979 resultados para Kolmogorov, Lie, Hormander, ipoellittiche
Resumo:
Photographic records of dietary intake (PhDRs) are an innovative method for the dietary assessment and may alleviate the burden of recording intake compared to traditional methods of recording intake. While the performance of PhDRs has been evaluated, no investigation into the application of this method had occurre within dietetic practice. This study examined the attitudes of dietitians towards the use of PhDRs in the provision of nutrition care. A web-based survey on the practices and beliefs with regards to technology use among Dietitians Association of Australia members was conducted in August 2011. Of the 87 dietitians who responded, 86% assessed the intakes of clients as part of individualised medical nutrition therapy, with the diet history the most common method used. The majority (91%) of dietitians surveyed believed that a PhDR would be of use in their current practice to estimate intake. Information contained in the PhDR would primarily be used to obtain a qualitative evaluation of diet (84%) or to supplement an existing assessment method (69%), as opposed to deriving an absolute measure of nutrient intake (31%). Most (87%) indicated that a PhDR would also be beneficial in both the delivery of the intervention and to evaluate and monitor goals and outcomes, while only 46% felt that a PhDR would assist in determining the nutrition diagnosis. This survey highlights the potential for the use of PhDRs within practice. Future endeavours lie in establishing resources which support the inclusion of PhDRs within the nutrition care process.
Resumo:
In this article, we analyze the three-component reaction-diffusion system originally developed by Schenk et al. (PRL 78:3781–3784, 1997). The system consists of bistable activator-inhibitor equations with an additional inhibitor that diffuses more rapidly than the standard inhibitor (or recovery variable). It has been used by several authors as a prototype three-component system that generates rich pulse dynamics and interactions, and this richness is the main motivation for the analysis we present. We demonstrate the existence of stationary one-pulse and two-pulse solutions, and travelling one-pulse solutions, on the real line, and we determine the parameter regimes in which they exist. Also, for one-pulse solutions, we analyze various bifurcations, including the saddle-node bifurcation in which they are created, as well as the bifurcation from a stationary to a travelling pulse, which we show can be either subcritical or supercritical. For two-pulse solutions, we show that the third component is essential, since the reduced bistable two-component system does not support them. We also analyze the saddle-node bifurcation in which two-pulse solutions are created. The analytical method used to construct all of these pulse solutions is geometric singular perturbation theory, which allows us to show that these solutions lie in the transverse intersections of invariant manifolds in the phase space of the associated six-dimensional travelling wave system. Finally, as we illustrate with numerical simulations, these solutions form the backbone of the rich pulse dynamics this system exhibits, including pulse replication, pulse annihilation, breathing pulses, and pulse scattering, among others.
Resumo:
In recent years considerable attention has been paid to the numerical solution of stochastic ordinary differential equations (SODEs), as SODEs are often more appropriate than their deterministic counterparts in many modelling situations. However, unlike the deterministic case numerical methods for SODEs are considerably less sophisticated due to the difficulty in representing the (possibly large number of) random variable approximations to the stochastic integrals. Although Burrage and Burrage [High strong order explicit Runge-Kutta methods for stochastic ordinary differential equations, Applied Numerical Mathematics 22 (1996) 81-101] were able to construct strong local order 1.5 stochastic Runge-Kutta methods for certain cases, it is known that all extant stochastic Runge-Kutta methods suffer an order reduction down to strong order 0.5 if there is non-commutativity between the functions associated with the multiple Wiener processes. This order reduction down to that of the Euler-Maruyama method imposes severe difficulties in obtaining meaningful solutions in a reasonable time frame and this paper attempts to circumvent these difficulties by some new techniques. An additional difficulty in solving SODEs arises even in the Linear case since it is not possible to write the solution analytically in terms of matrix exponentials unless there is a commutativity property between the functions associated with the multiple Wiener processes. Thus in this present paper first the work of Magnus [On the exponential solution of differential equations for a linear operator, Communications on Pure and Applied Mathematics 7 (1954) 649-673] (applied to deterministic non-commutative Linear problems) will be applied to non-commutative linear SODEs and methods of strong order 1.5 for arbitrary, linear, non-commutative SODE systems will be constructed - hence giving an accurate approximation to the general linear problem. Secondly, for general nonlinear non-commutative systems with an arbitrary number (d) of Wiener processes it is shown that strong local order I Runge-Kutta methods with d + 1 stages can be constructed by evaluated a set of Lie brackets as well as the standard function evaluations. A method is then constructed which can be efficiently implemented in a parallel environment for this arbitrary number of Wiener processes. Finally some numerical results are presented which illustrate the efficacy of these approaches. (C) 1999 Elsevier Science B.V. All rights reserved.
Resumo:
This work identifies the limitations of n-way data analysis techniques in multidimensional stream data, such as Internet chat room communications data, and establishes a link between data collection and performance of these techniques. Its contributions are twofold. First, it extends data analysis to multiple dimensions by constructing n-way data arrays known as high order tensors. Chat room tensors are generated by a simulator which collects and models actual communication data. The accuracy of the model is determined by the Kolmogorov-Smirnov goodness-of-fit test which compares the simulation data with the observed (real) data. Second, a detailed computational comparison is performed to test several data analysis techniques including svd [1], and multi-way techniques including Tucker1, Tucker3 [2], and Parafac [3].
Resumo:
This work investigates the accuracy and efficiency tradeoffs between centralized and collective (distributed) algorithms for (i) sampling, and (ii) n-way data analysis techniques in multidimensional stream data, such as Internet chatroom communications. Its contributions are threefold. First, we use the Kolmogorov-Smirnov goodness-of-fit test to show that statistical differences between real data obtained by collective sampling in time dimension from multiple servers and that of obtained from a single server are insignificant. Second, we show using the real data that collective data analysis of 3-way data arrays (users x keywords x time) known as high order tensors is more efficient than centralized algorithms with respect to both space and computational cost. Furthermore, we show that this gain is obtained without loss of accuracy. Third, we examine the sensitivity of collective constructions and analysis of high order data tensors to the choice of server selection and sampling window size. We construct 4-way tensors (users x keywords x time x servers) and analyze them to show the impact of server and window size selections on the results.
Resumo:
Despite the ubiquitous nature of the discourse on human rights there is currently little research on the emergence of disclosure by multinational corporations on their human rights obligations or the regulatory dynamic that may lie behind this trend. In an attempt to begin to explore the extent to which, if any, the language of human rights has entered the discourse of corporate accountability, this paper investigates the adoption of the International Labour Organisation's (ILO) human rights standards by major multinational garment retail companies that source products from developing countries, as disclosed through their reporting media. The paper has three objectives. Firstly, to empirically explore the extent to which a group of multinational garment retailers invoke the language of human rights when disclosing their corporate responsibilities. The paper reviews corporate reporting media including social responsibility codes of conduct, annual reports and stand-alone social responsibility reports released by 18 major global clothing and retail companies during a period from 1990 to 2007. We find that the number of companies adopting and disclosing on the ILO's workplace human rights standards has significantly increased since 1998 – the year in which the ILO's standards were endorsed and accepted by the global community (ILO, 1998). Secondly, drawing on a combination of Responsive Regulation theory and neo-institutional theory, we tentatively seek to understand the regulatory space that may have influenced these large corporations to adopt the language of human rights obligations. In particular, we study the role that International Governmental Organisation's (IGO) such as ILO may have played in these disclosures. Finally, we provide some critical reflections on the power and potential within the corporate adoption of the language of human rights.
Resumo:
Australian agriculture is faced with the dilemma of increasing food production for a growing domestic and world population while decreasing environmental impacts and supporting the social and economic future of regional communities. The challenge for farmers is compounded by declining rates of productivity growth which have been linked to changes in climate and decreasing investment in agricultural research. The answer must lie in understanding the ecological functionality of landscapes and matching management of agricultural systems and use of natural resources to landscape capacity in a changing climate. A simplified mixed grain and livestock farm case study is used to illustrate the challenges of assessing the potential for shifts in land allocation between commodities to achieve sustainable intensification of nutrition production. This study highlights the risks associated with overly-simplistic solutions and the need for increased investment in research to inform the development of practical strategies for increasing food production in Australian agro-ecosystems while managing the impacts of climate change and addressing climate change mitigation policies.
Resumo:
The current discourse surrounding victims of online fraud is heavily premised on an individual notion of greed. The strength of this discourse permeates the thinking of those who have not experienced this type of crime, as well as victims themselves. The current discourse also manifests itself in theories of victim precipitation, which again assigns the locus of blame to individuals for their actions in an offence. While these typologies and categorisations of victims have been critiqued as “victim blaming” in other fields, this has not occurred with regard to online fraud victims, where victim focused ideas of responsibility for the offence continue to dominate. This paper illustrates the nature and extent of the greed discourse and argues that it forms part of a wider construction of online fraud that sees responsibility for victimisation lie with the victims themselves and their actions. It argues that the current discourse does not take into account the level of deception and the targeting of vulnerability that is employed by the offender in perpetrating this type of crime. It concludes by advocating the need to further examine and challenge this discourse, especially with regard to its potential impact for victim’s access to support services and the wider criminal justice system.
Resumo:
Most security models for authenticated key exchange (AKE) do not explicitly model the associated certification system, which includes the certification authority (CA) and its behaviour. However, there are several well-known and realistic attacks on AKE protocols which exploit various forms of malicious key registration and which therefore lie outside the scope of these models. We provide the first systematic analysis of AKE security incorporating certification systems (ASICS). We define a family of security models that, in addition to allowing different sets of standard AKE adversary queries, also permit the adversary to register arbitrary bitstrings as keys. For this model family we prove generic results that enable the design and verification of protocols that achieve security even if some keys have been produced maliciously. Our approach is applicable to a wide range of models and protocols; as a concrete illustration of its power, we apply it to the CMQV protocol in the natural strengthening of the eCK model to the ASICS setting.
Resumo:
Migraine with aura (MA) is a subtype of typical migraine. Migraine with aura (MA) also encompasses a rare severe subtype Familial Hemiplegic Migraine (FHM) with several known genetic loci. The type 2 FHM (FHM-2) susceptibility locus maps to chromosome 1q23 and mutations in the ATP1A2 gene at this site have recently been implicated. We have previously provided evidence of linkage of typical migraine (predominantly MA) to microsatellite markers on chromosome 1, in the 1q31 and 1q23 regions. In this study, we have undertaken a large genomic investigation involving candidate genes that lie within the chromosome 1q23 and 1q31 regions using an association analysis approach. Methods We have genotyped a large population of case-controls (243 unrelated Caucasian migraineurs versus 243 controls) examining a set of 5 single nucleotide polymorphisms (SNPs) and the Fas Ligand dinucleotide repeat marker, located within the chromosome 1q23 and 1q31 regions. Results Several genes have been studied including membrane protein (ATP 1 subtype A4 and FasL), cytoplasmic glycoprotein (CASQ 1) genes and potassium (KCN J9 and KCN J10) and calcium (CACNA1E) channel genes in 243 migraineurs (including 85% MA and 15% of migraine without aura (MO)) and 243 matched controls. After correction for multiple testing, chi-square results showed non-significant P values (P > 0.008) across all SNPs (and a CA repeat) tested in these different genes, however results with the KCN J10 marker gave interesting results (P = 0.02) that may be worth exploring further in other populations. Conclusion These results do not show a significant role for the tested candidate gene variants and also do not support the hypothesis that a common chromosome 1 defective gene influences both FHM and the more common forms of migraine.
Resumo:
OBJECTIVES: The aims of the study were: (i) to extend our linkage analysis of chromosome 1q microsatellite markers in predominantly migraine with aura pedigrees and (ii) to test the novel FHM-2 ATP1A2 gene for involvement in these migraine affected pedigrees and a previous pedigree (MF14) showing evidence of linkage of markers to C1q31. METHODS: A chromosome 1 scan (31 markers) was performed in 21 multiplex pedigrees affected predominantly with migraine with aura (MA). The known FHM-2 ATP1A2 gene mutations were tested, by sequencing, for the involvement in MA and migraine without aura (MO) in these pedigrees. Sequencing was performed in the coding areas of the ATP1A2 gene through three MA individuals from MF14. RESULTS: Evidence for linkage was obtained at C1q23 to markers spanning the ATP1A2 gene. However, testing of the known ATP1A2 gene mutations (for FHM) in common migraine probands of pedigrees showing excess allele sharing was negative. Sequencing of the entire coding areas of the gene through all the three MA affected from MF14 was also negative for mutations. DISCUSSION: Microsatellite markers on chromosome 1q23 show evidence of excess allele sharing in MA and some MO pedigrees, suggesting linkage to the common forms of migraine and the presence of a susceptibility gene in this region. The FHM-2 (ATP1A2 gene) does not seem to be involved in the common types of migraine. Despite certain clinical characteristics, the genetic correlation between FHM and familial typical migraine remains unclear. Several candidate genes lie within the C1q23 and C1q31 cytogenetic regions; therefore, further studies are needed.
Resumo:
As we race towards a new era, rapid change of conventional models has become the norm. Just as technology has etched itself to the core of society, the sheer quantity of student devices connecting to university networks presents a sector wide challenge coinciding almost perfectly with many universities creating technology rich learning spaces. New fears include future proofing. It is not just a matter of technology becoming outdated. In seeking to accommodate the teaching styles and experience of staff across diverse faculties, is this technology simply too vanilla to meet their needs as they become increasingly skilled and inspired by technology’s potential? Through the early findings of a study into staff use of technology within Queensland University of Technology's next generation collaborative learning spaces, this paper explores whether the answers lie in a model presented by students equipping themselves with the tools they need to learn in the 21st century.
Resumo:
As all hospital staff are highly likely to interact with people living with dementia, education about their needs must be accessible to all staff, not only clinicians. Catherine Travers and David Lie evaluate the results of providing dementia education to non-clinical staff in a large teaching hospital. Dementia training programs offered in the hospital setting can improve staff knowledge and confidence in caring for patients with dementia (Foreman & Gardner 2005; McPhail et al 2009). It’s also been shown that a relatively minor investment in staff education can have noticeable effects on both staff attitudes and hospital practices regarding the care and support of patients with dementia and cognitive impairment (Foreman & Gardner 2005)...
Resumo:
There has been significant debate about the value of screening for dementia, and the need for early diagnosis. Options include Gene testing, early risk assessment, screening, case finding and review when a patient or carer identify that they have symptoms. This paper is not focused on these early approaches to identifying people with dementia. It is focused on the period when a patient or a carer has recognised that there are some memory problems and they are seeking assistance with a diagnosis or explanation in relation to memory loss.