164 resultados para Keywords: Gallai graphs, anti-Gallai graphs,
Resumo:
Abstract: This study explores the contradictions and ambivalences experienced by a working artist at a time when her age, her gender, and broader cultural shifts are all potential obstacles or liabilities to creative flourishing. It is the product of practice-led research into the creative process from the perspective of the female "late bloomer". In this phrase, I have in mind the mature-aged woman who is, in mid-life, suddenly seized with inspiration and fired with creative energy. At its heart is the question: If an Elizabeth Jolley were in our midst today, would we hear from her? The result is a full-length libretto and accompanying exegetical binoculars in the form of a Preface and an Afterword. The creative work, Things That Fall Over (TTFO) is conceived in two parts: a libretto and oratorio for performance. It begins as a play, but over three acts and into a coda, the work becomes something entirely other - an (anti-) musical. The work grew from a personal interest in the nexus between women, ageing and creative practice, via investigation into the oeuvre of two Australian artists, Elizabeth Jolley, author, first published at age 53, and Rosalie Gascoigne, sculptor, first exhibited at 58. A second strand of the research grew from a fascination for the stage musical, especially in its more alternative modes as in the hands of Stephen Sondheim, or in more provocative manifestations as witnessed in recent Tony Award winners Avenue Q and The Book of Mormon. Contextually, this research is conducted at a time when anecdotal evidence suggests that women’s work in the performing arts and in literature is being pushed to the margins after a late twentieth century Golden Age on page and stage. Using hybrid practice-led methodologies - bricolage, log-keeping - and working within queer and feminist paradigms, this study seeks to counter that push with a new work that is all-female, part-pantomime, part monstrous allegory. In illuminating the creative process of a mature-aged playwright it concludes that hybrid and interstitial forms still offer an inclusive and democratic space in which voices that may otherwise be muted will continue to be heard.
Resumo:
The backlash against gender-sensitive responses to women's victimization, offending, and imprisonment is inseparable from contemporary reaction against feminism and other progressive movements. The backlash against the American Violence Against Women Act (VAWA) provides a prime example of this resistance. Despite widespread support for VAWA and other policies designed to address violence against women, some constituencies object to their existence. The author investigates fathers' rights rhetoric on VAWA as an example of antifeminist backlash.
Resumo:
Speeding represents a major contributor to road trauma, increasing crash frequency and severity. Antispeeding campaigns represent a key strategy aimed at discouraging individuals from speeding. This paper investigated salient beliefs underpinning male and female drivers’ travel speed behaviour, with the view to use such insight to, ultimately, inform the content of targeted anti-speeding messages. A survey of N = 751 (579 males, 16-79 years) drivers assessed what they regarded as speeding in 60km/hr and 100km/hr zones and their beliefs about how they would respond to receiving a speeding infringement. Participants responded to scales which extended up to 20km/hr above each respective speed limit, the lowest speed that they considered was speeding and the speed at which they would be willing to drive and still feel in control. For analyses, to enable greater scrutiny of potential gender differences regarding the speeds identified, participants’ responses to these items were categorised into 5km/hr increments and chi-square analyses conducted. For their responses to (beliefs about) the possibility of being caught speeding, drivers were asked how applicable various beliefs were to them (e.g., feeling unlucky). These beliefs were analysed via MANOVA. The results revealed that there was considerable variability in the speeds identified, thus supporting the value of categorising speeds. Within the 100km/hr zone, based on the categories, a significant difference was found regarding the speed that males would be willing to drive (and still feel in control) relative to females. Specifically, the greatest proportion of males (30.4%) identified speeds within the 106-110km/hr category whereas the greatest proportion of females (38.1%) identified a lower speed, within the 101-105km/hr category, as the speed they would be willing to drive. No other significant differences emerged, however, either in relation to the definition of speeding reported for 100km/hr zones (i.e., males and females tended to identify a similar speed as indicative of speeding) nor for these same items as assessed in relation to the 60km/hr zones. For their responses to the possibility of being caught, males were significantly more likely than females to report that, if caught, a likely response they would have would be to think that they had still been driving safely. In contrast, females were significantly more likely than males to report thinking that their speeding had been unsafe and that they should not have been speeding. Females were also significantly more likely to report feeling embarrassed to tell important others about having received a speeding infringement than males. The findings are discussed in terms of their implications for developing well-targeted advertising messages aimed at discouraging drivers’ from speeding.
Resumo:
18.1 Antibiotics 18.1.1 Introduction to bacteria 18.1.2 Introduction to antibiotics 18.1.3 Inhibitors of bacterial cell wall synthesis 18.1.3.1 β-Lactams 18.1.3.2 Glycopeptides 18.1.4 Inhibitors of bacterial protein synthesis 18.1.4.1 Tetracyclines 18.1.4.2 Aminoglycosides 18.1.4.3 Chloramphenicol 18.1.4.4 Macrolides 18.1.4.5 Lincosamides 18.1.4.6 Oxalazidones 18.1.5 Inhibitors of DNA synthesis 18.2. Anti-tuberculotic drugs 18.2.1 Introduction 18.2.2 Isoniazid 18.2.3 Ethambutol 18.2.4 Rifamycin 18.2.5 Pyrazinamide 18.3. Anti-viral drugs 18.3.1 Introduction to viruses 18.3.2 Drugs used to treat herpesviruses 18.3.3 Drugs used to treat the flu 18.3.4 Drugs used to treat HIV/AIDS 18.4. Antifungal drugs 18.4.1 Introduction to Fungi 18.4.2 Antifungal drugs
Resumo:
HIV remains a significant global burden and without an effective vaccine, it is crucial to develop microbicides to halt the initial transmission of the virus. Several microbicides have been researched with various levels of success. Amongst these, the broadly neutralising antibodies and peptide lectins are promising in that they can immediately act on the virus and have proven efficacious in in vitro and in vivo protection studies. For the purpose of development and access by the relevant population groups, it is crucial that these microbicides be produced at low cost. For the promising protein and peptide candidate molecules, it appears that current production systems are overburdened and expensive to establish and maintain. With recent developments in vector systems for protein expression coupled with downstream protein purification technologies, plants are rapidly gaining credibility as alternative production systems. Here we evaluate the advances made in host and vector system development for plant expression as well as the progress made in expressing HIV neutralising antibodies and peptide lectins using plant-based platforms. © 2012 Elsevier Inc.
Resumo:
Modelling video sequences by subspaces has recently shown promise for recognising human actions. Subspaces are able to accommodate the effects of various image variations and can capture the dynamic properties of actions. Subspaces form a non-Euclidean and curved Riemannian manifold known as a Grassmann manifold. Inference on manifold spaces usually is achieved by embedding the manifolds in higher dimensional Euclidean spaces. In this paper, we instead propose to embed the Grassmann manifolds into reproducing kernel Hilbert spaces and then tackle the problem of discriminant analysis on such manifolds. To achieve efficient machinery, we propose graph-based local discriminant analysis that utilises within-class and between-class similarity graphs to characterise intra-class compactness and inter-class separability, respectively. Experiments on KTH, UCF Sports, and Ballet datasets show that the proposed approach obtains marked improvements in discrimination accuracy in comparison to several state-of-the-art methods, such as the kernel version of affine hull image-set distance, tensor canonical correlation analysis, spatial-temporal words and hierarchy of discriminative space-time neighbourhood features.
Resumo:
Open the sports or business section of your daily newspaper, and you are immediately bombarded with an array of graphs, tables, diagrams, and statistical reports that require interpretation. Across all walks of life, the need to understand statistics is fundamental. Given that our youngsters’ future world will be increasingly data laden, scaffolding their statistical understanding and reasoning is imperative, from the early grades on. The National Council of Teachers of Mathematics (NCTM) continues to emphasize the importance of early statistical learning; data analysis and probability was the Council’s professional development “Focus of the Year” for 2007–2008. We need such a focus, especially given the results of the statistics items from the 2003 NAEP. As Shaughnessy (2007) noted, students’ performance was weak on more complex items involving interpretation or application of items of information in graphs and tables. Furthermore, little or no gains were made between the 2000 NAEP and the 2003 NAEP studies. One approach I have taken to promote young children’s statistical reasoning is through data modeling. Having implemented in grades 3 –9 a number of model-eliciting activities involving working with data (e.g., English 2010), I observed how competently children could create their own mathematical ideas and representations—before being instructed how to do so. I thus wished to introduce data-modeling activities to younger children, confi dent that they would likewise generate their own mathematics. I recently implemented data-modeling activities in a cohort of three first-grade classrooms of six year- olds. I report on some of the children’s responses and discuss the components of data modeling the children engaged in.
Resumo:
Secure communications between large number of sensor nodes that are randomly scattered over a hostile territory, necessitate efficient key distribution schemes. However, due to limited resources at sensor nodes such schemes cannot be based on post deployment computations. Instead, pairwise (symmetric) keys are required to be pre-distributed by assigning a list of keys, (a.k.a. key-chain), to each sensor node. If a pair of nodes does not have a common key after deployment then they must find a key-path with secured links. The objective is to minimize the keychain size while (i) maximizing pairwise key sharing probability and resilience, and (ii) minimizing average key-path length. This paper presents a deterministic key distribution scheme based on Expander Graphs. It shows how to map the parameters (e.g., degree, expansion, and diameter) of a Ramanujan Expander Graph to the desired properties of a key distribution scheme for a physical network topology.
Resumo:
A complex attack is a sequence of temporally and spatially separated legal and illegal actions each of which can be detected by various IDS but as a whole they constitute a powerful attack. IDS fall short of detecting and modeling complex attacks therefore new methods are required. This paper presents a formal methodology for modeling and detection of complex attacks in three phases: (1) we extend basic attack tree (AT) approach to capture temporal dependencies between components and expiration of an attack, (2) using enhanced AT we build a tree automaton which accepts a sequence of actions from input message streams from various sources if there is a traversal of an AT from leaves to root, and (3) we show how to construct an enhanced parallel automaton that has each tree automaton as a subroutine. We use simulation to test our methods, and provide a case study of representing attacks in WLANs.
Resumo:
Online social networks can be modelled as graphs; in this paper, we analyze the use of graph metrics for identifying users with anomalous relationships to other users. A framework is proposed for analyzing the effectiveness of various graph theoretic properties such as the number of neighbouring nodes and edges, betweenness centrality, and community cohesiveness in detecting anomalous users. Experimental results on real-world data collected from online social networks show that the majority of users typically have friends who are friends themselves, whereas anomalous users’ graphs typically do not follow this common rule. Empirical analysis also shows that the relationship between average betweenness centrality and edges identifies anomalies more accurately than other approaches.
Resumo:
Secure communications in distributed Wireless Sensor Networks (WSN) operating under adversarial conditions necessitate efficient key management schemes. In the absence of a priori knowledge of post-deployment network configuration and due to limited resources at sensor nodes, key management schemes cannot be based on post-deployment computations. Instead, a list of keys, called a key-chain, is distributed to each sensor node before the deployment. For secure communication, either two nodes should have a key in common in their key-chains, or they should establish a key through a secure-path on which every link is secured with a key. We first provide a comparative survey of well known key management solutions for WSN. Probabilistic, deterministic and hybrid key management solutions are presented, and they are compared based on their security properties and re-source usage. We provide a taxonomy of solutions, and identify trade-offs in them to conclude that there is no one size-fits-all solution. Second, we design and analyze deterministic and hybrid techniques to distribute pair-wise keys to sensor nodes before the deployment. We present novel deterministic and hybrid approaches based on combinatorial design theory and graph theory for deciding how many and which keys to assign to each key-chain before the sensor network deployment. Performance and security of the proposed schemes are studied both analytically and computationally. Third, we address the key establishment problem in WSN which requires key agreement algorithms without authentication are executed over a secure-path. The length of the secure-path impacts the power consumption and the initialization delay for a WSN before it becomes operational. We formulate the key establishment problem as a constrained bi-objective optimization problem, break it into two sub-problems, and show that they are both NP-Hard and MAX-SNP-Hard. Having established inapproximability results, we focus on addressing the authentication problem that prevents key agreement algorithms to be used directly over a wireless link. We present a fully distributed algorithm where each pair of nodes can establish a key with authentication by using their neighbors as the witnesses.
Resumo:
Context: Anti-Müllerian hormone (AMH) concentration reflects ovarian aging and is argued to be a useful predictor of age at menopause (AMP). It is hypothesized that AMH falling below a critical threshold corresponds to follicle depletion, which results in menopause. With this threshold, theoretical predictions of AMP can be made. Comparisons of such predictions with observed AMP from population studies support the role for AMH as a forecaster of menopause. Objective: The objective of the study was to investigate whether previous relationships between AMH and AMP are valid using a much larger data set. Setting: AMH was measured in 27 563 women attending fertility clinics. Study Design: From these data a model of age-related AMH change was constructed using a robust regression analysis. Data on AMP from subfertile women were obtained from the population-based Prospect-European Prospective Investigation into Cancer and Nutrition (Prospect- EPIC) cohort (n � 2249). By constructing a probability distribution of age at which AMH falls below a critical threshold and fitting this to Prospect-EPIC menopausal age data using maximum likelihood, such a threshold was estimated. Main Outcome: The main outcome was conformity between observed and predicted AMP. Results: To get a distribution of AMH-predicted AMP that fit the Prospect-EPIC data, we found the critical AMH threshold should vary among women in such a way that women with low age-specific AMH would have lower thresholds, whereas women with high age-specific AMH would have higher thresholds (mean 0.075 ng/mL; interquartile range 0.038–0.15 ng/mL). Such a varying AMH threshold for menopause is a novel and biologically plausible finding. AMH became undetectable (�0.2 ng/mL) approximately 5 years before the occurrence of menopause, in line with a previous report. Conclusions: The conformity of the observed and predicted distributions of AMP supports the hypothesis that declining population averages of AMH are associated with menopause, making AMH an excellent candidate biomarker for AMP prediction. Further research will help establish the accuracy of AMH levels to predict AMP within individuals.
Resumo:
Classical architecture has a long history of representing the idealized proportions of the human body, derived from the Vitruvian man. This association with the idealized human form has also associated architecture as symbiotic with prevailing power structures. Meaning that architecture is always loaded with some signification, it creates a highly inscribed space. In the absence of architecture space is not necessarily without inscription, for within the void there can exist an anti-architecture. Like the black box theatre, it is both empty and full at the same time, in the absence of the architecture, the void of space and how it is occupied becomes much more profound. As Dorita Hannah writes, ‘In denying a purely visual apprehension of built space, and suggesting a profound interiority, the black-box posits a new way of regarding the body in space.’ This paper analyses the work of Harold Pinter and his use of the body to create an anti-architecture to subvert oppressors and power structures. Pinter’s works are an important case study in this research due to their political nature. His works are also heavily tied to territory, which bound the works in a dependent relationship with a simulated ‘place’. In the citation accompanying the playwright’s Nobel Laureate it states, '...in his plays [he] uncovers the precipice under everyday prattle and forces entry into oppression's closed rooms.' In Pinter’s work oppression manifests itself in the representation of a room, the architecture, which is the cause of a power struggle when objectified and defeated when subjectified. The following work examines how Pinter uses the body to subjectify and represent architecture as authority in his earlier works, which relied on detailed mimetic sets of domestic rooms, and then in his later political works, that were freed of representational scenography. This paper will also look at the adaption of Pinter’s work by the Belarus Free Theatre in their 2008 production of ‘Being Harold Pinter.’ The work of Pinter and the Belarus Free Theatre are concerned with authoritarian political structures. That is, political structures that works against ideas of individualism, ascribing to a mass-produced body as an artifact of dictatorship and conservatism. The focus on the body in space on an empty stage draws attention to the individual – the body amongst scenography can become merely another prop, lost in the borders and boundaries the scenery dictates. Through an analysis of selected works by Harold Pinter and their interpretations, this paper examines this paradox of emptiness and fullness through the body as anti-architecture in performance.
Resumo:
Young male drivers are over-represented in road-related fatalities. Speeding represents a pervasive and significant contributor to road trauma. Anti-speeding messages represent a long-standing strategy aimed at discouraging drivers from speeding. These messages, however, have not always achieved their persuasive objectives which may be due, in part, to them not always targeting the most salient beliefs underpinning the speeding behavior of particular driver groups. The current study elicited key beliefs underpinning speeding behavior as well as strategies used to avoid speeding, using a well-validated belief-based model, the Theory of Planned Behavior and in-depth qualitative methods. To obtain the most comprehensive understanding about the salient beliefs and strategies of young male drivers, how such beliefs and strategies compared with those of drivers of varying ages and gender, was also explored. Overall, 75 males and females (aged 17-25 or 30-55 years) participated in group discussions. The findings revealed beliefs that were particularly relevant to young males and that would likely represent key foci for developing message content. For instance, the need to feel in control and the desire to experience positive affect when driving were salient advantages; while infringements were a salient disadvantage and, in particular, the loss of points and the implications associated with potential licence loss as opposed to the monetary (fine) loss (behavioral beliefs). For normative influences, young males appeared to hold notable misperceptions (compared with other drivers, such as young females); for instance, young males believed that females/girlfriends were impressed by their speeding. In the case of control beliefs, the findings revealed low perceptions of control with respect to being able to not speed and a belief that something “extraordinary” would need to happen for a young male driver to lose control of their vehicle while speeding. The practical implications of the findings, in terms of providing suggestions for devising the content of anti-speeding messages, are discussed.
Resumo:
With the increasing enrolment of students with disabilities in primary schools and the enactment of legislative protections for students with disabilities in Disability Discrimination legislation and the Disability Standards for Education, this study examines the experiences of parents of students with disabilities in Queensland State schools. This study is concerned with the experiences that parents of children with disabilities have in relation to the concept and processes of inclusive classroom practice within the primary school. The experiences of parents in large metropolitan schools in Queensland, Australia are analysed in light of current anti-discrimination legislation operating within Australia. Data were collected using a mixed methodology in which 50 parents from nine large metropolitan Queensland State schools responded to a Parent Questionnaire about their experiences in their child’s school. This was followed by two focus groups with a total of six parents who described their experiences in their child’s school. Together the qualitative and quantitative information complemented the other to provide a unique perspective on the impact of anti-discrimination legislation. The findings from the study suggest that parents and their children continue to be discriminated against and that the legislation and associated standards have not eliminated this discrimination. Recommendations are made in the final chapter that propose an inclusive schooling framework for students with disabilities. This intends to ensure not only compliance with the ‘spirit’ of Anti-Discrimination legislation and the Disability Standards, but also a means by which schools may evolve to become inclusive and embracing of difference as part of overall richness of schools as opposed to deficiency.