949 resultados para Error-Free Transformations
Resumo:
Purpose - This paper seeks to understand the impact of financial cost on customer value in health prevention services by comparing free government services with private fee-charging providers. This is important as there is a common belief that a free health service is of lower quality and thus lower value than a paid service. However there is no evidence to verify this notion. Design / Methodology / Approach - A large-scale online survey was administered nationwide to Australian women. The respondents were asked about the functional and emotional value derived from their service experiences. Findings - Structural equation modelling (SEM) revealed non significant relationships between fee/free services and functional and emotional value (FV/EV). The non-significant relationship with FV is contrary to the theory of price quality relationship in services. This could be attributed to consumer perceptions that the technical quality of health professionals is comparable across free and paid services. The non-significant relationship with EV could be explained by the indicators used to reflect EV. These indicators were reflective of breast screening behaviour, not breast screening services. Subsequently, it may be posited that the act of having a breast screen is sufficient for consumers to derive emotional value, regardless of the financial cost. Originality / Value - This research fills an important gap in the literature by investigating the impact of financial cost on a service that consumers use proactively(prevention), rather than reactively (treatment). Insights are provided into the impact of cost on customer value in preventive health services, which are valuable to social marketing academics, health practitioners, and governments
Resumo:
Animal models typically require a known genetic pedigree to estimate quantitative genetic parameters. Here we test whether animal models can alternatively be based on estimates of relatedness derived entirely from molecular marker data. Our case study is the morphology of a wild bird population, for which we report estimates of the genetic variance-covariance matrices (G) of six morphological traits using three methods: the traditional animal model; a molecular marker-based approach to estimate heritability based on Ritland's pairwise regression method; and a new approach using a molecular genealogy arranged in a relatedness matrix (R) to replace the pedigree in an animal model. Using the traditional animal model, we found significant genetic variance for all six traits and positive genetic covariance among traits. The pairwise regression method did not return reliable estimates of quantitative genetic parameters in this population, with estimates of genetic variance and covariance typically being very small or negative. In contrast, we found mixed evidence for the use of the pedigree-free animal model. Similar to the pairwise regression method, the pedigree-free approach performed poorly when the full-rank R matrix based on the molecular genealogy was employed. However, performance improved substantially when we reduced the dimensionality of the R matrix in order to maximize the signal to noise ratio. Using reduced-rank R matrices generated estimates of genetic variance that were much closer to those from the traditional model. Nevertheless, this method was less reliable at estimating covariances, which were often estimated to be negative. Taken together, these results suggest that pedigree-free animal models can recover quantitative genetic information, although the signal remains relatively weak. It remains to be determined whether this problem can be overcome by the use of a more powerful battery of molecular markers and improved methods for reconstructing genealogies.
Resumo:
A Jacobian-free variable-stepsize method is developed for the numerical integration of the large, stiff systems of differential equations encountered when simulating transport in heterogeneous porous media. Our method utilises the exponential Rosenbrock-Euler method, which is explicit in nature and requires a matrix-vector product involving the exponential of the Jacobian matrix at each step of the integration process. These products can be approximated using Krylov subspace methods, which permit a large integration stepsize to be utilised without having to precondition the iterations. This means that our method is truly "Jacobian-free" - the Jacobian need never be formed or factored during the simulation. We assess the performance of the new algorithm for simulating the drying of softwood. Numerical experiments conducted for both low and high temperature drying demonstrates that the new approach outperforms (in terms of accuracy and efficiency) existing simulation codes that utilise the backward Euler method via a preconditioned Newton-Krylov strategy.
Resumo:
The term “business transformation” is a buzzword, often used to signify fundamental changes undergone by organisations. Despite numerous works in enterprise transformation, IT-enabled business transformation and organizational transformation, there appears to be a lack of consensus on what actually constitutes a business transformation as opposed to other types of redesign or organisational improvement projects. Consequently, knowledge about which elements of a business system that are impacted by such an endeavour is largely inconsistent, and partially conflicting. We present a business transformation typology that considers 18 attributes pertaining to the transforming organisation and the transformation initiative. To explore our typology, we analysed 10 published case studies and classified them along two dimensions – one ranging from marginal to fundamental changes, and another on internal and external visibility. Our literature review reveals how the terminology has been misused, and we provide some directions to provide more clarity around transformation phenomena in IS research.
Resumo:
Acid sulfate soils (ASS) are one of the stressor factors that cause many mangrove restoration projects to fail. Achieving successful rehabilitation in an ASS affected area requires an understanding of the geochemical conditions that influence the establishment and growth of mangrove seedlings. This study evaluated the effect of tidal inundation on geochemical conditions on sub layer to better understand their impacts on the density, establishment, and growth of mangrove seedlings. This study also examined the geochemical conditions under which mangrove seedlings can establish naturally, and/or be replanted in abandoned aquaculture ponds. The study area was in an area of abandoned aquaculture ponds situated in the Mare District, adjacent to Bone Bay, South Sulawesi, Indonesia.The pH, pHfox, redox potential, organic content, water soluble sulfate, SKCl, SPOS, and grain size of the soil from the sediment core at + 10 - 15 cm depth near roots were measured using. Pyrite analysis were conducted for the top and sub sediments. The density, establishment, and the relative root growth of Rhizophoraceae were also determined. Free tidal inundation at abandoned pond sites improved the sediment quality. The high density, establishment, and growth of mangrove seedlings were characterized by freely drained areas with a higher pH (field and oxidisable), lower organic content, and high proportion of silt/clay. Higher density and growth also correlated to reduced environments. Sulfur species did not influence the density, establishment, and growth of the seedlings directly. The supply of propagules from the mangrove stands, or access from good waterways were also important for seedlings to establish naturally.
Resumo:
Separately, actinic keratosis (AK) and cutaneous squamous cell carcinoma (SCC) have been associated with cutaneous human papillomavirus (HPV) infections. To further explore the association between HPV infection and SCC development, we determined markers of cutaneous HPV infection within a single population in persons with precursor lesions (AK), cancerous lesions (SCC), and without. Serum and plucked eyebrow hairs were collected from 57 tumor-free controls, 126 AK, and 64 SCC cases. Presence of HPV L1 and E6 seroreactivity and viral DNA were determined for HPV types 5, 8, 15, 16, 20, 24, and 38. Significant positive associations with increasing severity of the lesions (controls, AK, and SCC, respectively) were observed for overall HPV L1 seropositivity (13%, 26%, and 37%) and for HPV8 (4%, 17%, and 30%). In parallel, the proportion of L1 seropositive individuals against multiple HPV types increased from 14% to 39% and 45%. The overall E6 seroreactivity, however, tended to decline with AK and SCC, especially for HPV8 (21%, 11%, and 2%). HPV DNA positivity was most prevalent in the AK cases (54%) compared with the SCC cases (44%) and the tumor-free controls (40%). Among all participants, there was a positive trend between overall HPV DNA positivity and L1 seropositivity, but not E6 seropositivity. Taken together, our data suggest that cutaneous HPV infections accompanied by detectable HPV DNA in eyebrow hairs and HPV L1 seropositivity, but not E6 seropositivity, are associated with an increased risk of AK and SCC.
Resumo:
This paper describes the use of property graphs for mapping data between AEC software tools, which are not linked by common data formats and/or other interoperability measures. The intention of introducing this in practice, education and research is to facilitate the use of diverse, non-integrated design and analysis applications by a variety of users who need to create customised digital workflows, including those who are not expert programmers. Data model types are examined by way of supporting the choice of directed, attributed, multi-relational graphs for such data transformation tasks. A brief exemplar design scenario is also presented to illustrate the concepts and methods proposed, and conclusions are drawn regarding the feasibility of this approach and directions for further research.
Resumo:
The steady problem of free surface flow due to a submerged line source is revisited for the case in which the fluid depth is finite and there is a stagnation point on the free surface directly above the source. Both the strength of the source and the fluid speed in the far field are measured by a dimensionless parameter, the Froude number. By applying techniques in exponential asymptotics, it is shown that there is a train of periodic waves on the surface of the fluid with an amplitude which is exponentially small in the limit that the Froude number vanishes. This study clarifies that periodic waves do form for flows due to a source, contrary to a suggestion by Chapman & Vanden-Broeck (2006, J. Fluid Mech., 567, 299--326). The exponentially small nature of the waves means they appear beyond all orders of the original power series expansion; this result explains why attempts at describing these flows using a finite number of terms in an algebraic power series incorrectly predict a flat free surface in the far field.
Resumo:
Transition metal-free magnetism and half-metallicity recently has been the subject of intense research activity due to its potential in spintronics application. Here we, for the first time, demonstrate via density functional theory that the most recently experimentally realized graphitic carbon nitride (g-C4N3) displays a ferromagnetic ground state. Furthermore, this novel material is predicted to possess an intrinsic half-metallicity never reported to date. Our results highlight a new promising material toward realistic metal-free spintronics application.
Resumo:
Information retrieval (IR) by clinicians in the healthcare setting is critical for informing clinical decision-making. However, a large part of this information is in the form of free-text and inhibits clinical decision support and effective healthcare services. This makes meaningful use of clinical free-text in electronic health records (EHRs) for patient care a difficult task. Within the context of IR, given a repository of free-text clinical reports, one might want to retrieve and analyse data for patients who have a known clinical finding.
Resumo:
Internet services are important part of daily activities for most of us. These services come with sophisticated authentication requirements which may not be handled by average Internet users. The management of secure passwords for example creates an extra overhead which is often neglected due to usability reasons. Furthermore, password-based approaches are applicable only for initial logins and do not protect against unlocked workstation attacks. In this paper, we provide a non-intrusive identity verification scheme based on behavior biometrics where keystroke dynamics based-on free-text is used continuously for verifying the identity of a user in real-time. We improved existing keystroke dynamics based verification schemes in four aspects. First, we improve the scalability where we use a constant number of users instead of whole user space to verify the identity of target user. Second, we provide an adaptive user model which enables our solution to take the change of user behavior into consideration in verification decision. Next, we identify a new distance measure which enables us to verify identity of a user with shorter text. Fourth, we decrease the number of false results. Our solution is evaluated on a data set which we have collected from users while they were interacting with their mail-boxes during their daily activities.
Resumo:
This chapter contains sections titled: Introduction Case study: Estimating transmission rates of nosocomial pathogens Models and methods Data analysis and results Discussion References
Resumo:
There are different ways to authenticate humans, which is an essential prerequisite for access control. The authentication process can be subdivided into three categories that rely on something someone i) knows (e.g. password), and/or ii) has (e.g. smart card), and/or iii) is (biometric features). Besides classical attacks on password solutions and the risk that identity-related objects can be stolen, traditional biometric solutions have their own disadvantages such as the requirement of expensive devices, risk of stolen bio-templates etc. Moreover, existing approaches provide the authentication process usually performed only once initially. Non-intrusive and continuous monitoring of user activities emerges as promising solution in hardening authentication process: iii-2) how so. behaves. In recent years various keystroke dynamic behavior-based approaches were published that are able to authenticate humans based on their typing behavior. The majority focuses on so-called static text approaches, where users are requested to type a previously defined text. Relatively few techniques are based on free text approaches that allow a transparent monitoring of user activities and provide continuous verification. Unfortunately only few solutions are deployable in application environments under realistic conditions. Unsolved problems are for instance scalability problems, high response times and error rates. The aim of this work is the development of behavioral-based verification solutions. Our main requirement is to deploy these solutions under realistic conditions within existing environments in order to enable a transparent and free text based continuous verification of active users with low error rates and response times.