981 resultados para Set functions.
Resumo:
There’s a diagram that does the rounds online that neatly sums up the difference between the quality of equipment used in the studio to produce music, and the quality of the listening equipment used by the consumer...
Resumo:
This thesis is concerned with understanding the roles of four alternate healing systems and medical practice in the community's health behaviour. The four alternate systems are naturopathy, homoeopathy, osteopathy and chiropractic. The research reported developed from work supported by the Committee of Inquiry into Chiropractic, Osteopathy, Homoeopathy and Naturopathy conducted under the chairmanship of Professor E. C. Webb set up by the Australian Government in 1975. The study concentrates on the factors which influence individual clients in their decisions to consult healers for treatment. An underlying assumption is that an analysis of the processes that effect such decisions will lead to further knowledge of the community's attitudes towards the functions of alternate healing and medicine. A review of the historical backgrounds and current status of the four alternate healing systems leads to the conclusion that they differ in a variety of areas. These areas include treatment modalities, historical backgrounds, occupational development and rapprochement with medicine. Homoeopathy, osteopathy and chiropractic emerged as distinct approaches to healing late in the nineteenth century. Naturopathy tends to be a philosophy or style of life as much as a health system in its own right. Their relationships with medicine also vary; osteopathy and naturopathy receive some acceptance, some homoeopaths are tolerated, whilst chiropractic is ostracised and vilified. A common paradigm of treatment underlies all four alternate approaches to healing. They all eschew the use of synthetic pharmaceuticals and invasive treatments and accept an indigenous theory of disease and a belief in the vis medicatrix naturae or the healing power of nature. An inevitable concomitant of this paradigm is that they believe that healing and health must be self-engendered. They rest within the client and his or her actions, not within the hands, skills or power of the healer. It is these characteristics combined with the alternate healers ' claims to espouse a similar scientific rationale for their approaches, and their functioning as parallel healers to medicine, that establishes their special relationship with medicine. This relationship become s more problematic in the face of medicine's hegemony and claim to unique legitimacy as the community's sole healing system. The interaction between these systems and medical practice can be gauged through articles related to the four alternate healing systems that have appeared in the medical literature. Interest has been cyclical but appears to have markedly increased in the past two decades. In this period it has included exploratory and descriptive writing; concern with controlling and/or eradicating the healers; desire to protect an ignorant and vulnerable public and. finally understanding and exploration of what the alternate healers might have to offer. At the same time, the public or institutionalized role has been one of denial and suppression through ostracism and legal constraints. In spite of medicine's position the alternate healing systems have found growing community acceptance so that it is problematical and probably unacceptable now to consider their use as a 'deviant ' health action. Increasing interest in the characteristics of clients has provided a consensus that they are similar to the adult population and are more likely to suffer from musculoskeletal and chronic illnesses. They are no more likely to be neurotic or gullible than the general community, but probably more practical and more oriented towards an active involvement in the healing process. The impact of these issues is explored, through comparing the strategies taken into account when choosing a treatment. These include attending one of the alternate healers exclusively for a condition; attending an alternate healer and a medical practitioner for the same problem; attending a medical practitioner solely or not consulting any healer. Respondents from surveys of alternate healer clients and the general community were classified according to their use of these four strategies, and the influences on their decisions at different stages of the treatment decision making process were compared.
Resumo:
Existing multi-model approaches for image set classification extract local models by clustering each image set individually only once, with fixed clusters used for matching with other image sets. However, this may result in the two closest clusters to represent different characteristics of an object, due to different undesirable environmental conditions (such as variations in illumination and pose). To address this problem, we propose to constrain the clustering of each query image set by forcing the clusters to have resemblance to the clusters in the gallery image sets. We first define a Frobenius norm distance between subspaces over Grassmann manifolds based on reconstruction error. We then extract local linear subspaces from a gallery image set via sparse representation. For each local linear subspace, we adaptively construct the corresponding closest subspace from the samples of a probe image set by joint sparse representation. We show that by minimising the sparse representation reconstruction error, we approach the nearest point on a Grassmann manifold. Experiments on Honda, ETH-80 and Cambridge-Gesture datasets show that the proposed method consistently outperforms several other recent techniques, such as Affine Hull based Image Set Distance (AHISD), Sparse Approximated Nearest Points (SANP) and Manifold Discriminant Analysis (MDA).
Resumo:
Sexual harassment remains a widespread workplace phenomenon, despite laws that proscribe it. Drawing initially on a typology from the violence prevention literature that conceptualizes prevention and response approaches according to when they occur, the paper synthesizes strategies identified in literature addressing workplace sexual harassment, as well as other workplace injustices or grievances. The paper utilizes this previous research to develop a framework of sexual harassment prevention strategies along two dimensions: functions and timing. The framework offers a research-informed set of organization-wide preventative and remedial approaches, a systemic approach to what is often seen as an individual problem, and a means to better focus interventions that are often disparate and unco-ordinated. The paper also highlights important areas for future research including a stronger focus on longer-term (tertiary) corrective actions.
Resumo:
In CB Richard Ellis (C) Pty Ltd v Wingate Properties Pty Ltd [2005] QDC 399 McGill DCJ examined whether the court now has a discretion to set aside an irregularly entered default judgment.
Resumo:
The endoplasmic reticulum (ER) is the central organelle in the eukaryotic secretory pathway. The ER functions in protein synthesis and maturation and is crucial for proper maintenance of cellular homeostasis and adaptation to adverse environments. Acting as a cellular sentinel, the ER is exquisitely sensitive to changing environments principally via the ER quality control machinery. When perturbed, ER-stress triggers a tightly regulated and highly conserved, signal transduction pathway known as the unfolded protein response (UPR) that prevents the dangerous accumulation of unfolded/misfolded proteins. In situations where excessive UPR activity surpasses threshold levels, cells deteriorate and eventually trigger programmed cell death (PCD) as a way for the organism to cope with dysfunctional or toxic signals. The programmed cell death that results from excessive ER stress in mammalian systems contributes to several important diseases including hypoxia, neurodegeneration, and diabetes. Importantly, hallmark features and markers of cell death that are associated with ER stress in mammals are also found in plants. In particular, there is a common, conserved set of chaperones that modulate ER cell death signaling. Here we review the elements of plant cell death responses to ER stress and note that an increasing number of plant-pathogen interactions are being identified in which the host ER is targeted by plant pathogens to establish compatibility.
Resumo:
In C & E Pty Ltd v Corrigan [2006] QCA 47, the Queensland Court of Appeal considered whether r103 of the Uniform Civil Procedure Rules applied to the service of an application to set aside a statutory demand under s459G of the Corporations Act 2001 (Cth). The decision provides analysis and clarification of an issue that has clearly been one of some uncertainty.
Resumo:
The basic principles and equations are developed for elementary finance, based on the concept of compound interest. The five quantities of interest in such problems are present value, future value, amount of periodic payment, number of periods and the rate of interest per period. We consider three distinct means of computing each of these five quantities in Excel 2007: (i) use of algebraic equations, (ii) by recursive schedule and the Goal Seek facility, and (iii) use of Excel's intrinsic financial functions. The paper is intended to be used as the basis for a lesson plan and contains many examples and solved problems. Comment is made regarding the relative difficulty of each approach, and a prominent theme is the systematic use of more than one method to increase student understanding and build confidence in the answer obtained. Full instructions to build each type of model are given and a complete set of examples and solutions may be downloaded (Examples.xlsx and Solutions.xlsx).
Resumo:
The SOS screen, as originally described by Perkins et al. (1999), was setup with the aim of identifying Arabidopsis functions that might potentially be involved in the DNA metabolism. Such functions, when expressed in bacteria, are prone to disturb replication and thus trigger the SOS response. Consistently, expression of AtRAD51 and AtDMC1 induced the SOS response in bacteria, even affecting E. coli viability. 100 SOS-inducing cDNAs were isolated from a cDNA library constructed from an Arabidopsis cell suspension that was found to highly express meiotic genes. A large proportion of these SOS+ candidates are clearly related to the DNA metabolism, others could be involved in the RNA metabolism, while the remaining cDNAs encode either totally unknown proteins or proteins that were considered as irrelevant. Seven SOS+ candidate genes are induced following gamma irradiation. The in planta function of several of the SOS-inducing clones was investigated using T-DNA insertional mutants or RNA interference. Only one SOS+ candidate, among those examined, exhibited a defined phenotype: silenced plants for DUT1 were sensitive to 5-fluoro-uracil (5FU), as is the case of the leaky dut-1 mutant in E. coli that are affected in dUTPase activity. dUTPase is essential to prevent uracil incorporation in the course of DNA replication.
Resumo:
Universal One-Way Hash Functions (UOWHFs) may be used in place of collision-resistant functions in many public-key cryptographic applications. At Asiacrypt 2004, Hong, Preneel and Lee introduced the stronger security notion of higher order UOWHFs to allow construction of long-input UOWHFs using the Merkle-Damgård domain extender. However, they did not provide any provably secure constructions for higher order UOWHFs. We show that the subset sum hash function is a kth order Universal One-Way Hash Function (hashing n bits to m < n bits) under the Subset Sum assumption for k = O(log m). Therefore we strengthen a previous result of Impagliazzo and Naor, who showed that the subset sum hash function is a UOWHF under the Subset Sum assumption. We believe our result is of theoretical interest; as far as we are aware, it is the first example of a natural and computationally efficient UOWHF which is also a provably secure higher order UOWHF under the same well-known cryptographic assumption, whereas this assumption does not seem sufficient to prove its collision-resistance. A consequence of our result is that one can apply the Merkle-Damgård extender to the subset sum compression function with ‘extension factor’ k+1, while losing (at most) about k bits of UOWHF security relative to the UOWHF security of the compression function. The method also leads to a saving of up to m log(k+1) bits in key length relative to the Shoup XOR-Mask domain extender applied to the subset sum compression function.
Resumo:
We prove that homogeneous bent functions f:GF(2)^2n --> GF(2) of degree n do not exist for n>3. Consequently homogeneous bent functions must have degree
Resumo:
We determine the affine equivalence classes of the eight variable degree three homogeneous bent functions using a new algorithm. Our algorithm applies to general bent functions and can systematically determine the automorphism groups. We provide a partial verification of the enumeration of eight variable degree three homogeneous bent functions obtained by Meng et al. We determine the affine equivalence classes of these functions.
Resumo:
Albumin binds low–molecular-weight molecules, including proteins and peptides, which then acquire its longer half-life, thereby protecting the bound species from kidney clearance. We developed an experimental method to isolate albumin in its native state and to then identify [mass spectrometry (MS) sequencing] the corresponding bound low–molecular-weight molecules. We used this method to analyze pooled sera from a human disease study set (high-risk persons without cancer, n= 40; stage I ovarian cancer, n = 30; stage III ovarian cancer, n = 40) to demonstrate the feasibility of this approach as a discovery method. Methods Albumin was isolated by solid-phase affinity capture under native binding and washing conditions. Captured albumin-associated proteins and peptides were separated by gel electrophoresis and subjected to iterative MS sequencing by microcapillary reversed-phase tandem MS. Selected albumin-bound protein fragments were confirmed in human sera by Western blotting and immunocompetition. Results In total, 1208 individual protein sequences were predicted from all 3 pools. The predicted sequences were largely fragments derived from proteins with diverse biological functions. More than one third of these fragments were identified by multiple peptide sequences, and more than one half of the identified species were in vivo cleavage products of parent proteins. An estimated 700 serum peptides or proteins were predicted that had not been reported in previous serum databases. Several proteolytic fragments of larger molecules that may be cancer-related were confirmed immunologically in blood by Western blotting and peptide immunocompetition. BRCA2, a 390-kDa low-abundance nuclear protein linked to cancer susceptibility, was represented in sera as a series of specific fragments bound to albumin. Conclusion Carrier-protein harvesting provides a rich source of candidate peptides and proteins with potential diverse tissue and cellular origins that may reflect important disease-related information.
Resumo:
Numeric sets can be used to store and distribute important information such as currency exchange rates and stock forecasts. It is useful to watermark such data for proving ownership in case of illegal distribution by someone. This paper analyzes the numerical set watermarking model presented by Sion et. al in “On watermarking numeric sets”, identifies it’s weaknesses, and proposes a novel scheme that overcomes these problems. One of the weaknesses of Sion’s watermarking scheme is the requirement to have a normally-distributed set, which is not true for many numeric sets such as forecast figures. Experiments indicate that the scheme is also susceptible to subset addition and secondary watermarking attacks. The watermarking model we propose can be used for numeric sets with arbitrary distribution. Theoretical analysis and experimental results show that the scheme is strongly resilient against sorting, subset selection, subset addition, distortion, and secondary watermarking attacks.
Resumo:
Ever since Cox et. al published their paper, “A Secure, Robust Watermark for Multimedia” in 1996 [6], there has been tremendous progress in multimedia watermarking. The same pattern re-emerged with Agrawal and Kiernan publishing their work “Watermarking Relational Databases” in 2001 [1]. However, little attention has been given to primitive data collections with only a handful works of research known to the authors [11, 10]. This is primarily due to the absence of an attribute that differentiates marked items from unmarked item during insertion and detection process. This paper presents a distribution-independent, watermarking model that is secure against secondary-watermarking in addition to conventional attacks such as data addition, deletion and distortion. The low false positives and high capacity provide additional strength to the scheme. These claims are backed by experimental results provided in the paper.