – as well as store and disseminate illegal materials on image sharing websites and peer-to-peer software such as Gigatribe. Analysis of the social structures of the chatrooms was also carried out and the community functions and characteristics of each chatroom explored. The findings of this research have indicated several opportunities for further research. As a result of this research, recommendations are given on policy, prevention and response strategies with regards to online predators.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We consider the problem of how to efficiently and safely design dose finding studies. Both current and novel utility functions are explored using Bayesian adaptive design methodology for the estimation of a maximum tolerated dose (MTD). In particular, we explore widely adopted approaches such as the continual reassessment method and minimizing the variance of the estimate of an MTD. New utility functions are constructed in the Bayesian framework and are evaluated against current approaches. To reduce computing time, importance sampling is implemented to re-weight posterior samples thus avoiding the need to draw samples using Markov chain Monte Carlo techniques. Further, as such studies are generally first-in-man, the safety of patients is paramount. We therefore explore methods for the incorporation of safety considerations into utility functions to ensure that only safe and well-predicted doses are administered. The amalgamation of Bayesian methodology, adaptive design and compound utility functions is termed adaptive Bayesian compound design (ABCD). The performance of this amalgamation of methodology is investigated via the simulation of dose finding studies. The paper concludes with a discussion of results and extensions that could be included into our approach.