96 resultados para Onofri, Vincenzo, fl. 1500.
Resumo:
Purpose. To investigate whether diurnal variation occurs in retinal thickness measures derived from spectral domain optical coherence tomography (SD-OCT). Methods. Twelve healthy adult subjects had retinal thickness measured with SD-OCT every 2 h over a 10 h period. At each measurement session, three average B-scan images were derived from a series of multiple B-scans (each from a 5 mm horizontal raster scan along the fovea, containing 1500 A-scans/B-scan) and analyzed to determine the thickness of the total retina, as well as the thickness of the outer retinal layers. Average thickness values were calculated at the foveal center, at the 0.5 mm diameter foveal region, and for the temporal parafovea (1.5 mm from foveal center) and nasal parafovea (1.5 mm from foveal center). Results. Total retinal thickness did not exhibit significant diurnal variation in any of the considered retinal regions (p > 0.05). Evidence of significant diurnal variation was found in the thickness of the outer retinal layers (p < 0.05), with the most prominent changes observed in the photoreceptor layers at the foveal center. The photoreceptor inner and outer segment layer thickness exhibited mean amplitude (peak to trough) of daily change of 7 ± 3 μm at the foveal center. The peak in thickness was typically observed at the third measurement session (mean measurement time, 13:06). Conclusions. The total retinal thickness measured with SD-OCT does not exhibit evidence of significant variation over the course of the day. However, small but significant diurnal variation occurs in the thickness of the foveal outer retinal layers.
Resumo:
Information security has been recognized as a core requirement for corporate governance that is expected to facilitate not only the management of risks, but also as a corporate enabler that supports and contributes to the sustainability of organizational operations. In implementing information security, the enterprise information security policy is the set of principles and strategies that guide the course of action for the security activities and may be represented as a brief statement that defines program goals and sets information security and risk requirements. The enterprise information security policy (alternatively referred to as security policy in this paper) that represents the meta-policy of information security is an element of corporate ICT governance and is derived from the strategic requirements for risk management and corporate governance. Consistent alignment between the security policy and the other corporate business policies and strategies has to be maintained if information security is to be implemented according to evolving business objectives. This alignment may be facilitated by managing security policy alongside other corporate business policies within the strategic management cycle. There are however limitations in current approaches for developing and managing the security policy to facilitate consistent strategic alignment. This paper proposes a conceptual framework for security policy management by presenting propositions to positively affect security policy alignment with business policies and prescribing a security policy management approach that expounds on the propositions.
Resumo:
This chapter attends to the legal and political geographies of one of Earth's most important, valuable, and pressured spaces: the geostationary orbit. Since the first, NASA, satellite entered it in 1964, this small, defined band of Outer Space, 35,786km from the Earth's surface, and only 30km wide, has become a highly charged legal and geopolitical environment, yet it remains a space which is curiously unheard of outside of specialist circles. For the thousands of satellites which now underpin the Earth's communication, media, and data industries and flows, the geostationary orbit is the prime position in Space. The geostationary orbit only has the physical capacity to hold approximately 1500 satellites; in 1997 there were approximately 1000. It is no overstatement to assert that media, communication, and data industries would not be what they are today if it was not for the geostationary orbit. This chapter provides a critical legal geography of the geostationary orbit, charting the topography of the debates and struggles to define and manage this highly-important space. Drawing on key legal documents such as the Outer Space Treaty and the Moon Treaty, the chapter addresses fundamental questions about the legal geography of the orbit, questions which are of growing importance as the orbit’s available satellite spaces diminish and the orbit comes under increasing pressure. Who owns the geostationary orbit? Who, and whose rules, govern what may or may not (literally) take place within it? Who decides which satellites can occupy the orbit? Is the geostationary orbit the sovereign property of the equatorial states it supertends, as these states argued in the 1970s? Or is it a part of the res communis, or common property of humanity, which currently legally characterises Outer Space? As challenges to the existing legal spatiality of the orbit from launch states, companies, and potential launch states, it is particularly critical that the current spatiality of the orbit is understood and considered. One of the busiest areas of Outer Space’s spatiality is international territorial law. Mentions of Space law tend to evoke incredulity and ‘little green men’ jokes, but as Space becomes busier and busier, international Space law is growing in complexity and importance. The chapter draws on two key fields of research: cultural geography, and critical legal geography. The chapter is framed by the cultural geographical concept of ‘spatiality’, a term which signals the multiple and dynamic nature of geographical space. As spatial theorists such as Henri Lefebvre assert, a space is never simply physical; rather, any space is always a jostling composite of material, imagined, and practiced geographies (Lefebvre 1991). The ways in which a culture perceives, represents, and legislates that space are as constitutive of its identity--its spatiality--as the physical topography of the ground itself. The second field in which this chapter is situated—critical legal geography—derives from cultural geography’s focus on the cultural construction of spatiality. In his Law, Space and the Geographies of Power (1994), Nicholas Blomley asserts that analyses of territorial law largely neglect the spatial dimension of their investigations; rather than seeing the law as a force that produces specific kinds of spaces, they tend to position space as a neutral, universally-legible entity which is neatly governed by the equally neutral 'external variable' of territorial law (28). 'In the hegemonic conception of the law,' Pue similarly argues, 'the entire world is transmuted into one vast isotropic surface' (1990: 568) on which law simply acts. But as the emerging field of critical legal geography demonstrates, law is not a neutral organiser of space, but is instead a powerful cultural technology of spatial production. Or as Delaney states, legal debates are “episodes in the social production of space” (2001, p. 494). International territorial law, in other words, makes space, and does not simply govern it. Drawing on these tenets of the field of critical legal geography, as well as on Lefebvrian concept of multipartite spatiality, this chapter does two things. First, it extends the field of critical legal geography into Space, a domain with which the field has yet to substantially engage. Second, it demonstrates that the legal spatiality of the geostationary orbit is both complex and contested, and argues that it is crucial that we understand this dynamic legal space on which the Earth’s communications systems rely.
Resumo:
This paper examines the case of a procurement auction for a single project, in which the breakdown of the winning bid into its component items determines the value of payments subsequently made to bidder as the work progresses. Unbalanced bidding, or bid skewing, involves the uneven distribution of mark-up among the component items in such a way as to attempt to derive increased benefit to the unbalancer but without involving any change in the total bid. One form of unbalanced bidding for example, termed Front Loading (FL), is thought to be widespread in practice. This involves overpricing the work items that occur early in the project and underpricing the work items that occur later in the project in order to enhance the bidder's cash flow. Naturally, auctioners attempt to protect themselves from the effects of unbalancing—typically reserving the right to reject a bid that has been detected as unbalanced. As a result, models have been developed to both unbalance bids and detect unbalanced bids but virtually nothing is known of their use, success or otherwise. This is of particular concern for the detection methods as, without testing, there is no way of knowing the extent to which unbalanced bids are remaining undetected or balanced bids are being falsely detected as unbalanced. This paper reports on a simulation study aimed at demonstrating the likely effects of unbalanced bid detection models in a deterministic environment involving FL unbalancing in a Texas DOT detection setting, in which bids are deemed to be unbalanced if an item exceeds a maximum (or fails to reach a minimum) ‘cut-off’ value determined by the Texas method. A proportion of bids are automatically and maximally unbalanced over a long series of simulated contract projects and the profits and detection rates of both the balancers and unbalancers are compared. The results show that, as expected, the balanced bids are often incorrectly detected as unbalanced, with the rate of (mis)detection increasing with the proportion of FL bidders in the auction. It is also shown that, while the profit for balanced bidders remains the same irrespective of the number of FL bidders involved, the FL bidder's profit increases with the greater proportion of FL bidders present in the auction. Sensitivity tests show the results to be generally robust, with (mis)detection rates increasing further when there are fewer bidders in the auction and when more data are averaged to determine the baseline value, but being smaller or larger with increased cut-off values and increased cost and estimate variability depending on the number of FL bidders involved. The FL bidder's expected benefit from unbalancing, on the other hand, increases, when there are fewer bidders in the auction. It also increases when the cut-off rate and discount rate is increased, when there is less variability in the costs and their estimates, and when less data are used in setting the baseline values.
Resumo:
Background: Ureaplasmas are the most prevalent bacteria isolated from preterm deliveries and the prognosis for neonates varies depending on the gestation at delivery. Ureaplasmas vary their surface-exposed antigen (MBA, a virulence mechanism) during chronic intra-amniotic infections, but it is not known when changes first occur during gestation. Method: U. parvum serovar 3 (2x10e7CFU) was injected intra-amniotically (IA) into six experimental cohorts of pregnant ewes (of n=7), 3 days (d) or 7d before delivery at either: 100d, 124d or 140d gestation (term=145d). Control ewes received IA 10B broth. Fetuses were delivered surgically and ureaplasmas cultured from amniotic fluid (AF), chorioamnion, fetal lung (FL) and umbilical cord. Ureaplasmas were tested by western blot to demonstrate MBA variation. Results: The highest number of ureaplasmas were recovered from FL at 100d gestation after 3 days of infection (p<0.03). Six of 7(86%) 100d–3d FL demonstrated an ureaplasma MBA variant, but only 17% and 15% of FL showed an MBA variant after 3d infection at 124d and 140d gestation respectively. Greatest variation of the MBA occurred in AF and FL at 124d gestation after 7d infection. The least MBA variation was observed at 140d; however, at this time the most severe histological chorioamnionitis was observed. Conclusions: After intra-amniotic ureaplasma injections, higher numbers of ureaplasmas gained access to the FL at 100d gestation than observed at later gestations. This may exacerbate the adverse outcomes for neonates delivered early in gestation. In late gestation, ureaplasma MBA variation was minimal, but chorioamnionitis was the most severe. Adverse pregnancy outcomes associated with IA ureaplasma infection may vary depending on the duration of gestation, the number of ureaplasmas isolated from the fetal tissues and the degree of MBA variation.
Resumo:
Craving has long been associated with addictive disorders. It has received much attention over the last two decades, partly through the advent of pharmacotherapies that attempt to address it (Jonson, 2008; Yahyavi-Firouz-Abadi & See, 2009). More recently, craving for substances has attained increased prominence, with the inclusion of “Craving or a strong desire or urge” in the draft of DSM-5 (APA, 2012). Studies generally support craving as occurring on a single diagnostic dimension alongside existing dependence criteria (Hasin, et al., 2012; Keyes, et al., 2011). Some (e.g. Keyes, et al., 2011) demonstrate that the addition of craving to DSM-IV alcohol abuse and alcohol dependence criteria contributes novel variance in predicting severity, and improves discrimination above that offered by existing DSM-IV criteria. Within the current volume, the paper by Agrawal et al. confirms that craving strongly loads on a single dimension that also incorporates DSM-IV alcohol dependence criteria. Craving was a relatively severe symptom: It was least often endorsed, and did not exceed 50% endorsement until 6 of the remaining 7 criteria were present...
Resumo:
A 1500-word review of Strindberg: A Life by Sue Prideaux (Yale UP, 2012). One way of classifying biographies is to divide them into those that apply their own interpretative framework – be it psychoanalytic, gender-based, socio-historical, and so on – to a given subject and those that aim to meet the subject, on their own terms, or at least in terms that the subject would recognise...
Resumo:
This chapter is a tutorial that teaches you how to design extended finite state machine (EFSM) test models for a system that you want to test. EFSM models are more powerful and expressive than simple finite state machine (FSM) models, and are one of the most commonly used styles of models for model-based testing, especially for embedded systems. There are many languages and notations in use for writing EFSM models, but in this tutorial we write our EFSM models in the familiar Java programming language. To generate tests from these EFSM models we use ModelJUnit, which is an open-source tool that supports several stochastic test generation algorithms, and we also show how to write your own model-based testing tool. We show how EFSM models can be used for unit testing and system testing of embedded systems, and for offline testing as well as online testing.
Resumo:
In this paper, we propose an approach which attempts to solve the problem of surveillance event detection, assuming that we know the definition of the events. To facilitate the discussion, we first define two concepts. The event of interest refers to the event that the user requests the system to detect; and the background activities are any other events in the video corpus. This is an unsolved problem due to many factors as listed below: 1) Occlusions and clustering: The surveillance scenes which are of significant interest at locations such as airports, railway stations, shopping centers are often crowded, where occlusions and clustering of people are frequently encountered. This significantly affects the feature extraction step, and for instance, trajectories generated by object tracking algorithms are usually not robust under such a situation. 2) The requirement for real time detection: The system should process the video fast enough in both of the feature extraction and the detection step to facilitate real time operation. 3) Massive size of the training data set: Suppose there is an event that lasts for 1 minute in a video with a frame rate of 25fps, the number of frames for this events is 60X25 = 1500. If we want to have a training data set with many positive instances of the event, the video is likely to be very large in size (i.e. hundreds of thousands of frames or more). How to handle such a large data set is a problem frequently encountered in this application. 4) Difficulty in separating the event of interest from background activities: The events of interest often co-exist with a set of background activities. Temporal groundtruth typically very ambiguous, as it does not distinguish the event of interest from a wide range of co-existing background activities. However, it is not practical to annotate the locations of the events in large amounts of video data. This problem becomes more serious in the detection of multi-agent interactions, since the location of these events can often not be constrained to within a bounding box. 5) Challenges in determining the temporal boundaries of the events: An event can occur at any arbitrary time with an arbitrary duration. The temporal segmentation of events is difficult and ambiguous, and also affected by other factors such as occlusions.
Resumo:
Research on Enterprise Resource Planning (ERP) Systems is becoming a well-established research theme in Information Systems (IS) research. Enterprise Resource Planning Systems, given its unique differentiations with other IS applications, have provided an interesting backdrop to test and re-test some of the key and fundamental concepts in IS. While some researchers have tested well-established concepts of technology acceptance, system usage and system success in the context of ERP Systems, others have researched how new paradigms like cloud computing and social media integrate with ERP Systems. Moreover, ERP Systems provided the context for cross disciplinary research such as knowledge management, project management and business process management research. Almost after two-decades since its inception in IS research, this paper provides a critique of 198 papers published on ERP Systems since 2006-2012. We observe patterns on ES research, provide comparisons to past studies and provide future research directions.
Multi-level knowledge transfer in software development outsourcing projects : the agency theory view
Resumo:
In recent years, software development outsourcing has become even more complex. Outsourcing partner have begun‘re- outsourcing’ components of their projects to other outsourcing companies to minimize cost and gain efficiencies, creating a multi-level hierarchy of outsourcing. This research in progress paper presents preliminary findings of a study designed to understand knowledge transfer effectiveness of multi-level software development outsourcing projects. We conceptualize the SD-outsourcing entities using the Agency Theory. This study conceptualizes, operationalises and validates the concept of Knowledge Transfer as a three-phase multidimensional formative index of 1) Domain knowledge, 2) Communication behaviors, and 3) Clarity of requirements. Data analysis identified substantial, significant differences between the Principal and the Agent on two of the three constructs. Using Agency Theory, supported by preliminary findings, the paper also provides prescriptive guidelines of reducing the friction between the Principal and the Agent in multi-level software outsourcing.
Resumo:
Background: Ureaplasma species are the most prevalent isolates from women who deliver preterm. The MBA, a surface exposed lipoprotein, is a key virulence factor of ureaplasmas. We investigated MBA variation after chronic and acute intra-amniotic (IA) ureaplasma infections. Method: U. parvum serovar 3 (2x104 colony-forming-units) was injected IA into pregnant ewes at: 55 days gestation (d, term = 145d) (n=8); 117d (n=8) and 121d (n=8). Fetuses were delivered surgically (124d) and ureaplasmas cultured from amniotic fluid (AF), chorioamnion, fetal lung (FL) and umbilical cord were tested by western blot and PCR assays to demonstrate MBA and mba gene variation respectively. Tissue sections were sectioned and stained by haemotoxylin and eosin and inflammatory cell counts and pathology were reported (blinded to outcome). Results: Numerous MBA/mba variants were generated in vivo after chronic exposure to ureaplasma infection but after acute infection no variants (3d) or very few variants (7d) were generated. Identical MBA variants were detected within the AF and FL but different ureaplasma variants were detected within chorioamnion specimens. The severity of inflammation within chronically infected tissues varied between animals ranging from no inflammation to severe inflammation with/without fibrosis. Chorioamnion, FL and cord from the same animal demonstrated the same degree of inflammation. Conclusions: MBA/mba variation in vivo occurred after the initiation of the host immune response and we propose that ureaplasmas vary the MBA antigen to evade the host immune response. In some animals there was no inflammation despite colonisation with high numbers of ureaplasmas.
Resumo:
Creep and shrinkage behaviour of an ultra lightweight cement composite (ULCC) up to 450 days was evaluated in comparison with those of a normal weight aggregate concrete (NWAC) and a lightweight aggregate concrete (LWAC) with similar 28-day compressive strength. The ULCC is characterized by low density < 1500 kg/m3 and high compressive strength about 60 MPa. Autogenous shrinkage increased rapidly in the ULCC at early-age and almost 95% occurred prior to the start of creep test at 28 days. Hence, majority of shrinkage of the ULCC during creep test was drying shrinkage. Total shrinkage of the ULCC during the 450-day creep test was the lowest compared to the NWAC and LWAC. However, corresponding total creep in the ULCC was the highest with high proportion attributed to basic creep (≥ ~90%) and limited drying creep. The high creep of the ULCC is likely due to its low E-modulus. Specific creep of the ULCC was similar to that of the NWAC, but more than 80% higher than the LWAC. Creep coefficient of the ULCC was about 47% lower than that of the NWAC but about 18% higher than that of the LWAC. Among five creep models evaluated which tend to over-estimate the creep coefficient of the ULCC, EC2 model gives acceptable prediction within +25% deviations.
Resumo:
In this paper, the initial stage of films assembled by energetic C36 fullerenes on diamond (001)–(2 × 1) surface at low-temperature was investigated by molecular dynamics simulation using the Brenner potential. The incident energy was first uniformly distributed within an energy interval 20–50 eV, which was known to be the optimum energy range for chemisorption of single C36 on diamond (001) surface. More than one hundred C36 cages were impacted one after the other onto the diamond surface by randomly selecting their orientation as well as the impact position relative to the surface. The growth of films was found to be in three-dimensional island mode, where the deposited C36 acted as building blocks. The study of film morphology shows that it retains the structure of a free C36 cage, which is consistent with Low Energy Cluster Beam Deposition (LECBD) experiments. The adlayer is composed of many C36-monomers as well as the covalently bonded C36 dimers and trimers which is quite different from that of C20 fullerene-assembled film, where a big polymerlike chain was observed due to the stronger interaction between C20 cages. In addition, the chemisorption probability of C36 fullerenes is decreased with increasing coverage because the interaction between these clusters is weaker than that between the cluster and the surface. When the incident energy is increased to 40–65 eV, the chemisorption probability is found to increased and more dimers and trimers as well as polymerlike-C36 were observed on the deposited films. Furthermore, C36 film also showed high thermal stability even when the temperature was raised to 1500 K.
Resumo:
In this paper, the deposition of C-20 fullerenes on a diamond (001)-(2x1) surface and the fabrication of C-20 thin film at 100 K were investigated by a molecular dynamics (MD) simulation using the many-body Brenner bond order potential. First, we found that the collision dynamic of a single C-20 fullerene on a diamond surface was strongly dependent on its impact energy. Within the energy range 10-45 eV, the C-20 fullerene chemisorbed on the surface retained its free cage structure. This is consistent with the experimental observation, where it was called the memory effect in "C-20-type" films [P. Melion , Int. J. Mod. B 9, 339 (1995); P. Milani , Cluster Beam Synthesis of Nanostructured Materials (Springer, Berlin, 1999)]. Next, more than one hundred C-20 (10-25 eV) were deposited one after the other onto the surface. The initial growth stage of C-20 thin film was observed to be in the three-dimensional island mode. The randomly deposited C-20 fullerenes stacked on diamond surface and acted as building blocks forming a polymerlike structure. The assembled film was also highly porous due to cluster-cluster interaction. The bond angle distribution and the neighbor-atom-number distribution of the film presented a well-defined local order, which is of sp(3) hybridization character, the same as that of a free C-20 cage. These simulation results are again in good agreement with the experimental observation. Finally, the deposited C-20 film showed high stability even when the temperature was raised up to 1500 K.