855 resultados para Retaining
Resumo:
In this paper we describe the design of DNA Jewelry, which is a wearable tangible data representation of personal DNA profile data. An iterative design process was followed to develop a 3D form-language that could be mapped to standard DNA profile data, with the aim of retaining readability of data while also producing an aesthetically pleasing and unique result in the area of personalised design. The work explores design issues with the production of data tangibles, contributes to a growing body of research exploring tangible representations of data and highlights the importance of approaches that move between technology, art and design.
Resumo:
Studies of delayed nonmatching-to-sample (DNMS) performance following lesions of the monkey cortex have revealed a critical circuit of brain regions involved in forming memories and retaining and retrieving stimulus representations. Using event-related functional magnetic resonance imaging (fMRI), we measured brain activity in 10 healthy human participants during performance of a trial-unique visual DNMS task using novel barcode stimuli. The event-related design enabled the identification of activity during the different phases of the task (encoding, retention, and retrieval). Several brain regions identified by monkey studies as being important for successful DNMS performance showed selective activity during the different phases, including the mediodorsal thalamic nucleus (encoding), ventrolateral prefrontal cortex (retention), and perirhinal cortex (retrieval). Regions showing sustained activity within trials included the ventromedial and dorsal prefrontal cortices and occipital cortex. The present study shows the utility of investigating performance on tasks derived from animal models to assist in the identification of brain regions involved in human recognition memory.
Resumo:
This is a methodological paper describing when and how manifest items dropped from a latent construct measurement model (e.g., factor analysis) can be retained for additional analysis. Presented are protocols for assessment for retention in the measurement model, evaluation of dropped items as potential items separate from the latent construct, and post hoc analyses that can be conducted using all retained (manifest or latent) variables. The protocols are then applied to data relating to the impact of the NAPLAN test. The variables examined are teachers’ achievement goal orientations and teachers’ perceptions of the impact of the test on curriculum and pedagogy. It is suggested that five attributes be considered before retaining dropped manifest items for additional analyses. (1) Items can be retained when employed in service of an established or hypothesized theoretical model. (2) Items should only be retained if sufficient variance is present in the data set. (3) Items can be retained when they provide a rational segregation of the data set into subsamples (e.g., a consensus measure). (4) The value of retaining items can be assessed using latent class analysis or latent mean analysis. (5) Items should be retained only when post hoc analyses with these items produced significant and substantive results. These suggested exploratory strategies are presented so that other researchers using survey instruments might explore their data in similar and more innovative ways. Finally, suggestions for future use are provided.
Resumo:
The Global Financial Crisis (GFC) in 2008 had a significant impact on the world economy and the construction industry was no exception. This study investigates the major impacts of the 2008 GFC on the Australian construction industry and, in particular how the Australian construction contractors responded to the economic downturn. A total of 35 senior managers from the Top 100 Australian construction companies were interviewed. The findings indicate that construction companies, particularly the large ones were not affected in any significant way but are expecting some difficult financial times over the next few years and are taking actions to minimize the upcoming adverse impacts. The most common strategy adopted by Australian construction contractors is to concentrate on core business while avoiding aimless bidding. Similarly, great focus is placed on retaining human resources in order to maintain the skill set so that the company can respond quickly when market conditions improves. The research findings will provide construction contractors with insights on how to establish and sustain competitive advantages during economic slowdown and become more resilient in the future.
Resumo:
Many software applications extend their functionality by dynamically loading libraries into their allocated address space. However, shared libraries are also often of unknown provenance and quality and may contain accidental bugs or, in some cases, deliberately malicious code. Most sandboxing techniques which address these issues require recompilation of the libraries using custom tool chains, require significant modifications to the libraries, do not retain the benefits of single address-space programming, do not completely isolate guest code, or incur substantial performance overheads. In this paper we present LibVM, a sandboxing architecture for isolating libraries within a host application without requiring any modifications to the shared libraries themselves, while still retaining the benefits of a single address space and also introducing a system call inter-positioning layer that allows complete arbitration over a shared library’s functionality. We show how to utilize contemporary hardware virtualization support towards this end with reasonable performance overheads and, in the absence of such hardware support, our model can also be implemented using a software-based mechanism. We ensure that our implementation conforms as closely as possible to existing shared library manipulation functions, minimizing the amount of effort needed to apply such isolation to existing programs. Our experimental results show that it is easy to gain immediate benefits in scenarios where the goal is to guard the host application against unintentional programming errors when using shared libraries, as well as in more complex scenarios, where a shared library is suspected of being actively hostile. In both cases, no changes are required to the shared libraries themselves.
Resumo:
Protocols for secure archival storage are becoming increasingly important as the use of digital storage for sensitive documents is gaining wider practice. Wong et al.[8] combined verifiable secret sharing with proactive secret sharing without reconstruction and proposed a verifiable secret redistribution protocol for long term storage. However their protocol requires that each of the receivers is honest during redistribution. We proposed[3] an extension to their protocol wherein we relaxed the requirement that all the recipients should be honest to the condition that only a simple majority amongst the recipients need to be honest during the re(distribution) processes. Further, both of these protocols make use of Feldman's approach for achieving integrity during the (redistribution processes. In this paper, we present a revised version of our earlier protocol, and its adaptation to incorporate Pedersen's approach instead of Feldman's thereby achieving information theoretic secrecy while retaining integrity guarantees.
Resumo:
Reduced economic circumstances havemoved management goals towards higher profit, rather than maximum sustainable yields in several Australian fisheries. The eastern king prawn is one such fishery, for which we have developed new methodology for stock dynamics, calculation of model-based and data-based reference points and management strategy evaluation. The fishery is notable for the northward movement of prawns in eastern Australian waters, from the State jurisdiction of New South Wales to that of Queensland, as they grow to spawning size, so that vessels fishing in the northern deeper waters harvest more large prawns. Bioeconomic fishing data were standardized for calibrating a length-structured spatial operating model. Model simulations identified that reduced boat numbers and fishing effort could improve profitability while retaining viable fishing in each jurisdiction. Simulations also identified catch rate levels that were effective for monitoring in simple within-year effort-control rules. However, favourable performance of catch rate indicators was achieved only when a meaningful upper limit was placed on total allowed fishing effort. Themethods and findings will allow improved measures for monitoring fisheries and inform decision makers on the uncertainty and assumptions affecting economic indicators.
Resumo:
We address the issue of complexity for vector quantization (VQ) of wide-band speech LSF (line spectrum frequency) parameters. The recently proposed switched split VQ (SSVQ) method provides better rate-distortion (R/D) performance than the traditional split VQ (SVQ) method, even at the requirement of lower computational complexity. but at the expense of much higher memory. We develop the two stage SVQ (TsSVQ) method, by which we gain both the memory and computational advantages and still retain good R/D performance. The proposed TsSVQ method uses a full dimensional quantizer in its first stage for exploiting all the higher dimensional coding advantages and then, uses an SVQ method for quantizing the residual vector in the second stage so as to reduce the complexity. We also develop a transform domain residual coding method in this two stage architecture such that it further reduces the computational complexity. To design an effective residual codebook in the second stage, variance normalization of Voronoi regions is carried out which leads to the design of two new methods, referred to as normalized two stage SVQ (NTsSVQ) and normalized two stage transform domain SVQ (NTsTrSVQ). These two new methods have complimentary strengths and hence, they are combined in a switched VQ mode which leads to the further improvement in R/D performance, but retaining the low complexity requirement. We evaluate the performances of new methods for wide-band speech LSF parameter quantization and show their advantages over established SVQ and SSVQ methods.
Resumo:
The repeat unit of the K12 capsular polysaccharide isolated from the Acinetobacter baumannii global clone 1 clinical isolate, D36, was elucidated by means of chemical and spectroscopical methods. The structure was shown to contain N-acetyl-D-galactosamine (D-GalpNAc), N-acetyl-D-fucosamine and N-acetyl-L-fucosamine linked together in the main chain, with the novel sugar, 5,7-diacetamido-3,5,7,9-tetradeoxy-L-glycero-L-altro-non-2-ulosonic acid (5,7-di-N-acetylacinetaminic acid or Aci5Ac7Ac), attached to D-GalpNAc as a side branch. This matched the sugar composition of the K12 capsule and the genetic content of the KL12 capsule gene cluster reported previously. D-FucpNAc was predicted to be the substrate for the initiating transferase, ItrB3, with the Wzy polymerase making a α-D-FucpNAc-(1 → 3)-D-GalpNAc linkage between the repeat units. The three glycosyltransferases encoded by KL12 are all retaining glycosyltransferases and were predicted to form specific linkages between the sugars in the K12 repeat unit.
Resumo:
Three indoor, sheeted bag-stack fumigations of paddy rice using aluminium phosphide were undertaken in Guangdong Province, southern China. We measured the effect of two types of sheeting (polyvinylchloride [PVC] or polyethylene [PE]) and two types of floor sealing (clips or fixing into a slot with a rubber pipe) on phosphine concentration and retention. The aim was to test the feasibility of retaining fumigant at a sufficient concentration for long enough to control known resistant insect pests. Each stack was pressure tested and phosphine concentrations measured daily during the fumigation. Cages of test insects in culture medium, including resistant and susceptible strains, were placed inside each stack and could be observed through the clear sheeting. Highest concentrations for the longest period were obtained in a PVC-covered stack that included a ground sheet and wall sheets sealed to the floor with rubber pipes. A similar PVC-covered stack sealed to the floor with clips instead of pipe did not retain gas as efficiently and required re-dosing. A PE-covered stack, with no ground sheet but also with wall sheets sealed to the floor with pipe, produced an acceptable fumigation. Susceptible Rhyzopertha dominica were controlled in 2 days and the most resistant strain in 15 days. Resistant Cryptolestes ferrugineus survived until day 21. The paddy was still free of insect infestation 7 months later when the bag-stack was opened to mill the rice. Pressure half-lives correlated with gas concentration and retention. Sorption appeared to be a major limiting factor, reducing potential fumigant dosage by about 50%. The trials demonstrated the feasibility of sealing bag-stacks to a standard high enough to control all known resistant strains.
Resumo:
A fuzzy logic based centralized control algorithm for irrigation canals is presented. Purpose of the algorithm is to control downstream discharge and water level of pools in the canal, by adjusting discharge release from the upstream end and gates settings. The algorithm is based on the dynamic wave model (Saint-Venant equations) inversion in space, wherein the momentum equation is replaced by a fuzzy rule based model, while retaining the continuity equation in its complete form. The fuzzy rule based model is developed on fuzzification of a new mathematical model for wave velocity, the derivational details of which are given. The advantages of the fuzzy control algorithm, over other conventional control algorithms, are described. It is transparent and intuitive, and no linearizations of the governing equations are involved. Timing of the algorithm and method of computation are explained. It is shown that the tuning is easy and the computations are straightforward. The algorithm provides stable, realistic and robust outputs. The disadvantage of the algorithm is reduced precision in its outputs due to the approximation inherent in the fuzzy logic. Feed back control logic is adopted to eliminate error caused by the system disturbances as well as error caused by the reduced precision in the outputs. The algorithm is tested by applying it to water level control problem in a fictitious canal with a single pool and also in a real canal with a series of pools. It is found that results obtained from the algorithm are comparable to those obtained from conventional control algorithms.
Resumo:
A fuzzy dynamic flood routing model (FDFRM) for natural channels is presented, wherein the flood wave can be approximated to a monoclinal wave. This study is based on modification of an earlier published work by the same authors, where the nature of the wave was of gravity type. Momentum equation of the dynamic wave model is replaced by a fuzzy rule based model, while retaining the continuity equation in its complete form. Hence, the FDFRM gets rid of the assumptions associated with the momentum equation. Also, it overcomes the necessity of calculating friction slope (S-f) in flood routing and hence the associated uncertainties are eliminated. The fuzzy rule based model is developed on an equation for wave velocity, which is obtained in terms of discontinuities in the gradient of flow parameters. The channel reach is divided into a number of approximately uniform sub-reaches. Training set required for development of the fuzzy rule based model for each sub-reach is obtained from discharge-area relationship at its mean section. For highly heterogeneous sub-reaches, optimized fuzzy rule based models are obtained by means of a neuro-fuzzy algorithm. For demonstration, the FDFRM is applied to flood routing problems in a fictitious channel with single uniform reach, in a fictitious channel with two uniform sub-reaches and also in a natural channel with a number of approximately uniform sub-reaches. It is observed that in cases of the fictitious channels, the FDFRM outputs match well with those of an implicit numerical model (INM), which solves the dynamic wave equations using an implicit numerical scheme. For the natural channel, the FDFRM Outputs are comparable to those of the HEC-RAS model.
Resumo:
To maximize the information commonly collected from otoliths, the effect of DNA extraction on the estimation of age with otoliths was evaluated by comparing sagittal otolith samples from common coral trout (Plectropomus leopardus) for clarity and ageing discrepancies in DNA-extracted and untreated control otoliths. The DNA extraction process had no significant effect, indicating that archived otoliths can be used as a source of DNA while retaining their utility for age estimation.
Resumo:
While cannabis is the most prolifically used illicit drug in Australia, there is a gap in our understanding concerning the social interactions and friendships formed around its supply and use. The authors recruited cannabis users aged between 18 and 30 years throughout Australia, to explore the impact of supply routes on young users and their perceived notions of drug dealing in order to provide valuable insight into the influence that reciprocal relationships have on young people’s access to cannabis. Findings reveal that the supply of cannabis revolves around pre-existing connections and relationships formed through associates known to be able to readily source cannabis. It was found that motivations for proffering cannabis in a shared environment were related more to developing social capital than to generating financial gain. Given this, often those involved in supply do not perceive that they are breaking the law or that they are ‘dealers’. This social supply market appears to be built on trust and social interactions and, as such, presents several challenges to law enforcement. It is suggested that there would be benefit in providing targeted education campaigns to combat social supply dealing among young adults.
Resumo:
Quilpie mesquite (Prosopis velutina) is an invasive woody weed that is believed to have been introduced into south-west Queensland in the 1930s. Following the withdrawal of 2,4,5-T, research on P. pallida resulted in revised recommendations for control of all Prosopis spp. in Queensland. Adoption of many of these recommendations for Quilpie mesquite control produced substandard results. Following a pilot trial, a shade-house experiment was conducted to determine the differences in susceptibility of two species of mesquite, P. velutina and P. pallida, to commonly available herbicides. It was hypothesized that P. velutina was less susceptible than P. pallida, based upon claims that the registered chemical recommendations for Prosopis spp. were not sufficiently effective on P. velutina. Nine foliar herbicide treatments were applied to potted shade-house plants. Treatment effects indicated differing susceptibility between the two species. P. velutina consistently showed less response to metsulfuron, fluroxypyr, 2,4-D/picloram and triclopyr/picloram, compared to the glyphosate formulations, where negligible differences occurred between the two species. The response to glyphosate was poor at all rates in this experiment. Re-application of herbicides to surviving plants indicated that susceptibility can decrease when follow-up application is in autumn and the time since initial application is short. The relationship between leaf structure and the volume of spray adhering to a plant was assessed across species. The herbicide captured by similar-sized plants of each species differed, with P. pallida retaining a greater volume of herbicide.