117 resultados para Low-Level Light Therapy


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Principal topic: Effectuation theory suggests that entrepreneurs develop their new ventures in an iterative way by selecting possibilities through flexibility and interactions with the market; a focus on affordability of loss rather than maximal return on the capital invested, and the development of pre-commitments and alliances from stakeholders (Sarasvathy, 2001, 2008; Sarasvathy et al., 2005, 2006). In contrast, causation may be described as a rationalistic reasoning method to create a company. After a comprehensive market analysis to discover opportunities, the entrepreneur will select the alternative with the higher expected return and implement it through the use of a business plan. However, little is known about the consequences of following either of these two processes. One aspect that remains unclear is the relationship between newness and effectuation. On one hand it can be argued that the combination of a means-centered, interactive (through pre-commitments and alliances with stakeholders from the early phases of the venture creation) and open-minded process (through flexibility of exploiting contingencies) should encourage and facilitate the development of innovative solutions. On the other hand, having a close relationship with their “future first customers” and focussing too much on the resources and knowledge already within the firm may be a constraint that is not conducive to innovation, or at least not to a radical innovation. While it has been suggested that effectuation strategy is more likely to be used by innovative entrepreneurs (Sarasvathy, 2001), this hypothesis has not been demonstrated yet (Sarasvathy, 2001). Method: In our attempt to capture newness in its different aspects we have considered the following four domains where newness may happen: new product/service; new method for promotion and sales; new production methods/sourcing; market creation. We identified how effectuation may be differently associated with these four domains of newness. To test our four sets of hypotheses a dataset of 1329 firms (702 nascent and 627 young firms) randomly selected in Australia was examined through ANOVA Tukey HSD Test. Results and Implications: Results indicate the existence of a curvilinear relationship between effectuation and newness where low and high levels of newness are associated with low level of effectuation while medium level of newness is associated with high level of effectuation. Implications for academia, practitioners and policy makers are also discussed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The research presented in this thesis addresses inherent problems in signaturebased intrusion detection systems (IDSs) operating in heterogeneous environments. The research proposes a solution to address the difficulties associated with multistep attack scenario specification and detection for such environments. The research has focused on two distinct problems: the representation of events derived from heterogeneous sources and multi-step attack specification and detection. The first part of the research investigates the application of an event abstraction model to event logs collected from a heterogeneous environment. The event abstraction model comprises a hierarchy of events derived from different log sources such as system audit data, application logs, captured network traffic, and intrusion detection system alerts. Unlike existing event abstraction models where low-level information may be discarded during the abstraction process, the event abstraction model presented in this work preserves all low-level information as well as providing high-level information in the form of abstract events. The event abstraction model presented in this work was designed independently of any particular IDS and thus may be used by any IDS, intrusion forensic tools, or monitoring tools. The second part of the research investigates the use of unification for multi-step attack scenario specification and detection. Multi-step attack scenarios are hard to specify and detect as they often involve the correlation of events from multiple sources which may be affected by time uncertainty. The unification algorithm provides a simple and straightforward scenario matching mechanism by using variable instantiation where variables represent events as defined in the event abstraction model. The third part of the research looks into the solution to address time uncertainty. Clock synchronisation is crucial for detecting multi-step attack scenarios which involve logs from multiple hosts. Issues involving time uncertainty have been largely neglected by intrusion detection research. The system presented in this research introduces two techniques for addressing time uncertainty issues: clock skew compensation and clock drift modelling using linear regression. An off-line IDS prototype for detecting multi-step attacks has been implemented. The prototype comprises two modules: implementation of the abstract event system architecture (AESA) and of the scenario detection module. The scenario detection module implements our signature language developed based on the Python programming language syntax and the unification-based scenario detection engine. The prototype has been evaluated using a publicly available dataset of real attack traffic and event logs and a synthetic dataset. The distinct features of the public dataset are the fact that it contains multi-step attacks which involve multiple hosts with clock skew and clock drift. These features allow us to demonstrate the application and the advantages of the contributions of this research. All instances of multi-step attacks in the dataset have been correctly identified even though there exists a significant clock skew and drift in the dataset. Future work identified by this research would be to develop a refined unification algorithm suitable for processing streams of events to enable an on-line detection. In terms of time uncertainty, identified future work would be to develop mechanisms which allows automatic clock skew and clock drift identification and correction. The immediate application of the research presented in this thesis is the framework of an off-line IDS which processes events from heterogeneous sources using abstraction and which can detect multi-step attack scenarios which may involve time uncertainty.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Iconic and significant buildings are the common target of bombings by terrorists causing large numbers of casualties and extensive property damage. Recent incidents were external bomb attacks on multi-storey buildings with reinforced concrete frames. Under a blast load circumstance, crucial damage initiates at low level storeys in a building and may then lead to a progressive collapse of whole or part of the structure. It is therefore important to identify the critical initial influence regions along the height, width and depth of the building exposed to blast effects and the structure response in order to assess the vulnerability of the structure to disproportionate and progressive collapse. This paper discusses the blast response and the propagation of its effects on a two dimensional reinforced concrete (RC) frame, designed to withstand normal gravity loads. The explicit finite element code, LS DYNA is used for the analysis. A complete RC portal frame seven storeys by six bays is modelled with reinforcement details and appropriate materials to simulate strain rate effects. Explosion loads derived from standard manuals are applied as idealized triangular pressures on the column faces of the numerical models. The analysis reports the influence of blast propagation as displacements and material yielding of the structural elements in the RC frame. The effected regions are identified and classified according to the load cases. This information can be used to determine the vulnerability of multi-storey RC buildings to various external explosion scenarios and designing buildings to resist blast loads.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Guide contains the distilled findings from a major, two-year research project to explore those factors considered by industry practitioners to be critical to the successful adoption of ICT, both within their firms and between their firms and their trading partners. In the context of this project Critical Success Factors (CSFs) have been defined as, “Those things that absolutely, positively must be attended to in order to maximise the likelihood of a successful outcome for the stakeholder, defined in the stakeholder’s terms.” The guide includes: o Perceived benefits of ICT use across the consultants’ sector o Types and levels of ICT used across the sector o Self-assessment tool o CSFs for medium- and high-level ICT users, including o Best Practice Profiles o Action Statements o Barriers to ICT use for low-level users o Action Statements The material contained in this Guide has been generated following a number of principles: o For a given situation there is not a single ‘right answer’, but a number of solutions that have to be evaluated using a range of relevant factors. o As there are as many solutions as there are ‘solvers’, factors for evaluation will ‘emerge’ from collective wisdom.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Guide contains the distilled findings from a major, two-year research project to explore those factors considered by industry practitioners to be critical to the successful adoption of ICT, both within their firms and between their firms and their trading partners. In the context of this project Critical Success Factors (CSFs) have been defined as, “Those things that absolutely, positively must be attended to in order to maximise the likelihood of a successful outcome for the stakeholder, defined in the stakeholder’s terms.” The guide includes: o Perceived benefits of ICT use across the subcontractors’ sector o Types and levels of ICT used across the sector o Self-assessment tool o CSFs for medium- and high-level ICT users, including o Best Practice Profiles o Action Statements o Barriers to ICT use for low-level users o Action Statements The material contained in this Guide has been generated following a number of principles: o For a given situation there is not a single ‘right answer’, but a number of solutions that have to be evaluated using a range of relevant factors. o As there are as many solutions as there are ‘solvers’, factors for evaluation will ‘emerge’ from collective wisdom.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This study explored the prediction of psychological climate and stresses on job satisfaction in non U.S. setting. A total of 450 surveys were sent to 11 organisations in Thailand and employees were asked to fill out the survey. The first hypothesis that positive psychological climate dimensions predicted lower level of stresses among Thai employees was partially accepted. Further regression analysis tested second hypothesis that positive psychological climate dimensions and low level of stresses predict job satisfaction among Thai employees. Contrary to expectation, only stress variables predicted job satisfaction. Thai culture influence was discussed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Rural land has not always been considered as a major long-term investment with both institutional investors and absentee owners in countries such as U.K. and Australia. Although rural land is included in both single asset and mixed asset portfolios in the U.S, it is not at the same levels as either commercial or industrial property. Rural land occupies over 50% of the total area of Australia, and comprises over 115,000 economic farm properties (excludes rural residential, hobby farms and rural lifestyle blocks. However, less than 1.6% of the total economic farm numbers are actually owned by corporate or institutional investors. This low level of corporate involvement in the Australian rural property market has limited both the investment performance research and inclusion of this rural land type in both property and mixed asset investment portfolios. In the U.S. rural land is also the most extensive real estate type based on total area occupied. The United States Department of Agriculture statistics (1998) show that in 1997 there were 2.06 million farms in the U.S., covering 968 million acres, with a total value of $912 billion and generating an annual income of $202 billion. The level of corporate ownership of farms in the U.S. is also higher than the level of corporate farm ownership in Australia. This high level of institutional ownership in rural land in U.S has provided the opportunity for the rural property asset class to be analysed in relation to it’s investment performance and possible role in a mixed asset or mixed property investment portfolio.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Oberon-2 is an object-oriented language with a class structure based on type extension. The runtime structure of Oberon-2 is described and the low-level mechanism for dynamic type checking explained. It is shown that the superior type-safety of the language, when used for programming styles based on heterogeneous, pointer-linked data structures, has an entirely negligible cost in runtime performance.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Cultural objects are increasingly generated and stored in digital form, yet effective methods for their indexing and retrieval still remain an important area of research. The main problem arises from the disconnection between the content-based indexing approach used by computer scientists and the description-based approach used by information scientists. There is also a lack of representational schemes that allow the alignment of the semantics and context with keywords and low-level features that can be automatically extracted from the content of these cultural objects. This paper presents an integrated approach to address these problems, taking advantage of both computer science and information science approaches. We firstly discuss the requirements from a number of perspectives: users, content providers, content managers and technical systems. We then present an overview of our system architecture and describe various techniques which underlie the major components of the system. These include: automatic object category detection; user-driven tagging; metadata transform and augmentation, and an expression language for digital cultural objects. In addition, we discuss our experience on testing and evaluating some existing collections, analyse the difficulties encountered and propose ways to address these problems.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Air pollution is ranked by the World Health Organisation as one of the top ten contributors to the global burden of disease and injury. Exposure to gaseous air pollutants, even at a low level, has been associated with cardiorespiratory diseases (Vedal, Brauer et al. 2003). Most recent epidemiological studies of air pollution have used time-series analyses to explore the relationship between daily mortality or morbidity and daily ambient air pollution concentrations based on the same day or previous days (Hajat, Armstrong et al. 2007). However, most of the previous studies have examined the association between air pollution and health outcomes using air pollution data from a single monitoring site or average values from a few monitoring sites to represent the whole population of the study area. In fact, for a metropolitan city, ambient air pollution levels may differ significantly among the different areas. There is increasing concern that the relationships between air pollution and mortality may vary with geographical area (Chen, Mengersen et al. 2007). Additionally, some studies have indicated that socio-economic status can act as a confounder when investigating the relation between geographical location and health (Scoggins, Kjellstrom et al. 2004). This study examined the spatial variation in the relationship between long-term exposure to gaseous air pollutants (including nitrogen dioxide (NO2), ozone (O3) and sulphur dioxide (SO2)), and cardiorespiratory mortality in Brisbane, Australia, during the period 1996 - 2004.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Rodenticide use in agriculture can lead to the secondary poisoning of avian predators. Currently the Australian sugarcane industry has two rodenticides, Racumin® and Rattoff®, available for in-crop use but, like many agricultural industries, it lacks an ecologically-based method of determining the potential secondary poisoning risk the use of these rodenticides poses to avian predators. The material presented in this thesis addresses this by: a. determining where predator/prey interactions take place in sugar producing districts; b. quantifying the amount of rodenticide available to avian predators and the probability of encounter; and c. developing a stochastic model that allows secondary poisoning risk under various rodenticide application scenarios to be investigated. Results demonstrate that predator/prey interactions are highly constrained by environmental structure. Rodents used crops that provided high levels of canopy cover and therefore predator protection and poorly utilised open canopy areas. In contrast, raptors over-utilised areas with low canopy cover and low rodent densities, but which provided high accessibility to prey. Given this pattern of habitat use, and that industry baiting protocols preclude rodenticide application in open canopy crops, these results indicate that secondary poisoning can only occur if poisoned rodents leave closed canopy crops and become available for predation in open canopy areas. Results further demonstrate that after in-crop rodenticide application, only a small proportion of rodents available in open areas are poisoned and that these rodents carry low levels of toxicant. Coupled with the low level of rodenticide use in the sugar industry, the high toxic threshold raptors have to these toxicants and the low probability of encountering poisoned rodents, results indicate that the risk of secondary poisoning events occurring is minimal. A stochastic model was developed to investigate the effect of manipulating factors that might influence secondary poisoning hazard in a sugarcane agro-ecosystem. These simulations further suggest that in all but extreme scenarios, the risk of secondary poisoning is also minimal. Collectively, these studies demonstrate that secondary poisoning of avian predators associated with the use of the currently available rodenticides in Australian sugar producing districts is minimal. Further, the ecologically-based method of assessing secondary poisoning risk developed in this thesis has broader applications in other agricultural systems where rodenticide use may pose risks to avian predators.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Modern computer graphics systems are able to construct renderings of such high quality that viewers are deceived into regarding the images as coming from a photographic source. Large amounts of computing resources are expended in this rendering process, using complex mathematical models of lighting and shading. However, psychophysical experiments have revealed that viewers only regard certain informative regions within a presented image. Furthermore, it has been shown that these visually important regions contain low-level visual feature differences that attract the attention of the viewer. This thesis will present a new approach to image synthesis that exploits these experimental findings by modulating the spatial quality of image regions by their visual importance. Efficiency gains are therefore reaped, without sacrificing much of the perceived quality of the image. Two tasks must be undertaken to achieve this goal. Firstly, the design of an appropriate region-based model of visual importance, and secondly, the modification of progressive rendering techniques to effect an importance-based rendering approach. A rule-based fuzzy logic model is presented that computes, using spatial feature differences, the relative visual importance of regions in an image. This model improves upon previous work by incorporating threshold effects induced by global feature difference distributions and by using texture concentration measures. A modified approach to progressive ray-tracing is also presented. This new approach uses the visual importance model to guide the progressive refinement of an image. In addition, this concept of visual importance has been incorporated into supersampling, texture mapping and computer animation techniques. Experimental results are presented, illustrating the efficiency gains reaped from using this method of progressive rendering. This visual importance-based rendering approach is expected to have applications in the entertainment industry, where image fidelity may be sacrificed for efficiency purposes, as long as the overall visual impression of the scene is maintained. Different aspects of the approach should find many other applications in image compression, image retrieval, progressive data transmission and active robotic vision.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Quantum psychopathology holds the so called “quantum mind” hypothesis, which is controversial. In addition, this hypothesis focuses attention onto quantum processes in the brain, and how this may relate to psychopathological issues. This is very “low level”. As a consequence, it is challenging to form bridges to “higher level” problems related to psychopathology. By adopting the stance used in the quantum interaction community or researchers, this reply puts forward the idea that an idealistic approach may circumvent the controversy and opens the way for addressing challenges at higher levels of psychopathology.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Student learning research literature has shown that students' learning approaches are influenced by the learning context (Evans, Kirby, & Fabrigar, 2003). Of the many contextual factors, assessment has been found to have the most important influence on the way students go about learning. For example, assessment that is perceived to required a low level of cognitive abilities will more likely elicit a learning approach that concentrate on reproductive learning activities. Moreover, assessment demand will also interact with learning approach to determine academic performance. In this paper an assessment specific model of learning comprising presage, process and product variables (Biggs, 2001) was proposed and tested against data obtained from a sample of introductory economics students (n=434). The model developed was used to empirically investigate the influence of learning inputs and learning approaches on academic performances across assessment types (essay assignment, multiple choice question exam and exam essay). By including learning approaches in the learning model, the mechanism through which learning inputs determine academic performance was examined. Methodological limitations of the study will also be discussed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper considers the pros and cons of using Behavioural cloning for the development of low-level helicopter automation modules. Over the course of this project several Behavioural cloning approaches have been investigated. The results of the most effective Behavioural cloning approach are then compared to PID modules designed for the same aircraft. The comparison takes into consideration development time, reliability, and control performance. It has been found that Behavioural cloning techniques employing local approximators and a wide state-space coverage during training can produce stabilising control modules in less time than tuning PID controllers. However, performance and reliabity deficits have been found to exist with the Behavioural Cloning, attributable largely to the time variant nature of the dynamics due to the operating environment, and the pilot actions being poor for teaching. The final conclusion drawn here is that tuning PID modules remains superior to behavioural cloning for low-level helicopter automation.