996 resultados para ammassi galassie aloni relitti radio cluster
Resumo:
Music composition using prominent broadcast speeches across the whole twentieth century in commemoration of the centenary of Marconi's first transatlantic radio transmission. The work is based on creating music from the found objects of melody derived from spoken intonation. Recordings of the speeches are accompanied throughout by live instrumental music.
Resumo:
Background Zoonotic schistosomiasis japonica is a major public health problem in China. Bovines, particularly water buffaloes, are thought to play a major role in the transmission of schistosomiasis to humans in China. Preliminary results (1998–2003) of a praziquantel (PZQ)-based pilot intervention study we undertook provided proof of principle that water buffaloes are major reservoir hosts for S. japonicum in the Poyang Lake region, Jiangxi Province. Methods and Findings Here we present the results of a cluster-randomised intervention trial (2004–2007) undertaken in Hunan and Jiangxi Provinces, with increased power and more general applicability to the lake and marshlands regions of southern China. The trial involved four matched pairs of villages with one village within each pair randomly selected as a control (human PZQ treatment only), leaving the other as the intervention (human and bovine PZQ treatment). A sentinel cohort of people to be monitored for new infections for the duration of the study was selected from each village. Results showed that combined human and bovine chemotherapy with PZQ had a greater effect on human incidence than human PZQ treatment alone. Conclusions The results from this study, supported by previous experimental evidence, confirms that bovines are the major reservoir host of human schistosomiasis in the lake and marshland regions of southern China, and reinforce the rationale for the development and deployment of a transmission blocking anti-S. japonicum vaccine targeting bovines.
Resumo:
Background The problem of silent multiple comparisons is one of the most difficult statistical problems faced by scientists. It is a particular problem for investigating a one-off cancer cluster reported to a health department because any one of hundreds, or possibly thousands, of neighbourhoods, schools, or workplaces could have reported a cluster, which could have been for any one of several types of cancer or any one of several time periods. Methods This paper contrasts the frequentist approach with a Bayesian approach for dealing with silent multiple comparisons in the context of a one-off cluster reported to a health department. Two published cluster investigations were re-analysed using the Dunn-Sidak method to adjust frequentist p-values and confidence intervals for silent multiple comparisons. Bayesian methods were based on the Gamma distribution. Results Bayesian analysis with non-informative priors produced results similar to the frequentist analysis, and suggested that both clusters represented a statistical excess. In the frequentist framework, the statistical significance of both clusters was extremely sensitive to the number of silent multiple comparisons, which can only ever be a subjective "guesstimate". The Bayesian approach is also subjective: whether there is an apparent statistical excess depends on the specified prior. Conclusion In cluster investigations, the frequentist approach is just as subjective as the Bayesian approach, but the Bayesian approach is less ambitious in that it treats the analysis as a synthesis of data and personal judgements (possibly poor ones), rather than objective reality. Bayesian analysis is (arguably) a useful tool to support complicated decision-making, because it makes the uncertainty associated with silent multiple comparisons explicit.
Resumo:
BACKGROUND: Literature and clinical experience suggest that some people experience atypical, complicated or pathological bereavement reactions in response to a major loss. METHOD: Three groups of community-based bereaved subjects--spouses (n = 44), adult children (n = 40), and parents (n = 36)--were followed up four times in the 13 months after a loss. A 17-item scale of core bereavement times was developed and used to investigate the intensity of the bereavement response over time. RESULTS: Cluster analysis revealed a pattern of bereavement-related symptoms approximating a syndrome of chronic grief in 11 (9.2%) of the 120 subjects. None of the respondents displayed a pattern consistent with delayed or absent grief. CONCLUSIONS: In a non-clinical community sample of bereaved people, delayed or absent grief is infrequently seen, unlike chronic grief, which is demonstrated in a minority.
Resumo:
This paper considers the history of the cluster concept in urban economic geography, and its relationship to recent debates about creative cities. It then looks at the role that universities can play in the development of a creative cluster, as well as some of the potential pitfalls.
Resumo:
Maximisation of Knowledge-Based Development (KBD) benefits requires effective dissemination and utilisation mechanisms to accompany the initial knowledge creation process. This work highlights the potential for interactions between Supply Chains (SCs) and Small and Medium sized Enterprise Clusters (SMECs), (including via ‘junction’ firms which are members of both networks), to facilitate such effective dissemination and utilisation of knowledge. In both these network types there are firms that readily utilise their relationships and ties for ongoing business success through innovation. The following chapter highlights the potential for such beneficial interactions between SCs and SMECs in key elements of KBD, particularly knowledge management, innovation and technology transfer. Because there has been little focus on the interactions between SCs and SMECs, particularly when firms simultaneously belong to both, this chapter examines the conduits through which information and knowledge can be transferred and utilised. It shows that each network type has its own distinct advantages in the types of information searched for and transferred amongst network member firms. Comparing and contrasting these advantages shows opportunities for both networks to leverage the knowledge sharing strengths of each other, through these ‘junctions’ to address their own weaknesses, allowing implications to be drawn concerning new ways of utilising relationships for mutual network gains.
Resumo:
This article explores the role of radio sound in establishing what I term ‘affective rhythms’ in everyday life. Through exploring the affective qualities of radio sound and its capacity for mood generation in the home, this article explores personal affective states and personal organisation. The term affective rhythm relates both to mood, and to routine. It is the combination of both that allows the possibility of thinking about sound and affect, and how they relate to, and integrate with, routine everyday life. The notion of ‘affective rhythm’ forces us to consider the idea of mood in the light of the routine nature of everyday domestic life.
Resumo:
The ad hoc networks are vulnerable to attacks due to distributed nature and lack of infrastructure. Intrusion detection systems (IDS) provide audit and monitoring capabilities that offer the local security to a node and help to perceive the specific trust level of other nodes. The clustering protocols can be taken as an additional advantage in these processing constrained networks to collaboratively detect intrusions with less power usage and minimal overhead. Existing clustering protocols are not suitable for intrusion detection purposes, because they are linked with the routes. The route establishment and route renewal affects the clusters and as a consequence, the processing and traffic overhead increases due to instability of clusters. The ad hoc networks are battery and power constraint, and therefore a trusted monitoring node should be available to detect and respond against intrusions in time. This can be achieved only if the clusters are stable for a long period of time. If the clusters are regularly changed due to routes, the intrusion detection will not prove to be effective. Therefore, a generalized clustering algorithm has been proposed that can run on top of any routing protocol and can monitor the intrusions constantly irrespective of the routes. The proposed simplified clustering scheme has been used to detect intrusions, resulting in high detection rates and low processing and memory overhead irrespective of the routes, connections, traffic types and mobility of nodes in the network. Clustering is also useful to detect intrusions collaboratively since an individual node can neither detect the malicious node alone nor it can take action against that node on its own.
Resumo:
In this paper, we present recent results with using range from radio for mobile robot localization. In previous work we have shown how range readings from radio tags placed in the environment can be used to localize a robot. We have extended previous work to consider robustness. Specifically, we are interested in the case where range readings are very noisy and available intermittently. Also, we consider the case where the location of the radio tags is not known at all ahead of time and must be solved for simultaneously along with the position of the moving robot. We present results from a mobile robot that is equipped with GPS for ground truth, operating over several km.