82 resultados para Cooperação bilateral

em Queensland University of Technology - ePrints Archive


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper proposes a novel approach to video deblocking which performs perceptually adaptive bilateral filtering by considering color, intensity, and motion features in a holistic manner. The method is based on bilateral filter which is an effective smoothing filter that preserves edges. The bilateral filter parameters are adaptive and avoid over-blurring of texture regions and at the same time eliminate blocking artefacts in the smooth region and areas of slow motion content. This is achieved by using a saliency map to control the strength of the filter for each individual point in the image based on its perceptual importance. The experimental results demonstrate that the proposed algorithm is effective in deblocking highly compressed video sequences and to avoid over-blurring of edges and textures in salient regions of image.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Prophylactic surgery including hysterectomy and bilateral salpingo-oophorectomy (BSO) is recommended in BRCA positive women, while in women from the general population, hysterectomy plus BSO may increase the risk of overall mortality. The effect of hysterectomy plus BSO on women previously diagnosed with breast cancer is unknown. We used data from a population-base data linkage study of all women diagnosed with primary breast cancer in Queensland, Australia between 1997 and 2008 (n=21,067). We fitted flexible parametric breast cancer specific and overall survival models with 95% confidence intervals (also known as Royston-Parmar models) to assess the impact of risk-reducing surgery (removal of uterus, one or both ovaries). We also stratified analyses by age 20-49 and 50-79 years, respectively. Overall, 1,426 women (7%) underwent risk-reducing surgery (13% of premenopausal women and 3% of postmenopausal women). No women who had risk-reducing surgery, compared to 171 who did not have risk-reducing surgery developed a gynaecological cancer. Overall, 3,165 (15%) women died, including 2,195 (10%) from breast cancer. Hysterectomy plus BSO was associated with significantly reduced risk of death overall (adjusted HR = 0.69, 95% CI 0.53-0.89; P =0.005). Risk reduction was greater among premenopausal women, whose risk of death halved (HR, 0.45; 95% CI, 0.25-0.79; P < 0.006). This was largely driven by reduction in breast cancer-specific mortality (HR, 0.43; 95% CI, 0.24-0.79; P < 0.006). This population-based study found that risk-reducing surgery halved the mortality risk for premenopausal breast cancer patients. Replication of our results in independent cohorts, and subsequently randomised trials are needed to confirm these findings.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Corporate and organisational fleet and road safety is of strong interest to government and government agencies in Australia and New Zealand. It has been identified that there is great opportunity to engage and assist organisations and corporations in the delivery of road safety and road safety measures to achieve nationally significant road related trauma reductions. This guide has therefore been developed through public sector funding for use by any workplace within Australia and New Zealand. Significant road safety benefits can be achieved by road safety government agencies (Australia and New Zealand) that engage with private and public sectors at their workplaces to address work related road safety issues. It has also been noted that organisational road safety advancement creates effective and sustainable outcomes, safer places of employment, and safer communities. This can be achieved without totally relying upon traditional and often lengthy processes such as further public legislation and/ or community attitudinal and behavioural change programs. Currently, there is little in the way of robust guides or support for those organisations that are wishing to adopt road safety within their places of employment, supply chain and/ or community. Due to this identified gap in available resource and support, it has been recommended that a practical organisational road safety guide be produced; hence the development of this guide. A guide, or supporting documentation, that bridges the gap between government and road safety research knowledge, internationally endorsed road safety methodology, and assists industry as the end user. To achieve this, the guide is designed to be non-specific to any industry sector and usable for small or large organisations, public or private, and engaging for senior executives and the personnel on the ground responsible for its implementation. Therefore, this guide is based on methodology and principles so that it can be applicable in a scalable way to the greatest number of public and private organisations while providing enough detail and ‘how to’ advice to enable organisations to generate their own solutions to road safety issues.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Contralateral bones are often used in many medical applications but it is assumed that their bilateral differences are insignificant. Previous studies used a limited number of distance measurements in quantifying the corresponding differences; therefore, little is known about their bilateral 3D surface asymmetries. The aim of the study is to develop a comprehensive method to quantify geometrical asymmetries between the left and right tibia in order to provide first results on whether the contralateral tibia can be used as an equivalent reference. In this study, 3D bone models were reconstructed from CT scans of seven tibiae pairs, and 34 variables consisting of 2D and 3D measurements were measured from various anatomical regions. All 2D measurements, and lateral plateau and distal subchondral bone surface measurements showed insignificant differences (p > 0.05), but the rest of the surfaces showed significant differences (p < 0.05). Our results suggest that the contralateral tibia can be used as a reference especially in surgical applications such as articular reconstructions since the bilateral differences in the subchondral bone surfaces were less than 0.3 mm. The method can also be potentially transferable to other relevant studies that require the accurate quantification of bone bilateral asymmetries.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background To determine the impact of cataract surgery on vision-related quality of life (VRQOL) and examine the association between objective visual measures and change in VRQOL after surgery among bilateral cataract patients in Ho Chi Minh City, Vietnam. Methods A cohort of older patients with bilateral cataract was assessed one week before and one to three months after first eye or both eye cataract surgery. Visual measures including visual acuity, contrast sensitivity and stereopsis were obtained. Vision-related quality of life was assessed using the NEI VFQ-25. Descriptive analyses and a generalized linear estimating equation (GEE) analysis were undertaken to measure change in VRQOL after surgery. Results Four hundred and thirteen patients were assessed before cataract surgery and 247 completed the follow-up assessment one to three months after first or both eye cataract surgery. Overall, VRQOL significantly improved after cataract surgery (p < 0.001) particularly after both eye surgeries. Binocular contrast sensitivity (p < 0.001) and stereopsis (p < 0.001) were also associated with change in VRQOL after cataract surgery. Visual acuity was not associated with VRQOL. Conclusions Cataract surgery significantly improved VRQOL among bilateral cataract patients in Vietnam. Contrast sensitivity as well as stereopsis, rather than visual acuity significantly affected VRQOL after cataract surgery.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose To determine the prevalence of falls in the 12 months prior to cataract surgery and examine the associations between visual and other risk factors and falls among older bilateral cataract patients in Vietnam. Methods Data collected from 413 patients in the week before scheduled cataract surgery included a questionnaire and three objective visual tests. Results The outcome of interest was self-reported falls in the previous 12 months. A total of 13% (n = 53) of bilateral cataract patients reported 60 falls within the previous 12 months. After adjusting for age, sex, race, employment status, comorbidities, medication usage, refractive management, living status and the three objective visual tests in the worse eye, women (odds ratio, OR, 4.64, 95% confidence interval, CI, 1.85–11.66), and those who lived alone (OR 4.51, 95% CI 1.44–14.14) were at increased risk of a fall. Those who reported a comorbidity were at decreased risk of a fall (OR 0.43, 95% CI 0.19–0.95). Contrast sensitivity (OR 0.31, 95% CI 0.10–0.95) was the only significant visual test associated with a fall. These results were similar for the better eye, except the presence of a comorbidity was not significant (OR 0.45, 95% CI 0.20–1.02). Again, contrast sensitivity was the only significant visual factor associated with a fall (OR 0.15, 95% CI 0.04–0.53). Conclusion Bilateral cataract patients in Vietnam are potentially at high risk of falls and in need of falls prevention interventions. It may also be important for ophthalmologists and health professionals to consider contrast sensitivity measures when prioritizing cataract patients for surgery and assessing their risk of falls.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This report describes the diagnostic features, clinical management and the issues associated with management of a young immunocompetent male who presented with a presumed left Herpes simplex immune stromal keratitis, and ten months later, a right immune stromal keratitis associated with Herpes zoster ophthalmicus.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Peripheral corneal opacities are a common clinical finding. In this case report we describe the routine presentation of a young adult male patient with unilateral opacities in the peripheral cornea resembling a corneal arcus. These opacities were confined to the level of the anterior corneal stroma. The patient also exhibited bilateral signs of mild keratoconus and reported a history of vernal keratoconjunctivitis as a child. A diagnosis of unilateral pseudogerontoxon was made. Pseudogerontoxon is an opacity of the peripheral cornea resembling corneal arcus that typically occurs in patients with a history of allergic eye disease. The clinical features and differential diagnoses of this relatively uncommon cause of peripheral corneal opacity are discussed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Vietnam's present draft of the proposed new Law on Competition is currently in its ninth version. Although there is a need to enact legislation as quickly as possible, Vietnam cannot rush the drafting process. Under its Bilateral Trade Agreement with the USA, Vietnam has committed to improve the quality of its laws and consistency of its legislative framework. Since the Law on Competition will be fundamental in establishing the legal framework for a more coherent and effective competition regime, and will have profound influences on Vietnam's objective of becoming a socialist-oriented market economy, its provisions must be well constructed and well considered, and this takes time. This article shows how the proposed Law is being crafted as compared to older drafts which sheds light on changes in policy during the drafting process. Where possible, the Draft is also compared with the laws in other jurisdictions for any assistance they might lend. In this author's opinion not all the changes are positive but any defects in the draft are not intractable and can be remedied prior to promulgation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The increase of buyer-driven supply chains, outsourcing and other forms of non-traditional employment has resulted in challenges for labour market regulation. One business model which has created substantial regulatory challenges is supply chains. The supply chain model involves retailers purchasing products from brand corporations who then outsource the manufacturing of the work to traders who contract with factories or outworkers who actually manufacture the clothing and textiles. This business model results in time and cost pressures being pushed down the supply chain which has resulted in sweatshops where workers systematically have their labour rights violated. Literally millions of workers work in dangerous workplaces where thousands are killed or permanently disabled every year. This thesis has analysed possible regulatory responses to provide workers a right to safety and health in supply chains which provide products for Australian retailers. This thesis will use a human rights standard to determine whether Australia is discharging its human rights obligations in its approach to combating domestic and foreign labour abuses. It is beyond this thesis to analyse Occupational Health and Safety (OHS) laws in every jurisdiction. Accordingly, this thesis will focus upon Australian domestic laws and laws in one of Australia’s major trading partners, the Peoples’ Republic of China (China). It is hypothesised that Australia is currently breaching its human rights obligations through failing to adequately regulate employees’ safety at work in Australian-based supply chains. To prove this hypothesis, this thesis will adopt a three- phase approach to analysing Australia’s regulatory responses. Phase 1 will identify the standard by which Australia’s regulatory approach to employees’ health and safety in supply chains can be judged. This phase will focus on analysing how workers’ rights to safety as a human right imposes a moral obligation on Australia to take reasonablely practicable steps regulate Australian-based supply chains. This will form a human rights standard against which Australia’s conduct can be judged. Phase 2 focuses upon the current regulatory environment. If existing regulatory vehicles adequately protect the health and safety of employees, then Australia will have discharged its obligations through simply maintaining the status quo. Australia currently regulates OHS through a combination of ‘hard law’ and ‘soft law’ regulatory vehicles. The first part of phase 2 analyses the effectiveness of traditional OHS laws in Australia and in China. The final part of phase 2 then analyses the effectiveness of the major soft law vehicle ‘Corporate Social Responsibility’ (CSR). The fact that employees are working in unsafe working conditions does not mean Australia is breaching its human rights obligations. Australia is only required to take reasonably practicable steps to ensure human rights are realized. Phase 3 identifies four regulatory vehicles to determine whether they would assist Australia in discharging its human rights obligations. Phase 3 then analyses whether Australia could unilaterally introduce supply chain regulation to regulate domestic and extraterritorial supply chains. Phase 3 also analyses three public international law regulatory vehicles. This chapter considers the ability of the United Nations Global Compact, the ILO’s Better Factory Project and a bilateral agreement to improve the detection and enforcement of workers’ right to safety and health.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Stream ciphers are encryption algorithms used for ensuring the privacy of digital telecommunications. They have been widely used for encrypting military communications, satellite communications, pay TV encryption and for voice encryption of both fixed lined and wireless networks. The current multi year European project eSTREAM, which aims to select stream ciphers suitable for widespread adoptation, reflects the importance of this area of research. Stream ciphers consist of a keystream generator and an output function. Keystream generators produce a sequence that appears to be random, which is combined with the plaintext message using the output function. Most commonly, the output function is binary addition modulo two. Cryptanalysis of these ciphers focuses largely on analysis of the keystream generators and of relationships between the generator and the keystream it produces. Linear feedback shift registers are widely used components in building keystream generators, as the sequences they produce are well understood. Many types of attack have been proposed for breaking various LFSR based stream ciphers. A recent attack type is known as an algebraic attack. Algebraic attacks transform the problem of recovering the key into a problem of solving multivariate system of equations, which eventually recover the internal state bits or the key bits. This type of attack has been shown to be effective on a number of regularly clocked LFSR based stream ciphers. In this thesis, algebraic attacks are extended to a number of well known stream ciphers where at least one LFSR in the system is irregularly clocked. Applying algebriac attacks to these ciphers has only been discussed previously in the open literature for LILI-128. In this thesis, algebraic attacks are first applied to keystream generators using stop-and go clocking. Four ciphers belonging to this group are investigated: the Beth-Piper stop-and-go generator, the alternating step generator, the Gollmann cascade generator and the eSTREAM candidate: the Pomaranch cipher. It is shown that algebraic attacks are very effective on the first three of these ciphers. Although no effective algebraic attack was found for Pomaranch, the algebraic analysis lead to some interesting findings including weaknesses that may be exploited in future attacks. Algebraic attacks are then applied to keystream generators using (p; q) clocking. Two well known examples of such ciphers, the step1/step2 generator and the self decimated generator are investigated. Algebraic attacks are shown to be very powerful attack in recovering the internal state of these generators. A more complex clocking mechanism than either stop-and-go or the (p; q) clocking keystream generators is known as mutual clock control. In mutual clock control generators, the LFSRs control the clocking of each other. Four well known stream ciphers belonging to this group are investigated with respect to algebraic attacks: the Bilateral-stop-and-go generator, A5/1 stream cipher, Alpha 1 stream cipher, and the more recent eSTREAM proposal, the MICKEY stream ciphers. Some theoretical results with regards to the complexity of algebraic attacks on these ciphers are presented. The algebraic analysis of these ciphers showed that generally, it is hard to generate the system of equations required for an algebraic attack on these ciphers. As the algebraic attack could not be applied directly on these ciphers, a different approach was used, namely guessing some bits of the internal state, in order to reduce the degree of the equations. Finally, an algebraic attack on Alpha 1 that requires only 128 bits of keystream to recover the 128 internal state bits is presented. An essential process associated with stream cipher proposals is key initialization. Many recently proposed stream ciphers use an algorithm to initialize the large internal state with a smaller key and possibly publicly known initialization vectors. The effect of key initialization on the performance of algebraic attacks is also investigated in this thesis. The relationships between the two have not been investigated before in the open literature. The investigation is conducted on Trivium and Grain-128, two eSTREAM ciphers. It is shown that the key initialization process has an effect on the success of algebraic attacks, unlike other conventional attacks. In particular, the key initialization process allows an attacker to firstly generate a small number of equations of low degree and then perform an algebraic attack using multiple keystreams. The effect of the number of iterations performed during key initialization is investigated. It is shown that both the number of iterations and the maximum number of initialization vectors to be used with one key should be carefully chosen. Some experimental results on Trivium and Grain-128 are then presented. Finally, the security with respect to algebraic attacks of the well known LILI family of stream ciphers, including the unbroken LILI-II, is investigated. These are irregularly clock- controlled nonlinear filtered generators. While the structure is defined for the LILI family, a particular paramater choice defines a specific instance. Two well known such instances are LILI-128 and LILI-II. The security of these and other instances is investigated to identify which instances are vulnerable to algebraic attacks. The feasibility of recovering the key bits using algebraic attacks is then investigated for both LILI- 128 and LILI-II. Algebraic attacks which recover the internal state with less effort than exhaustive key search are possible for LILI-128 but not for LILI-II. Given the internal state at some point in time, the feasibility of recovering the key bits is also investigated, showing that the parameters used in the key initialization process, if poorly chosen, can lead to a key recovery using algebraic attacks.