76 resultados para Universal tree
Resumo:
Many alternative therapies are used as first aid treatment for burns, despite limited evidence supporting their use. In this study, Aloe vera, saliva and a tea tree oil impregnated dressing (Burnaid) were applied as first aid to a porcine deep dermal contact burn, compared to a control of nothing. After burn creation, the treatments were applied for 20 min and the wounds observed at weekly dressing changes for 6 weeks. Results showed that the alternative treatments did significantly decrease subdermal temperature within the skin during the treatment period. However, they did not decrease the microflora or improve re-epithelialisation, scar strength, scar depth or cosmetic appearance of the scar and cannot be recommended for the first aid treatment of partial thickness burns.
Resumo:
Genomic sequences are fundamentally text documents, admitting various representations according to need and tokenization. Gene expression depends crucially on binding of enzymes to the DNA sequence at small, poorly conserved binding sites, limiting the utility of standard pattern search. However, one may exploit the regular syntactic structure of the enzyme's component proteins and the corresponding binding sites, framing the problem as one of detecting grammatically correct genomic phrases. In this paper we propose new kernels based on weighted tree structures, traversing the paths within them to capture the features which underpin the task. Experimentally, we and that these kernels provide performance comparable with state of the art approaches for this problem, while offering significant computational advantages over earlier methods. The methods proposed may be applied to a broad range of sequence or tree-structured data in molecular biology and other domains.
Resumo:
Numerous studies have documented subtle but consistent sex differences in self-reports and observer-ratings of five-factor personality traits, and such effects were found to show well-defined developmental trajectories and remarkable similarity across nations. In contrast, very little is known about perceived gender differences in five-factor traits in spite of their potential implications for gender biases at the interpersonal and societal level. In particular, it is not clear how perceived gender differences in five-factor personality vary across age groups and national contexts and to what extent they accurately reflect assessed sex differences in personality. To address these questions, we analyzed responses from 3,323 individuals across 26 nations (mean age = 22.3 years, 31% male) who were asked to rate the five-factor personality traits of typical men or women in three age groups (adolescent, adult, and older adult) in their respective nations. Raters perceived women as slightly higher in openness, agreeableness, and conscientiousness as well as some aspects of extraversion and neuroticism. Perceived gender differences were fairly consistent across nations and target age groups and mapped closely onto assessed sex differences in self- and observer-rated personality. Associations between the average size of perceived gender differences and national variations in sociodemographic characteristics, value systems, or gender equality did not reach statistical significance. Findings contribute to our understanding of the underlying mechanisms of gender stereotypes of personality and suggest that perceptions of actual sex differences may play a more important role than culturally based gender roles and socialization processes.
Resumo:
A business process is often modeled using some kind of a directed flow graph, which we call a workflow graph. The Refined Process Structure Tree (RPST) is a technique for workflow graph parsing, i.e., for discovering the structure of a workflow graph, which has various applications. In this paper, we provide two improvements to the RPST. First, we propose an alternative way to compute the RPST that is simpler than the one developed originally. In particular, the computation reduces to constructing the tree of the triconnected components of a workflow graph in the special case when every node has at most one incoming or at most one outgoing edge. Such graphs occur frequently in applications. Secondly, we extend the applicability of the RPST. Originally, the RPST was applicable only to graphs with a single source and single sink such that the completed version of the graph is biconnected. We lift both restrictions. Therefore, the RPST is then applicable to arbitrary directed graphs such that every node is on a path from some source to some sink. This includes graphs with multiple sources and/or sinks and disconnected graphs.
Resumo:
This study is the first to examine the effectiveness of the Fun FRIENDS programme, a school-based, universal preventive intervention for early childhood anxiety and promotion of resilience delivered by classroom teachers. Participants (N = 488) included children aged 4–7 years attending 1 of 14 Catholic Education schools in Brisbane, Australia. The schools were randomly allocated to one of three groups, the intervention, active comparison and waitlist control group. Parents completed standardized measures of anxiety and behavioural inhibition (BI), resilience, social and emotional functioning and behaviour difficulties in addition to parental stress and anxiety, at pre- and post- and 12-month follow-up. Teachers also completed a parallel measure of social and emotional strength at the three time points. Comparable results were obtained for the intervention and comparison groups; however, the intervention group (IG) achieved greater reductions in BI, child behavioural difficulties and improvements in social and emotional competence. In addition, significant improvements in parenting distress and parent–child interactions were found for the IG, with gains maintained at 12-month follow-up. Teacher reports revealed more significant improvement in social and emotional competence for the IG. Clinical implications of the findings are discussed, along with limitations and directions for future research.
Resumo:
The global demand for food, feed, energy and water poses extraordinary challenges for future generations. It is evident that robust platforms for the exploration of renewable resources are necessary to overcome these challenges. Within the multinational framework MultiBioPro we are developing biorefinery pipelines to maximize the use of plant biomass. More specifically, we use poplar and tobacco tree (Nicotiana glauca) as target crop species for improving saccharification, isoprenoid, long chain hydrocarbon contents, fiber quality, and suberin and lignin contents. The methods used to obtain these outputs include GC-MS, LC-MS and RNA sequencing platforms. The metabolite pipelines are well established tools to generate these types of data, but also have the limitations in that only well characterized metabolites can be used. The deep sequencing will allow us to include all transcripts present during the developmental stages of the tobacco tree leaf, but has to be mapped back to the sequence of Nicotiana tabacum. With these set-ups, we aim at a basic understanding for underlying processes and at establishing an industrial framework to exploit the outcomes. In a more long term perspective, we believe that data generated here will provide means for a sustainable biorefinery process using poplar and tobacco tree as raw material. To date the basal level of metabolites in the samples have been analyzed and the protocols utilized are provided in this article.
Resumo:
A recent meta-analysis provides evidence supporting the universal application of school-based prevention programs for adolescent depression. The mechanisms underlying such successful interventions, however, are largely unknown. We report on a qualitative analysis of 109 Grade 9 students’ beliefs about what they gained from an evidence-based depression prevention intervention, the Resourceful Adolescent Program (RAP-A). Fifty-four percent of interviewees articulated at least one specific example of program benefit. A thematic analysis of responses revealed two major themes, improved interpersonal relationships and improved self-regulation, both stronger than originally assumed. A more minor theme also emerged—more helpful cognitions. It is postulated that both improved interpersonal relationships and improved self-regulation are likely to enhance one another, and more helpful cognitions may express its contribution through enhanced self-regulation. These findings broaden our understanding of the impact of depression prevention programs, beginning to illuminate how such programs benefit participants.
Resumo:
With the introduction of the Personally Controlled Health Record (PCEHR), the Australian public is being asked to accept greater responsibility for their healthcare by taking an active role in the management of personal health information. Although well designed, constructed and intentioned, policy and privacy concerns have resulted in an eHealth model that may impact future health sharing requirements. Hence, as a case study for a consumer eHealth initative in the Australian context, eHealth-as-a-Service (eHaaS) serves as a disruptive step in in the aggregation and transformation of health information for use as real-world knowledge. The strategic value of extending the community Health Record Bank (HRB) model lies in the ability to automatically draw on a multitude of relevant data repositories and sources to create a single source of the truth and to engage market forces to create financial sustainability. The opportunity to transform the beleaguered Australian PCEHR into a realisable and sustainable technology consumption model for patient safety is explored. Moreover, the current clerical focus of healthcare practitioners acting in the role of de facto record keepers is renegotiated to establish a shared knowledge creation landscape of action for safer patient interventions. To achieve this potential however requires a platform that will facilitate efficient and trusted unification of all health information available in real-time across the continuum of care. eHaaS provides a sustainable environment and encouragement to realise this potential.
Resumo:
A mixed species reforestation program known as the Rainforestation Farming system was undertaken in the Philippines to develop forms of farm forestry more suitable for smallholders than the simple monocultural plantations commonly used then. In this study, we describe the subsequent changes in stand structure and floristic composition of these plantations in order to learn from the experience and develop improved prescriptions for reforestation systems likely to be attractive to smallholders. We investigated stands aged from 6 to 11 years old on three successive occasions over a 6 year period. We found the number of species originally present in the plots as trees >5 cm dbh decreased from an initial total of 76 species to 65 species at the end of study period. But, at the same time, some new species reached the size class threshold and were recruited into the canopy layer. There was a substantial decline in tree density from an estimated stocking of about 5000 trees per ha at the time of planting to 1380 trees per ha at the time of the first measurement; the density declined by a further 4.9% per year. Changes in composition and stand structure were indicated by a marked shift in the Importance Value Index of species. Over six years, shade-intolerant species became less important and the native shade-tolerant species (often Dipterocarps) increased in importance. Based on how the Rainforestation Farming plantations developed in these early years, we suggest that mixed-species plantations elsewhere in the humid tropics should be around 1000 trees per ha or less, that the proportion of fast growing (and hence early maturing) trees should be about 30–40% of this initial density and that any fruit tree component should only be planted on the plantation margin where more light and space are available for crowns to develop.
Resumo:
We discuss algorithms for combining sequential prediction strategies, a task which can be viewed as a natural generalisation of the concept of universal coding. We describe a graphical language based on Hidden Markov Models for defining prediction strategies, and we provide both existing and new models as examples. The models include efficient, parameterless models for switching between the input strategies over time, including a model for the case where switches tend to occur in clusters, and finally a new model for the scenario where the prediction strategies have a known relationship, and where jumps are typically between strongly related ones. This last model is relevant for coding time series data where parameter drift is expected. As theoretical contributions we introduce an interpolation construction that is useful in the development and analysis of new algorithms, and we establish a new sophisticated lemma for analysing the individual sequence regret of parameterised models.
Resumo:
Universal One-Way Hash Functions (UOWHFs) may be used in place of collision-resistant functions in many public-key cryptographic applications. At Asiacrypt 2004, Hong, Preneel and Lee introduced the stronger security notion of higher order UOWHFs to allow construction of long-input UOWHFs using the Merkle-Damgård domain extender. However, they did not provide any provably secure constructions for higher order UOWHFs. We show that the subset sum hash function is a kth order Universal One-Way Hash Function (hashing n bits to m < n bits) under the Subset Sum assumption for k = O(log m). Therefore we strengthen a previous result of Impagliazzo and Naor, who showed that the subset sum hash function is a UOWHF under the Subset Sum assumption. We believe our result is of theoretical interest; as far as we are aware, it is the first example of a natural and computationally efficient UOWHF which is also a provably secure higher order UOWHF under the same well-known cryptographic assumption, whereas this assumption does not seem sufficient to prove its collision-resistance. A consequence of our result is that one can apply the Merkle-Damgård extender to the subset sum compression function with ‘extension factor’ k+1, while losing (at most) about k bits of UOWHF security relative to the UOWHF security of the compression function. The method also leads to a saving of up to m log(k+1) bits in key length relative to the Shoup XOR-Mask domain extender applied to the subset sum compression function.
Efficient extension of standard Schnorr/RSA signatures into Universal Designated-Verifier Signatures
Resumo:
Universal Designated-Verifier Signature (UDVS) schemes are digital signature schemes with additional functionality which allows any holder of a signature to designate the signature to any desired designated-verifier such that the designated-verifier can verify that the message was signed by the signer, but is unable to convince anyone else of this fact. Since UDVS schemes reduce to standard signatures when no verifier designation is performed, it is natural to ask how to extend the classical Schnorr or RSA signature schemes into UDVS schemes, so that the existing key generation and signing implementation infrastructure for these schemes can be used without modification. We show how this can be efficiently achieved, and provide proofs of security for our schemes in the random oracle model.
Resumo:
Motivated by privacy issues associated with dissemination of signed digital certificates, we define a new type of signature scheme called a ‘Universal Designated-Verifier Signature’ (UDVS). A UDVS scheme can function as a standard publicly-verifiable digital signature but has additional functionality which allows any holder of a signature (not necessarily the signer) to designate the signature to any desired designated-verifier (using the verifier’s public key). Given the designated-signature, the designated-verifier can verify that the message was signed by the signer, but is unable to convince anyone else of this fact. We propose an efficient deterministic UDVS scheme constructed using any bilinear group-pair. Our UDVS scheme functions as a standard Boneh-Lynn-Shacham (BLS) signature when no verifier-designation is performed, and is therefore compatible with the key-generation, signing and verifying algorithms of the BLS scheme. We prove that our UDVS scheme is secure in the sense of our unforgeability and privacy notions for UDVS schemes, under the Bilinear Diffie-Hellman (BDH) assumption for the underlying group-pair, in the random-oracle model. We also demonstrate a general constructive equivalence between a class of unforgeable and unconditionally-private UDVS schemes having unique signatures (which includes the deterministic UDVS schemes) and a class of ID-Based Encryption (IBE) schemes which contains the Boneh-Franklin IBE scheme but not the Cocks IBE scheme.
Resumo:
Artist's Statement: These suspended shipping floats symbolise the artist's grandfather's home on Keriri (Hammond Island), where the trees are decorated with floats of all colours that have washed up on the beach. Across the entire Torres Strait, these floats, often from Asia, wash ashore and become decorative objects, strung from trees and hung from island shacks. Their vivid colours, and sometimes reflective glass surfaces, play against the lush tropical setting, while their re-use reflects the innovative character of island life. This arrangement of the floats represents the artist's family tree, which he has traced back six generations to Mer (Murray Island) and Keriri. The strings of orange floats represent his immediate family and direct lineage, each member of which is named on a float, with the totem of the family painted on the base. The remaining floats trace additional ancestry and spread further back through time and space, spanning the Torres Strait from west to east.