791 resultados para Every day objects


Relevância:

80.00% 80.00%

Publicador:

Resumo:

A proposta do presente estudo foi avaliar os efeitos do laser de baixa intensidade na regeneração óssea no procedimento de expansão rápida da maxila. Utilizou-se 27 indivíduos com média de idade de 10,2 anos, divididos em dois grupos: grupo laser (n=14), no qual se realizou a expansão rápida da maxila, associada ao laser e grupo sem laser (n=13), que realizou somente a expansão rápida da maxila. O protocolo de ativação do parafuso expansor foi de 1 volta completa no primeiro dia e ½ volta diária até a sobrecorreção. O laser utilizado foi o de diodo (TWIN Laser MMOptics®, São Carlos), seguindo o protocolo de aplicação: comprimento de onda de 780nm, potência de 40mW, densidade de 10J/cm2, em 10 pontos localizados ao redor da sutura palatina mediana. Os estágios de aplicação foram: L1 (do primeiro ao quinto dia de aplicação), L2 (travamento do parafuso e 3 dias seguidos), L3, L4 e L5 (após 7, 14 e 21 dias do L2, respectivamente). Radiografias oclusais da maxila foram realizadas com auxílio de uma escala de alumínio, para referencial densitométrico, em diferentes tempos: T1 (inicial), T2 (dia de travamento do parafuso), T3 (3 a 5 dias do T2), T4 (30 dias do T3), T5 (60 dias do T4). As radiografias foram digitalizadas e submetidas a um programa de imagem (Image Tool - UTHSCSA, Texas, USA), para mensuração da densidade óptica das áreas previamente selecionadas. Para realização do teste estatístico, utilizou-se a Análise de Covariância usando como covariável o tempo para a fase avaliada. Em todos os testes foi adotado nível de significância de 5% (p<0,05).Para o Grupo Laser, os dados mostram que houve uma queda significante de densidade durante a abertura do parafuso (T2-T1), um aumento significante da mesma no período final de avaliação (T5-T4), e um aumento também da densidade no período de regeneração propriamente dito (T5-T2), ou seja, a partir do momento em que finalizou a fase de abertura do parafuso expansor. Enquanto que no Grupo Sem Laser, a densidade não mostrou diferença estatisticamente significantemente em nenhum período analisado. Os resultados mostraram que o laser propiciou consideravelmente uma melhor abertura da sutura palatina mediana, além de influenciar no processo de regeneração óssea da sutura, acelerando seus processos de reparo.(AU)

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Models of visual motion processing that introduce priors for low speed through Bayesian computations are sometimes treated with scepticism by empirical researchers because of the convenient way in which parameters of the Bayesian priors have been chosen. Using the effects of motion adaptation on motion perception to illustrate, we show that the Bayesian prior, far from being convenient, may be estimated on-line and therefore represents a useful tool by which visual motion processes may be optimized in order to extract the motion signals commonly encountered in every day experience. The prescription for optimization, when combined with system constraints on the transmission of visual information, may lead to an exaggeration of perceptual bias through the process of adaptation. Our approach extends the Bayesian model of visual motion proposed byWeiss et al. [Weiss Y., Simoncelli, E., & Adelson, E. (2002). Motion illusions as optimal perception Nature Neuroscience, 5:598-604.], in suggesting that perceptual bias reflects a compromise taken by a rational system in the face of uncertain signals and system constraints. © 2007.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This book challenges the accepted notion that the transition from the command economy to market based systems is complete across the post-Soviet space. While it is noted that different political economies have developed in such states, such as Russia’s ‘managed democracy’, events such as Ukraine gaining ‘market economy status’ by the European Union and acceding to the World Trade Organisation in 2008 are taken as evidence that the reform period is over. Such thinking is based on numerous assumptions; specifically that economic transition has defined start and end points, that the formal economy now has primacy over other forms of economic practices and that national economic growth leads to the ‘trickle down’ of wealth to those marginalised by the transition process. Based on extensive ethnographic and quantitative research, conducted in Ukraine and Russia between 2004 - 2007, this book questions these assumptions by stating that the economies that operate across post-Soviet spaces are far from the textbook idea of a market economy. Through this the whole notion of ‘transition’ is problematised and the importance of informal economies to everyday life is demonstrated. Using case studies of various sectors, such as entrepreneurial behaviour and the higher education system, it is also shown how corruption has invaded almost all sectors of the post-Soviet every day.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The number of new chemical entities (NCE) is increasing every day after the introduction of combinatorial chemistry and high throughput screening to the drug discovery cycle. One third of these new compounds have aqueous solubility less than 20µg/mL [1]. Therefore, a great deal of interest has been forwarded to the salt formation technique to overcome solubility limitations. This study aims to improve the drug solubility of a Biopharmaceutical Classification System class II (BCS II) model drug (Indomethacin; IND) using basic amino acids (L-arginine, L-lysine and L-histidine) as counterions. Three new salts were prepared using freeze drying method and characterised by FT-IR spectroscopy, proton nuclear magnetic resonance ((1)HNMR), Differential Scanning Calorimetry (DSC) and Thermogravimetric analysis (TGA). The effect of pH on IND solubility was also investigated using pH-solubility profile. Both arginine and lysine formed novel salts with IND, while histidine failed to dissociate the free acid and in turn no salt was formed. Arginine and lysine increased IND solubility by 10,000 and 2296 fold, respectively. An increase in dissolution rate was also observed for the novel salts. Since these new salts have improved IND solubility to that similar to BCS class I drugs, IND salts could be considered for possible waivers of bioequivalence.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

In this poster we presented our preliminary work on the study of spammer detection and analysis with 50 active honeypot profiles implemented on Weibo.com and QQ.com microblogging networks. We picked out spammers from legitimate users by manually checking every captured user's microblogs content. We built a spammer dataset for each social network community using these spammer accounts and a legitimate user dataset as well. We analyzed several features of the two user classes and made a comparison on these features, which were found to be useful to distinguish spammers from legitimate users. The followings are several initial observations from our analysis on the features of spammers captured on Weibo.com and QQ.com. ¦The following/follower ratio of spammers is usually higher than legitimate users. They tend to follow a large amount of users in order to gain popularity but always have relatively few followers. ¦There exists a big gap between the average numbers of microblogs posted per day from these two classes. On Weibo.com, spammers post quite a lot microblogs every day, which is much more than legitimate users do; while on QQ.com spammers post far less microblogs than legitimate users. This is mainly due to the different strategies taken by spammers on these two platforms. ¦More spammers choose a cautious spam posting pattern. They mix spam microblogs with ordinary ones so that they can avoid the anti-spam mechanisms taken by the service providers. ¦Aggressive spammers are more likely to be detected so they tend to have a shorter life while cautious spammers can live much longer and have a deeper influence on the network. The latter kind of spammers may become the trend of social network spammer. © 2012 IEEE.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

In less than a decade, personal computers have become part of our daily lives. Many of us come into contact with computers every day, whether at work, school or home. As useful as the new technologies are, they also have a darker side. By making computers part of our daily lives, we run the risk of allowing thieves, swindlers, and all kinds of deviants directly into our homes. Armed with a personal computer, a modem and just a little knowledge, a thief can easily access confidential information, such as details of bank accounts and credit cards. This book helps people avoid harm at the hands of Internet criminals. It offers a tour of the more dangerous parts of the Internet, as the author explains who the predators are, their motivations, how they operate and how to protect against them. In less than a decade, personal computers have become part of our daily lives. Many of us come into contact with computers every day, whether at work, school or home. As useful as the new technologies are, they also have a darker side. By making computers part of our daily lives, we run the risk of allowing thieves, swindlers, and all kinds of deviants directly into our homes. Armed with a personal computer, a modem and just a little knowledge, a thief can easily access confidential information, such as details of bank accounts and credit cards. This book is intended to help people avoid harm at the hands of Internet criminals. It offers a tour of the more dangerous parts of the Internet, as the author explains who the predators are, their motivations, how they operate and how to protect against them. Behind the doors of our own homes, we assume we are safe from predators, con artists, and other criminals wishing us harm. But the proliferation of personal computers and the growth of the Internet have invited these unsavory types right into our family rooms. With a little psychological knowledge a con man can start to manipulate us in different ways. A terrorist can recruit new members and raise money over the Internet. Identity thieves can gather personal information and exploit it for criminal purposes. Spammers can wreak havoc on businesses and individuals. Here, an expert helps readers recognize the signs of a would-be criminal in their midst. Focusing on the perpetrators, the author provides information about how they operate, why they do it, what they hope to do, and how to protect yourself from becoming a victim.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Computing and information technology have made significant advances. The use of computing and technology is a major aspect of our lives, and this use will only continue to increase in our lifetime. Electronic digital computers and high performance communication networks are central to contemporary information technology. The computing applications in a wide range of areas including business, communications, medical research, transportation, entertainments, and education are transforming local and global societies around the globe. The rapid changes in the fields of computing and information technology also make the study of ethics exciting and challenging, as nearly every day, the media report on a new invention, controversy, or court ruling. This tutorial will explore a broad overview on the scientific foundations, technological advances, social implications, and ethical and legal issues related to computing. It will provide the milestones in computing and in networking, social context of computing, professional and ethical responsibilities, philosophical frameworks, and social, ethical, historical, and political implications of computer and information technology. It will outline the impact of the tremendous growth of computer and information technology on people, ethics and law. Political and legal implications will become clear when we analyze how technology has outpaced the legal and political arenas.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Доклад, поместен в сборника на Националната конференция "Образованието в информационното общество", Пловдив, май, 2012 г.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The purpose of this study was to describe the experiences of five educators participating in a teacher-initiated learning community that valued practical teacher knowledge. Connelly and Clandinin (2000) argued that practical teacher knowledge grew out of experience through interaction in the professional knowledge landscape. Collaboration that promoted teacher learning was the foundation to effective school change (Wood, 1997). This teacher-initiated learning community consisted of members who had equal status and collaborated by participating in discourse on curriculum and instruction. The collegiality of the community fostered teacher professionalism that improved practice and benefited the school. This study focused on the following research questions: (1) What was the experience of these five educators in this learning community? (2) What did these five individuals understand about the nature of practical teacher knowledge? (3) According to the participants, what was the relationship between teacher empowerment and effective school change? ^ The participants were chosen because each voluntarily attended this teacher-initiated learning community. Each participant answered questions regarding the experience during three semi-structured tape-recorded interviews. The interviews were transcribed, and significant statements of meaning were extracted. Using a triangulation of ideas that were common to at least three of the participants ensured the trustworthiness of the analysis. These statements were combined to describe what was experienced and how the participants described their experience. The emerging themes were the characteristics of and the relationships, methods, conditions, and environment for the teachers. The teachers described how a knowledge base of practical teacher knowledge was gained as a spirit of camaraderie developed. The freedom that the teachers experienced to collaborate and learn fostered new classroom practice that affected school change as student interaction and productivity increased. ^ The qualitative analysis of this study provided a description of a learning community that valued practical teacher knowledge and fostered professional development. This description was important to educational stakeholders because it demonstrated how practical teacher knowledge was gained during the teachers' daily work. By sharing every day experiences, the teacher talk generated collaboration and accountability that the participants felt improved practice and fostered a safe, productive learning environment for students. ^

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The Balmis expedition, sent to America by the Spanish monarch Charles IV in 1803, was a watershed in the history of Medicine as it made smallpox vaccination available for the first time, effectively prevented the disease from spreading, and saved thousands of lives. Immunization required complex administrative measures and political decisions including the creation of Vaccination Boards, all of which involved different sectors of Spanish American society. This dissertation argues that at the beginning of the nineteenth century the Spanish American colonial state had reached some level of maturity and cohesion that made it capable of executing this complex project in public health. The significance of this mobilization and the every-day experience in implementing this new public health measure is the center of this work. It is situated geographically in Venezuela and Cuba, entities which took different evolutionary paths in the nineteenth century. The organization and functioning of Vaccination Boards in these two areas are used to illustrate the state formation process, and sharp political differences in this critical period.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

In human society, people encounter various deontic conflicts every day. Deontic decisions are those that include moral, ethical, and normative aspects. Here, the concern is with deontic conflicts: decisions where all the alternatives lead to the violation of some norms. People think critically about these kinds of decisions. But, just ‘what’ they think about is not always clear. ^ People use certain estimating factors/criteria to balance the tradeoffs when they encounter deontic conflicts. It is unclear what subjective factors people use to make a deontic decision. An elicitation approach called the Open Factor Conjoint System is proposed, which applies an online elicitation methodology which is a combination of two well-know research methodologies: repertory grid and conjoint analysis. This new methodology is extended to be a web based application. It seeks to elicit additional relevant (subjective) factors from people, which affect deontic decisions. The relative importance and utility values are used for the development of a decision model to predict people’s decisions. ^ Fundamentally, this methodology was developed and intended to be applicable for a wide range of elicitation applications with minimal experimenter bias. Comparing with the traditional method, this online survey method reduces the limitation of time and space in data collection and this methodology can be applied in many fields. Two possible applications were addressed: robotic vehicles and the choice of medical treatment. In addition, this method can be applied to many research related disciplines in cross-cultural research due to its online ability with global capacity. ^

Relevância:

80.00% 80.00%

Publicador:

Resumo:

In an article entitled - The Specialist: Coming Soon To Your Local Hotel - by Stan Bromley, Regional Vice President and General Manager, Four Seasons Clift Hotel, San Francisco, the author’s introduction states: “An experienced hotelier discusses the importance of the delivery of a high “quality-to-value” ratio consistently to guests, particularly as the hotel market becomes specialized and a distinction is drawn between a “property” and a “hotel.” The author’s primary intention is to make you, the reader, aware of changes in the hospitality/hotel marketplace. From the embryo to the contemporary, the hotel market has consistently evolved; this includes but is not limited to mission statement, marketing, management, facilities, and all the tangibles and intangibles of the total hotel experience. “Although we are knocking ourselves out trying to be everything to everyone, I don't think hotel consumers are as interested in “mixing and matching” as they were in the past,” Bromley says. “Today's hotel guest is looking for “specialized care,” and is increasingly skeptical of our industry-wide hotel ads and promises of greatness.” As an example Bromley makes an analogy using retail outlets such as Macy’s, Saks, and Sears, which cater to their own unique market segment. Hotels now follow the same outline, he allows. “In my view, two key factors will make a hotel a success,” advises Bromley. “First, know your specialty and market to that segment. Second, make sure you consistently offer a high quality-to-value ratio. That means every day.” To emphasize that second point, Bromley offers this bolstering thought, “The second factor that will make or break your business is your ability to deliver a high "quality/value" ratio-and to do so consistently.” The author evidently considers quality-to-value ratio to be an important element. Bromley emphasizes the importance of convention and trade show business to the hotel industry. That business element cannot be over-estimated in his opinion. This doesn’t mean an operator who can accommodate that type of business should exclude other client opportunities outside the target market. It does mean, however, these secondary opportunities should only be addressed after pursuing the primary target strategy. After all, the largest profit margin lies in the center of the target. To amplify the above statement, and in reference to his own experience, Bromley says, “Being in the luxury end of the business I, on the other hand, need to uncover and book individuals and small corporate meetings more than convention or association business.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Online Social Network (OSN) services provided by Internet companies bring people together to chat, share the information, and enjoy the information. Meanwhile, huge amounts of data are generated by those services (they can be regarded as the social media ) every day, every hour, even every minute, and every second. Currently, researchers are interested in analyzing the OSN data, extracting interesting patterns from it, and applying those patterns to real-world applications. However, due to the large-scale property of the OSN data, it is difficult to effectively analyze it. This dissertation focuses on applying data mining and information retrieval techniques to mine two key components in the social media data — users and user-generated contents. Specifically, it aims at addressing three problems related to the social media users and contents: (1) how does one organize the users and the contents? (2) how does one summarize the textual contents so that users do not have to go over every post to capture the general idea? (3) how does one identify the influential users in the social media to benefit other applications, e.g., Marketing Campaign? The contribution of this dissertation is briefly summarized as follows. (1) It provides a comprehensive and versatile data mining framework to analyze the users and user-generated contents from the social media. (2) It designs a hierarchical co-clustering algorithm to organize the users and contents. (3) It proposes multi-document summarization methods to extract core information from the social network contents. (4) It introduces three important dimensions of social influence, and a dynamic influence model for identifying influential users.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

In human society, people encounter various deontic conflicts every day. Deontic decisions are those that include moral, ethical, and normative aspects. Here, the concern is with deontic conflicts: decisions where all the alternatives lead to the violation of some norms. People think critically about these kinds of decisions. But, just ‘what’ they think about is not always clear. People use certain estimating factors/criteria to balance the tradeoffs when they encounter deontic conflicts. It is unclear what subjective factors people use to make a deontic decision. An elicitation approach called the Open Factor Conjoint System is proposed, which applies an online elicitation methodology which is a combination of two well-know research methodologies: repertory grid and conjoint analysis. This new methodology is extended to be a web based application. It seeks to elicit additional relevant (subjective) factors from people, which affect deontic decisions. The relative importance and utility values are used for the development of a decision model to predict people’s decisions. Fundamentally, this methodology was developed and intended to be applicable for a wide range of elicitation applications with minimal experimenter bias. Comparing with the traditional method, this online survey method reduces the limitation of time and space in data collection and this methodology can be applied in many fields. Two possible applications were addressed: robotic vehicles and the choice of medical treatment. In addition, this method can be applied to many research related disciplines in cross-cultural research due to its online ability with global capacity.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This master thesis has the main goal investigate how families are inserted in the socioeducational process of teenagers who are undergoing social measures of liberty deprivation. The specific objectives are: to characterize the family´s living together of adolescents deprived of their freedom and their families, from the actions and routines of the socio-educational system; to assess the professional working links in the context of socio-education, in order to care and strengthening families of the adolescents; to investigate how families evaluate the operation of socio-educational process in which adolescents are met. Method: to achieve the proposed objectives, data collection occurred in complementary steps: the first phase took place from visits to socioeducational units of liberty deprivation of RN, and dialogues with professionals working in socio-education. Subsequently, action research stage was carried out, from the insertion of the researcher in the extension project Family and the struggle for the effectiveness of the National Socio Service System, that aimed to strengthen monitoring the adolescents socio-education by their families, and had as methodology the conversation circles and thematic workshops. Lastly, were performed reading and analysis of the references to the family in the Individual Care Plans (PIAs) for adolescents. The information gathered was recorded in field diaries and subjected to thematic content analysis. This research was guided by the Marxist theoretical framework, structured on the understanding of the involvement of adolescents with illegal acts as a development and expression of the social question. From this theoretical framework, the prevailing view in the capitalist society of adolescents in conflict with the law as individuals who are treated by means of repression and segregation and the weakness of social policies is questioned, both in the execution of their own socioeducational measures as the articulation of network services for adolescent protection and strengthening your family. Results: in relation to the operation of the socioeducational system in RN in general, it was observed a state of unhealthy physical spaces and institutional practices that violate human rights, idleness and lack of access to social rights, and criminalization and institutionalization of poor young people and their families. With regard to family´s living together, it was noticed great distance between principles and guidelines recommended by the SINASE, about acquaintanceship and family strengthening, and every day practices of socio-education in RN: serious violations were observed that undermine the family´s living together, as the distance between the socio-educational units of deprivation of liberty and the cities where families live; absence, irregularity and poor conditions in carrying out the family visits; lack of conjugal visits; restricted and unarticulated actions for the care and strengthening of the families of adolescents, most of whom live in poverty or extreme poverty. Finally, it was found a number of blamefully and punishments to the family, including practices such as inward inspection (visual inspection while naked and squant), plus a series of violence and omissions care that sick family members and weaken the links between adolescents and their families.