123 resultados para control over life
Resumo:
Introduction Many bilinguals will have had the experience of unintentionally reading something in a language other than the intended one (e.g. MUG to mean mosquito in Dutch rather than a receptacle for a hot drink, as one of the possible intended English meanings), of finding themselves blocked on a word for which many alternatives suggest themselves (but, somewhat annoyingly, not in the right language), of their accent changing when stressed or tired and, occasionally, of starting to speak in a language that is not understood by those around them. These instances where lexical access appears compromised and control over language behavior is reduced hint at the intricate structure of the bilingual lexical architecture and the complexity of the processes by which knowledge is accessed and retrieved. While bilinguals might tend to blame word finding and other language problems on their bilinguality, these difficulties per se are not unique to the bilingual population. However, what is unique, and yet far more common than is appreciated by monolinguals, is the cognitive architecture that subserves bilingual language processing. With bilingualism (and multilingualism) the rule rather than the exception (Grosjean, 1982), this architecture may well be the default structure of the language processing system. As such, it is critical that we understand more fully not only how the processing of more than one language is subserved by the brain, but also how this understanding furthers our knowledge of the cognitive architecture that encapsulates the bilingual mental lexicon. The neurolinguistic approach to bilingualism focuses on determining the manner in which the two (or more) languages are stored in the brain and how they are differentially (or similarly) processed. The underlying assumption is that the acquisition of more than one language requires at the very least a change to or expansion of the existing lexicon, if not the formation of language-specific components, and this is likely to manifest in some way at the physiological level. There are many sources of information, ranging from data on bilingual aphasic patients (Paradis, 1977, 1985, 1997) to lateralization (Vaid, 1983; see Hull & Vaid, 2006, for a review), recordings of event-related potentials (ERPs) (e.g. Ardal et al., 1990; Phillips et al., 2006), and positron emission tomography (PET) and functional magnetic resonance imaging (fMRI) studies of neurologically intact bilinguals (see Indefrey, 2006; Vaid & Hull, 2002, for reviews). Following the consideration of methodological issues and interpretative limitations that characterize these approaches, the chapter focuses on how the application of these approaches has furthered our understanding of (1) selectivity of bilingual lexical access, (2) distinctions between word types in the bilingual lexicon and (3) control processes that enable language selection.
Resumo:
Censorship and Performance, edited by Tom Sellar, examines the politics of censorship, and continuing contests over the ‘right’ to claim theatrical and cultural stages for controversial forms of social and self representation, at the start of the twenty-first century. In bringing this collection together, Sellar has taken a broad-based approach to the concept of censorship in theatrical performance—and, indeed, to the concept of theatrical performance itself. Sellar and his contributors clearly accept that surveillance, suppression and restriction of specific forms of representation is a complex, culturally specific phenomenon. In this sense, Censorship and Performance addresses direct political control over content, as well as thornier arguments about media controversy, moral panic, and the politics of self-censorship amongst artists and arts organisations.
Resumo:
The TraSe (Transform-Select) algorithm has been developed to investigate the morphing of electronic music through automatically applying a series of deterministic compositional transformations to the source, guided towards a target by similarity metrics. This is in contrast to other morphing techniques such as interpolation or parameters or probabilistic variation. TraSe allows control over stylistic elements of the music through user-defined weighting of numerous compositional transformations. The formal evaluation of TraSe was mostly qualitative and occurred through nine participants completing an online questionnaire. The music generated by TraSe was generally felt to be less coherent than a human composed benchmark but in some cases judged as more creative.
Resumo:
This thesis presents a case study of the Special Broadcasting Service documenting the broadcasting challenges posed by user-generated content initiatives and the work-place approach to strategies for participation. Using the action research method, the project findings reveal that limitations to resources and funding determined the scope for innovation and that the practice of executive editorial control over content was considered fundamental to fulfilling the responsibilities of the public service mandate. Media workers were overwhelmingly positive about the enhanced productive capabilities of the audience and willing to facilitate moderated interactions, however the effectiveness of these initiatives differed according to the level of skills required. This thesis demonstrates how participatory initiatives can enhance aspects of the public service remit relating to cultural diversity, the servicing of niche interests, and broader social representation, and help reinvigorate the relevance of public service broadcasting in the digitalised media sphere.
Resumo:
The most common daily trip for employed persons and students is the commute to and from work and/or place of study. Though there are clear environmental, health and safety benefits from using public transport instead of private vehicles for these trips, a high proportion of commuters still choose private vehicles to get to work or study. This study reports an investigation of psychological factors influencing students’ travel choices from the perspective of the Theory of Planned Behaviour (TPB). Students from 3 different university campuses (n= 186) completed a cross-sectional survey on their car commuting behaviour. Particular focus was given to whether car commuting habits could add to understanding of commuting behaviour over and above behavioural intentions. Results indicated that, as expected, behavioural intention to travel by car was the strongest TPB predictor of car commuting behaviour. Further, general car commuting habits explained additional variance over and above TPB constructs, though the contribution was modest. No relationship between habit and intentions was found. Overall results suggest that, although student car commuting behaviour is habitual in nature, it is predominantly guided by reasoned action. Implications of these findings are that in order to alter the use of private vehicles, the factors influencing commuters’ intentions to travel by car must be addressed. Specifically, interventions should target the perceived high levels of both the acceptability of commuting by car and the perceived control over the choice to commute by car.
Resumo:
The objective of this investigation was to compare the acute effects of exercise and diet manipulations on energy intake, between dietary restrained and unrestrained females. Comparisons of two studies using an identical 2 x 2 repeated-measures design (level of activity (rest or exercise) and lunch type (high-fat or low-fat)) including thirteen dietary unrestrained and twelve restrained females were performed. Energy expenditure during the rest session was estimated and the energy cost of exercise was measured by indirect calorimetry. Relative energy intake was calculated by subtracting the energy expenditure of the exercise session from the energy intake of the test meal. Post-meal hedonic ratings were completed after lunch. Energy intake and relative energy intake increased during high-fat conditions compared with the low-fat, independently of exercise (P < 0.001). There was a positive relationship between dietary restraint scores and energy intake or relative energy intake in the rest conditions only (r 0.54, P < 0.01). The decrease of relative energy intake between the rest and exercise conditions was higher in restrained than in unrestrained eaters (P < 0.01). These results confirm that a high-fat diet reversed the energy deficit due to exercise. There was no energy compensation in response to an acute bout of exercise during the following meal. In restrained eaters, exercise was more effective in creating an energy deficit than in unrestrained eaters. Exercise may help restrained eaters to maintain control over appetite.
Resumo:
In this paper, we report on a metal-catalyst-free synthesis of carbon nanotubes (CNTs) on a pre-patterned Si(001) surface. Arrays of triangular-shaped holes were created by nanoindentation in specific sites of the sample. After germanium deposition and chemical vapor deposition (CVD) of acetylene, a few CNTs nucleated and grew from germanium nanoparticles. These results illustrate that it is possible to control the growth of CNTs without the use of any metal catalyst. By leading the assembly of Ge nanoparticles with a patterning technique, a precise control over the growth order is also attainable.
Resumo:
Establishing a nationwide Electronic Health Record system has become a primary objective for many countries around the world, including Australia, in order to improve the quality of healthcare while at the same time decreasing its cost. Doing so will require federating the large number of patient data repositories currently in use throughout the country. However, implementation of EHR systems is being hindered by several obstacles, among them concerns about data privacy and trustworthiness. Current IT solutions fail to satisfy patients’ privacy desires and do not provide a trustworthiness measure for medical data. This thesis starts with the observation that existing EHR system proposals suer from six serious shortcomings that aect patients’ privacy and safety, and medical practitioners’ trust in EHR data: accuracy and privacy concerns over linking patients’ existing medical records; the inability of patients to have control over who accesses their private data; the inability to protect against inferences about patients’ sensitive data; the lack of a mechanism for evaluating the trustworthiness of medical data; and the failure of current healthcare workflow processes to capture and enforce patient’s privacy desires. Following an action research method, this thesis addresses the above shortcomings by firstly proposing an architecture for linking electronic medical records in an accurate and private way where patients are given control over what information can be revealed about them. This is accomplished by extending the structure and protocols introduced in federated identity management to link a patient’s EHR to his existing medical records by using pseudonym identifiers. Secondly, a privacy-aware access control model is developed to satisfy patients’ privacy requirements. The model is developed by integrating three standard access control models in a way that gives patients access control over their private data and ensures that legitimate uses of EHRs are not hindered. Thirdly, a probabilistic approach for detecting and restricting inference channels resulting from publicly-available medical data is developed to guard against indirect accesses to a patient’s private data. This approach is based upon a Bayesian network and the causal probabilistic relations that exist between medical data fields. The resulting definitions and algorithms show how an inference channel can be detected and restricted to satisfy patients’ expressed privacy goals. Fourthly, a medical data trustworthiness assessment model is developed to evaluate the quality of medical data by assessing the trustworthiness of its sources (e.g. a healthcare provider or medical practitioner). In this model, Beta and Dirichlet reputation systems are used to collect reputation scores about medical data sources and these are used to compute the trustworthiness of medical data via subjective logic. Finally, an extension is made to healthcare workflow management processes to capture and enforce patients’ privacy policies. This is accomplished by developing a conceptual model that introduces new workflow notions to make the workflow management system aware of a patient’s privacy requirements. These extensions are then implemented in the YAWL workflow management system.
Resumo:
Predicate encryption has an advantage over traditional public-key or identity-based encryption, since predicate encryption systems provide more flexible control over access to encrypted data. We focus on delegation capabilities in predicate systems. More specifically, we investigate delegatable encryption systems supporting disjunctive predicate evaluations. We present formal security definitions of delegatable predicate encryption and provide the first delegatable predicate encryption scheme which supports disjunctive predicate evaluations in the public-key setting. We analyze the security of the proposed system and give a security proof. In addition, we present a delegatable predicate encryption in the symmetric-key setting and discuss the related security issues.
Resumo:
The advance of rapid prototyping techniques has significantly improved control over the pore network architecture of tissue engineering scaffolds. In this work we assessed the influence of scaffold pore architecture on cell seeding and static culturing, by comparing a computer‐designed gyroid architecture fabricated by stereolithography to a random‐pore architecture resulting from salt‐leaching. The scaffold types showed comparable porosity and pore size values, but the gyroid type showed a more than tenfold higher permeability due to the absence of size‐limiting pore interconnections. The higher permeability significantly improved the wetting properties of the hydrophobic scaffolds, and increased the settling speed of cells upon static seeding of immortalised mesenchymal stem cells. After dynamic seeding followed by 5 days of static culture, gyroid scaffolds showed large cell populations in the centre of the scaffold, while salt‐leached scaffolds were covered with a cell‐sheet on the outside and no cells were found in the scaffold centre. It was shown that interconnectivity of the pores and permeability of the scaffold prolongs the time of static culture before overgrowth of cells at the scaffold periphery occurs. Furthermore, novel scaffold designs are proposed to further improve the transport of oxygen and nutrients throughout the scaffolds, and to create tissue engineering grafts with designed, pre‐fabricated vasculature.
Resumo:
Creative Commons (CC) is often seen as a social movement, dismissed by critics as a tool for hobbyists or academics who do not sell their creations to make a living. However, this paper argues that the licensing of creative copyright works under a CC licence does not preclude commercial gain. If used wisely, CC licences can be a useful tool for creators in their quest for commercial success. In particular, this paper argues that the sharing of creative works online under a CC licence allows creators to circumvent traditional distribution channels dominated by content intermediaries, whilst maintaining a level of control over their copyright works (i.e. explicitly reserving some rights but not all rights). This will be illustrated by case studies on how CC is being used by content creators and intermediaries respectively, and how successful their respective methods are in harnessing this tool.
Resumo:
This article examined the relationship between time structure and Macan's process model of time management. This study proposed that time structure—‘appraisal of effective time usage’—would be a more parsimonious mediator than perceived control over time in the relationship between time management behaviours and outcome variables, such as job satisfaction and psychological well-being. Alternative structure models were compared using a sample of 111 university students. Model 1 tested Macan's process model of time management with perceived control over time as the mediator. Model 2 replaced perceived control over time by the construct of time structure. Model 3 examined the possibility of perceived control over time and time structure as being parallel mediators of the relationships between time management and outcomes. Results of this study showed that Model 1 and Model 2 fitted the data equally well. On the other hand, the mediated effects were small and partial in both models. This pattern of results calls for reassessment of the process model.
Resumo:
This paper presents a modified approach to evaluate access control policy similarity and dissimilarity based on the proposal by Lin et al. (2007). Lin et al.'s policy similarity approach is intended as a filter stage which identifies similar XACML policies that can be analysed further using more computationally demanding techniques based on model checking or logical reasoning. This paper improves the approach of computing similarity of Lin et al. and also proposes a mechanism to calculate a dissimilarity score by identifying related policies that are likely to produce different access decisions. Departing from the original algorithm, the modifications take into account the policy obligation, rule or policy combining algorithm and the operators between attribute name and value. The algorithms are useful in activities involving parties from multiple security domains such as secured collaboration or secured task distribution. The algorithms allow various comparison options for evaluating policies while retaining control over the restriction level via a number of thresholds and weight factors.
Resumo:
Health information sharing has become a vital part of modern healthcare delivery. E-health technologies provide efficient and effective ways of sharing medical information, but give rise to issues that neither the medical professional nor the consumers have control over. Information security and patient privacy are key impediments that hinder sharing information as sensitive as health information. Health information interoperability is another issue which hinders the adoption of available e health technologies. In this paper we propose a solution for these problems in terms of information accountability, the HL7 interoperability standard and social networks for manipulating personal health records.
Resumo:
Abstract Background: The current obesity epidemic is thought to be partly driven by over-consumption of sugar-sweetened diets and soft drinks. Loss-of-control over eating and addiction to drugs of abuse share overlapping brain mechanisms including changes in motivational drive, such that stimuli that are often no longer ‘liked’ are still intensely ‘wanted’ [7,8]. The neurokinin 1 (NK1) receptor system has been implicated in both learned appetitive behaviors and addiction to alcohol and opioids; however, its role in natural reward seeking remains unknown. Methodology/Principal Findings: We sought to determine whether the NK1-receptor system plays a role in the reinforcing properties of sucrose using a novel selective and clinically safe NK1-receptor antagonist, ezlopitant (CJ-11,974), in three animal models of sucrose consumption and seeking. Furthermore, we compared the effect of ezlopitant on ethanol consumption and seeking in rodents. The NK1-receptor antagonist, ezlopitant decreased appetitive responding for sucrose more potently than for ethanol using an operant self-administration protocol without affecting general locomotor activity. To further evaluate the selectivity of the NK1-receptor antagonist in decreasing consumption of sweetened solutions, we compared the effects of ezlopitant on water, saccharin-, and sodium chloride (NaCl) solution consumption. Ezlopitant decreased intake of saccharin but had no effect on water or salty solution consumption. Conclusions/Significance: The present study indicates that the NK1-receptor may be a part of a common pathway regulating the self-administration, motivational and reinforcing aspects of sweetened solutions, regardless of caloric value, and those of substances of abuse. Additionally, these results indicate that the NK1-receptor system may serve as a therapeutic target for obesity induced by over-consumption of natural reinforcers.