885 resultados para fuzzy based evaluation method
Resumo:
Efforts to identify the specific components of the mammalian inner ear have been hampered by the small number of neuroepithelial cells and the variety of supporting cells. To circumvent these difficulties, we used a PCR-based subtractive method on cDNA from 2-day-old mouse cochlea. A cDNA encoding a predicted 2910-amino acid protein related to mucin has been isolated. Several lines of evidence indicate, however, that this protein does not undergo the O-glycosylation characteristic to mucins. As confirmed by immunocytochemistry and biochemical experiments, this protein is specific to the inner ear. Immunohistofluorescence labeling showed that this protein is a component of all the acellular membranes of the inner ear: i.e., the tectorial membrane of the cochlea, the otoconial and accessory membranes of the utricule and saccule, the cupula of the semicircular canals, and a previously undescribed acellular material covering the otoconia of the saccule. The protein has been named otogelin with reference to its localization. A variety of nonsensory cells located underneath these membranes could be identified as synthesizing otogelin. Finally, this study revealed a maturation process of the tectorial membrane, as evidenced by the progressive organization of otogelin labeling into thick and spaced radial fiber-like structures.
Resumo:
Objectives: Comparatively few people with severe mental illness are employed despite evidence that many people within this group wish to obtain, can obtain and sustain employment, and that employment can contribute to recovery. This investigation aimed to: (i) describe the current policy and service environment within which people with severe mental illness receive employment services; (ii) identify evidence-based practices that improve employment outcomes for people with severe mental illness; (iii) determine the extent to which the current Australian policy environment is consistent with the implementation of evidence-based employment services for people with severe mental illness; and (iv) identify methods and priorities for enhancing employment services for Australians with severe mental illness through implementation of evidence-based practices. Method: Current Australian practices were identified, having reference to policy and legal documents, funding body requirements and anecdotal reports. Evidence-based employment services for people with severe mental illness were identified through examination of published reviews and the results of recent controlled trials. Results: Current policy settings support the provision of employment services for people with severe mental illness separate from clinical services. Recent studies have identified integration of clinical and employment services as a major factor in the effectiveness of employment services. This is usually achieved through co-location of employment and mental health services. Conclusions: Optimal evidence-based employment services are needed by Australians with severe mental illness. Providing optimal services is a challenge in the current policy environment. Service integration may be achieved through enhanced intersectoral links between employment and mental health service providers as well as by co-locating employment specialists within a mental health care setting.
Resumo:
Both the New Zealand Ministry of Education's Literacy Experts Group and the Australian National Inquiry into the Teaching of Literacy have recently acknowledged the centrality of systematic instruction in synthetic phonics to early reading instruction, but this conclusion remains contentious in some circles. This paper briefly summarises empirical research in basic psychology and evidence-based evaluation studies supporting the inclusion of systematic synthetic phonics instruction within the early reading curriculum, allowing practising psychologists to develop an informed opinion on this issue.
Resumo:
The fundamental failure of current approaches to ontology learning is to view it as single pipeline with one or more specific inputs and a single static output. In this paper, we present a novel approach to ontology learning which takes an iterative view of knowledge acquisition for ontologies. Our approach is founded on three open-ended resources: a set of texts, a set of learning patterns and a set of ontological triples, and the system seeks to maintain these in equilibrium. As events occur which disturb this equilibrium, actions are triggered to re-establish a balance between the resources. We present a gold standard based evaluation of the final output of the system, the intermediate output showing the iterative process and a comparison of performance using different seed input. The results are comparable to existing performance in the literature.
Resumo:
A simple method for training the dynamical behavior of a neural network is derived. It is applicable to any training problem in discrete-time networks with arbitrary feedback. The method resembles back-propagation in that it is a least-squares, gradient-based optimization method, but the optimization is carried out in the hidden part of state space instead of weight space. A straightforward adaptation of this method to feedforward networks offers an alternative to training by conventional back-propagation. Computational results are presented for simple dynamical training problems, with varied success. The failures appear to arise when the method converges to a chaotic attractor. A patch-up for this problem is proposed. The patch-up involves a technique for implementing inequality constraints which may be of interest in its own right.
Resumo:
Purpose – Previous reviews of Corporate Social Reporting (CSR) literature have tended to focus on developed economies. The aim of this study is to extend reviews of CSR literature to emerging economies. Design/methodology/approach – A desk-based research method, using a classification framework of three categories. Findings – Most CSR studies in emerging economies have concentrated on the Asia-Pacific and African regions and are descriptive in nature, used content analysis methods and measured the extent and volume of disclosures contained within the annual reports. Such studies provide indirect explanation of the reasons behind CSR adoption, but of late, a handful of studies have started to probe managerial motivations behind CSR directly through in-depth interviews finding that CSR agendas in emerging economies are largely driven by external forces, namely pressures from parent companies, international market and international agencies.
Resumo:
Purpose – To investigate the role of simulation in the introduction of technology in a continuous operations process. Design/methodology/approach – A case-based research method was chosen with the aim to provide an exemplar of practice and test the proposition that the use of simulation can improve the implementation and running of conveyor systems in continuous process facilities. Findings – The research determines the optimum rate of re-introduction of inventory to a conveyor system generated during a breakdown event. Research limitations/implications – More case studies are required demonstrating the operational and strategic benefits that can be gained by using simulation to assess technology in organisations. Practical implications – A practical outcome of the study was the implementation of a policy for the manual re-introduction of inventory on a conveyor line after a breakdown event had occurred. Originality/value – The paper presents a novel example of the use of simulation to estimate the re-introduction rate of inventory after a breakdown event on a conveyor line. The paper highlights how by addressing this operational issue, ahead of implementation, the likelihood of the success of the strategic decision to acquire the technology can be improved.
Resumo:
The development of appropriate lab-based evaluation techniques for mobile technologies requires continued research attention. In particular, experimental design needs to account for the environmental context in which such technologies will ultimately be used. This requires, in part, that relevant environmental distractions be incorporated into evaluations. This chapter reflects on different techniques that were used in three separate lab-based mobile evaluation experiments to present visual distractions to participants and to measure the participants’ cognizance of the distractions during the course of mobile evaluations of technology. The different techniques met the different needs of the three studies with respect to the fidelity of the data captured, the impact of acknowledging distractions on the evaluation task, and the typical context of use for the technology being evaluated. The results of the studies showed that the introduction of visual distractions did have an impact on the experimental task and indicate that future work is required in this area.
Resumo:
This paper addresses the security of a specific class of common watermarking methods based on Dither modulation-quantisation index modulation (DM-QIM) and focusing on watermark-only attacks (WOA). The vulnerabilities of and probable attacks on lattice structure based watermark embedding methods have been presented in the literature. DM-QIM is one of the best known lattice structure based watermarking techniques. In this paper, the authors discuss a watermark-only attack scenario (the attacker has access to a single watermarked content only). In the literature it is an assumption that DM-QIM methods are secure to WOA. However, the authors show that the DM-QIM based embedding method is vulnerable against a guided key guessing attack by exploiting subtle statistical regularities in the feature space embeddings for time series and images. Using a distribution-free algorithm, this paper presents an analysis of the attack and numerical results for multiple examples of image and time series data.
Resumo:
This paper addresses the security of a specific class of common watermarking methods based on Dither modulation-quantisation index modulation (DM-QIM) and focusing on watermark-only attacks (WOA). The vulnerabilities of and probable attacks on lattice structure based watermark embedding methods have been presented in the literature. DM-QIM is one of the best known lattice structure based watermarking techniques. In this paper, the authors discuss a watermark-only attack scenario (the attacker has access to a single watermarked content only). In the literature it is an assumption that DM-QIM methods are secure to WOA. However, the authors show that the DM-QIM based embedding method is vulnerable against a guided key guessing attack by exploiting subtle statistical regularities in the feature space embeddings for time series and images. Using a distribution-free algorithm, this paper presents an analysis of the attack and numerical results for multiple examples of image and time series data.
Resumo:
Purpose – The purpose of this paper is to investigate the “last mile” delivery link between a hub and spoke distribution system and its customers. The proportion of retail, as opposed to non-retail (trade) customers using this type of distribution system has been growing in the UK. The paper shows the applicability of simulation to demonstrate changes in overall delivery policy to these customers. Design/methodology/approach – A case-based research method was chosen with the aim to provide an exemplar of practice and test the proposition that simulation can be used as a tool to investigate changes in delivery policy. Findings – The results indicate the potential improvement in delivery performance, specifically in meeting timed delivery performance, that could be made by having separate retail and non-retail delivery runs from the spoke terminal to the customer. Research limitations/implications – The simulation study does not attempt to generate a vehicle routing schedule but demonstrates the effects of a change on delivery performance when comparing delivery policies. Practical implications – Scheduling and spreadsheet software are widely used and provide useful assistance in the design of delivery runs and the allocation of staff to those delivery runs. This paper demonstrates to managers the usefulness of investigating the efficacy of current design rules and presents simulation as a suitable tool for this analysis. Originality/value – A simulation model is used in a novel application to test a change in delivery policy in response to a changing delivery profile of increased retail deliveries.
Resumo:
This research aims to examine the effectiveness of Soft Systems Methodology (SSM) to enable systemic change within local goverment and local NHS environments and to examine the role of the facilitator within this process. Checkland's Mode 2 variant of Soft Systems Methodology was applied on an experimental basis in two environments, Herefordshire Health Authority and Sand well Health Authority. The Herefordshire application used SSM in the design of an Integrated Care Pathway for stroke patients. In Sandwell, SSM was deployed to assist in the design of an Infonnation Management and Technology (IM&T) Strategy for the boundary-spanning Sandwell Partnership. Both of these environments were experiencing significant organisational change as the experiments unfurled. The explicit objectives of the research were: To examine the evolution and development of SSM and to contribute to its further development. To apply the Soft Systems Methodology to change processes within the NHS. To evaluate the potential role of SSM in this wider process of change. To assess the role of the researcher as a facilitator within this process. To develop a critical framework through which the impact of SSM on change might be understood and assessed. In developing these objectives, it became apparent that there was a gap in knowledge relating to SSM. This gap concerns the evaluation of the role of the approach in the change process. The case studies highlighted issues in stakeholder selection and management; the communicative assumptions in SSM; the ambiguous role of the facilitator; and the impact of highly politicised problem environments on the effectiveness of the methodology in the process of change. An augmented variant on SSM that integrates an appropriate (social constructivist) evaluation method is outlined, together with a series of hypotheses about the operationalisation of this proposed method.
Resumo:
The development of appropriate lab-based evaluation techniques for mobile technologies requires continued research attention. In particular, experimental design needs to account for the environmental context in which such technologies will ultimately be used. This requires, in part, that relevant environmental distractions be incorporated into evaluations. This chapter reflects on different techniques that were used in three separate lab-based mobile evaluation experiments to present visual distractions to participants and to measure the participants’ cognizance of the distractions during the course of mobile evaluations of technology. The different techniques met the different needs of the three studies with respect to the fidelity of the data captured, the impact of acknowledging distractions on the evaluation task, and the typical context of use for the technology being evaluated. The results of the studies showed that the introduction of visual distractions did have an impact on the experimental task and indicate that future work is required in this area.
Resumo:
Saturation mutagenesis is a powerful tool in modern protein engineering. This can allow the analysis of potential new properties thus allowing key residues within a protein to be targeted and randomised. However, the creation of large libraries using conventional saturation mutagenesis with degenerate codons (NNN or NNK) has inherent redundancy and disparities in residue representation. In this we describe the combination of ProxiMAX randomisation and CIS display for the use of generating novel peptides. Unlike other methods ProxiMAX randomisation does not require any intricate chemistry but simply utilises synthetic DNA and molecular biology techniques. Designed ‘MAX’ oligonucleotides were ligated, amplified and digested in an iterative cycle. Results show that randomised ‘MAX’ codons can be added sequentially to the base sequence creating a series of randomised non-degenerate codons that can subsequently be inserted into a gene. CIS display (Isogencia, UK) is an in vitro DNA based screening method that creates a genotype to phenotype link between a peptide and the nucleic acid that encodes it. The use of straight forward in vitro transcription/translation and other molecular biology techniques permits ease of use along with flexibility making it a potent screening technique. Using ProxiMAX randomisation in combination with CIS display, the aim is to produce randomised anti-nerve growth factor (NGF) and calcitonin gene-related (CGRP) peptides to demonstrate the high-throughput nature of this combination.
Resumo:
Purpose – Previous reviews of Corporate Social Reporting (CSR) literature have tended to focus on developed economies. The aim of this study is to extend reviews of CSR literature to emerging economies. Design/methodology/approach – A desk-based research method, using a classification framework of three categories. Findings – Most CSR studies in emerging economies have concentrated on the Asia-Pacific and African regions and are descriptive in nature, used content analysis methods and measured the extent and volume of disclosures contained within the annual reports. Such studies provide indirect explanation of the reasons behind CSR adoption, but of late, a handful of studies have started to probe managerial motivations behind CSR directly through in-depth interviews finding that CSR agendas in emerging economies are largely driven by external forces, namely pressures from parent companies, international market and international agencies. Originality/value – This is the first review and analysis of CSR studies from the emerging economy perspective. Following this analysis, the authors have identified some important future research questions.