855 resultados para 010104 Combinatorics and Discrete Mathematics (excl. Physical Combinatorics)
Resumo:
The Tara Oceans Expedition (2009-2013) sampled the world oceans on board a 36 m long schooner, collecting environmental data and organisms from viruses to planktonic metazoans for later analyses using modern sequencing and state-of-the-art imaging technologies. Tara Oceans Data are particularly suited to study the genetic, morphological and functional diversity of plankton. The present data set includes properties of seawater, particulate matter and dissolved matter from physical, optical and imaging sensors mounted on a vertical sampling system (Rosette) used during the 2009-2013 tara Oceans Expedition. It comprised 2 pairs of conductivity and temperature sensors (SEABIRD components), and a complete set of WEtLabs optical sensors, including chrorophyll and CDOM fluorometers, a 25 cm transmissiometer, and a one-wavelength backscatter meter. In addition, a SATLANTIC ISUS nitrate sensor and a Hydroptic Underwater Vision Profiler (UVP) were mounted on the rosette. In the Arctic Ocean and Arctic Seas (2013), a second oxygen sensor (SBE43) and a four frequency Aquascat acoustic profiler were added. The system was powered on specific Li-Ion batteries and data were self-recorded at 24HZ. Sensors have all been factory calibrated before, during and after the four year program. Oxygen was validated using climatologies (WOA09). Nitrate and Fluorescence data were adjusted with discrete measurements from Niskin bottles mounted on the Rosette, and optical darks were performed monthly on board. A total of 839 quality checked vertical profiles were made during the tara Oceans expedition 2009-2013.
Resumo:
The Tara Oceans Expedition (2009-2013) sampled the world oceans on board a 36 m long schooner, collecting environmental data and organisms from viruses to planktonic metazoans for later analyses using modern sequencing and state-of-the-art imaging technologies. Tara Oceans Data are particularly suited to study the genetic, morphological and functional diversity of plankton. The present data set includes properties of seawater, particulate matter and dissolved matter from physical, optical and imaging sensors mounted on a vertical sampling system (Rosette) used during the 2009-2013 tara Oceans Expedition. It comprised 2 pairs of conductivity and temperature sensors (SEABIRD components), and a complete set of WEtLabs optical sensors, including chrorophyll and CDOM fluorometers, a 25 cm transmissiometer, and a one-wavelength backscatter meter. In addition, a SATLANTIC ISUS nitrate sensor and a Hydroptic Underwater Vision Profiler (UVP) were mounted on the rosette. In the Arctic Ocean and Arctic Seas (2013), a second oxygen sensor (SBE43) and a four frequency Aquascat acoustic profiler were added. The system was powered on specific Li-Ion batteries and data were self-recorded at 24HZ. Sensors have all been factory calibrated before, during and after the four year program. Oxygen was validated using climatologies (WOA09). Nitrate and Fluorescence data were adjusted with discrete measurements from Niskin bottles mounted on the Rosette, and optical darks were performed monthly on board. A total of 839 quality checked vertical profiles were made during the tara Oceans expedition 2009-2013.
Resumo:
The Tara Oceans Expedition (2009-2013) sampled the world oceans on board a 36 m long schooner, collecting environmental data and organisms from viruses to planktonic metazoans for later analyses using modern sequencing and state-of-the-art imaging technologies. Tara Oceans Data are particularly suited to study the genetic, morphological and functional diversity of plankton. The present data set includes properties of seawater, particulate matter and dissolved matter from physical, optical and imaging sensors mounted on a vertical sampling system (Rosette) used during the 2009-2013 tara Oceans Expedition. It comprised 2 pairs of conductivity and temperature sensors (SEABIRD components), and a complete set of WEtLabs optical sensors, including chrorophyll and CDOM fluorometers, a 25 cm transmissiometer, and a one-wavelength backscatter meter. In addition, a SATLANTIC ISUS nitrate sensor and a Hydroptic Underwater Vision Profiler (UVP) were mounted on the rosette. In the Arctic Ocean and Arctic Seas (2013), a second oxygen sensor (SBE43) and a four frequency Aquascat acoustic profiler were added. The system was powered on specific Li-Ion batteries and data were self-recorded at 24HZ. Sensors have all been factory calibrated before, during and after the four year program. Oxygen was validated using climatologies (WOA09). Nitrate and Fluorescence data were adjusted with discrete measurements from Niskin bottles mounted on the Rosette, and optical darks were performed monthly on board. A total of 839 quality checked vertical profiles were made during the tara Oceans expedition 2009-2013.
Resumo:
The Tara Oceans Expedition (2009-2013) sampled the world oceans on board a 36 m long schooner, collecting environmental data and organisms from viruses to planktonic metazoans for later analyses using modern sequencing and state-of-the-art imaging technologies. Tara Oceans Data are particularly suited to study the genetic, morphological and functional diversity of plankton. The present data set includes properties of seawater, particulate matter and dissolved matter from physical, optical and imaging sensors mounted on a vertical sampling system (Rosette) used during the 2009-2013 tara Oceans Expedition. It comprised 2 pairs of conductivity and temperature sensors (SEABIRD components), and a complete set of WEtLabs optical sensors, including chrorophyll and CDOM fluorometers, a 25 cm transmissiometer, and a one-wavelength backscatter meter. In addition, a SATLANTIC ISUS nitrate sensor and a Hydroptic Underwater Vision Profiler (UVP) were mounted on the rosette. In the Arctic Ocean and Arctic Seas (2013), a second oxygen sensor (SBE43) and a four frequency Aquascat acoustic profiler were added. The system was powered on specific Li-Ion batteries and data were self-recorded at 24HZ. Sensors have all been factory calibrated before, during and after the four year program. Oxygen was validated using climatologies (WOA09). Nitrate and Fluorescence data were adjusted with discrete measurements from Niskin bottles mounted on the Rosette, and optical darks were performed monthly on board. A total of 839 quality checked vertical profiles were made during the tara Oceans expedition 2009-2013.
Resumo:
Background
Increasing physical activity in the workplace can provide employee physical and mental health benefits, and employer economic benefits through reduced absenteeism and increased productivity. The workplace is an opportune setting to encourage habitual activity. However, there is limited evidence on effective behaviour change interventions that lead to maintained physical activity. This study aims to address this gap and help build the necessary evidence base for effective, and cost-effective, workplace interventions
Methods/design
This cluster randomised control trial will recruit 776 office-based employees from public sector organisations in Belfast and Lisburn city centres, Northern Ireland. Participants will be randomly allocated by cluster to either the Intervention Group or Control Group (waiting list control). The 6-month intervention consists of rewards (retail vouchers, based on similar principles to high street loyalty cards), feedback and other evidence-based behaviour change techniques. Sensors situated in the vicinity of participating workplaces will promote and monitor minutes of physical activity undertaken by participants. Both groups will complete all outcome measures. The primary outcome is steps per day recorded using a pedometer (Yamax Digiwalker CW-701) for 7 consecutive days at baseline, 6, 12 and 18 months. Secondary outcomes include health, mental wellbeing, quality of life, work absenteeism and presenteeism, and use of healthcare resources. Process measures will assess intervention “dose”, website usage, and intervention fidelity. An economic evaluation will be conducted from the National Health Service, employer and retailer perspective using both a cost-utility and cost-effectiveness framework. The inclusion of a discrete choice experiment will further generate values for a cost-benefit analysis. Participant focus groups will explore who the intervention worked for and why, and interviews with retailers will elucidate their views on the sustainability of a public health focused loyalty card scheme.
Discussion
The study is designed to maximise the potential for roll-out in similar settings, by engaging the public sector and business community in designing and delivering the intervention. We have developed a sustainable business model using a ‘points’ based loyalty platform, whereby local businesses ‘sponsor’ the incentive (retail vouchers) in return for increased footfall to their business.
Resumo:
The structures of the anhydrous 1:1 proton-transfer compounds of 4,5-dichlorophthalic acid (DCPA) with the monocyclic heteroaromatic Lewis bases 2-aminopyrimidine, 3-(aminocarboxy) pyridine (nicotinamide) and 4-(aminocarbonyl) pyridine (isonicotinamide), namely 2-aminopyrimidinium 2-carboxy-4,5-dichlorobenzoate C4H6N3+ C8H3Cl2O4- (I), 3-(aminocarbonyl) pyridinium 2-carboxy-4,5-dichlorobenzoate C6H7N2O+ C8H3Cl2O4- (II) and the unusual salt adduct 4-(aminocarbonyl) pyridinium 2-carboxy-4,5-dichlorobenzoate 2-carboxymethyl-4,5-dichlorobenzoic acid (1/1/1) C6H7N2O+ C8H3Cl2O4-.C9H6Cl2O4 (III) have been determined at 130 K. Compound (I) forms discrete centrosymmetric hydrogen-bonded cyclic bis(cation--anion) units having both R2/2(8) and R2/1(4) N-H...O interactions. In compound (II) the primary N-H...O linked cation--anion units are extended into a two-dimensional sheet structure via amide-carboxyl and amide-carbonyl N-H...O interactions. The structure of (III) reveals the presence of an unusual and unexpected self-synthesized methyl monoester of the acid as an adduct molecule giving one-dimensional hydrogen-bonded chains. In all three structures the hydrogen phthalate anions are
Resumo:
Privacy enhancing protocols (PEPs) are a family of protocols that allow secure exchange and management of sensitive user information. They are important in preserving users’ privacy in today’s open environment. Proof of the correctness of PEPs is necessary before they can be deployed. However, the traditional provable security approach, though well established for verifying cryptographic primitives, is not applicable to PEPs. We apply the formal method of Coloured Petri Nets (CPNs) to construct an executable specification of a representative PEP, namely the Private Information Escrow Bound to Multiple Conditions Protocol (PIEMCP). Formal semantics of the CPN specification allow us to reason about various security properties of PIEMCP using state space analysis techniques. This investigation provides us with preliminary insights for modeling and verification of PEPs in general, demonstrating the benefit of applying the CPN-based formal approach to proving the correctness of PEPs.
Resumo:
Any theory of thinking or teaching or learning rests on an underlying philosophy of knowledge. Mathematics education is situated at the nexus of two fields of inquiry, namely mathematics and education. However, numerous other disciplines interact with these two fields which compound the complexity of developing theories that define mathematics education. We first address the issue of clarifying a philosophy of mathematics education before attempting to answer whether theories of mathematics education are constructible? In doing so we draw on the foundational writings of Lincoln and Guba (1994), in which they clearly posit that any discipline within education, in our case mathematics education, needs to clarify for itself the following questions: (1) What is reality? Or what is the nature of the world around us? (2) How do we go about knowing the world around us? [the methodological question, which presents possibilities to various disciplines to develop methodological paradigms] and, (3) How can we be certain in the “truth” of what we know? [the epistemological question]
Resumo:
Background: In order to design appropriate environments for performance and learning of movement skills, physical educators need a sound theoretical model of the learner and of processes of learning. In physical education, this type of modelling informs the organization of learning environments and effective and efficient use of practice time. An emerging theoretical framework in motor learning, relevant to physical education, advocates a constraints-led perspective for acquisition of movement skills and game play knowledge. This framework shows how physical educators could use task, performer and environmental constraints to channel acquisition of movement skills and decision making behaviours in learners. From this viewpoint, learners generate specific movement solutions to satisfy the unique combination of constraints imposed on them, a process which can be harnessed during physical education lessons. Purpose: In this paper the aim is to provide an overview of the motor learning approach emanating from the constraints-led perspective, and examine how it can substantiate a platform for a new pedagogical framework in physical education: nonlinear pedagogy. We aim to demonstrate that it is only through theoretically valid and objective empirical work of an applied nature that a conceptually sound nonlinear pedagogy model can continue to evolve and support research in physical education. We present some important implications for designing practices in games lessons, showing how a constraints-led perspective on motor learning could assist physical educators in understanding how to structure learning experiences for learners at different stages, with specific focus on understanding the design of games teaching programmes in physical education, using exemplars from Rugby Union and Cricket. Findings: Research evidence from recent studies examining movement models demonstrates that physical education teachers need a strong understanding of sport performance so that task constraints can be manipulated so that information-movement couplings are maintained in a learning environment that is representative of real performance situations. Physical educators should also understand that movement variability may not necessarily be detrimental to learning and could be an important phenomenon prior to the acquisition of a stable and functional movement pattern. We highlight how the nonlinear pedagogical approach is student-centred and empowers individuals to become active learners via a more hands-off approach to learning. Summary: A constraints-based perspective has the potential to provide physical educators with a framework for understanding how performer, task and environmental constraints shape each individual‟s physical education. Understanding the underlying neurobiological processes present in a constraints-led perspective to skill acquisition and game play can raise awareness of physical educators that teaching is a dynamic 'art' interwoven with the 'science' of motor learning theories.
Resumo:
The obesity epidemic is a global trend and is of particular concern in children. Recent reports have highlighted the severity of obesity in children by suggesting: “today's generation of children will be the first for over a century for whom life expectancy falls.” This review assesses the evidence that identifies the important role of physical activity in the growth, development and physical health of young people, owing to its numerous physical and psychological health benefits. Key issues, such as “does a sedentary lifestyle automatically lead to obesity” and “are levels of physical activity in today's children less than physical activity levels in children from previous generations?”, are also discussed. Today's environment enforces an inactive lifestyle that is likely to contribute to a positive energy balance and childhood obesity. Whether a child or adolescent, the evidence is conclusive that physical activity is conducive to a healthy lifestyle and prevention of disease. Habitual physical activity established during the early years may provide the greatest likelihood of impact on mortality and longevity. It is evident that environmental factors need to change if physical activity strategies are to have a significant impact on increasing habitual physical activity levels in children and adolescents. There is also a need for more evidence-based physical activity guidelines for children of all ages. Efforts should be concentrated on facilitating an active lifestyle for children in an attempt to put a stop to the increasing prevalence of obese children
Resumo:
We present a novel approach for preprocessing systems of polynomial equations via graph partitioning. The variable-sharing graph of a system of polynomial equations is defined. If such graph is disconnected, then the corresponding system of equations can be split into smaller ones that can be solved individually. This can provide a tremendous speed-up in computing the solution to the system, but is unlikely to occur either randomly or in applications. However, by deleting certain vertices on the graph, the variable-sharing graph could be disconnected in a balanced fashion, and in turn the system of polynomial equations would be separated into smaller systems of near-equal sizes. In graph theory terms, this process is equivalent to finding balanced vertex partitions with minimum-weight vertex separators. The techniques of finding these vertex partitions are discussed, and experiments are performed to evaluate its practicality for general graphs and systems of polynomial equations. Applications of this approach in algebraic cryptanalysis on symmetric ciphers are presented: For the QUAD family of stream ciphers, we show how a malicious party can manufacture conforming systems that can be easily broken. For the stream ciphers Bivium and Trivium, we nachieve significant speedups in algebraic attacks against them, mainly in a partial key guess scenario. In each of these cases, the systems of polynomial equations involved are well-suited to our graph partitioning method. These results may open a new avenue for evaluating the security of symmetric ciphers against algebraic attacks.
Resumo:
Objective: To examine the prospective dose–response relationships between both leisure-time physical activity (LTPA) and walking with self-reported arthritis in older women. Design, setting and participants: Data came from women aged 73–78 years who completed mailed surveys in 1999, 2002 and 2005 for the Australian Longitudinal Study on Women’s Health. Women reported their weekly minutes of walking and moderate to vigorous physical activities. They also reported on whether they had been diagnosed with, or treated for, arthritis since the previous survey. General estimating equation analyses were performed to examine the longitudinal relationship between LTPA and arthritis and, for women who reported walking as their only physical activity, the longitudinal relationship between walking and arthritis. Women who reported arthritis or a limited ability to walk in 1999 were excluded, resulting in data from 3613 women eligible for inclusion in these analyses. Main results: ORs for self-reported arthritis were lowest for women who reported “moderate” levels of LTPA (OR 0.78; 95% CI 0.67 to 0.92), equivalent to 75 to <150 minutes of moderate-intensity LTPA per week. Slightly higher odds ratios were found for women who reported “high” (OR 0.81; 95% CI 0.69 to 0.95) or “very high” (OR 0.84; 95% CI 0.72 to 0.98) LTPA levels, indicating no further benefit from increased activity. For women whose only activity was walking, an inverse dose–response relationship between walking and arthritis was seen. Conclusions: The results support an inverse association between both LTPA and walking with self-reported arthritis over 6 years in older women who are able to walk.
Resumo:
In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least theoretically, join various types of IMSs to make them interoperable and give users the illusion that they are interacting with just one IMS. However, due to the complexity of an IMS, attempting to join various types of IMSs is a technically challenging task, let alone assessing how well an IMetS manages to integrate these IMSs. The first contribution of this thesis is the development of a generic IMS model called the Layered Identity Infrastructure Model (LIIM). Using this model, we develop a set of properties that an ideal IMetS should provide. This idealized form is then used as a benchmark to evaluate existing IMetSs. Different types of IMS provide varying levels of privacy protection support. Unfortunately, as observed by Jøsang et al (2007), there is insufficient privacy protection in many of the existing IMSs. In this thesis, we study and extend a type of privacy enhancing technology known as an Anonymous Credential System (ACS). In particular, we extend the ACS which is built on the cryptographic primitives proposed by Camenisch, Lysyanskaya, and Shoup. We call this system the Camenisch, Lysyanskaya, Shoup - Anonymous Credential System (CLS-ACS). The goal of CLS-ACS is to let users be as anonymous as possible. Unfortunately, CLS-ACS has problems, including (1) the concentration of power to a single entity - known as the Anonymity Revocation Manager (ARM) - who, if malicious, can trivially reveal a user’s PII (resulting in an illegal revocation of the user’s anonymity), and (2) poor performance due to the resource-intensive cryptographic operations required. The second and third contributions of this thesis are the proposal of two protocols that reduce the trust dependencies on the ARM during users’ anonymity revocation. Both protocols distribute trust from the ARM to a set of n referees (n > 1), resulting in a significant reduction of the probability of an anonymity revocation being performed illegally. The first protocol, called the User Centric Anonymity Revocation Protocol (UCARP), allows a user’s anonymity to be revoked in a user-centric manner (that is, the user is aware that his/her anonymity is about to be revoked). The second protocol, called the Anonymity Revocation Protocol with Re-encryption (ARPR), allows a user’s anonymity to be revoked by a service provider in an accountable manner (that is, there is a clear mechanism to determine which entity who can eventually learn - and possibly misuse - the identity of the user). The fourth contribution of this thesis is the proposal of a protocol called the Private Information Escrow bound to Multiple Conditions Protocol (PIEMCP). This protocol is designed to address the performance issue of CLS-ACS by applying the CLS-ACS in a federated single sign-on (FSSO) environment. Our analysis shows that PIEMCP can both reduce the amount of expensive modular exponentiation operations required and lower the risk of illegal revocation of users’ anonymity. Finally, the protocols proposed in this thesis are complex and need to be formally evaluated to ensure that their required security properties are satisfied. In this thesis, we use Coloured Petri nets (CPNs) and its corresponding state space analysis techniques. All of the protocols proposed in this thesis have been formally modeled and verified using these formal techniques. Therefore, the fifth contribution of this thesis is a demonstration of the applicability of CPN and its corresponding analysis techniques in modeling and verifying privacy enhancing protocols. To our knowledge, this is the first time that CPN has been comprehensively applied to model and verify privacy enhancing protocols. From our experience, we also propose several CPN modeling approaches, including complex cryptographic primitives (such as zero-knowledge proof protocol) modeling, attack parameterization, and others. The proposed approaches can be applied to other security protocols, not just privacy enhancing protocols.