970 resultados para L-functions
Resumo:
Purpose: To investigate the correlations of the global flash multifocal electroretinogram (MOFO mfERG) with common clinical visual assessments – Humphrey perimetry and Stratus circumpapillary retinal nerve fiber layer (RNFL) thickness measurement in type II diabetic patients. Methods: Forty-two diabetic patients participated in the study: ten were free from diabetic retinopathy (DR) while the remainder suffered from mild to moderate non-proliferative diabetic retinopathy (NPDR). Fourteen age-matched controls were recruited for comparison. MOFO mfERG measurements were made under high and low contrast conditions. Humphrey central 30-2 perimetry and Stratus OCT circumpapillary RNFL thickness measurements were also performed. Correlations between local values of implicit time and amplitude of the mfERG components (direct component (DC) and induced component (IC)), and perimetric sensitivity and RNFL thickness were evaluated by mapping the localized responses for the three subject groups. Results: MOFO mfERG was superior to perimetry and RNFL assessments in showing differences between the diabetic groups (with and without DR) and the controls. All the MOFO mfERG amplitudes (except IC amplitude at high contrast) correlated better with perimetry findings (Pearson’s r ranged from 0.23 to 0.36, p<0.01) than did the mfERG implicit time at both high and low contrasts across all subject groups. No consistent correlation was found between the mfERG and RNFL assessments for any group or contrast conditions. The responses of the local MOFO mfERG correlated with local perimetric sensitivity but not with RNFL thickness. Conclusion: Early functional changes in the diabetic retina seem to occur before morphological changes in the RNFL.
Resumo:
Chapter 10 explains the functions and types of report and proposal documents commonly used in business and professional contexts.
Resumo:
The intention of this Australian adaptation of DuBrin is to bring an Australian/Asia Pacific focus to the theoretically strong American text on leadership. The book covers leaders performing a number of specific roles and functions in a wide variety of organisational positions in all sectors including private, political and community.
Resumo:
We investigated the potential of an extract of Lycopodium obscurum L.; stigmastane-3-oxo-21-oic acid (SA), to enhance osteogensis of mouse osteoblastic MC3T3-E1 cells. SA at a concentration of 16 µM was found to have no significant effect upon the viability of the cells, thus concentrations of 8 µM and 16 µM of SA were used in all further experiments. Both concentrations of SA had an inhibitory affect upon alkaline phosphatase activity (ALP) after 8 days incubation, however, after 16 days activity was restored to control levels. However Alizarin red S staining showed increased levels of mineralization for both concentrations after 16 days culture. Real time PCR showed inhibition of genes Runx2 and Osterix genes responsible for the up-regulation of ALP. However early time point (8 days) up-regulation of bone matrix mineralization genes OPN and OCN, and late time point (16 days) up-regulation of both Jun-D and Fra-2 mRNA expression was significantly enhanced. These results suggest a potential me-chanism of SA in enhancing bone fracture healing is through the up-regulating bone matrix minera-lization.
Resumo:
The research described in this paper forms part of an in-depth investigation of safety culture in one of Australia’s largest construction companies. The research builds on a previous qualitative study with organisational safety leaders and further investigates how safety culture is perceived and experienced by organisational members, as well as how this relates to their safety behaviour and related outcomes at work. Participants were 2273 employees of the case study organisation, with 689 from the Construction function and 1584 from the Resources function. The results of several analyses revealed some interesting organisational variance on key measures. Specifically, the Construction function scored significantly higher on all key measures: safety climate, safety motivation, safety compliance, and safety participation. The results are discussed in terms of relevance in an applied research context.
Resumo:
Smartphones started being targets for malware in June 2004 while malware count increased steadily until the introduction of a mandatory application signing mechanism for Symbian OS in 2006. From this point on, only few news could be read on this topic. Even despite of new emerging smartphone platforms, e.g. android and iPhone, malware writers seemed to lose interest in writing malware for smartphones giving users an unappropriate feeling of safety. In this paper, we revisit smartphone malware evolution for completing the appearance list until end of 2008. For contributing to smartphone malware research, we continue this list by adding descriptions on possible techniques for creating the first malware(s) for Android platform. Our approach involves usage of undocumented Android functions enabling us to execute native Linux application even on retail Android devices. This can be exploited to create malicious Linux applications and daemons using various methods to attack a device. In this manner, we also show that it is possible to bypass the Android permission system by using native Linux applications.
Resumo:
This paper reports on the implementation of a non-invasive electroencephalography-based brain-computer interface to control functions of a car in a driving simulator. The system is comprised of a Cleveland Medical Devices BioRadio 150 physiological signal recorder, a MATLAB-based BCI and an OKTAL SCANeR advanced driving experience simulator. The system utilizes steady-state visual-evoked potentials for the BCI paradigm, elicited by frequency-modulated high-power LEDs and recorded with the electrode placement of Oz-Fz with Fz as ground. A three-class online brain-computer interface was developed and interfaced with an advanced driving simulator to control functions of the car, including acceleration and steering. The findings are mainly exploratory but provide an indication of the feasibility and challenges of brain-controlled on-road cars for the future, in addition to a safe, simulated BCI driving environment to use as a foundation for research into overcoming these challenges.
Resumo:
This paper provides a commentary on the contribution by Dr Chow who questioned whether the functions of learning are general across all categories of tasks or whether there are some task-particular aspects to the functions of learning in relation to task type. Specifically, they queried whether principles and practice for the acquisition of sport skills are different than what they are for musical, industrial, military and human factors skills. In this commentary we argue that ecological dynamics contains general principles of motor learning that can be instantiated in specific performance contexts to underpin learning design. In this proposal, we highlight the importance of conducting skill acquisition research in sport, rather than relying on empirical outcomes of research from a variety of different performance contexts. Here we discuss how task constraints of different performance contexts (sport, industry, military, music) provide different specific information sources that individuals use to couple their actions when performing and acquiring skills. We conclude by suggesting that his relationship between performance task constraints and learning processes might help explain the traditional emphasis on performance curves and performance outcomes to infer motor learning.
Resumo:
This report looks at opportunities in relation to what is either already available or starting to take off in Information and Communication Technology (ICT). ICT focuses on the entire system of information, communication, processes and knowledge within an organisation. It focuses on how technology can be implemented to serve the information and communication needs of people and organisations. An ICT system involves a combination of work practices, information, people and a range of technologies and applications organised to make the business or organisation fully functional and efficient, and to accomplish goals in an organisation. Our focus is on vocational, workbased education in New Zealand. It is not about eLearning, although we briefly touch on the topic. We provide a background on vocational education in New Zealand, cover what we consider to be key trends impacting workbased, vocational education and training (VET), and offer practical suggestions for leveraging better value from ICT initiatives across the main activities of an Industry Training Organisation (ITO). We use a learning value chain approach to demonstrate the main functions ITOs engage in and also use this approach as the basis for developing and prioritising an ICT strategy. Much of what we consider in this report is applicable to the wider tertiary education sector as it relates to life-long learning. We consider ICT as an enabler that: a) connects education businesses (all types including tertiary education institutions) to learners, their career decisions and their learning, and as well, b) enables those same businesses to run more efficiently. We suggest that these two sets of activities are considered as interconnected parts of the same education or training business ICT strategy.
Resumo:
While much of the control and many of the activities found in today’s classrooms have been placed in the hands of the learners and learning has become inquiry-based, there remains a need for teachers to use teaching tools that would facilitate this student-centered teaching process. This article identifies the K-W-L Chart as one such tool and follows a case study of four Kuwaiti ‘Family and Consumer Sciences’ teaching / learning events to evaluate their ability to enhance the learning outcomes of eight students. The research was designed from a qualitative, multi-tiered design approach and was assessed through a constant comparative method of data analysis of interview responses, classroom observations and worksheet-assessments. The results showed that the use of K-W-L Charts influenced the teachers and learners toward a more inquiry-based approach and facilitated a more student-centered and collaborative learning environment, raising the level of interest and the amount of personal input given by the students.
Resumo:
The name apophyllite refers to a specific group of phyllosilicates, a class of minerals that also includes the micas and are a class of minerals of similar chemical makeup that comprise a solid solution series, and includes the members apophyllite-(KF), apophyllite-(KOH) and apophyllite-(NaF). Fluorapophyllite apophyllite-(KF) and hydroxyapophyllite apophyllite-(KOH) are different minerals only because of the difference in percentages of fluorine to hydroxyl ions. Three apophyllite minerals have been characterised by thermogravimetric analysis and infrared spectroscopy. Dehydration takes place in several steps. Major mass losses occur at around 205–220 °C and at 400–429 °C. Minor mass losses are observed around 242–292 °C. It is proposed that dehydration occurs in the first decomposition step. Water is lost over the temperature range 125–250, 250–325 and 325–525 °C with the loss of 4.5, 0.5 and 3.0 mol of water. Water functions as zeolitic water and is also coordinated to the silica surfaces.
Resumo:
The increasing global distribution of automobiles necessitates that the design of In-vehicle Information Systems (IVIS) is appropriate for the regions to which they are being exported. Differences between regions such as culture, environment and traffic context can influence the needs, usability and acceptance of IVIS. This paper describes two studies aimed at identifying regional differences in IVIS design needs and preferences across drivers from Australia and China to determine the impact of any differences on IVIS design. Using a questionnaire and interaction clinics, the influence of cultural values and driving patterns on drivers' preferences for, and comprehension of, surface- and interaction-level aspects of IVIS interfaces was explored. Similarities and differences were found between the two regional groups in terms of preferences for IVIS input control types and labels and in the comprehension of IVIS functions. Specifically, Chinese drivers preferred symbols and Chinese characters over English words and were less successful (compared to Australians) at comprehending English abbreviations, particularly for complex IVIS functions. Implications in terms of the current trend to introduce Western-styled interfaces into other regions with little or no adaptation are discussed.
Resumo:
Admission to practice law in Australia falls under the general supervisory power of supreme court judges in the various jurisdictions. The degree of supervision varies among jurisdictions, but the judiciary generally is responsible for setting the educational requirements for admission. A variety of admission boards perform a number of administrative and supervisory functions; for example, determining whether a particular law school's degree satisfies educational requirements for admission...
Resumo:
Robust hashing is an emerging field that can be used to hash certain data types in applications unsuitable for traditional cryptographic hashing methods. Traditional hashing functions have been used extensively for data/message integrity, data/message authentication, efficient file identification and password verification. These applications are possible because the hashing process is compressive, allowing for efficient comparisons in the hash domain but non-invertible meaning hashes can be used without revealing the original data. These techniques were developed with deterministic (non-changing) inputs such as files and passwords. For such data types a 1-bit or one character change can be significant, as a result the hashing process is sensitive to any change in the input. Unfortunately, there are certain applications where input data are not perfectly deterministic and minor changes cannot be avoided. Digital images and biometric features are two types of data where such changes exist but do not alter the meaning or appearance of the input. For such data types cryptographic hash functions cannot be usefully applied. In light of this, robust hashing has been developed as an alternative to cryptographic hashing and is designed to be robust to minor changes in the input. Although similar in name, robust hashing is fundamentally different from cryptographic hashing. Current robust hashing techniques are not based on cryptographic methods, but instead on pattern recognition techniques. Modern robust hashing algorithms consist of feature extraction followed by a randomization stage that introduces non-invertibility and compression, followed by quantization and binary encoding to produce a binary hash output. In order to preserve robustness of the extracted features, most randomization methods are linear and this is detrimental to the security aspects required of hash functions. Furthermore, the quantization and encoding stages used to binarize real-valued features requires the learning of appropriate quantization thresholds. How these thresholds are learnt has an important effect on hashing accuracy and the mere presence of such thresholds are a source of information leakage that can reduce hashing security. This dissertation outlines a systematic investigation of the quantization and encoding stages of robust hash functions. While existing literature has focused on the importance of quantization scheme, this research is the first to emphasise the importance of the quantizer training on both hashing accuracy and hashing security. The quantizer training process is presented in a statistical framework which allows a theoretical analysis of the effects of quantizer training on hashing performance. This is experimentally verified using a number of baseline robust image hashing algorithms over a large database of real world images. This dissertation also proposes a new randomization method for robust image hashing based on Higher Order Spectra (HOS) and Radon projections. The method is non-linear and this is an essential requirement for non-invertibility. The method is also designed to produce features more suited for quantization and encoding. The system can operate without the need for quantizer training, is more easily encoded and displays improved hashing performance when compared to existing robust image hashing algorithms. The dissertation also shows how the HOS method can be adapted to work with biometric features obtained from 2D and 3D face images.