947 resultados para missing


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The dual path of insertion concept for removable partial denture (RPD) design may be used in esthetically demanding situations. When compared to conventional RPDs, the main advantage of this design is the minimal use of clasps. This clinical report describes the treatment of a patient with an anterior maxillary edentulous area using a dual path RPD. The diagnostic cast was surveyed to ensure the adequacy of the undercuts on the mesial surfaces of the anterior abutments, where rigid minor connectors were placed. Inverted V-shaped canine cingulum rest seats were prepared to provide resistance to tooth movement during function. The dual path RPD concept allows excellent esthetic results, minimizes tooth preparation, and reduces the tendency toward plaque accumulation in a Kennedy class IV partially edentulous arch.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Abstract

Continuous variable is one of the major data types collected by the survey organizations. It can be incomplete such that the data collectors need to fill in the missingness. Or, it can contain sensitive information which needs protection from re-identification. One of the approaches to protect continuous microdata is to sum them up according to different cells of features. In this thesis, I represents novel methods of multiple imputation (MI) that can be applied to impute missing values and synthesize confidential values for continuous and magnitude data.

The first method is for limiting the disclosure risk of the continuous microdata whose marginal sums are fixed. The motivation for developing such a method comes from the magnitude tables of non-negative integer values in economic surveys. I present approaches based on a mixture of Poisson distributions to describe the multivariate distribution so that the marginals of the synthetic data are guaranteed to sum to the original totals. At the same time, I present methods for assessing disclosure risks in releasing such synthetic magnitude microdata. The illustration on a survey of manufacturing establishments shows that the disclosure risks are low while the information loss is acceptable.

The second method is for releasing synthetic continuous micro data by a nonstandard MI method. Traditionally, MI fits a model on the confidential values and then generates multiple synthetic datasets from this model. Its disclosure risk tends to be high, especially when the original data contain extreme values. I present a nonstandard MI approach conditioned on the protective intervals. Its basic idea is to estimate the model parameters from these intervals rather than the confidential values. The encouraging results of simple simulation studies suggest the potential of this new approach in limiting the posterior disclosure risk.

The third method is for imputing missing values in continuous and categorical variables. It is extended from a hierarchically coupled mixture model with local dependence. However, the new method separates the variables into non-focused (e.g., almost-fully-observed) and focused (e.g., missing-a-lot) ones. The sub-model structure of focused variables is more complex than that of non-focused ones. At the same time, their cluster indicators are linked together by tensor factorization and the focused continuous variables depend locally on non-focused values. The model properties suggest that moving the strongly associated non-focused variables to the side of focused ones can help to improve estimation accuracy, which is examined by several simulation studies. And this method is applied to data from the American Community Survey.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Estimates of HIV prevalence are important for policy in order to establish the health status of a country's population and to evaluate the effectiveness of population-based interventions and campaigns. However, participation rates in testing for surveillance conducted as part of household surveys, on which many of these estimates are based, can be low. HIV positive individuals may be less likely to participate because they fear disclosure, in which case estimates obtained using conventional approaches to deal with missing data, such as imputation-based methods, will be biased. We develop a Heckman-type simultaneous equation approach which accounts for non-ignorable selection, but unlike previous implementations, allows for spatial dependence and does not impose a homogeneous selection process on all respondents. In addition, our framework addresses the issue of separation, where for instance some factors are severely unbalanced and highly predictive of the response, which would ordinarily prevent model convergence. Estimation is carried out within a penalized likelihood framework where smoothing is achieved using a parametrization of the smoothing criterion which makes estimation more stable and efficient. We provide the software for straightforward implementation of the proposed approach, and apply our methodology to estimating national and sub-national HIV prevalence in Swaziland, Zimbabwe and Zambia.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

After years of deliberation, the EU commission sped up the reform process of a common EU digital policy considerably in 2015 by launching the EU digital single market strategy. In particular, two core initiatives of the strategy were agreed upon: General Data Protection Regulation and the Network and Information Security (NIS) Directive law texts. A new initiative was additionally launched addressing the role of online platforms. This paper focuses on the platform privacy rationale behind the data protection legislation, primarily based on the proposal for a new EU wide General Data Protection Regulation. We analyse the legislation rationale from an Information System perspective to understand the role user data plays in creating platforms that we identify as “processing silos”. Generative digital infrastructure theories are used to explain the innovative mechanisms that are thought to govern the notion of digitalization and successful business models that are affected by digitalization. We foresee continued judicial data protection challenges with the now proposed Regulation as the adoption of the “Internet of Things” continues. The findings of this paper illustrate that many of the existing issues can be addressed through legislation from a platform perspective. We conclude by proposing three modifications to the governing rationale, which would not only improve platform privacy for the data subject, but also entrepreneurial efforts in developing intelligent service platforms. The first modification is aimed at improving service differentiation on platforms by lessening the ability of incumbent global actors to lock-in the user base to their service/platform. The second modification posits limiting the current unwanted tracking ability of syndicates, by separation of authentication and data store services from any processing entity. Thirdly, we propose a change in terms of how security and data protection policies are reviewed, suggesting a third party auditing procedure.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Resources created at the University of Southampton for the module Remote Sensing for Earth Observation

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Abstract: In the mid-1990s when I worked for a telecommunications giant I struggled to gain access to basic geodemographic data. It cost hundreds of thousands of dollars at the time to simply purchase a tile of satellite imagery from Marconi, and it was often cheaper to create my own maps using a digitizer and A0 paper maps. Everything from granular administrative boundaries to right-of-ways to points of interest and geocoding capabilities were either unavailable for the places I was working in throughout Asia or very limited. The control of this data was either in a government’s census and statistical bureau or was created by a handful of forward thinking corporations. Twenty years on we find ourselves inundated with data (location and other) that we are challenged to amalgamate, and much of it still “dirty” in nature. Open data initiatives such as ODI give us great hope for how we might be able to share information together and capitalize not only in the crowdsourcing behavior but in the implications for positive usage for the environment and for the advancement of humanity. We are already gathering and amassing a great deal of data and insight through excellent citizen science participatory projects across the globe. In early 2015, I delivered a keynote at the Data Made Me Do It conference at UC Berkeley, and in the preceding year an invited talk at the inaugural QSymposium. In gathering research for these presentations, I began to ponder on the effect that social machines (in effect, autonomous data collection subjects and objects) might have on social behaviors. I focused on studying the problem of data from various veillance perspectives, with an emphasis on the shortcomings of uberveillance which included the potential for misinformation, misinterpretation, and information manipulation when context was entirely missing. As we build advanced systems that rely almost entirely on social machines, we need to ponder on the risks associated with following a purely technocratic approach where machines devoid of intelligence may one day dictate what humans do at the fundamental praxis level. What might be the fallout of uberveillance? Bio: Dr Katina Michael is a professor in the School of Computing and Information Technology at the University of Wollongong. She presently holds the position of Associate Dean – International in the Faculty of Engineering and Information Sciences. Katina is the IEEE Technology and Society Magazine editor-in-chief, and IEEE Consumer Electronics Magazine senior editor. Since 2008 she has been a board member of the Australian Privacy Foundation, and until recently was the Vice-Chair. Michael researches on the socio-ethical implications of emerging technologies with an emphasis on an all-hazards approach to national security. She has written and edited six books, guest edited numerous special issue journals on themes related to radio-frequency identification (RFID) tags, supply chain management, location-based services, innovation and surveillance/ uberveillance for Proceedings of the IEEE, Computer and IEEE Potentials. Prior to academia, Katina worked for Nortel Networks as a senior network engineer in Asia, and also in information systems for OTIS and Andersen Consulting. She holds cross-disciplinary qualifications in technology and law.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There is a limited amount of research in the area of missing persons, especially adults. The aim of this research is to expand on the understanding of missing people, by examining adults' behaviours while missing and determining if distinct behavioural themes exist. Based on previous literature it was hypothesised that three behavioural themes will be present; dysfunctional, escape, and unintentional. Thirty-six behaviours were coded from 362 missing person police reports and analysed using smallest space analysis (SSA). This produced a spatial representation of the behaviours, showing three distinct behavioural themes. Seventy percent of the adult missing person reports were classified under one dominant theme, 41% were ‘unintentional’, 18% were ‘dysfunctional’, and 11% were ‘escape’. The relationship between a missing person's dominant behavioural theme and their assigned risk level and demographic characteristics were also analysed. A significant association was found between the age, occupational status, whether they had any mental health issues, and the risk level assigned to the missing person; and their dominant behavioural theme. The findings are the first step in the development of a standardised checklist for a missing person investigation. This has implications on how practitioners prioritise missing adults, and interventions to prevent individuals from going missing. Copyright © 2016 John Wiley & Sons, Ltd.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Adobe's Acrobat software, released in June 1993, is based around a new Portable Document Format (PDF) which offers the possibility of being able to view and exchange electronic documents, independent of the originating software, across a wide variety of supported hardware platforms (PC, Macintosh, Sun UNIX etc.). The fact that the imageable objects are rendered with full use of Level 2 PostScript means that the most demanding requirements can be met in terms of high-quality typography, device-independent colour and full page fidelity with respect to the printed version. PDF possesses an internal structure which supports hypertextual features, and a range of file compression options. In a sense PDF establishes a low-level multiplatform machine code for imageable objects but its notion of hypertext buttons and links is similarly low-level , in that they are anchored to physical locations on xed pages. However, many other hypertext systems think of links as potentially spanning multiple files, which may in turn be located on various machines scattered across the Internet. The immediate challenge is to bridge the "abstraction gap" between high-level notions of a link and PDF's positionally-anchored low-level view. More specifically, how can Mosaic, WWW and Acrobat/PDF be configured so that the notions of "link ", in the various systems, work together harmoniously? This paper reviews progress so far on the CAJUN project (CD-ROM Acrobat Journals Using Networks) with particular reference to experiments that have already taken place in disseminating PDF via e-mail, Gopher and FTP. The prospects for integrating Acrobat seamlessly with WWW are then discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The singular life and curious biographies of Mary Carleton.--The Carleton publications of 1663.--The minor publications of 1673.--"The counterfeit lady," a fiction.--The narrative technique of "The counterfeit lady."--The historical significance of "The counterfeit lady."--The current doctrine of the rise of the English novel.--Bibliographical difficulties.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A commissioned article for the Conversation website on the innovative publishing platform Medium and a comparison with other established social media sites.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

My dissertation presented seven violin concertos in three recital programs. Three of these concertos are acknowledged masterpieces performed in established concert venues throughout the world. They are the concertos of Mozart, Beethoven and Tchaikovsky. The other four are less standard and are composed by Viotti, Kreutzer, Rode and Spohr. These less standard concertos were popular during their time yet they seem not to have stood the test of time. A curriculum devoted exclusively to the standard concertos creates problems for the young violinist. The Mozart violin concertos are often the first standard concertos that the young violin student encounters. They are considered to be the least technically demanding of the standard concertos. The next most advanced standard concertos that the student will usually encounter are Bruch’s G minor concerto, Wieniawski’s D minor concerto and Barber’s concerto. The trouble is that the work on Mozart concertos does not adequately prepare a student for the next most advanced standard concerto. There is a discontinuous leap in the progression of technical difficulty between the Mozart concertos and the next most advanced concertos. Likewise the standard concerto repertoire provides no smooth historical or stylistic progression between the Mozart concertos and the next most advanced concertos. If the young violinist is limited to the standard repertoire then she has no smooth progression either technical, historical or stylistic. I seek to demonstrate that, by adding concertos of Spohr, Viotti, Kreutzer, and Rode to the standard violin curriculum, one could remedy this problem. The first and third recitals were performed in the Gildenhorn Recital Hall and the second recital in the School of Music’s Smith Lecture Hall, both at the University of Maryland. All three recitals can be found in the Digital Repository at the University of Maryland (DRUM).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

International audience

Relevância:

20.00% 20.00%

Publicador:

Resumo:

ABSTRACT Researchers frequently have to analyze scales in which some participants have failed to respond to some items. In this paper we focus on the exploratory factor analysis of multidimensional scales (i.e., scales that consist of a number of subscales) where each subscale is made up of a number of Likert-type items, and the aim of the analysis is to estimate participants' scores on the corresponding latent traits. We propose a new approach to deal with missing responses in such a situation that is based on (1) multiple imputation of non-responses and (2) simultaneous rotation of the imputed datasets. We applied the approach in a real dataset where missing responses were artificially introduced following a real pattern of non-responses, and a simulation study based on artificial datasets. The results show that our approach (specifically, Hot-Deck multiple imputation followed of Consensus Promin rotation) was able to successfully compute factor score estimates even for participants that have missing data.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Desertomycin A is an aminopolyol polyketide containing a macrolactone ring. We have proposed that desertomycin A and similar compounds (marginolactones) are formed by polyketide synthases primed not with gamma-aminobutanoyl-CoA but with 4-guanidinylbutanoyl-CoA, to avoid facile cyclization of the starter unit. This hypothesis requires that there be a final-stage de-amidination of the corresponding guanidino-substituted natural product, but no enzyme for such a process has been described. We have now identified candidate amidinohydrolase genes within the desertomycin and primycin clusters. Deletion of the putative desertomycin amidinohydrolase gene dstH in Streptomyces macronensis led to the accumulation of desertomycin B, the guanidino form of the antibiotic. Also, purified DstH efficiently catalyzed the in vitro conversion of desertomycin B into the A form. Hence this amidinohydrolase furnishes the missing link in this proposed naturally evolved example of protective-group chemistry.