984 resultados para 196-808
Resumo:
The use of computing to support environmental planning and the development of land use models dates back to the late 1950s. The main thrust of computing applications, which by the early 1980s increasingly included the use of geospatial technologies, is their contribution to better planning and decision making. The computing tools and technologies are designed to enhance the planners’ capability to deal with complex environments and to plan for prosperous and livable communities. This paper examines the role of Information Technologies (IT) and particularly Internet Based Geographic Information Systems (Internet GIS) as spatial decision support systems to aid community based local decision making. The paper also covers the advantages and challenges of these internet based mapping applications and tools for collaborative decision making on the environment.
Resumo:
In this paper we propose a method for vision only topological simultaneous localisation and mapping (SLAM). Our approach does not use motion or odometric information but a sequence of colour histograms from visited places. In particular, we address the perceptual aliasing problem which occurs using external observations only in topological navigation. We propose a Bayesian inference method to incrementally build a topological map by inferring spatial relations from the sequence of observations while simultaneously estimating the robot's location. The algorithm aims to build a small map which is consistent with local adjacency information extracted from the sequence measurements. Local adjacency information is incorporated to disambiguate places which otherwise would appear to be the same. Experiments in an indoor environment show that the proposed technique is capable of dealing with perceptual aliasing using visual observations only and successfully performs topological SLAM.
Resumo:
Tellurates are rare minerals as the tellurate anion is readily reduced to the tellurite ion. Often minerals with both tellurate and tellurite anions in the mineral are found. An example of such a mineral containing tellurate and tellurite is yecoraite. Raman spectroscopy has been used to study this mineral, the exact structure of which is unknown. Two Raman bands at 796 and 808 cm-1 are assigned to the ν1 (TeO4)2- symmetric and ν3 (TeO3)2- antisymmetric stretching modes and Raman bands at 699 cm-1 are attributed to the the ν3 (TeO4)2- antisymmetric stretching mode and the band at 690 cm-1 to the ν1 (TeO3)2- symmetric stretching mode. The intense band at 465 cm-1 with a shoulder at 470 cm-1 is assigned the (TeO4)2- and (TeO3)2- bending modes. Prominent Raman bands are observed at 2878, 2936, 3180 and 3400 cm-1. The band at 3936 cm-1 appears quite distinct and the observation of multiple bands indicates the water molecules in the yecoraite structure are not equivalent. The values for the OH stretching vibrations listed provide hydrogen bond distances of 2.625 Å (2878 cm-1), 2.636 Å (2936 cm-1), 2.697 Å (3180 cm-1) and 2.798 Å (3400 cm-1). This range of hydrogen bonding contributes to the stability of the mineral. A comparison of the Raman spectra of yecoraite with that of tellurate containing minerals kuranakhite, tlapallite and xocomecatlite is made.
Resumo:
Routine postsurgery assessment of primary total hip arthroplasty (THA) is recommended in many countries. Whether the benefits of this activity are justified by the costs is not known. We used a decision-analytic Markov model to compare the costs and health outcomes of 3 different follow-up strategies after primary THA. If there is no routine follow-up of patients for 7 years after primary THA, there would be cost savings between AU$6.5 and $11.9 million and gains of between 1.8 and 8.8 quality-adjusted life years. Policy makers should investigate less resource-intensive alternatives to common routine postsurgical assessment.
Resumo:
Cutaneous malignant melanoma (CMM) is a major health issue in Queensland, Australia, which has the world’s highest incidence. Recent molecular and epidemiologic studies suggest that CMM arises through multiple etiological pathways involving gene-environment interactions. Understanding the potential mechanisms leading to CMM requires larger studies than those previously conducted. This article describes the design and baseline characteristics of Q-MEGA, the Queensland Study of Melanoma: Environmental and Genetic Associations, which followed up 4 population-based samples of CMM patients in Queensland, including children, adolescents, men aged over 50, and a large sample of adult cases and their families, including twins. Q-MEGA aims to investigate the roles of genetic and environmental factors, and their interaction, in the etiology of melanoma. Three thousand, four hundred and seventy-one participants took part in the follow-up study and were administered a computer-assisted telephone interview in 2002-2005. Updated data on environmental and phenotypic risk factors, and 2777 blood samples were collected from interviewed participants as well as a subset of relatives. This study provides a large and well-described population-based sample of CMM cases with follow-up data. Characteristics of the cases and repeatability of sun exposure and phenotype measures between the baseline and the follow-up surveys, from 6 to 17 years later, are also described.
Resumo:
Objective: The objectives of this article are to explore the extent to which the International Statistical Classification of Diseases and Related Health Problems (ICD) has been used in child abuse research, to describe how the ICD system has been applied and to assess factors affecting the reliability of ICD coded data in child abuse research.----- Methods: PubMed, CINAHL, PsychInfo and Google Scholar were searched for peer reviewed articles written since 1989 that used ICD as the classification system to identify cases and research child abuse using health databases. Snowballing strategies were also employed by searching the bibliographies of retrieved references to identify relevant associated articles. The papers identified through the search were independently screened by two authors for inclusion, resulting in 47 studies selected for the review. Due to heterogeneity of studies metaanalysis was not performed.----- Results: This paper highlights both utility and limitations of ICD coded data. ICD codes have been widely used to conduct research into child maltreatment in health data systems. The codes appear to be used primarily to determine child maltreatment patterns within identified diagnoses or to identify child maltreatment cases for research.----- Conclusions: A significant impediment to the use of ICD codes in child maltreatment research is the under-ascertainment of child maltreatment by using coded data alone. This is most clearly identified and, to some degree, quantified, in research where data linkage is used. Practice Implications: The importance of improved child maltreatment identification will assist in identifying risk factors and creating programs that can prevent and treat child maltreatment and assist in meeting reporting obligations under the CRC.
Resumo:
As a result of rapid urbanisation, population growth, change in lifestyles, pollution and the impacts of climate change, water provision has become a critical challenge for planners and policy-makers. In the wake of increasingly difficult water provision and drought, the notion that freshwater is a finite and vulnerable resources is increasingly being realised. Many city administrations around the World are struggling to provide water security for their residents to maintain lifestyle and economic grouth. This paper review the glocalalternatives to current water sources, including that of desalination, water transfers, recycling, and integrated water management. A comparative study on alternative resources is undertaken and the results are discussed.
Resumo:
Heteronormative discourses provide the most common lens through which sexuality is understood within university curricula. This means that sexuality is discussed in terms of categories of identity, with heterosexuality accorded primacy and all ‘others’ indeed ‘othered.’ This paper reports on research carried out by the authors in a core first year university justice class, in which students of law and/or justice were required to engage with, discuss, and reflect on discourses on sexuality. It uses a poststructural framework to identify how students understand non-heterosexualities and how they personally relate to queer identities, in the sense that it asks questions about gender and sexual identity, and the discourses surrounding them. It was found that strongly negative attitudes to non-heterosexualities are quite resistant to challenge, and that some students express being confronted with queerness as a deep-seated fear of being drawn into otherness against their will. The result was that, while many students were able to unpack their attitudes towards queerness and engage in critical reflection and re-evaluation of their attitudes, students with strongly negative views towards non-heterosexualities conversely refused to engage at all, typically perceiving even the engagement itself as a threat to their core heterosexual identity. However, the authors caution against relying on the idea that students are simply “homophobic” to explain this reluctance, as this term does not necessarily account for the complexity of the discourses that inform students’ reactions in this context. This “homophobia” may simply be related to a way of performing gender and sexual identity as opposed to overt discrimination and fear.
Resumo:
Computer tomography has been used to image and reconstruct in 3-D an Egyptian mummy from the collection of the British Museum. This study of Tjentmutengebtiu, a priestess from the 22nd dynasty (945-715 BC) revealed invaluable information of a scientific, Egyptological and palaeopathological nature without mutilation and destruction of the painted cartonnage case or linen wrappings. Precise details on the removal of the brain through the nasal cavity and the viscera from the abdominal cavity were obtained. The nature and composition of the false eyes were investigated. The detailed analysis of the teeth provided a much closer approximation of age at death. The identification of materials used for the various amulets including that of the figures placed in the viscera was graphically demonstrated using this technique.
Resumo:
In children, the pain and anxiety associated with acute burn dressing changes can be severe, with drug treatment alone frequently proving to be inadequate. Virtual reality (VR) systems have been successfully trialled in limited numbers of adult and paediatric burn patients. Augmented reality (AR) differs from VR in that it overlays virtual images onto the physical world, instead of creating a complete virtual world. This prospective randomised controlled trial investigated the use of AR as an adjunct to analgesia and sedation in children with acute burns. Forty-two children (30 male and 12 female), with an age range of 3–14 years (median age 9 years) and a total burn surface area ranging from 1 to 16% were randomised into a treatment (AR) arm and a control (basic cognitive therapy) arm after administration of analgesia and/or sedation. Pain scores, pulse rates (PR), respiratory rates (RR) and oxygen saturations (SaO2) were recorded pre-procedurally, at 10 min intervals and post-procedurally. Parents were also asked to grade their child's overall pain score for the dressing change. Mean pain scores were significantly lower (p = 0.0060) in the AR group compared to the control group, as were parental pain assessment scores (p = 0.015). Respiratory and pulse rates showed significant changes over time within groups, however, these were not significantly different between the two study groups. Oxygen saturation did not differ significantly over time or between the two study groups. This trial shows that augmented reality is a useful adjunct to pharmacological analgesia.
Resumo:
Soft biometrics are characteristics that can be used to describe, but not uniquely identify an individual. These include traits such as height, weight, gender, hair, skin and clothing colour. Unlike traditional biometrics (i.e. face, voice) which require cooperation from the subject, soft biometrics can be acquired by surveillance cameras at range without any user cooperation. Whilst these traits cannot provide robust authentication, they can be used to provide coarse authentication or identification at long range, locate a subject who has been previously seen or who matches a description, as well as aid in object tracking. In this paper we propose three part (head, torso, legs) height and colour soft biometric models, and demonstrate their verification performance on a subset of the PETS 2006 database. We show that these models, whilst not as accurate as traditional biometrics, can still achieve acceptable rates of accuracy in situations where traditional biometrics cannot be applied.
Resumo:
Two series of novel ruthenium bipyridyl dyes incorporating sulfur-donor bidentate ligands with general formula \[Ru(R-bpy)2C2N2S2] and \[Ru(R-bpy)2(S2COEt)]\[NO3] (where R =H, CO2Et, CO2H; C2N2S2 = cyanodithioimidocarbonate and S2COEt = ethyl xanthogenate) have been synthesized and characterized spectroscopically, electrochemically and computationally. The acid derivatives in both series (C2N2S2 3 and S2COEt 6) were used as a photosensitizer in a dye-sensitized solar cell (DSSC) and the incident photo-to-current conversion efficiency (IPCE), overall efficiency (_) and kinetics of the dye/TiO2 system were investigated. It was found that 6 gave a higher efficiency cell than 3 despite the latter dye’s more favorable electronic properties, such as greater absorption range, higher molar extinction coefficient and large degree of delocalization of the HOMO. The transient absorption spectroscopy studies revealed that the recombination kinetics of 3 were unexpectedly fast, which was attributed to the terminal CN on the ligand binding to the TiO2, as evidenced by an absorption study of R =H and CO2Et dyes sensitized on TiO2, and hence leading to a lower efficiency DSSC.
Self-efficacy, outcome expectations and self-care behaviour in people with type 2 diabetes in Taiwan
Resumo:
Aims. To explore differences in self-care behaviour according to demographic and illness characteristics; and relationships among self-care behaviour and demographic and illness characteristics, efficacy expectations and outcome expectations of people with type 2 diabetes in Taiwan. Background. Most people with diabetes do not control their disease appropriately in Taiwan. Enhanced self-efficacy towards managing diseases can be an effective way of improving disease control as proposed by the self-efficacy model which provides a useful framework for understanding adherence to self-care behaviours. Design and methods. The sample comprised 145 patients with type 2 diabetes aged 30 years or more from diabetes outpatient clinics in Taipei. Data were collected using a self-administered questionnaire for this study. One-way anova, t-tests, Pearson product moment correlation and hierarchical regression were analysed for the study. Results. Significant differences were found: between self-care behaviour and complications (t = −2·52, p < 0·01) and patient education (t = −1·96, p < 0·05). Self-care behaviour was significantly and positively correlated with duration of diabetes (r = 0·36, p < 0·01), efficacy expectations (r = 0·54, p < 0·01) and outcome expectations (r = 0·44, p < 0·01). A total of 39·1% of variance in self-care behaviour can be explained by duration of diabetes, efficacy expectations and outcome expectations. Conclusions. Findings support the use of the self-efficacy model as a framework for understanding adherence to self-care behaviour. Relevance to clinical practice. Using self-efficacy theory when designing patient education interventions for people with type 2 diabetes will enhance self-management routines and assist in reducing major complications in the future.
Resumo:
Miller’s algorithm for computing pairings involves perform- ing multiplications between elements that belong to different finite fields. Namely, elements in the full extension field Fpk are multiplied by elements contained in proper subfields F pk/d , and by elements in the base field Fp . We show that significant speedups in pairing computations can be achieved by delaying these “mismatched” multiplications for an optimal number of iterations. Importantly, we show that our technique can be easily integrated into traditional pairing algorithms; implementers can exploit the computational savings herein by applying only minor changes to existing pairing code.
Resumo:
Purpose – The purpose of this paper is to develop a conceptual framework that can be used to identify capabilities needed in the management of infrastructure assets. Design/methodology/approach – This paper utilises a qualitative approach to analyse secondary data in order to develop a conceptual framework that identifies capabilities for strategic infrastructure asset management. Findings – In an external business environment that is undergoing rapid change, it is more appropriate to focus on factors internal to the organisation such as resources and capabilities as a basis to develop competitive advantage. However, there is currently very little understanding of the internal capabilities that are appropriate for infrastructure asset management. Therefore, a conceptual framework is needful to guide infrastructure organisations in the identification of capabilities. Research limitations/implications – This is a conceptual paper and future empirical research should be conducted to validate the propositions made in the paper. Practical implications – The paper clearly argues the need for infrastructure organisations to adopt a systematic approach to identifying the capabilities needed in the management of strategic infrastructure assets. The discussion on the impact of essential capabilities is useful in providing the impetus for managers who operate in a deregulated infrastructure business landscape to review their existing strategies. Originality/value – The paper provides a new perspective on how asset managers can create value for their organisations by investing in the relevant capabilities.