934 resultados para Running-based anaerobic sprint test
Resumo:
We conducted a randomized controlled trial to test whether a Brief Mobile Treatment (BMT) intervention could improve outcomes relative to usual care among suicide attempters. The intervention included training in problem solving therapy, meditation, a brief intervention to increase social support as well as advice on alcohol and other drugs, and mobile phone follow-up. The effect of the intervention was measured in terms of a reduction in suicidal ideation, depression and self-harm at Baseline, six and 12 months. A wait-list control group received usual care. A total of 68 participants was recruited from a Sri Lankan hospital following a suicide attempt. Participants who received the intervention were found to achieve significant improvements in reducing suicidal ideation and depression than those receiving usual care. The BMT group also experienced a significant improvement of social support when compared to the control group. However, the BMT group did not demonstrate a significant effect in reducing actual self-harm and most substance use, and differential effects on alcohol use were restricted to men. Although the present study was limited in revealing which component of the intervention was more effective in preventing suicide, it showed its efficacy in reducing suicide as a whole.
Resumo:
This chapter is a tutorial that teaches you how to design extended finite state machine (EFSM) test models for a system that you want to test. EFSM models are more powerful and expressive than simple finite state machine (FSM) models, and are one of the most commonly used styles of models for model-based testing, especially for embedded systems. There are many languages and notations in use for writing EFSM models, but in this tutorial we write our EFSM models in the familiar Java programming language. To generate tests from these EFSM models we use ModelJUnit, which is an open-source tool that supports several stochastic test generation algorithms, and we also show how to write your own model-based testing tool. We show how EFSM models can be used for unit testing and system testing of embedded systems, and for offline testing as well as online testing.
Resumo:
Background Accumulated biological research outcomes show that biological functions do not depend on individual genes, but on complex gene networks. Microarray data are widely used to cluster genes according to their expression levels across experimental conditions. However, functionally related genes generally do not show coherent expression across all conditions since any given cellular process is active only under a subset of conditions. Biclustering finds gene clusters that have similar expression levels across a subset of conditions. This paper proposes a seed-based algorithm that identifies coherent genes in an exhaustive, but efficient manner. Methods In order to find the biclusters in a gene expression dataset, we exhaustively select combinations of genes and conditions as seeds to create candidate bicluster tables. The tables have two columns: (a) a gene set, and (b) the conditions on which the gene set have dissimilar expression levels to the seed. First, the genes with less than the maximum number of dissimilar conditions are identified and a table of these genes is created. Second, the rows that have the same dissimilar conditions are grouped together. Third, the table is sorted in ascending order based on the number of dissimilar conditions. Finally, beginning with the first row of the table, a test is run repeatedly to determine whether the cardinality of the gene set in the row is greater than the minimum threshold number of genes in a bicluster. If so, a bicluster is outputted and the corresponding row is removed from the table. Repeating this process, all biclusters in the table are systematically identified until the table becomes empty. Conclusions This paper presents a novel biclustering algorithm for the identification of additive biclusters. Since it involves exhaustively testing combinations of genes and conditions, the additive biclusters can be found more readily.
Resumo:
Model-based testing (MBT) relies on models of a system under test and/or its environment to derive test cases for the system. This paper discusses the process of MBT and defines a taxonomy that covers the key aspects of MBT approaches. It is intended to help with understanding the characteristics, similarities and differences of those approaches, and with classifying the approach used in a particular MBT tool. To illustrate the taxonomy, a description of how three different examples of MBT tools fit into the taxonomy is provided.
Resumo:
Driving on an approach to a signalized intersection while distracted is particularly dangerous, as potential vehicular conflicts and resulting angle collisions tend to be severe. Given the prevalence and importance of this particular scenario, the decisions and actions of distracted drivers during the onset of yellow lights are the focus of this study. Driving simulator data were obtained from a sample of 58 drivers under baseline and handheld mobile phone conditions at the University of Iowa - National Advanced Driving Simulator. Explanatory variables included age, gender, cell phone use, distance to stop-line, and speed. Although there is extensive research on drivers’ responses to yellow traffic signals, the examination has been conducted from a traditional regression-based approach, which does not necessary provide the underlying relations and patterns among the sampled data. In this paper, we exploit the benefits of both classical statistical inference and data mining techniques to identify the a priori relationships among main effects, non-linearities, and interaction effects. Results suggest that novice (16-17 years) and young drivers’ (18-25 years) have heightened yellow light running risk while distracted by a cell phone conversation. Driver experience captured by age has a multiplicative effect with distraction, making the combined effect of being inexperienced and distracted particularly risky. Overall, distracted drivers across most tested groups tend to reduce the propensity of yellow light running as the distance to stop line increases, exhibiting risk compensation on a critical driving situation.
Resumo:
Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways from payment systems to assisting the lives of elderly or disabled people. Security threats for these devices become increasingly dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level. Therefore, third-party developers have the opportunity to develop kernel-based low-level security tools which is not normal for smartphone platforms. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS for example, holding the greatest market share among all smartphone OSs, was closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners� privacy. In this work, we present our current results in analyzing the security of Android smartphones with a focus on its Linux side. Our results are not limited to Android, they are also applicable to Linux-based smartphones such as OpenMoko Neo FreeRunner. Our contribution in this work is three-fold. First, we analyze android framework and the Linux-kernel to check security functionalities. We survey wellaccepted security mechanisms and tools which can increase device security. We provide descriptions on how to adopt these security tools on Android kernel, and provide their overhead analysis in terms of resource usage. As open smartphones are released and may increase their market share similar to Symbian, they may attract attention of malware writers. Therefore, our second contribution focuses on malware detection techniques at the kernel level. We test applicability of existing signature and intrusion detection methods in Android environment. We focus on monitoring events on the kernel; that is, identifying critical kernel, log file, file system and network activity events, and devising efficient mechanisms to monitor them in a resource limited environment. Our third contribution involves initial results of our malware detection mechanism basing on static function call analysis. We identified approximately 105 Executable and Linking Format (ELF) executables installed to the Linux side of Android. We perform a statistical analysis on the function calls used by these applications. The results of the analysis can be compared to newly installed applications for detecting significant differences. Additionally, certain function calls indicate malicious activity. Therefore, we present a simple decision tree for deciding the suspiciousness of the corresponding application. Our results present a first step towards detecting malicious applications on Android-based devices.
Resumo:
In wastewater treatment plants based on anaerobic digestion, supernatant and outflows from sludge dewatering systems contain significantly high amount of ammonium. Generally, these waters are returned to the head of wastewater treatment plant (WWTP), thereby increasing the total nitrogen load of the influent flow. Ammonium from these waters can be recovered and commercially utilised using novel ion-exchange materials. Mackinnon et al. have described an approach for removal and recovery of ammonium from side stream centrate returns obtained from anaerobic digester of a typical WWTP. Most of the ammonium from side streams can potentially be removed, which significantly reduces overall inlet demand at a WWTP. However, the extent of reduction achieved depends on the level of ammonium and flow-rate in the side stream. The exchange efficiency of the ion-exchange material, MesoLite, used in the ammonium recovery process deteriorates with long-term use due to mechanical degradation and use of regenerant. To ensure that a sustainable process is utilised a range of potential applications for this “spent” MesoLite have been evaluated. The primary focus of evaluations has been use of ammonium-loaded MesoLite as a source of nitrogen and growth medium for plants. A MesoLite fertiliser has advantage over soluble fertilisers in that N is held on an insoluble matrix and is gradually released according to exchange equilibria. Many conventional N fertilisers are water-soluble and thus, instantly release all applied N into the soil solution. Loss of nutrient commonly occurs through volatilisation and/or leaching. On average, up to half of the N delivered by a typical soluble fertiliser can be lost through these processes. In this context, use of ammonium-loaded MesoLite as a fertiliser has been evaluated using standard greenhouse and field-based experiments for low fertility soils. Rye grass, a suitable test species for greenhouse trials, was grown in 1kg pots over a period of several weeks with regular irrigation. Nitrogen was applied at a range of rates using a chemical fertiliser as a control and using two MesoLite fertilisers. All other nutrients were applied in adequate amounts. All treatments were replicated three times. Plants were harvested after four weeks, and dry plant mass and N concentrations were determined. At all nitrogen application rates, ammonium-loaded MesoLite produced higher plant mass than plants fertilised by the chemical fertiliser. The lower fertiliser effectiveness of the chemical fertliser is attributed to possible loss of some N through volatilisation. The MesoLite fertilisers did not show any adverse effect on availability of macro and trace nutrients, as shown by lack of deficiency symptoms, dry matter yield and plant analyses. Nitrogen loaded on to MesoLite in the form of exchanged ammonium is readily available to plants while remaining protected from losses via leaching and volatilisation. Spent MesoLite appears to be a suitable and effective fertiliser for a wide range of soils, particularly sandy soils with poor nutrient holding capacity.
Resumo:
Abstract. In recent years, sparse representation based classification(SRC) has received much attention in face recognition with multipletraining samples of each subject. However, it cannot be easily applied toa recognition task with insufficient training samples under uncontrolledenvironments. On the other hand, cohort normalization, as a way of mea-suring the degradation effect under challenging environments in relationto a pool of cohort samples, has been widely used in the area of biometricauthentication. In this paper, for the first time, we introduce cohort nor-malization to SRC-based face recognition with insufficient training sam-ples. Specifically, a user-specific cohort set is selected to normalize theraw residual, which is obtained from comparing the test sample with itssparse representations corresponding to the gallery subject, using poly-nomial regression. Experimental results on AR and FERET databases show that cohort normalization can bring SRC much robustness against various forms of degradation factors for undersampled face recognition.
Resumo:
PURPOSE: To test the reliability of Timed Up and Go Tests (TUGTs) in cardiac rehabilitation (CR) and compare TUGTs to the 6-Minute Walk Test (6MWT) for outcome measurement. METHODS: Sixty-one of 154 consecutive community-based CR patients were prospectively recruited. Subjects undertook repeated TUGTs and 6MWTs at the start of CR (start-CR), postdischarge from CR (post-CR), and 6 months postdischarge from CR (6 months post-CR). The main outcome measurements were TUGT time (TUGTT) and 6MWT distance (6MWD). RESULTS: Mean (SD) TUGTT1 and TUGTT2 at the 3 assessments were 6.29 (1.30) and 5.94 (1.20); 5.81 (1.22) and 5.53 (1.09); and 5.39 (1.60) and 5.01 (1.28) seconds, respectively. A reduction in TUGTT occurred between each outcome point (P ≤ .002). Repeated TUGTTs were strongly correlated at each assessment, intraclass correlation (95% CI) = 0.85 (0.76–0.91), 0.84 (0.73–0.91), and 0.90 (0.83–0.94), despite a reduction between TUGTT1 and TUGTT2 of 5%, 5%, and 7%, respectively (P ≤ .006). Relative decreases in TUGTT1 (TUGTT2) occurred from start-CR to post-CR and from start-CR to 6 months post-CR of −7.5% (−6.9%) and −14.2% (−15.5%), respectively, while relative increases in 6MWD1 (6MWD2) occurred, 5.1% (7.2%) and 8.4% (10.2%), respectively (P < .001 in all cases). Pearson correlation coefficients for 6MWD1 to TUGTT1 and TUGTT2 across all times were −0.60 and −0.68 (P < .001) and the intraclass correlations (95% CI) for the speeds derived from averaged 6MWDs and TUGTTs were 0.65 (0.54, 0.73) (P < .001). CONCLUSIONS: Similar relative changes occurred for the TUGT and the 6MWT in CR. A significant correlation between the TUGTT and 6MWD was demonstrated, and we suggest that the TUGT may provide a related or a supplementary measurement of functional capacity in CR.
Resumo:
The configuration of comprehensive Enterprise Systems to meet the specific requirements of an organisation up to today is consuming significant resources. The results of failing implementation projects are severe and may even threaten the organisation’s existence. This paper proposes a method which aims at increasing the efficiency of Enterprise Systems implementations. First, we argue that existing process modelling languages that feature different degrees of abstraction for different user groups exist and are used for different purposes which makes it necessary to integrate them. We describe how to do this using the meta models of the involved languages. Second, we motivate that an integrated process model based on the integrated meta model needs to be configurable and elaborate on the mechanisms by which this model configuration can be achieved. We introduce a business example using SAP modelling techniques to illustrate the proposed method.
Resumo:
Observational studies suggest that people with a high serum 25-hydroxyvitamin D (25(OH)D) concentration may have reduced risk of chronic diseases such as osteoporosis, multiple sclerosis, type 1 diabetes, cardiovascular disease, and some cancers. The AusD Study (A Quantitative Assessment of Solar UV Exposure for Vitamin D Synthesis in Australian Adults) was conducted to clarify the relationships between ultraviolet (UV) radiation exposure, dietary intake of vitamin D, and serum 25(OH)D concentration among Australian adults residing in Townsville (19.3°S), Brisbane (27.5°S), Canberra (35.3°S), and Hobart (42.8°S). Participants aged 18-75 years were recruited from the Australian Electoral Roll between 2009 and 2010. Measurements were made of height, weight, waist:hip ratio, skin, hair, and eye color, blood pressure, and grip strength. Participants completed a questionnaire on sun exposure and vitamin D intake, together with 10 days of personal UV dosimetry and an associated sun-exposure and physical-activity diary that was temporally linked to a blood test for measurement of 25(OH)D concentration. Ambient solar UV radiation was also monitored at all study sites. We collected comprehensive, high-quality data from 1,002 participants (459 males, 543 females) assessed simultaneously across a range of latitudes and through all seasons. Here we describe the scientific and methodological issues considered in designing the AusD Study.
Resumo:
This paper presents a comparative study to evaluate the usability of a tag-based interface alongside the present 'conventional' interface in the Australian mobile banking context. The tag-based interface is based on user-assigned tags to banking resources with support for different types of customization. And the conventional interface is based on standard HTML objects such as select boxes, lists, tables and etc, with limited customization. A total of 20 banking users evaluated both interfaces based on a set of tasks and completed a post-test usability questionnaire. Efficiency, effectiveness, and user satisfaction were considered to evaluate the usability of the interfaces. Results of the evaluation show improved usability in terms of user satisfaction with the tag-based interface compared to the conventional interface. This outcome is more apparent among participants without prior mobile banking experience. Therefore, there is a potential for the tag-based interface to improve user satisfaction of mobile banking and also positively affect the adoption and acceptance of mobile banking, particularly in Australia.
Resumo:
Context: Various epidemiological studies have estimated that up to 70% of runners sustain an overuse running injury each year. Although few overuse running injuries have an established cause, more than 80% of running-related injuries occur at or below the knee, which suggests that some common mechanisms may be at work. The question then becomes, are there common mechanisms related to overuse running injuries? Evidence Acquisition: Research studies were identified via the following electronic databases: MEDLINE, EMBASE PsycInfo, and CINAHL (1980–July 2008). Inclusion was based on evaluation of risk factors for overuse running injuries. Results: A majority of the risk factors that have been researched over the past few years can be generally categorized into 2 groups: atypical foot pronation mechanics and inadequate hip muscle stabilization. Conclusion: Based on the review of literature, there is no definitive link between atypical foot mechanics and running injury mechanisms. The lack of normative data and a definition of typical foot structure has hampered progress. In contrast, a large and growing body of literature suggests that weakness of hip-stabilizing muscles leads to atypical lower extremity mechanics and increased forces within the lower extremity while running.
Resumo:
Monitoring fetal wellbeing is a compelling problem in modern obstetrics. Clinicians have become increasingly aware of the link between fetal activity (movement), well-being, and later developmental outcome. We have recently developed an ambulatory accelerometer-based fetal activity monitor (AFAM) to record 24-hour fetal movement. Using this system, we aim at developing signal processing methods to automatically detect and quantitatively characterize fetal movements. The first step in this direction is to test the performance of the accelerometer in detecting fetal movement against real-time ultrasound imaging (taken as the gold standard). This paper reports first results of this performance analysis.
Resumo:
Introduction: There is a recognised relationship between dry weather conditions and increased risk of anterior cruciate ligament (ACL) injury. Previous studies have identified 28 day evaporation as an important weather-based predictor of non-contact ACL injuries in professional Australian Football League matches. The mechanism of non-contact injury to the ACL is believed to increased traction and impact forces between footwear and playing surface. Ground hardness and the amount and quality of grass are factors that would most likely influence this and are inturn, related to the soil moisture content and prevailing weather conditions. This paper explores the relationship between soil moisture content, preceding weather conditions and the Clegg Soil Impact Test (CSIT) which is an internationally recognised standard measure of ground hardness for sports fields. Methodology: The 2.25 kg Clegg Soil Impact Test and a pair of 12 cm soil moisture probes were used to measure ground hardness and percentage moisture content. Five football fields were surveyed at 13 prescribed sites just before seven football matches from October 2008 to January 2009 (an FC Women’s WLeague team). Weather conditions recorded at the nearest weather station were obtained from the Bureau of Meteorology website and total rainfall less evaporation was calculated for 7 and 28 days prior to each match. All non-contact injuries occurring during match play and their location on the field were recorded. Results/conclusions: Ground hardness varied between CSIT 5 and 17 (x10G) (8 is considered a good value for sports fields). Variations within fields were typically greatest in the centre and goal areas. Soil moisture ranged from 3 to 40% with some fields requiring twice the moisture content of others to maintain similar CSIT values. There was a non-linear, negative relationship for ground hardness versus moisture content and a linear relationship with weather (R2, of 0.30 and 0.34, respectively). Three non-contact ACL injuries occurred during the season. Two of these were associated with hard and variable ground conditions.