91 resultados para Kings and rulers--Religious aspects
Resumo:
Background: The aim of this work is to develop a more complete qualitative and quantitative understanding of the in vivo histology of the human bulbar conjunctiva. Methods: Laser scanning confocal microscopy (LSCM) was used to observe and measure morphological characteristics of the bulbar conjunctiva of 11 healthy human volunteer subjects. Results: The superficial epithelial layer of the bulbar conjunctiva is seen as a mass of small cell nuclei. Cell borders are sometimes visible. The light grey borders of basal epithelial cells are clearly visible, but nuclei can not be seen. The conjunctival stroma is comprised of a dense meshwork of white fibres, through which traverse blood vessels containing cellular elements. Orifices at the epithelial surface may represent goblet cells that have opened and expelled their contents. Goblet cells are also observed in the deeper epithelial layers, as well as conjunctival microcysts and mature forms of Langerhans cells. The bulbar conjunctiva has a mean thickness of 32.9 1.1 mm, and a superficial and basal epithelial cell density of 2212 782 and 2368 741 cells/ mm2, respectively. Overall goblet and mature Langerhans cell densities are 111 58 and 23 25 cells/mm2, respectively. Conclusions: LSCM is a powerful technique for studying the human bulbar conjunctiva in vivo and quantifying key aspects of cell morphology. The observations presented here may serve as a useful marker against which changes in conjunctival morphology due to disease, surgery, drug therapy or contact lens wear can be assessed.
Resumo:
Mark Taylor's new essay assesses the impact of the diagram on interior design from the late 19th century to the present. Taylor identifies the pop-cultural discourse of advice writing in both books and magazines as a starting point for his analysis. Drawing on diverse sources, his analysis focuses on texts relating to the dynamics of use and flexibility by Catherine Beecher, Harriet Beecher Stowe, Melusina Fay Peirce, Mary Haweis and Christine Frederick among others. The examples in these texts use the home, domestic housekeeping and kitchens as the sites and practices of intervention through which interior design innovations can be enacted. Taylor's analysis identified the innovations in both the social and the political aspects of space and the critique of static space behind these seemingly amateurish and innocuous texts. Identifying these contributions as early precursors of Modernism's open-plan and flexible, dynamic spaces, Taylor also interprets them with a critical concern for the oppositions and hierarchies that can exist in spatial design, and which are the hallmarks of recent Postmodern, phenomenological approaches to interior design and its theorisations. The progressive and subversive "paradigms for living" implicit in these diagrams can be argued to present a model of greater economic, social and political equality as well as representing a more balanced set of power relations in the home. Progressing through the 20th century to the present, Taylor's analysis shifts byond the dressed body and on to the more intimate rituals of the revealed body to further examine how diagrams of the interior, and the interior as a set of diagrams, are also mediators, sites and grounds for the design of social and sexual intimacy. Through a consideration of the link between design, indentity and intimacy (whether of the invisible, fashioned or sexualised body), the diagrms of interiors are reconfigured as radical and critical tools for an animate, material and emancipatory "redressing" of the balance between the body, identity, sexuality, gender, function, mis(use), aesthetics and the interior.
Resumo:
The following exegesis will detail the key advantages and disadvantages of combining a traditional talk show genre with a linear documentary format using a small production team and a limited budget in a fast turnaround weekly environment. It will deal with the Australian Broadcasting Corporation series Talking Heads, broadcast weekly in the early evening schedule for the network at 18.30 with the presenter Peter Thompson. As Executive Producer for the programme at its inception I was responsible for setting it up for the ABC in Brisbane, a role that included selecting most of the team to work on the series and commissioning the music, titles and all other aspects required to bring the show to the screen. What emerged when producing this generic hybrid will be examined at length, including: „h The talk show/documentary hybrid format needs longer than 26¡¦30¡¨ to be entirely successful. „h The type of presenter ideally suited to the talk show/documentary format requires someone who is genuinely interested in their guests and flexible enough to maintain the format against tangential odds. „h The use of illustrative footage shot in a documentary style narrative improves the talk show format. iv „h The fast turnaround of the talk show/documentary hybrid puts tremendous pressure on the time frames for archive research and copyright clearance and therefore needs to be well-resourced. „h In a fast turnaround talk show/documentary format the field components are advantageous but require very low shooting ratios to be sustainable. „h An intimate set works best for a talk show hybrid like this. Also submitted are two DVDs of recordings of programmes I produced and directed from the first and third series. These are for consideration in the practical component of this project and reflect the changes that I made to the series.
Resumo:
This thesis argues that in order to establish a sound information security culture it is necessary to look at organisation's information security systems in a socio- technical context. The motivation for this research stems from the continuing concern of ineffective information security in organisations, leading to potentially significant monetary losses. It is important to address both technical and non- technical aspects when dealing with information security management. Culture has been identified as an underlying determinant of individuals' behaviour and this extends to information security culture, particularly in developing countries. This research investigates information security culture in the Saudi Arabia context. The theoretical foundation for the study is based on organisational and national culture theories. A conceptual framework for this study was constructed based on Peterson and Smith's (1997) model of national culture. This framework guides the study of national, organisational and technological values and their relationships to the development of information security culture. Further, the study seeks to better understand how these values might affect the development and deployment of an organisation's information security culture. Drawing on evidence from three exploratory case studies, an emergent conceptual framework was developed from the traditional human behaviour and the social environment perspectives used in social work, This framework contributes to in- formation security management by identifying behaviours related to four modes of information security practice. These modes provide a sound basis that can be used to evaluate individual organisational members' behaviour and the adequacy of ex- isting security measures. The results confirm the plausibility of the four modes of practice. Furthermore, a final framework was developed by integrating the four modes framework into the research framework. The outcomes of the three case stud- ies demonstrate that some of the national, organisational and technological values have clear impacts on the development and deployment of organisations' informa- tion security culture. This research, by providing an understanding the in uence of national, organi- sational and technological values on individuals' information security behaviour, contributes to building a theory of information security culture development within an organisational context. The research reports on the development of an inte- grated information security culture model that highlights recommendations for developing an information security culture. The research framework, introduced by this research, is put forward as a robust starting point for further related work in this area.
Resumo:
This article applies a Wittgensteinian approach to the examination of the intelligibility of religious belief, in the wake of the recent attack on the Judeo-Christian religion by Richard Dawkins's book The God Delusion. The article attempts to show that Dawkins has confused religion with superstition, and that while Dawkins's arguments are decisive in the case of superstition, they do not successfully show religion to be a delusion. Religious belief in God is not like belief in the existence of a planet, and genuine religious faith is not like the belief in something for which there is not yet enough evidence, like belief in dark matter. The Christian doctrines of the resurrection and eternal life are misconstrued if they are understood as factual claims because they are then merely shallow superstitions, and not the great religious riddles they are meant to be.
Resumo:
This paper discusses the challenges of making a case for the adoption of low cost railway level crossings in Australia. Several issues are discussed in this paper including legal issues associated with the treatment of low-exposure passive crossings with low cost level crossing warning devices (LCLCWDs); principles of operation and deployment for LCLCWDs; and technical and human factors aspects of safety and availability. The Cooperative Research Centre (CRC) for Rail Innovation’s affordable level crossings project aims to address a number of these technical and human factors issues through research and field trials.
Resumo:
Computer resource allocation represents a significant challenge particularly for multiprocessor systems, which consist of shared computing resources to be allocated among co-runner processes and threads. While an efficient resource allocation would result in a highly efficient and stable overall multiprocessor system and individual thread performance, ineffective poor resource allocation causes significant performance bottlenecks even for the system with high computing resources. This thesis proposes a cache aware adaptive closed loop scheduling framework as an efficient resource allocation strategy for the highly dynamic resource management problem, which requires instant estimation of highly uncertain and unpredictable resource patterns. Many different approaches to this highly dynamic resource allocation problem have been developed but neither the dynamic nature nor the time-varying and uncertain characteristics of the resource allocation problem is well considered. These approaches facilitate either static and dynamic optimization methods or advanced scheduling algorithms such as the Proportional Fair (PFair) scheduling algorithm. Some of these approaches, which consider the dynamic nature of multiprocessor systems, apply only a basic closed loop system; hence, they fail to take the time-varying and uncertainty of the system into account. Therefore, further research into the multiprocessor resource allocation is required. Our closed loop cache aware adaptive scheduling framework takes the resource availability and the resource usage patterns into account by measuring time-varying factors such as cache miss counts, stalls and instruction counts. More specifically, the cache usage pattern of the thread is identified using QR recursive least square algorithm (RLS) and cache miss count time series statistics. For the identified cache resource dynamics, our closed loop cache aware adaptive scheduling framework enforces instruction fairness for the threads. Fairness in the context of our research project is defined as a resource allocation equity, which reduces corunner thread dependence in a shared resource environment. In this way, instruction count degradation due to shared cache resource conflicts is overcome. In this respect, our closed loop cache aware adaptive scheduling framework contributes to the research field in two major and three minor aspects. The two major contributions lead to the cache aware scheduling system. The first major contribution is the development of the execution fairness algorithm, which degrades the co-runner cache impact on the thread performance. The second contribution is the development of relevant mathematical models, such as thread execution pattern and cache access pattern models, which in fact formulate the execution fairness algorithm in terms of mathematical quantities. Following the development of the cache aware scheduling system, our adaptive self-tuning control framework is constructed to add an adaptive closed loop aspect to the cache aware scheduling system. This control framework in fact consists of two main components: the parameter estimator, and the controller design module. The first minor contribution is the development of the parameter estimators; the QR Recursive Least Square(RLS) algorithm is applied into our closed loop cache aware adaptive scheduling framework to estimate highly uncertain and time-varying cache resource patterns of threads. The second minor contribution is the designing of a controller design module; the algebraic controller design algorithm, Pole Placement, is utilized to design the relevant controller, which is able to provide desired timevarying control action. The adaptive self-tuning control framework and cache aware scheduling system in fact constitute our final framework, closed loop cache aware adaptive scheduling framework. The third minor contribution is to validate this cache aware adaptive closed loop scheduling framework efficiency in overwhelming the co-runner cache dependency. The timeseries statistical counters are developed for M-Sim Multi-Core Simulator; and the theoretical findings and mathematical formulations are applied as MATLAB m-file software codes. In this way, the overall framework is tested and experiment outcomes are analyzed. According to our experiment outcomes, it is concluded that our closed loop cache aware adaptive scheduling framework successfully drives co-runner cache dependent thread instruction count to co-runner independent instruction count with an error margin up to 25% in case cache is highly utilized. In addition, thread cache access pattern is also estimated with 75% accuracy.
Resumo:
In this article we identify how computational automation achieved through programming has enabled a new class of music technologies with generative music capabilities. These generative systems can have a degree of music making autonomy that impacts on our relationships with them; we suggest that this coincides with a shift in the music-equipment relationship from tool use to a partnership. This partnership relationship can occur when we use technologies that display qualities of agency. It raises questions about the kinds of skills and knowledge that are necessary to interact musically in such a partnership. These are qualities of musicianship we call eBility. In this paper we seek to define what eBility might consist of and how consideration of it might effect music education practice. The 'e' in eBility refers not only to the electronic nature of computing systems but also to the ethical, enabling, experiential and educational dimensions of the creative relationship with technologies with agency. We hope to initiate a discussion around differentiating what we term representational technologies from those with agency and begin to uncover the implications of these ideas for music educators in schools and communities. We hope also to elucidate the emergent theory and practice that has enabled the development of strategies for optimising this kind of eBility where the tool becomes partner. The identification of musical technologies with agency adds to the authors’ list of metaphors for technology use in music education that previously included tool, medium and instrument. We illustrate these ideas with examples and with data from our work with the jam2jam interactive music system. In this discussion we will outline our experiences with jam2jam as an example of a technology with agency and describe the aspects of eBility that interaction with it promotes.
Resumo:
Background Pakistan has the highest population rate of road fatalities in South Asia (25.3 fatalities per 100,000 people: Global Status Report on Road Safety, WHO 2009). Along with road environment and vehicle factors, human factors make a substantial contribution to traffic safety in Pakistan. Beliefs about road crash causation and prevention have been demonstrated to contribute to risky road use behaviour and resistance to preventive measures in a handful of other developing countries, but has not been explored in Pakistan. In particular, fatalism (whether based on religion, other cultural beliefs or experience) has been highlighted as a barrier to achieving changes in attitudes and behaviour. Aims The research reported here aimed (i) to explore perceptions of road crash causation among policy makers, police officers, professional drivers and car drivers in Pakistan; (ii) to identify how cultural and religious beliefs influence road use behaviour in Pakistan; and (iii) to understand how fatalistic beliefs may work as obstacles to road safety interventions. Methods In-depth interviews were conducted by the primary author (mostly in Urdu) in Lahore, Rawalpindi and Islamabad with 12 professional drivers (taxi, bus and truck), 4 car drivers, 6 police officers, 4 policy makers and 2 religious orators. All but two were Muslim, two were female, and they were drawn from a wide range of ages (24 to 60) and educational backgrounds. The interviews were taped and transcribed, then translated into English and analysed for themes related to the aims. Results Fatalism emerged as a pervasive belief utilised to justify risky road use behaviour and to resist messages about preventive measures. There was a strong religious underpinning to the statement of fatalistic beliefs (this reflects popular conceptions of Islam rather than scholarly interpretations), but also an overlap with superstitious beliefs which have longer-standing roots in Pakistani culture. These beliefs were not limited to people of poor educational background or position. A particular issue which was explored in more detail was the way in which these beliefs and their interpretation within Pakistani society contributed to poor police reporting of crashes. Discussion and conclusions The pervasive nature of fatalistic beliefs in Pakistan affects road user behaviour by supporting continued risk taking behaviour on the road, and by interfering with public health messages about behaviours which would reduce the risk of traffic crashes. The widespread influence of these beliefs on the ways that people respond to traffic crashes and the death of family members contribute to low crash reporting rates and to a system which is difficult to change. The promotion of an evidence-based approach to road user behaviour is recommended, along with improved professional education for police and policy makers.
Resumo:
Objective: Preclinical and clinical data suggest that lipid biology is integral to brain development and neurodegeneration. Both aspects are proposed as being important in the pathogenesis of schizophrenia. The purpose of this paper is to examine the implications of lipid biology, in particular the role of essential fatty acids (EFA), for schizophrenia. Methods: Medline databases were searched from 1966 to 2001 followed by the crosschecking of references. Results: Most studies investigating lipids in schizophrenia described reduced EFA, altered glycerophospholipids and an increased activity of a calcium-independent phospholipase A2 in blood cells and in post-mortem brain tissue. Additionally, in vivo brain phosphorus-31 Magnetic Resonance Spectroscopy (31P-MRS) demonstrated lower phosphomonoesters (implying reduced membrane precursors) in first- and multi-episode patients. In contrast, phosphodiesters were elevated mainly in first-episode patients (implying increased membrane breakdown products), whereas inconclusive results were found in chronic patients. EFA supplementation trials in chronic patient populations with residual symptoms have demonstrated conflicting results. More consistent results were observed in the early and symptomatic stages of illness, especially if EFA with a high proportion of eicosapentaenoic acid was used. Conclusion: Peripheral blood cell, brain necropsy and 31P-MRS analysis reveal a disturbed lipid biology, suggesting generalized membrane alterations in schizophrenia. 31P-MRS data suggest increased membrane turnover at illness onset and persisting membrane abnormalities in established schizophrenia. Cellular processes regulating membrane lipid metabolism are potential new targets for antipsychotic drugs and might explain the mechanism of action of treatments such as eicosapentaenoic acid.