949 resultados para Proof.
Resumo:
This work was a interactive object piece that was installed at West Space as part of the 'Conceted Efforts' exhibition. Three clipboards hosted a petition addressed to Australian Museum Directors urging them to accept this artist card in lieu of payment when artists visit their institution, a list of potential elements of proof of position as an Australian artist, and an example of the artist card. The work explored the potential for collaboration between artists and institutions and explored the value of artists in the contemporary art world.
Resumo:
Lattice-based cryptographic primitives are believed to offer resilience against attacks by quantum computers. We demonstrate the practicality of post-quantum key exchange by constructing cipher suites for the Transport Layer Security (TLS) protocol that provide key exchange based on the ring learning with errors (R-LWE) problem, we accompany these cipher suites with a rigorous proof of security. Our approach ties lattice-based key exchange together with traditional authentication using RSA or elliptic curve digital signatures: the post-quantum key exchange provides forward secrecy against future quantum attackers, while authentication can be provided using RSA keys that are issued by today's commercial certificate authorities, smoothing the path to adoption. Our cryptographically secure implementation, aimed at the 128-bit security level, reveals that the performance price when switching from non-quantum-safe key exchange is not too high. With our R-LWE cipher suites integrated into the Open SSL library and using the Apache web server on a 2-core desktop computer, we could serve 506 RLWE-ECDSA-AES128-GCM-SHA256 HTTPS connections per second for a 10 KiB payload. Compared to elliptic curve Diffie-Hellman, this means an 8 KiB increased handshake size and a reduction in throughput of only 21%. This demonstrates that provably secure post-quantum key-exchange can already be considered practical.
Resumo:
This study reports on an original concept of additive manufacturing for the fabrication of tissue engineered constructs (TEC), offering the possibility of concomitantly manufacturing a customized scaffold and a bioreactor chamber to any size and shape. As a proof of concept towards the development of anatomically relevant TECs, this concept was utilized for the design and fabrication of a highly porous sheep tibia scaffold around which a bioreactor chamber of similar shape was simultaneously built. The morphology of the bioreactor/scaffold device was investigated by micro-computed tomography and scanning electron microscopy confirming the porous architecture of the sheep tibiae as opposed to the non-porous nature of the bioreactor chamber. Additionally, this study demonstrates that both the shape, as well as the inner architecture of the device can significantly impact the perfusion of fluid within the scaffold architecture. Indeed, fluid flow modelling revealed that this was of significant importance for controlling the nutrition flow pattern within the scaffold and the bioreactor chamber, avoiding the formation of stagnant flow regions detrimental for in vitro tissue development. The bioreactor/scaffold device was dynamically seeded with human primary osteoblasts and cultured under bi-directional perfusion for two and six weeks. Primary human osteoblasts were observed homogenously distributed throughout the scaffold, and were viable for the six week culture period. This work demonstrates a novel application for additive manufacturing in the development of scaffolds and bioreactors. Given the intrinsic flexibility of the additive manufacturing technology platform developed, more complex culture systems can be fabricated which would contribute to the advances in customized and patient-specific tissue engineering strategies for a wide range of applications.
Resumo:
Background Over the last two decades, Transcutaneous Bone-Anchored Prosthesis (TCBAP) has proven to be an effective alternative for prosthetic attachment for amputees, particularly for individuals unable to wear a socket. [1-17] However, the load transmitted through a typical TCBAP to the residual tibia and knee joint can be unbearable for transtibial amputees with knee arthritis. Aim A. To describe the surgical procedure combining TKR with TCBAP for the first time; and B. To present preliminary data on potential risks and benefits with assessment of clinical and functional outcomes at follow up Method We used a TCBAP connected to the tibial base plate of a Total Knee Replacement (TKR) prosthesis enabling the tibial residuum and the knee joint to act as weight sharing structures by transferring the load directly to the femur. We performed a standard hinged TKR connected to a custom made TCBAP at the first stage followed by creating a skin implant interface as a second stage. We retrospectively reviewed four cases of trans-tibial amputations presenting with knee joint arthritis. Patients were assessed clinically and functionally including standard measures of health-related quality of life, amputee mobility predictor tool, ambulation tests and actual activity level. Progress was monitored for 6-24 months. Results Clinical outcomes including adverse events show no major complications but one case of superficial infection. Functional outcomes improved for all participants as early as 6 months follow up. Discussion & Conclusion TKR and TCBAP were combined for the first time in this proof-of-concept case series. The preliminary outcomes indicated that this procedure is potentially a safe and effective alternative for this patient group despite the theoretical increase in risk of ascending infection through the skin-implant interface to the external environment. We suggest larger comparative series to further validate these results.
Resumo:
Background Over the last two decades, Transcutaneous Bone-Anchored Prosthesis (TCBAP) has proven to be an effective alternative for prosthetic attachment for above knee amputees, particularly for individuals suffering from socket interface related complications. [1-17] Amputees with a very short femoral residuum (<15 cm) are at a considerable higher risk for these complications as well as high risk of implant failure, if they underwent a typical TCBAP due to the relatively small bony-implant contact leading to a need of a novel technique. Aim A. To describe the surgical procedure combining THR with TCBAP for the first time; and B. To present preliminary data on potential risks and benefits with assessment of clinical and functional outcomes at follow up Method We used a TCBAP connected to the stem of a Total Hip Replacement (THR) prosthesis enabling the femoral residuum and the hip joint to act as weight sharing structures by transferring the load directly to the pelvis. We performed a tri-polar THR connected to a custom made TCBAP at the first stage followed by creating a skin implant interface as a second stage. We retrospectively reviewed three cases of transfemoral amputations presenting with extremely short femoral residuum. Patients were assessed clinically and functionally including standard measures of health-related quality of life, amputee mobility predictor tool, ambulation tests and actual activity level. Progress was monitored for 6-24 months. Results Clinical outcomes including adverse events show no major complications. Functional outcomes improved for all participants as early as 6 months follow up. All cases were wheelchair bound preoperatively (K0 – AMPRO) improved to walking with One stick (K3 – AMPRO) at 3 months follow up. Discussion & Conclusion THR and TCBAP were combined for the first time in this proof-of-concept case series. The preliminary outcomes indicated that this procedure is potentially a safe and effective alternative despite the theoretical increase in risk of ascending infection through the skin-implant interface to the external environment for this patient group. We suggest larger comparative series to further validate these results.
Development of multi-rotor localised surveillance using multi-spectral sensors for plant biosecurity
Resumo:
This report describes a proof of concept for multi-rotor localised surveillance using a multi-spectral sensor for plant biosecurity applications. A literature review was conducted on previous applications using airborne multispectral imaging for plant biosecurity purposes. A ready built platform was purchased and modified in order to fit and provide suitable clearance for a Tetracam Mini-MCA multispectral camera. The appropriate risk management documents were developed allowing the platform and the multi-spectral camera to be tested extensively. However, due to technical difficulties with the platform the Mini- MCA was not mounted to the platform. Once a suitable platform is developed, future extensions can be conducted into the suitability of the Mini-MCA for airborne surveillance of Australian crops.
Resumo:
The process view concept deploys a partial and temporal representation to adjust the visible view of a business process according to various perception constraints of users. Process view technology is of practical use for privacy protection and authorization control in process-oriented business management. Owing to complex organizational structure, it is challenging for large companies to accurately specify the diverse perception of different users over business processes. Aiming to tackle this issue, this article presents a role-based process view model to incorporate role dependencies into process view derivation. Compared to existing process view approaches, ours particularly supports runtime updates to the process view perceivable to a user with specific view merging operations, thereby enabling the dynamic tracing of process perception. A series of rules and theorems are established to guarantee the structural consistency and validity of process view transformation. A hypothetical case is conducted to illustrate the feasibility of our approach, and a prototype is developed for the proof-of-concept purpose.
Resumo:
A new intellectual epoch has generated new enterprises to suit changed beliefs and circumstances. A widespread sentiment in both formal historiography and curriculum studies reduces the “new” to the question of how knowledge is recognized as such, how it is gained, and how it is represented in narrative form. Whether the nature of history and conceptions of knowledge are, or ought to be, central considerations in curriculum studies and reducible to purposes or elevated as present orientated requires rethinking. This paper operates as an incitement to discourse that disrupts the protection and isolation of primary categories in the field whose troubling is overdue. In particular, the paper moves through several layers that highlight the lack of settlement regarding the endowment of objects for study with the status of the scientific. It traces how some “invisible” things have been included within the purview of curriculum history as objects of study and not others. The focus is the making of things deemed invisible into scientific objects (or not) and the specific site of analysis is the work of William James (1842-1910). James studied intensely both child mind and the ghost, the former of which becomes scientized and legitimated for further study, the latter abjected. This contrast opens key points for reconsideration regarding conditions of proof, validation criteria, and subject matters and points to opportunities to challenge some well-rehearsed foreclosures within progressive politics and education.
Resumo:
This article canvasses recent case law adjudicating the uneasy disclosure balance between the interests of the insurer and the insured in the process of transacting an insurance contract. It examines also the consequences of non-disclosure and misrepresentation and whether the avowed legislative intent — that the liability of the insurer in respect of a claim is to be reduced to the amount that would place the insurer in the position it would have been had the non-disclosure or misrepresentation not occurred — is being achieved in practice. As there is no doubt as to who bears the onus of proof as to non-disclosure or misrepresentation it is surprising that insurers continue to flounder in this regard in relation to underwriting guidelines and adherence to them. The article reviews recent case law in this context and stresses that an insurer wishing to preserve its capacity to avoid liability on the basis that it would not have entered into a contract at all had the true situation been known to it must maintain detailed underwriting guidelines supported by consistent adherence to those guidelines. Recent case law also emphasises that the insurer must provide clear and cogent admissible evidence from appropriate personnel and officers of the company to discharge its onus.
Resumo:
Al-Li-SiCp composites were fabricated by a simple and cost effective stir casting technique. A compound billet technique has been developed to overcome the problems encountered during hot extrusion of these composites. After successful fabrication hardness measurement and room temperature compressive test were carried out on 8090 Al and its composites reinforced with 8, 12 and 18vol.% SiC particles in as extruded and peak aged conditions. The addition of SiC increases the hardness. 0.2% proof stress and compressive strength of Al-Li-8%SiC and Al-Li-12%SiC composites are higher than the unreinforced alloy. in case of the Al-Li-18%SiC composite, the 0.2% proof stress and compressive strength were higher than the unreinforced alloy but lower than those of Al-Li-8%SiC and Al-Li-12%SiC composites. This is attributed to clustering of particles and poor interfacial bonding.
Resumo:
Although robotics research has seen advances over the last decades robots are still not in widespread use outside industrial applications. Yet a range of proposed scenarios have robots working together, helping and coexisting with humans in daily life. In all these a clear need to deal with a more unstructured, changing environment arises. I herein present a system that aims to overcome the limitations of highly complex robotic systems, in terms of autonomy and adaptation. The main focus of research is to investigate the use of visual feedback for improving reaching and grasping capabilities of complex robots. To facilitate this a combined integration of computer vision and machine learning techniques is employed. From a robot vision point of view the combination of domain knowledge from both imaging processing and machine learning techniques, can expand the capabilities of robots. I present a novel framework called Cartesian Genetic Programming for Image Processing (CGP-IP). CGP-IP can be trained to detect objects in the incoming camera streams and successfully demonstrated on many different problem domains. The approach requires only a few training images (it was tested with 5 to 10 images per experiment) is fast, scalable and robust yet requires very small training sets. Additionally, it can generate human readable programs that can be further customized and tuned. While CGP-IP is a supervised-learning technique, I show an integration on the iCub, that allows for the autonomous learning of object detection and identification. Finally this dissertation includes two proof-of-concepts that integrate the motion and action sides. First, reactive reaching and grasping is shown. It allows the robot to avoid obstacles detected in the visual stream, while reaching for the intended target object. Furthermore the integration enables us to use the robot in non-static environments, i.e. the reaching is adapted on-the- fly from the visual feedback received, e.g. when an obstacle is moved into the trajectory. The second integration highlights the capabilities of these frameworks, by improving the visual detection by performing object manipulation actions.
Resumo:
Let G = (V, E) be a finite, simple and undirected graph. For S subset of V, let delta(S, G) = {(u, v) is an element of E : u is an element of S and v is an element of V - S} be the edge boundary of S. Given an integer i, 1 <= i <= vertical bar V vertical bar, let the edge isoperimetric value of G at i be defined as b(e)(i, G) = min(S subset of V:vertical bar S vertical bar=i)vertical bar delta(S, G)vertical bar. The edge isoperimetric peak of G is defined as b(e)(G) = max(1 <= j <=vertical bar V vertical bar)b(e)(j, G). Let b(v)(G) denote the vertex isoperimetric peak defined in a corresponding way. The problem of determining a lower bound for the vertex isoperimetric peak in complete t-ary trees was recently considered in [Y. Otachi, K. Yamazaki, A lower bound for the vertex boundary-width of complete k-ary trees, Discrete Mathematics, in press (doi: 10.1016/j.disc.2007.05.014)]. In this paper we provide bounds which improve those in the above cited paper. Our results can be generalized to arbitrary (rooted) trees. The depth d of a tree is the number of nodes on the longest path starting from the root and ending at a leaf. In this paper we show that for a complete binary tree of depth d (denoted as T-d(2)), c(1)d <= b(e) (T-d(2)) <= d and c(2)d <= b(v)(T-d(2)) <= d where c(1), c(2) are constants. For a complete t-ary tree of depth d (denoted as T-d(t)) and d >= c log t where c is a constant, we show that c(1)root td <= b(e)(T-d(t)) <= td and c(2)d/root t <= b(v) (T-d(t)) <= d where c(1), c(2) are constants. At the heart of our proof we have the following theorem which works for an arbitrary rooted tree and not just for a complete t-ary tree. Let T = (V, E, r) be a finite, connected and rooted tree - the root being the vertex r. Define a weight function w : V -> N where the weight w(u) of a vertex u is the number of its successors (including itself) and let the weight index eta(T) be defined as the number of distinct weights in the tree, i.e eta(T) vertical bar{w(u) : u is an element of V}vertical bar. For a positive integer k, let l(k) = vertical bar{i is an element of N : 1 <= i <= vertical bar V vertical bar, b(e)(i, G) <= k}vertical bar. We show that l(k) <= 2(2 eta+k k)
Resumo:
Quantifying the stiffness properties of soft tissues is essential for the diagnosis of many cardiovascular diseases such as atherosclerosis. In these pathologies it is widely agreed that the arterial wall stiffness is an indicator of vulnerability. The present paper focuses on the carotid artery and proposes a new inversion methodology for deriving the stiffness properties of the wall from cine-MRI (magnetic resonance imaging) data. We address this problem by setting-up a cost function defined as the distance between the modeled pixel signals and the measured ones. Minimizing this cost function yields the unknown stiffness properties of both the arterial wall and the surrounding tissues. The sensitivity of the identified properties to various sources of uncertainty is studied. Validation of the method is performed on a rubber phantom. The elastic modulus identified using the developed methodology lies within a mean error of 9.6%. It is then applied to two young healthy subjects as a proof of practical feasibility, with identified values of 625 kPa and 587 kPa for one of the carotid of each subject.
Resumo:
The potential of near infra-red (NIR) spectroscopy for non-invasive measurement of fruit quality of pineapple (Ananas comosus var. Smooth Cayenne) and mango (Magnifera indica var. Kensington) fruit was assessed. A remote reflectance fibre optic probe, placed in contact with the fruit skin surface in a light-proof box, was used to deliver monochromatic light to the fruit, and to collect NIR reflectance spectra (760–2500 nm). The probe illuminated and collected reflected radiation from an area of about 16 cm2. The NIR spectral attributes were correlated with pineapple juice Brix and with mango flesh dry matter (DM) measured from fruit flesh directly underlying the scanned area. The highest correlations for both fruit were found using the second derivative of the spectra (d2 log 1/R) and an additive calibration equation. Multiple linear regression (MLR) on pineapple fruit spectra (n = 85) gave a calibration equation using d2 log 1/R at wavelengths of 866, 760, 1232 and 832 nm with a multiple coefficient of determination (R2) of 0.75, and a standard error of calibration (SEC) of 1.21 °Brix. Modified partial least squares (MPLS) regression analysis yielded a calibration equation with R2 = 0.91, SEC = 0.69, and a standard error of cross validation (SECV) of 1.09 oBrix. For mango, MLR gave a calibration equation using d2 log 1/R at 904, 872, 1660 and 1516 nm with R2 = 0.90, and SEC = 0.85% DM and a bias of 0.39. Using MPLS analysis, a calibration equation with R2 = 0.98, SEC = 0.54 and SECV = 1.19 was obtained. We conclude that NIR technology offers the potential to assess fruit sweetness in intact whole pineapple and DM in mango fruit, respectively, to within 1° Brix and 1% DM, and could be used for the grading of fruit in fruit packing sheds.
Resumo:
The study shows that the reading paradigm derived from codes Roland Barthes presented in his S/Z exposes the postmodernic nature of Saul Bellow s Herzog (1964), and embodies in which way the novel is organized as a radical rewriting of modernism and its ideology. I explore how solid, compact and modernistic subject breaks down at every level of Herzog s narration. I actually argue that the heteroglossic novel is representative of an early American postmodern movement in literaure, and it should by no means be dissected narrowly as a realistic or naturalistic novel at all. The intertextual code verifies that the interpretation of Herzog remains inadequate if one doesn t take account of the novel s significant intertextual references to other texts. In fact, even the mind of Moses Herzog, the protagonist of the novel, is a mosaic of citations. It emerges from the dissertation that the figure of Don Quixote follows Moses Herzog as an ambiguous shadow while the professor of history struggles with his anxiety and anguish, and travels in a mentally confused state around the U.S. for five days in the early 1960s, encountering the impending atmosphere of transition as the country is on the threshold of a significant cultural and social change. There is a strong necessity for updated interpretation of Herzog partly because its centrality to Bellow s own career as a writer but mainly because it has been previously read trough modernistic lenses. I shall try to proof in my study that American Jewish Saul Bellow s (1915 2005) Herzog escapes any kind of simple, elemental or essentialistic construction or reading and in real terms it doesn t offer any comprehensive, total or coherent solution or system for those philosophical doctrines it criticizes and makes fun of. The philosophical, conceptual and cultural substance of Herzog does not constitute an independent or autonomous theoretical tract which would have a life of its own. Altough the novel reflects the continuity of Bellow s writing it is clearly some kind of conscious or unconscious experiment during his long career as a writer. He hasn t been so radical before or since the publication of Herzog. It is unarguably his most postmodern novel.The reading paradigm based on specific codes demonstrates how deep into the basic questions of his personal life and existence itself he must dive in oder to find his many ways towards authentic or primordial self in fragmented and shattered world which is constanly rewritten and which makes human being a tourist of his own life. In that ongoing process the protagonist has to accept the ultimate plurality of his mind and self. He must confront that the modernistic definition of identity as a solid, monolithic and stable entity has broken down into different, inconsistent and even contradictory possibilities of identification. Moses Herzog embodies obviously Stuart Hall s description of the postmodern self his identity has turn into a movable feast.