994 resultados para info


Relevância:

10.00% 10.00%

Publicador:

Resumo:

History of the general-interest magazine, Australasian Post, also known as Aussie Post.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Nucleic acid molecules are championing a new generation of reverse engineered biopharmaceuticals. In terms of potential application in gene medicine, plasmid DNA (pDNA) vectors have exceptional therapeutic and immunological profiles as they are free from safety concerns associated with viral vectors, display non-toxicity and are simpler to develop. This review addresses the potential applications of pDNA molecules in vaccine design/development and gene therapy via recombinant DNA technology as well as a staged delivery mechanism for the introduction of plasmid-borne gene to target cells via the nasal route.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Grøstl is a SHA-3 candidate proposal. Grøstl is an iterated hash function with a compression function built from two fixed, large, distinct permutations. The design of Grøstl is transparent and based on principles very different from those used in the SHA-family. The two permutations are constructed using the wide trail design strategy, which makes it possible to give strong statements about the resistance of Grøstl against large classes of cryptanalytic attacks. Moreover, if these permutations are assumed to be ideal, there is a proof for the security of the hash function. Grøstl is a byte-oriented SP-network which borrows components from the AES. The S-box used is identical to the one used in the block cipher AES and the diffusion layers are constructed in a similar manner to those of the AES. As a consequence there is a very strong confusion and diffusion in Grøstl. Grøstl is a so-called wide-pipe construction where the size of the internal state is significantly larger than the size of the output. This has the effect that all known, generic attacks on the hash function are made much more difficult. Grøstl has good performance on a wide range of platforms and counter-measures against side-channel attacks are well-understood from similar work on the AES.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This document is an addendum to the submission document of Grøstl, which was selected for the second round of NIST's SHA-3 competition. We stress that we do not change the specification of Grøstl. In other words, Grøstl is defined exactly as specified in the original submission document. In this document we mention a few alternative descriptions of our SHA-3 candidate Grøstl and describe recent analysis results on Grøstl.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Grøstl is a SHA-3 candidate proposal. Grøstl is an iterated hash function with a compression function built from two �fixed, large, distinct permutations. The design of Grøstl is transparent and based on principles very different from those used in the SHA-family. The two permutations are constructed using the wide trail design strategy, which makes it possible to give strong statements about the resistance of Grøstl against large classes of cryptanalytic attacks. Moreover, if these permutations are assumed to be ideal, there is a proof for the security of the hash function. Grøstl is a byte-oriented SP-network which borrows components from the AES. The S-box used is identical to the one used in the block cipher AES and the diffusion layers are constructed in a similar manner to those of the AES. As a consequence there is a very strong confusion and diffusion in Grøstl

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Although seeking help for mental ill-health is beneficial, the majority of persons afflicted do not access available help services. Young adults (16-24 years old) in particular have the highest prevalence of mental health problems and the lowest rate of help-seeking behaviour. Key barriers to help-seeking for young adults, including cost, privacy concerns, inconvenience, access to health professionals and interpersonal interaction, appear to derive from the face-to-face method of service delivery traditionally used to distribute mental health services. Social marketing employs the principle of value exchange, whereby consumers will choose a behaviour in exchange for receiving valued benefits and/or a reduction in key barriers, to achieve behavioural goals for social good. The appropriation of mobile digital technology to deliver self-help mental health services may reduce the current barriers to help seeking, however, extant literature offers no empirical support for this proposition. Our research addresses this gap by examining the perceptions of young adults regarding M-mental health services. Depth interviews were undertaken with 15 young adults (18-24 years old), who had self-reported mild-moderate stress, anxiety or depression. The data were thematically analysed with the assistance of Nvivo. The findings reveal M-mental health services reduce the barriers to accessing face-to-face help services to a large extent. However, they also present their own barriers to help-seeking that must be considered by social marketers, including negligible cost expectations and service efficacy concerns. Overall, this study highlights the potential of M-mental health services to encourage early intervention and help-seeking behaviour as part of a social marketing strategy to address mental illness in young adults.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A one size fits all approach dominates alcohol programs in school settings (Botvin et al., 2007), which may limit program effectiveness (Snyder et al., 2004). Programs tailored to the meet the needs and wants of adolescent groups may be more effective. Limited attention has been directed towards employing a full segmentation process. Where segmentation has been examined, the focus has remained on socio-demographic characteristics and more recently psychographic variables (Mathijssen et al., 2012). The current study aimed to identify whether the addition of behaviour could be used to identify segments. Variables included attitudes towards binge drinking (α = 0.86), behavioral intentions’ (α = 0.97), perceived behavioral control (PBC), injunctive norms (α = 0.94); descriptive norms (α = 0.87), knowledge and reported behaviour. Data was collected from five schools, n = 625 (32.96% girls). Two-Step cluster analysis produced a sample (n = 625) with a silhouette measure of cohesion and separation of 0.4. The intention measure and whether students reported previously consuming alcohol were the most distinguishing characteristics - predictor importance scores of (1.0). A four segment solution emerged. The first segment (“Male abstainers” – 37.2%) featured the highest knowledge score (M: 5.9) along with the lowest-risk drinking attitudes and intentions to drink excessively. Segment 2 (“At risk drinkers” - 11.2%) were characterised by their high-risk attitudes and high-risk drinking intentions. Injunctive (M: 4.1) and descriptive norms (M: 4.9) may indicate a social environment where drinking is the norm. Segment 3 (”Female abstainers” – 25.9%) represents young girls, who have the lowest-risk attitudes and low intentions to drink excessively. The fourth and final segment (boys = 67.4%) (“Moderate drinkers” – 25.7%) all report previously drinking alcohol yet their attitudes and intentions towards excessive alcohol consumption are lower than other segments. Segmentation focuses on identifying groups of individuals who feature similar characteristics. The current study illustrates the importance of including reported behaviour in addition to psychographic and demographic characteristics to identify unique groups to inform intervention planning and design. Key messages The principle of segmentation has received limited attention in the context of school-based alcohol education programs. This research identified four segments amongst 14-16 year high school students, each of which can be targeted with a unique, tailored program to meet the needs and wants of the target audience.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Bearing faults are the most common cause of wind turbine failures. Unavailability and maintenance cost of wind turbines are becoming critically important, with their fast growing in electric networks. Early fault detection can reduce outage time and costs. This paper proposes Anomaly Detection (AD) machine learning algorithms for fault diagnosis of wind turbine bearings. The application of this method on a real data set was conducted and is presented in this paper. For validation and comparison purposes, a set of baseline results are produced using the popular one-class SVM methods to examine the ability of the proposed technique in detecting incipient faults.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Overvoltage and overloading due to high utilization of PVs are the main power quality concerns for future distribution power systems. This paper proposes a distributed control coordination strategy to manage multiple PVs within a network to overcome these issues. PVs reactive power is used to deal with over-voltages and PVs active power curtailment are regulated to avoid overloading. The proposed control structure is used to share the required contribution fairly among PVs, in proportion to their ratings. This approach is examined on a practical distribution network with multiple PVs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

1. In conservation decision-making, we operate within the confines of limited funding. Furthermore, we often assume particular relationships between management impact and our investment in management. The structure of these relationships, however, is rarely known with certainty - there is model uncertainty. We investigate how these two fundamentally limiting factors in conservation management, money and knowledge, impact optimal decision-making. 2. We use information-gap decision theory to find strategies for maximizing the number of extant subpopulations of a threatened species that are most immune to failure due to model uncertainty. We thus find a robust framework for exploring optimal decision-making. 3. The performance of every strategy decreases as model uncertainty increases. 4. The strategy most robust to model uncertainty depends not only on what performance is perceived to be acceptable but also on available funding and the time horizon over which extinction is considered. 5. Synthesis and applications. We investigate the impact of model uncertainty on robust decision-making in conservation and how this is affected by available conservation funding. We show that subpopulation triage can be a natural consequence of robust decision-making. We highlight the need for managers to consider triage not as merely giving up, but as a tool for ensuring species persistence in light of the urgency of most conservation requirements, uncertainty and the poor state of conservation funding. We illustrate this theory by a specific application to allocation of funding to reduce poaching impact on the Sumatran tiger Panthera tigris sumatrae in Kerinci Seblat National Park. © 2008 The Authors.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Decision-making for conservation is conducted within the margins of limited funding. Furthermore, to allocate these scarce resources we make assumptions about the relationship between management impact and expenditure. The structure of these relationships, however, is rarely known with certainty. We present a summary of work investigating the impact of model uncertainty on robust decision-making in conservation and how this is affected by available conservation funding. We show that achieving robustness in conservation decisions can require a triage approach, and emphasize the need for managers to consider triage not as surrendering but as rational decision making to ensure species persistence in light of the urgency of the conservation problems, uncertainty, and the poor state of conservation funding. We illustrate this theory by a specific application to allocation of funding to reduce poaching impact on the Sumatran tiger Panthera tigris sumatrae in Kerinci Seblat National Park, Indonesia. To conserve our environment, conservation managers must make decisions in the face of substantial uncertainty. Further, they must deal with the fact that limitations in budgets and temporal constraints have led to a lack of knowledge on the systems we are trying to preserve and on the benefits of the actions we have available (Balmford & Cowling 2006). Given this paucity of decision-informing data there is a considerable need to assess the impact of uncertainty on the benefit of management options (Regan et al. 2005). Although models of management impact can improve decision making (e.g.Tenhumberg et al. 2004), they typically rely on assumptions around which there is substantial uncertainty. Ignoring this 'model uncertainty', can lead to inferior decision-making (Regan et al. 2005), and potentially, the loss of the species we are trying to protect. Current methods used in ecology allow model uncertainty to be incorporated into the model selection process (Burnham & Anderson 2002; Link & Barker 2006), but do not enable decision-makers to assess how this uncertainty would change a decision. This is the basis of information-gap decision theory (info-gap); finding strategies most robust to model uncertainty (Ben-Haim 2006). Info-gap has permitted conservation biology to make the leap from recognizing uncertainty to explicitly incorporating severe uncertainty into decision-making. In this paper we present a summary of McDonald-Madden et al (2008a) who use an info-gap framework to address the impact of uncertainty in the functional representations of biological systems on conservation decision-making. Furthermore, we highlight the importance of two key elements limiting conservation decision-making - funding and knowledge - and how they interact to influence the best management strategy for a threatened species. Copyright © ASCE 2011.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper reports on the development of a playful digital experience, Anim-action, designed for young children with developmental disabilities. This experience was built using the Stomp platform, a technology designed specifically to meet the needs of people with intellectual disability through facilitating whole body interaction. We provide detail on how knowledge gained from key stakeholders informed the design of the application and describe the design guidelines used in the development process. A study involving 13 young children with developmental disabilities was conducted to evaluate the extent to which Anim-action facilitates cognitive, social and physical activity. Results demonstrated that Anim-action effectively supports cognitive and physical activity. In particular, it promoted autonomy and encouraged problem solving and motor planning. Conversely, there were limitations in the system’s ability to support social interaction, in particular, cooperation. Results have been analyzed to determine how design guidelines might be refined to address these limitations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A switching control strategy is proposed for single inductor current-fed push-pull converter with a secondary side active voltage doubler rectifier or a voltage rectifier used in photovoltaic (PV) grid interfacing. The proposed switching control strategy helps to turn-on and turn-off the primary side power switches with zero-voltage and zero-current switching. The operation of the push-pull converter is analyzed for two modes of operation. The feasibility of the proposed switching control strategy is validated using simulation and experimental results.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper aims to address the ways in which drawing can be understood as the becoming-expressive of materials, site, and body, over time. The discussion pivots around a series of studies that replace linear or causal relationships – in history, drawing and expression – with topological movement. My approach is largely through a speculative case study. In a rereading of the familiar Butades myth, I examine how a shadow tracing can variously be taken as the first mimetic art with its origins in the urge to “capture”, and, antithetically, as the originary expressive folding of matter, site and body. The paper is divided into five sections. The first presents the Butades myth, identifying the representational problem that lies at the roots of its traditional telling. The next three sections outline a series of topologies that facilitate a discussion of the Butades myth from historical, disciplinary, and expressive perspectives. The final section aims to show the relevance of this discussion to a contemporary drawing practice, using my own drawing research as a case study. The field of inquiry is that of representational critique. The fold, an image associated with a topological geometry, replaces the relational or signifying disjuncture of representational structures, and suggests a becoming- expressive of subject and object, form and matter.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Weblogs, or blogs, constitute a form and genre of online publishing that emerged in the mid-1990s as a logical consequence of the confluence of personal and professional home pages and new web publishing technologies. To overcome technological limitations, where news updates had to be manually inserted by editing the underlying HTML code, the early content-management systems in the second half of the 1990s built on server-side database technology to dynamically generate web pages; this enabled more convenient and more frequent content updates. Weblogs utilised such technologies to provide an up-to-date news feed, presenting individual news items in reverse chronological order. Most blogging platforms provide commenting functions that enable readers to respond to and discuss individual blog posts...