990 resultados para SINGULAR CONTINUOUS-SPECTRUM


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Australian Securities Exchange (ASX) listing rule 3.1 requires listed companies to immediately disclose price sensitive information to the market via the ASX’s Company Announcements Platform (CAP) prior to release through other disclosure channels. Since 1999, to improve the communication process, the ASX has permitted third-party mediation in the disclosure process that leads to the release of an Open Briefing (OB) through CAP. An OB is an interview between senior executives of the firm and an Open Briefing analyst employed by Orient Capital Pty Ltd (broaching topics such as current profit and outlook). Motivated by an absence of research on factors that influence firms to use OBs as a discretionary disclosure channel, this study examines (1) Why do firms choose to release information to the market via OBs?, (2) What are the firm characteristics that explain the discretionary use of OBs as a disclosure channel?, and (3) What are the disclosure attributes that influence firms’ decisions to regularly use OBs as a disclosure channel? Based on agency and information economics theories, a theoretical framework is developed to address research questions. This theoretical framework comprises disclosure environments such as firm characteristics and external factors, disclosure attributes and disclosure consequences. In order to address the first research question, the study investigates (i) the purpose of using OBs, (2) whether firms use OBs to provide information relating to previous public announcements, and (3) whether firms use OBs to provide routine or non-routine disclosures. In relation to the second and third research questions, hypotheses are developed to test factors expected to explain the discretionary use of OBs and firms’ decisions to regularly use OBs, and to explore the factors influencing the nature of OB disclosure. Content analysis and logistic regression models are used to investigate the research questions and test the hypotheses. Data are drawn from a hand-collected population of 1863 OB announcements issued by 239 listed firms between 2000 and 2010. The results show that types of information disclosed via an OB announcement are principally on matters relating to corporate strategies and performance and outlook. Most OB announcements are linked with a previous related announcement, with the lag between announcements significantly longer for loss-making firms than profitmaking firms. The main results show that firms which tend to be larger, have an analyst following, and have higher growth opportunities, are more likely to release OBs. Further, older firms and firms that release OB announcements containing good news, historical information and less complex information tend to be regular OB users. Lastly, firms more likely to disclose strategic information via OBs tend to operate in industries facing greater uncertainty, do not have analysts following, and have higher growth opportunities are less likely to disclose good news, historical information and complex information via OBs. This study is expected to contribute to disclosure literature in terms of disclosure attributes and firm characteristics that influence behaviour in this unique (OB) disclosure channel. With regard to practical significance, regulators can gain an understanding of how OBs are disclosed which can assist them in monitoring the use of OBs and improving the effectiveness of communications with stakeholders. In addition, investors can have a better comprehension of information contained in OB announcements, which may in turn better facilitate their investment decisions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cognitive radio is an emerging technology proposing the concept of dynamic spec- trum access as a solution to the looming problem of spectrum scarcity caused by the growth in wireless communication systems. Under the proposed concept, non- licensed, secondary users (SU) can access spectrum owned by licensed, primary users (PU) so long as interference to PU are kept minimal. Spectrum sensing is a crucial task in cognitive radio whereby the SU senses the spectrum to detect the presence or absence of any PU signal. Conventional spectrum sensing assumes the PU signal as ‘stationary’ and remains in the same activity state during the sensing cycle, while an emerging trend models PU as ‘non-stationary’ and undergoes state changes. Existing studies have focused on non-stationary PU during the transmission period, however very little research considered the impact on spectrum sensing when the PU is non-stationary during the sensing period. The concept of PU duty cycle is developed as a tool to analyse the performance of spectrum sensing detectors when detecting non-stationary PU signals. New detectors are also proposed to optimise detection with respect to duty cycle ex- hibited by the PU. This research consists of two major investigations. The first stage investigates the impact of duty cycle on the performance of existing detec- tors and the extent of the problem in existing studies. The second stage develops new detection models and frameworks to ensure the integrity of spectrum sensing when detecting non-stationary PU signals. The first investigation demonstrates that conventional signal model formulated for stationary PU does not accurately reflect the behaviour of a non-stationary PU. Therefore the performance calculated and assumed to be achievable by the conventional detector does not reflect actual performance achieved. Through analysing the statistical properties of duty cycle, performance degradation is proved to be a problem that cannot be easily neglected in existing sensing studies when PU is modelled as non-stationary. The second investigation presents detectors that are aware of the duty cycle ex- hibited by a non-stationary PU. A two stage detection model is proposed to improve the detection performance and robustness to changes in duty cycle. This detector is most suitable for applications that require long sensing periods. A second detector, the duty cycle based energy detector is formulated by integrat- ing the distribution of duty cycle into the test statistic of the energy detector and suitable for short sensing periods. The decision threshold is optimised with respect to the traffic model of the PU, hence the proposed detector can calculate average detection performance that reflect realistic results. A detection framework for the application of spectrum sensing optimisation is proposed to provide clear guidance on the constraints on sensing and detection model. Following this framework will ensure the signal model accurately reflects practical behaviour while the detection model implemented is also suitable for the desired detection assumption. Based on this framework, a spectrum sensing optimisation algorithm is further developed to maximise the sensing efficiency for non-stationary PU. New optimisation constraints are derived to account for any PU state changes within the sensing cycle while implementing the proposed duty cycle based detector.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Most current computer systems authorise the user at the start of a session and do not detect whether the current user is still the initial authorised user, a substitute user, or an intruder pretending to be a valid user. Therefore, a system that continuously checks the identity of the user throughout the session is necessary without being intrusive to end-user and/or effectively doing this. Such a system is called a continuous authentication system (CAS). Researchers have applied several approaches for CAS and most of these techniques are based on biometrics. These continuous biometric authentication systems (CBAS) are supplied by user traits and characteristics. One of the main types of biometric is keystroke dynamics which has been widely tried and accepted for providing continuous user authentication. Keystroke dynamics is appealing for many reasons. First, it is less obtrusive, since users will be typing on the computer keyboard anyway. Second, it does not require extra hardware. Finally, keystroke dynamics will be available after the authentication step at the start of the computer session. Currently, there is insufficient research in the CBAS with keystroke dynamics field. To date, most of the existing schemes ignore the continuous authentication scenarios which might affect their practicality in different real world applications. Also, the contemporary CBAS with keystroke dynamics approaches use characters sequences as features that are representative of user typing behavior but their selected features criteria do not guarantee features with strong statistical significance which may cause less accurate statistical user-representation. Furthermore, their selected features do not inherently incorporate user typing behavior. Finally, the existing CBAS that are based on keystroke dynamics are typically dependent on pre-defined user-typing models for continuous authentication. This dependency restricts the systems to authenticate only known users whose typing samples are modelled. This research addresses the previous limitations associated with the existing CBAS schemes by developing a generic model to better identify and understand the characteristics and requirements of each type of CBAS and continuous authentication scenario. Also, the research proposes four statistical-based feature selection techniques that have highest statistical significance and encompasses different user typing behaviors which represent user typing patterns effectively. Finally, the research proposes the user-independent threshold approach that is able to authenticate a user accurately without needing any predefined user typing model a-priori. Also, we enhance the technique to detect the impostor or intruder who may take over during the entire computer session.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background Insect baculovirus-produced Human immunodeficiency virus type 1 (HIV-1) Gag virus-like-particles (VLPs) stimulate good humoral and cell-mediated immune responses in animals and are thought to be suitable as a vaccine candidate. Drawbacks to this production system include contamination of VLP preparations with baculovirus and the necessity for routine maintenance of infectious baculovirus stock. We used piggyBac transposition as a novel method to create transgenic insect cell lines for continuous VLP production as an alternative to the baculovirus system. Results Transgenic cell lines maintained stable gag transgene integration and expression up to 100 cell passages, and although the level of VLPs produced was low compared to baculovirus-produced VLPs, they appeared similar in size and morphology to baculovirus-expressed VLPs. In a murine immunogenicity study, whereas baculovirus-produced VLPs elicited good CD4 immune responses in mice when used to boost a prime with a DNA vaccine, no boost response was elicited by transgenically produced VLPs. Conclusion Transgenic insect cells are stable and can produce HIV Pr55 Gag VLPs for over 100 passages: this novel result may simplify strategies aimed at making protein subunit vaccines for HIV. Immunogenicity of the Gag VLPs in mice was less than that of baculovirus-produced VLPs, which may be due to lack of baculovirus glycoprotein incorporation in the transgenic cell VLPs. Improved yield and immunogenicity of transgenic cell-produced VLPs may be achieved with the addition of further genetic elements into the piggyBac integron.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Over recent years there has been an increase in the literature examining youth with Autism Spectrum Disorders (ASD). The growth in this area of research has highlighted a significant gap in our understanding of suitable interventions for people with ASD and the treatment of co-occurring psychiatric disorders.1-3 Children with ASD are at increased risk of experiencing depressive symptoms and developing depression; however with very few proven interventions available for preventing and treating depression in children with ASD, there is a need for further research in this area.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Wires of YBa2Cu3O7-x were fabricated by extrusion using a hydroxypropyl methylcellulose (HPMC) binder. As little as 2 wt.% binder was added to an oxide prepared by a novel co-precipitation process, to produce a plastic mass which readily gave continuous extrusion of long lengths of wire in a reproducible fashion. Critical temperatures of 92K were obtained for wires given optimum high-temperature heat treatments. Critical current densities greater than 1000 A cm-1 were measured at 77.3K using heat treatments at around 910°C for 10h. These transport critical current densities, measured on centimeter-long wires, were obtained with microstructures showing a relatively dense and uniform distribution of randomly oriented, small YBa2Cu3O7-x grains. © 1993.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Internet services are important part of daily activities for most of us. These services come with sophisticated authentication requirements which may not be handled by average Internet users. The management of secure passwords for example creates an extra overhead which is often neglected due to usability reasons. Furthermore, password-based approaches are applicable only for initial logins and do not protect against unlocked workstation attacks. In this paper, we provide a non-intrusive identity verification scheme based on behavior biometrics where keystroke dynamics based-on free-text is used continuously for verifying the identity of a user in real-time. We improved existing keystroke dynamics based verification schemes in four aspects. First, we improve the scalability where we use a constant number of users instead of whole user space to verify the identity of target user. Second, we provide an adaptive user model which enables our solution to take the change of user behavior into consideration in verification decision. Next, we identify a new distance measure which enables us to verify identity of a user with shorter text. Fourth, we decrease the number of false results. Our solution is evaluated on a data set which we have collected from users while they were interacting with their mail-boxes during their daily activities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There are different ways to authenticate humans, which is an essential prerequisite for access control. The authentication process can be subdivided into three categories that rely on something someone i) knows (e.g. password), and/or ii) has (e.g. smart card), and/or iii) is (biometric features). Besides classical attacks on password solutions and the risk that identity-related objects can be stolen, traditional biometric solutions have their own disadvantages such as the requirement of expensive devices, risk of stolen bio-templates etc. Moreover, existing approaches provide the authentication process usually performed only once initially. Non-intrusive and continuous monitoring of user activities emerges as promising solution in hardening authentication process: iii-2) how so. behaves. In recent years various keystroke dynamic behavior-based approaches were published that are able to authenticate humans based on their typing behavior. The majority focuses on so-called static text approaches, where users are requested to type a previously defined text. Relatively few techniques are based on free text approaches that allow a transparent monitoring of user activities and provide continuous verification. Unfortunately only few solutions are deployable in application environments under realistic conditions. Unsolved problems are for instance scalability problems, high response times and error rates. The aim of this work is the development of behavioral-based verification solutions. Our main requirement is to deploy these solutions under realistic conditions within existing environments in order to enable a transparent and free text based continuous verification of active users with low error rates and response times.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Since 1 December 2002, the New Zealand Exchange’s (NZX) continuous disclosure listing rules have operated with statutory backing. To test the effectiveness of the new corporate disclosure regime, we compare the change in quantity of market announcements (overall, non-routine, non-procedural and external) released to the NZX before and after the introduction of statutory backing. We also extend our study in investigating whether the effectiveness of the new corporate disclosure regime is diminished or augmented by corporate governance mechanisms including board size, providing separate roles for CEO and Chairman, board independence, board gender diversity and audit committee independence. Our findings provide a qualified support for the effectiveness of the new corporate disclosure regime regarding the quantity of market disclosures. There is strong evidence that the effectiveness of the new corporate disclosure regime was augmented by providing separate roles for CEO and Chairman, board gender diversity and audit committee independence, and diminished by board size. In addition, there is significant evidence that share price queries do impact corporate disclosure behaviour and this impact is significantly influenced by corporate governance mechanisms. Our findings provide important implications for corporate regulators in their quest for...

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We propose a multi-layer spectrum sensing optimisation algorithm to maximise sensing efficiency by computing the optimal sensing and transmission durations for a fast changing, dynamic primary user. Dynamic primary user traffic is modelled as a random process, where the primary user changes states during both the sensing period and transmission period to reflect a more realistic scenario. Furthermore, we formulate joint constraints to correctly reflect interference to the primary user and lost opportunity of the secondary user during the transmission period. Finally, we implement a novel duty cycle based detector that is optimised with respect to PU traffic to accurately detect primary user activity during the sensing period. Simulation results show that unlike currently used detection models, the proposed algorithm can jointly optimise the sensing and transmission durations to simultaneously satisfy the optimisation constraints for the considered primary user traffic.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Since 1 December 2002, the New Zealand Exchange’s (NZX) continuous disclosure listing rules have operated with statutory backing. To test the effectiveness of the new corporate disclosure regime, we compare the change in quantity of market announcements (overall, non-routine, non-procedural and external) released to the NZX before and after the introduction of statutory backing. We also extend our study in investigating whether the effectiveness of the new corporate disclosure regime is diminished or augmented by corporate governance mechanisms including board size, providing separate roles for CEO and Chairman, board independence, board gender diversity and audit committee independence. Our findings provide a qualified support for the effectiveness of the new corporate disclosure regime regarding the quantity of market disclosures. There is strong evidence that the effectiveness of the new corporate disclosure regime was augmented by providing separate roles for CEO and Chairman, board gender diversity and audit committee independence, and diminished by board size. In addition, there is significant evidence that share price queries do impact corporate disclosure behaviour and this impact is significantly influenced by corporate governance mechanisms. Our findings provide important implications for corporate regulators in their quest for a superior disclosure regime.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Pedagogical styles, methods, models, practices or strategies are valued for what they claim they can achieve. In recent times curriculum documents and governments have called for a range of teaching approaches to meet the variety of learner differences and allow students to make more independent decision making in physical education (Hardy and Mawer, 1999). One well known system of categorizing teaching styles is the Mosston and Ashworth’s Spectrum of Teaching Styles (2002). In Queensland, prior to 2005, no research had been conducted on the teaching styles used by teachers of Physical Education. However, many teachers self-reported that they employed a variety of teaching styles depending on the aims and content of the material to be taught (Cothran, et al., 2005). This research, for the first time, collected teacher’s self-reported use of teaching styles and through observations verify the styles that were being used to teach Senior Physical Education in Queensland. More specifically the aims of the research were to determine: a) What teaching styles teachers of Senior Physical Education in Queensland believe they use? i) Were they using a range of teaching styles? ii) Were teachers of Senior Physical Education in Queensland using teaching styles that the Queensland Senior Physical Education Syllabus (2004) required? b) If Mosston and Ashworth’s (2002) Spectrum of Teaching Styles were used to categorise styles observed during the teaching of Senior Physical Education did the styles being used provide opportunities for evaluating as described by the Queensland Senior Physical Education Syllabus (2004)? The research was conducted in two phases. Part A involved use of a questionnaire to determine the teaching styles Queensland teachers of Senior Physical Education reported using and how often they reported using them. The questionnaire was administered to 110 teachers throughout Queensland. The sample was determined from 346 schools teaching Senior Physical Education (in 2006) across the state of Queensland, Australia. 286 questionnaires were sent to 77 non-randomised schools. There were 66 male and 44 female respondents in the sample. A wide range of teaching styles were reportedly used by teachers of Senior Physical Education with Practice Style-Style B, Command Style-Style A and Divergent Discovery Style-Style H, the most reportedly used. The Self-Teaching Style-Style K was reportedly used the least by teachers involved in this study. From the respondents a group of teachers were identified to form the participants for Part B. Part B of the study involved observation of a group of volunteer participants (from those who had completed the questionnaire) who displayed many of the ‘typical’ characteristics, and a cross-section of backgrounds, of teachers of Senior Physical Education in Queensland. In the case of this study, the criteria used to select the group of teachers to be observed teaching were, teaching experience (number of years: 0-4, 5-10 and 11 years and over), gender, geographical location of schools (focused on Brisbane and near area for travel/access purposes), profile of the students at schools (girls, boys or co-educational), nature of school (Government or Private) and the physical activities being taught in a school (activities to reflect all the areas of physical activity outlined within the syllabus). A total of 27 questionnaire respondents from Part A indicated that they were willing to be observed teaching practical lessons. The respondents who volunteered to be involved in Part B of the study came from different regions across the state of Queensland and was not confined to the Brisbane metropolitan area or large cities. From the group of people who volunteered for Part B four came from outside Brisbane and 23 from the Brisbane area. The final observation group of nine participants included eight teachers from the Brisbane area and one from a rural area. The characteristics of the final group included three females and six males from private and public schools with a range of teaching experience in years and a range of physical activities. Four year 12 and five year 11 teachers and their classes were videoed on three occasions as they progressed through an eight – nine week unit of work. This resulted in 24 hours 48 minutes and 20 seconds (or 4465 observations) of video teaching data which was subsequently coded by several researchers (99% interobserver reliability) to determine the teaching styles employed by the participants. This research indicated that, based on Mosston and Ashworth’s (2002) Spectrum of Teaching Styles, teachers of Senior Physical Education in Queensland used predominantly one style to teach 27 observed lessons. This is in sharp contrast to the variety of styles 110 teachers self- reportedly used and in spite of the Queensland Senior Physical Education Syllabus (2004) suggesting a range of specific styles be used. These results are discussed in the context of the Queensland Senior Physical Education Syllabus (2004), teacher knowledge of teaching styles and high-stakes curriculum and external pressures such as national testing and the publication of data from schools in tabloid newspapers. The data and findings in this research provide a rationale for improving teacher knowledge regarding teaching styles and the need for a clear definition of terminology in syllabus documents. Careful examination of the effects that the publishing of school data may have on teaching styles is advised. This research not only collected teacher’s perceptions of the teaching styles they believed they used it also verified these claims through direct observations of the teachers while teaching. These findings are relevant to syllabus writers, teacher educators, policy makers within education and teachers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

With one in every 100 children diagnosed with Autism Spectrum Disorder (ASD), it is highly likely that you may have a child with this diagnosis in your group from year to year.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The design of concurrent software systems, in particular process-aware information systems, involves behavioral modeling at various stages. Recently, approaches to behavioral analysis of such systems have been based on declarative abstractions defined as sets of behavioral relations. However, these relations are typically defined in an ad-hoc manner. In this paper, we address the lack of a systematic exploration of the fundamental relations that can be used to capture the behavior of concurrent systems, i.e., co-occurrence, conflict, causality, and concurrency. Besides the definition of the spectrum of behavioral relations, which we refer to as the 4C spectrum, we also show that our relations give rise to implication lattices. We further provide operationalizations of the proposed relations, starting by proposing techniques for computing relations in unlabeled systems, which are then lifted to become applicable in the context of labeled systems, i.e., systems in which state transitions have semantic annotations. Finally, we report on experimental results on efficiency of the proposed computations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Lake Wivenhoe Integrated Wireless Sensor Network is conceptually similar to traditional SCADA monitoring and control approaches. However, it is applied in an open system using wireless devices to monitor processes that affect water quality at both a high spatial and temporal frequency. This monitoring assists scientists to better understand drivers of key processes that influence water quality and provide the operators with an early warning system if below standard water enters the reservoir. Both of these aspects improve the safety and efficient delivery of drinking water to the end users.