194 resultados para PERFECT NASH EQUILIBRIA
Resumo:
Do you need a practical guide to assessment, curriculum and policy? Are you also looking for a book that is firmly grounded in the theory of this subject? Assessment for Education combines both theory and practice, making it the perfect guide for students, researchers, academics and teachers. This book makes assessment processes transparent for practitioners, and shows how assessment should relate to education. It looks at evidence-informed decision-making and the interrelationships between standards, judgment and moderation practice for improved assessment, teacher quality, schools and systems. The book will provide you with: ' Knowledge about quality assessment and judgement practice ' Understanding of relationships across curriculum, assessment, teaching and learning ' Knowledge of the concept of front-ending assessment based on the learner's needs ' An analysis of practitioner judgement approaches ' Understanding of the conditions under which teacher assessment can be valid ' Principles derived from research of social moderation practices Whether you are studying and researching assessment or working in curriculum and assessment policy, this book will show you how practitioner use of achievement standards can improve learning, equity, social justice and accountability.
Resumo:
Plants transformed with Agrobacterium frequently contain T-DNA concatamers with direct-repeat (d/r) or inverted-repeat (i/r) transgene integrations, and these repetitive T-DNA insertions are often associated with transgene silencing. To facilitate the selection of transgenic lines with simple T-DNA insertions, we constructed a binary vector (pSIV) based on the principle of hairpin RNA (hpRNA)-induced gene silencing. The vector is designed so that any transformed cells that contain more than one insertion per locus should generate hpRNA against the selective marker gene, leading to its silencing. These cells should, therefore, be sensitive to the selective agent and less likely to regenerate. Results from Arabidopsis and tobacco transformation showed that pSIV gave considerably fewer transgenic lines with repetitive insertions than did a conventional T-DNA vector (pCON). Furthermore, the transgene was more stably expressed in the pSIV plants than in the pCON plants. Rescue of plant DNA flanking sequences from pSIV plants was significantly more frequent than from pCON plants, suggesting that pSIV is potentially useful for T-DNA tagging. Our results revealed a perfect correlation between the presence of tail-to-tail inverted repeats and transgene silencing, supporting the view that read-through hpRNA transcript derived from i/r T-DNA insertions is a primary inducer of transgene silencing in plants. © CSIRO 2005.
Resumo:
Posttranscriptional silencing (PTGS) in plants, nematodes, Drosophila, and perhaps all eukaryotes operates by sequence-specific degradation or translational inhibition of the target mRNA. These processes are mediated by duplexed RNA. In Drosophila and nematodes, double-stranded (ds)RNA or self-complementary RNA is processed into fragments of approximately 21 nt by Dicer-1 [1, 2]. These small interfering RNAs (siRNAs) serve as guides to target degradation of homologous single-stranded (ss)RNA [1, 3]. In some cases, the approximately 21 nt guide fragments derived from endogenous, imperfectly self-complementary RNAs cause translational inhibition of their target mRNAs, with which they have substantial, but not perfect sequence complementarity [4-6]. These small temporal RNAs (stRNAs) belong to a class of noncoding microRNAs (miRNAs), 20-24 nt in length, that are found in flies, plants, nematodes, and mammals [4, 6-12]. In nematodes, the Dicer-1 enzyme catalyzes the production of both siRNA and stRNA [2, 13-15]. Mutation of the Arabidopsis Dicer-1 homolog, CARPEL FACTORY (CAF), blocks miRNA production [1, 4, 16-18]. Here, we report that the same caf mutant does not block either PTGS or siRNA production induced by self-complementary hairpin RNA. This suggests either that this mutation only impairs miRNA formation or, more interestingly, that plants have two distinct dicer-like enzymes, one for miRNA and another for siRNAi production.
Resumo:
The first International Diabetic Foot Conference in Australia was hosted at Liverpool Hospital in Sydney during May 30-31, 2013. In response to the growing diabetes epidemic globally and more locally to Australia, the conference provided the perfect bridge for interaction between the multidisciplinary team members involved in diabetes care and the opportunity to assimilate the most up-to-date evidence-based medicine from some of the most respected researchers in the field.
Resumo:
Background High-risk foot complications such as neuropathy, ischaemia, deformity, infections, ulcers and amputations consume considerable health care resources and typically result from chronic diseases. This study aimed to develop and test the validity and reliability of a Queensland High Risk Foot Form (QHRFF) tool. Methods Phase one involved developing a QHRFF using an existing diabetes high-risk foot tool, literature search, expert panel and several state-wide stakeholder groups. Phase two tested the criterion-related validity along with inter- and intra-rater reliability of the final QHRFF. Three cohorts of patients (n = 94) and four clinicians, representing different levels of expertise, were recruited. Validity was determined by calculating sensitivity, specificity and positive predictive values (PPV). Kappa and intra-class correlation (ICC) statistics were used to establish reliability. Results A QHRFF tool containing 46-items across seven domains was developed and endorsed. The majority of QHRFF items achieved moderate-to-perfect validity (PPV = 0.71 – 1) and reliability (Kappa/ICC = 0.41 – 1). Items with weak validity and/or reliability included those identifying health professionals previously attending the patient, other (non-listed) co-morbidity, previous foot ulcer, foot deformity, optimum offloading and optimum footwear. Conclusions The QHRFF had moderate-to-perfect validity and reliability across the majority of items, particularly identifying individual co-morbidities and foot complications. Items with weak validity or reliability need to be re-defined or removed. Overall, the QHRFF appears to be a valid and reliable tool to assess, collect and measure clinical data pertaining to high-risk foot complications for clinical or research purposes.
Resumo:
Intersex is the condition whereby an individual is born with biological features that are simultaneously perceived as male and female. Ranging from the ambiguous genitalia of the true 'hermaphrodite' to the 'mildly or internally intersexed', the condition may be as common as cleft palate. Like cleft palate, it is hidden and surgically altered, but for very different reasons. Intersex draws heavily on the personal testimony of intersexed individuals, their loved ones and medical carers. The impact of early sex-assignment surgery on an individual's later life is examined within the context of ethical and clinical questions. Harper challenges the conventional and radical 'treatment' of intersexuality through non-consensual infant sex-assignment surgery. In doing so, she exposes powerful myths, taboos and constructions of gender - the perfect phallus, a bi-polar model of gender and the infallibility of medical decisions. Handling sensitive material with care, this book deepens our understanding of a condition that has itself only been medically understood in recent years.
Resumo:
Social networking sites (SNSs), with their large numbers of users and large information base, seem to be perfect breeding grounds for exploiting the vulnerabilities of people, the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as “social engineering.” While technology-based security has been addressed by research and may be well understood, social engineering is more challenging to understand and manage, especially in new environments such as SNSs, owing to some factors of SNSs that reduce the ability of users to detect the attack and increase the ability of attackers to launch it. This work will contribute to the knowledge of social engineering by presenting the first two conceptual models of social engineering attacks in SNSs. Phase-based and source-based models are presented, along with an intensive and comprehensive overview of different aspects of social engineering threats in SNSs.
Resumo:
While social engineering represents a real and ominous threat to many organizations, companies, governments, and individuals, social networking sites (SNSs), have been identified as among the most common means of social engineering attacks. Owing to factors that reduce the ability of users to detect social engineering tricks and increase the ability of attackers to launch them, SNSs seem to be perfect breeding ground for exploiting the vulnerabilities of people, and the weakest link in security. This work will contribute to the knowledge of social engineering by identifying different entities and subentities that affect social engineering based attacks in SNSs. Moreover, this paper includes an intensive and comprehensive overview of different aspects of social engineering threats in SNSs.
Resumo:
Travel time estimation and prediction on motorways has long been a topic of research. Prediction modeling generally assumes that the estimation is perfect. No matter how good is the prediction modeling- the errors in estimation can significantly deteriorate the accuracy and reliability of the prediction. Models have been proposed to estimate travel time from loop detector data. Generally, detectors are closely spaced (say 500m) and travel time can be estimated accurately. However, detectors are not always perfect, and even during normal running conditions few detectors malfunction, resulting in increase in the spacing between the functional detectors. Under such conditions, error in the travel time estimation is significantly large and generally unacceptable. This research evaluates the in-practice travel time estimation model during different traffic conditions. It is observed that the existing models fail to accurately estimate travel time during large detector spacing and congestion shoulder periods. Addressing this issue, an innovative Hybrid model that only considers loop data for travel time estimation is proposed. The model is tested using simulation and is validated with real Bluetooth data from Pacific Motorway Brisbane. Results indicate that during non free flow conditions and larger detector spacing Hybrid model provides significant improvement in the accuracy of travel time estimation.
Resumo:
It was Dvorak in 1986 that postulated 'tumours are wounds that do not heal' as they share common cellular and molecular mechanisms, which are active in both wounds and in cancer tissue. Inflammation is a crucial part of the innate immune system that protects against pathogens and initiates adaptive immunity. Acute inflammation is usually a rapid and self-limiting process, however it does not always resolve. This leads to the establishment of a chronic inflammatory state and provides the perfect environment for carcinogenesis. Inflammation and cancer have long had an association, going back as far as Virchow in 1863, when leucocytes were noted in neoplastic tissue. It has been estimated that approximately 25% of all malignancies are initiated or exacerbated by inflammation caused by infectious agents. Furthermore, inflammation is linked to all of the six hallmarks of cancer (evasion of apoptosis, insensitivity to anti-growth signals, unlimited replicative potential, angiogenesis, increase in survival factors and invasion and metastasis). It is thought that inflammation may play a critical role in lung carcinogenesis given that individuals with inflammatory lung conditions have an increased risk of lung cancer development. Cigarette smoking can also induce inflammation in the lung and smokers are at a higher risk of developing lung cancer than non-smokers. However, exposure to a number of environmental agents such as radon, have also been demonstrated as a causative factor in this disease. This chapter will focus on inflammation as a contributory factor in non small cell lung cancer (NSCLC), concentrating primarily on the pathological involvement of the pro-inflammatory cytokines, TNF-α, IL-1β, and the CXC (ELR+) chemokine family. Targeting of inflammatory mediators will also be discussed as a therapeutic strategy in this disease. © 2013 by Nova Science Publishers, Inc. All rights reserved.
Resumo:
The purpose of this paper is to describe a new decomposition construction for perfect secret sharing schemes with graph access structures. The previous decomposition construction proposed by Stinson is a recursive method that uses small secret sharing schemes as building blocks in the construction of larger schemes. When the Stinson method is applied to the graph access structures, the number of such “small” schemes is typically exponential in the number of the participants, resulting in an exponential algorithm. Our method has the same flavor as the Stinson decomposition construction; however, the linear programming problem involved in the construction is formulated in such a way that the number of “small” schemes is polynomial in the size of the participants, which in turn gives rise to a polynomial time construction. We also show that if we apply the Stinson construction to the “small” schemes arising from our new construction, both have the same information rate.
Resumo:
1. Background/context This presentation will report on emerging results from a two phase project funded by the Australian Learning and Teaching Council (ALTC). The project was designed in partnership with five universities and aimed to embed peer review within the local teaching and learning culture by using a distributive leadership framework. 2. The initiative/practice The presentation will highlight research outcomes that bring together both the fundamentals of peer review of teaching with the broader contextual elements of Integration, Leadership and Development. It will be demonstrated that peer review of teaching can be implemented and have advantages for academic staff, teaching evaluation and an organisation if attention is given to strategies that influence the contexts and cultures of teaching. Peer review as a strategy to develop excellence in teaching is considered from a holistic perspective that by necessity encompasses all elements of an educational environment. Results demonstrate achievements that can be obtained through working to foster conditions needed for sustainable leadership and change. The work has implications for policy, research, teaching development and student outcomes and has potential application world-wide. 3. Method(s) of evaluative data collection and analysis The 2 phase project collected focus group and questionnaire data to inform research results that were analysed using a thematic qualitative approach and statistical exploration. 4. Evidence of effectiveness The presentation will demonstrate the effectiveness of distributive leadership and strategic approaches to working for cultural change through the presentation of project findings.
Resumo:
This presentation addresses issues related to leadership, academic development and scholarship of teaching and learning, and highlights research funded by the Australian Office of Learning and Teaching (OLT) designed to embed and sustain peer review of teaching within the culture of 5 Australian universities: Queensland University of Technology, University of Technology, Sydney, University of Adelaide, Curtin University, and Charles Darwin University. Peer review of teaching in higher education will be emphasised as a professional process for providing feedback on teaching and learning practice, which if sustained, can become an effective ongoing strategy for academic development (Barnard et al, 2011; Bell, 2005; Bolt and Atkinson, 2010; McGill & Beaty 2001, 1992; Kemmis & McTaggart, 2000). The research affirms that using developmental peer review models (Barnard et al, 2011; D'Andrea, 2002; Hammersley-Fletcher & Orsmond, 2004) can bring about successful implementation, especially when implemented within a distributive leadership framework (Spillane & Healey, 2010). The project’s aims and objectives were to develop leadership capacity and integrate peer review as a cultural practice in higher education. The research design was a two stage inquiry process over 2 years. The project began in July 2011 and encompassed a development and pilot phase followed by a cascade phase with questionnaire and focus group evaluation processes to support ongoing improvement and measures of outcome. Leadership development activities included locally delivered workshops complemented by the identification and support of champions. To optimise long term sustainability, the project was implemented through existing learning and teaching structures and processes within the respective partner universities. Research outcomes highlight the fundamentals of peer review of teaching and the broader contextual elements of integration, leadership and development, expressed as a conceptual model for embedding peer review of teaching within higher education. The research opens a communicative space about introduction of peer review that goes further than simply espousing its worth and introduction. The conceptual model highlights the importance of development of distributive leadership capacity, integration of policies and processes, and understanding the values, beliefs, assumptions and behaviors embedded in an organizational culture. The presentation overviews empirical findings that demonstrate progress to advance peer review requires an ‘across-the-board’ commitment to embed change, and inherently demands a process that co-creates connection across colleagues, discipline groups, and the university sector. Progress toward peer review of teaching as a cultural phenomenon can be achieved and has advantages for academic staff, scholarship, teaching evaluation and an organisation, if attention is given to strategies that influence the contexts and cultures of teaching practice. Peer review as a strategy to develop excellence in teaching is considered from a holistic perspective that by necessity encompasses all elements of an educational environment and has a focus on scholarship of teaching. The work is ongoing and has implication for policy, research, teaching development and student outcomes, and has potential application world-wide.
Resumo:
This project is a two phase design working in partnership with five universities to develop, implement and systematically embed a distributive leadership model that aims to embed peer partnership (review, development) within the culture of teaching and learning excellence. This presentation will posit a ‘prototype’ peer review leadership model based on ongoing research that brings together both the fundamentals of peer review with the broader importance of context and persons. It will be argued that essential to teaching development is a need to address not only the implementation of peer partnership programs but also strategies to influence and change both the contexts of teaching and the advantages for colleagues. Peer review as a strategy to develop excellence in teaching needs to be considered from a holistic perspective encompassing all elements of the teaching environment. The emphasis is on working to foster the type of conditions needed for leadership and change to begin and be sustained. The work has implications for policy, research, leadership development and student outcomes and has potential application world-wide. Phase 1 has collected focus interview and questionnaire data to inform the research and is being analysed using a thematic qualitative approach and statistical analysis. Evidence is emerging currently as the project is ongoing.
Resumo:
In this paper, we propose a steganalysis method that is able to identify the locations of stego bearing pixels in the binary image. In order to do that, our proposed method will calculate the residual between a given stego image and its estimated cover image. After that, we will compute the local entropy difference between these two versions of images as well. Finally, we will compute the mean of residual and mean of local entropy difference across multiple stego images. From these two means, the locations of stego bearing pixels can be identified. The presented empirical results demonstrate that our proposed method can identify the stego bearing locations of near perfect accuracy when sufficient stego images are supplied. Hence, our proposed method can be used to reveal which pixels in the binary image have been used to carry the secret message.