945 resultados para Identity by descent matrix
Resumo:
A review of the 6th APT focusing on the work and performance of Rohan Wealleans
Creating 'saviour siblings' : the notion of harming by conceiving in the context of healthy children
Resumo:
Over the past decade there have been a number of families who have utilised assisted reproductive technologies (ARTs) to create a tissue-matched child, with the purpose of using the child’s tissue to cure an existing sick child. This inevitably brings such families a sense of hope as the ultimate aim is to overcome a family health crisis. However, this specific use of reproductive technologies has been the subject of significant criticism, most of which is levelled against the potential harm to the ‘saviour’ child. In Australia, families seeking to access reproductive technologies in this context are therefore required to justify their motives to an ethics committee in order to establish, amongst other things, whether the child will suffer harm once born. This paper explores the concept of harm in the context of conception, focusing on whether it is possible to ‘harm’ a healthy child who has been conceived to save another. To achieve this, the paper will evaluate the impact of the ‘non-identity’ principle in the ‘saviour sibling’ context, and assess the existing body of literature which addresses ‘harm’ in the context of conception. As will be established, the majority of such literature has focused on ‘wrongful life’ cases which seek to address whether an existing child who has been born with a disability, has been harmed. Finally, this paper will distinguish the harm arguments in the ‘saviour sibling’ context based on the fact that the harm evaluation concerns the ‘future-life’ assessment of a healthy child.
Resumo:
The increase of online services, such as eBanks, WebMails, in which users are verified by a username and password, is increasingly exploited by Identity Theft procedures. Identity Theft is a fraud, in which someone pretends to be someone else is order to steal money or get other benefits. To overcome the problem of Identity Theft an additional security layer is required. Within the last decades the option of verifying users based on their keystroke dynamics was proposed during login verification. Thus, the imposter has to be able to type in a similar way to the real user in addition to having the username and password. However, verifying users upon login is not enough, since a logged station/mobile is vulnerable for imposters when the user leaves her machine. Thus, verifying users continuously based on their activities is required. Within the last decade there is a growing interest and use of biometrics tools, however, these are often costly and require additional hardware. Behavioral biometrics, in which users are verified, based on their keyboard and mouse activities, present potentially a good solution. In this paper we discuss the problem of Identity Theft and propose behavioral biometrics as a solution. We survey existing studies and list the challenges and propose solutions.
Resumo:
With the overwhelming increase in the amount of texts on the web, it is almost impossible for people to keep abreast of up-to-date information. Text mining is a process by which interesting information is derived from text through the discovery of patterns and trends. Text mining algorithms are used to guarantee the quality of extracted knowledge. However, the extracted patterns using text or data mining algorithms or methods leads to noisy patterns and inconsistency. Thus, different challenges arise, such as the question of how to understand these patterns, whether the model that has been used is suitable, and if all the patterns that have been extracted are relevant. Furthermore, the research raises the question of how to give a correct weight to the extracted knowledge. To address these issues, this paper presents a text post-processing method, which uses a pattern co-occurrence matrix to find the relation between extracted patterns in order to reduce noisy patterns. The main objective of this paper is not only reducing the number of closed sequential patterns, but also improving the performance of pattern mining as well. The experimental results on Reuters Corpus Volume 1 data collection and TREC filtering topics show that the proposed method is promising.
Resumo:
Internet services are important part of daily activities for most of us. These services come with sophisticated authentication requirements which may not be handled by average Internet users. The management of secure passwords for example creates an extra overhead which is often neglected due to usability reasons. Furthermore, password-based approaches are applicable only for initial logins and do not protect against unlocked workstation attacks. In this paper, we provide a non-intrusive identity verification scheme based on behavior biometrics where keystroke dynamics based-on free-text is used continuously for verifying the identity of a user in real-time. We improved existing keystroke dynamics based verification schemes in four aspects. First, we improve the scalability where we use a constant number of users instead of whole user space to verify the identity of target user. Second, we provide an adaptive user model which enables our solution to take the change of user behavior into consideration in verification decision. Next, we identify a new distance measure which enables us to verify identity of a user with shorter text. Fourth, we decrease the number of false results. Our solution is evaluated on a data set which we have collected from users while they were interacting with their mail-boxes during their daily activities.
Resumo:
OBJECTIVE: Chemoresistance is a critical feature of advanced ovarian cancer with only 30% of patients surviving longer than 5 years. We have previously shown that four kallikrein-related (KLK) peptidases, KLK4, KLK5, KLK6 and KLK7 (KLK4-7), are implicated in peritoneal invasion and tumour growth, but underlying mechanisms were not identified. We also reported that KLK7 overexpression confers chemoresistance to paclitaxel, and cell survival via integrins. In this study, we further explored the functional consequenses of overexpression of all four KLKs (KLK4-7) simultaneously in the ovarian cancer cell line, OV-MZ-6, and its impact on integrin expression and signalling, cell adhesion and survival as contributors to chemoresistance and metastatic progression. METHODS: Quantitative gene and protein expression analyses, confocal microscopy, cell adhesion and chemosensitivity assays were performed. RESULTS: Expression of α5β1/αvβ3 integrins was downregulated upon combined stable KLK4-7 overexpression in OV-MZ-6 cells. Accordingly, the adhesion of these cells to vitronectin and fibronectin, the extracellular matrix binding proteins of α5β1/αvβ3 integrins and two predominant proteins of the peritoneal matrix, was decreased. KLK4-7-transfected cells were more resistant to paclitaxel (10-100 nmol/L: 38-54%), but not to carboplatin, which was associated with decreased apoptotic stimuli. However, the KLK4-7-induced paclitaxel resistance was not blocked by the MEK1/2 inhibitor, U0126. CONCLUSIONS: This study demonstrates that combined KLK4-7 expression by ovarian cancer cells promotes reduced integrin expression with consequently less cell-matrix attachment, and insensitivity to paclitaxel mediated by complex integrin and MAPK independent interactions, indicative of a malignant phenotype and disease progression suggesting a role for these KLKs in this process.
Resumo:
This research examines the effects of expectation (perceived attractiveness) on satisfaction, place identity, and place dependence. Place identity and place dependence are viewed as relational components of choice and relate to deeper needs. This study proposes that these two relational components depend on transactional expectations, which are emergent and determined by past experiences and visitor goals. In a theoretically elaborated and tested Structural Equation Model (SEM) this study assumes that these relationships vary according to intentions to return. The study addresses the conditions under which loyalty intentions influence the deeper place attachments (place identity and place dependence) that visitors associate with attractive cultural and natural destinations. The model is tested on a sample of 504 international tourists visiting Tanzania during fall 2010, and explains 59% of variance in the predicted dependent variables. The results are linked to a discussion on loyalty programs.
Resumo:
Identity-Based (IB) cryptography is a rapidly emerging approach to public-key cryptography that does not require principals to pre-compute key pairs and obtain certificates for their public keys— instead, public keys can be arbitrary identifiers such as email addresses, while private keys are derived at any time by a trusted private key generator upon request by the designated principals. Despite the flurry of recent results on IB encryption and signature, some questions regarding the security and efficiency of practicing IB encryption (IBE) and signature (IBS) as a joint IB signature/encryption (IBSE) scheme with a common set of parameters and keys, remain unanswered. We first propose a stringent security model for IBSE schemes. We require the usual strong security properties of: (for confidentiality) indistinguishability against adaptive chosen-ciphertext attacks, and (for nonrepudiation) existential unforgeability against chosen-message insider attacks. In addition, to ensure as strong as possible ciphertext armoring, we also ask (for anonymity) that authorship not be transmitted in the clear, and (for unlinkability) that it remain unverifiable by anyone except (for authentication) by the legitimate recipient alone. We then present an efficient IBSE construction, based on bilinear pairings, that satisfies all these security requirements, and yet is as compact as pairing-based IBE and IBS in isolation. Our scheme is secure, compact, fast and practical, offers detachable signatures, and supports multirecipient encryption with signature sharing for maximum scalability.
Resumo:
Melt electrospinning in a direct writing mode is a recent additive manufacturing approach to fabricate porous scaffolds for tissue engineering applications. In this study, we describe porous and cell-invasive poly (ε-caprolactone) scaffolds fabricated by combining melt electrospinning and a programmable x–y stage. Fibers were 7.5 ± 1.6 µm in diameter and separated by interfiber distances ranging from 8 to 133 µm, with an average of 46 ± 22 µm. Micro-computed tomography revealed that the resulting scaffolds had a highly porous (87%), three-dimensional structure. Due to the high porosity and interconnectivity of the scaffolds, a top-seeding method was adequate to achieve fibroblast penetration, with cells present throughout and underneath the scaffold. This was confirmed histologically, whereby a 3D fibroblast-scaffold construct with full cellular penetration was produced after 14 days in vitro. Immunohistochemistry was used to confirm the presence and even distribution of the key dermal extracellular matrix proteins, collagen type I and fibronectin. These results show that melt electrospinning in a direct writing mode can produce cell invasive scaffolds, using simple top-seeding approaches.
Resumo:
In this study, I investigate the model of English language teacher education developed in Cuba. It includes features that would be considered innovative, contemporary, good practice anywhere in the Western world, as well as having distinctly Cuban elements. English is widely taught in Cuba in the education system and on television by Cuban teachers who are prepared in five-year courses at pedagogical universities by bilingual Cuban teacher educators. This case study explores the identity and pedagogy of six English language teacher educators at Cuba’s largest university of pedagogical sciences. Postcolonial theory provides a framework for examining how the Cuban pedagogy of English language teacher education resists the negative representation of Cuba in hegemonic Western discourse; and challenges neoliberal Western dogma. Postcolonial concepts of representation, resistance and hybridity are used in this examination. Cuban teacher education features a distinctive ‘pedagogy of tenderness’. Teacher educators build on caring relationships and institutionalised values of solidarity, collectivism and collaboration. Communicative English language teaching strategies are contextualised to enhance the pedagogical and communicative competence of student teachers, and intercultural intelligibility is emphasised. The collaborative pedagogy of Cuban English language teacher education features peer observation, mentoring and continuing professional development; as well as extensive pre-service classroom teaching and research skill development for student teachers. Being Cuban and bilingual are significant aspects of the professional identity of case members, who regard their profession as a vocation and who are committed to preparing good English language teachers.
Resumo:
Particulate matter research is essential because of the well known significant adverse effects of aerosol particles on human health and the environment. In particular, identification of the origin or sources of particulate matter emissions is of paramount importance in assisting efforts to control and reduce air pollution in the atmosphere. This thesis aims to: identify the sources of particulate matter; compare pollution conditions at urban, rural and roadside receptor sites; combine information about the sources with meteorological conditions at the sites to locate the emission sources; compare sources based on particle size or mass; and ultimately, provide the basis for control and reduction in particulate matter concentrations in the atmosphere. To achieve these objectives, data was obtained from assorted local and international receptor sites over long sampling periods. The samples were analysed using Ion Beam Analysis and Scanning Mobility Particle Sizer methods to measure the particle mass with chemical composition and the particle size distribution, respectively. Advanced data analysis techniques were employed to derive information from large, complex data sets. Multi-Criteria Decision Making (MCDM), a ranking method, drew on data variability to examine the overall trends, and provided the rank ordering of the sites and years that sampling was conducted. Coupled with the receptor model Positive Matrix Factorisation (PMF), the pollution emission sources were identified and meaningful information pertinent to the prioritisation of control and reduction strategies was obtained. This thesis is presented in the thesis by publication format. It includes four refereed papers which together demonstrate a novel combination of data analysis techniques that enabled particulate matter sources to be identified and sampling site/year ranked. The strength of this source identification process was corroborated when the analysis procedure was expanded to encompass multiple receptor sites. Initially applied to identify the contributing sources at roadside and suburban sites in Brisbane, the technique was subsequently applied to three receptor sites (roadside, urban and rural) located in Hong Kong. The comparable results from these international and national sites over several sampling periods indicated similarities in source contributions between receptor site-types, irrespective of global location and suggested the need to apply these methods to air pollution investigations worldwide. Furthermore, an investigation into particle size distribution data was conducted to deduce the sources of aerosol emissions based on particle size and elemental composition. Considering the adverse effects on human health caused by small-sized particles, knowledge of particle size distribution and their elemental composition provides a different perspective on the pollution problem. This thesis clearly illustrates that the application of an innovative combination of advanced data interpretation methods to identify particulate matter sources and rank sampling sites/years provides the basis for the prioritisation of future air pollution control measures. Moreover, this study contributes significantly to knowledge based on chemical composition of airborne particulate matter in Brisbane, Australia and on the identity and plausible locations of the contributing sources. Such novel source apportionment and ranking procedures are ultimately applicable to environmental investigations worldwide.
Resumo:
In this article, I argue for an acknowledgement of the significance of the dancer’s role in the creation of independent contemporary dance. I propose the term ‘moving identity’ to outline the independent contemporary dancer’s ‘way of moving’ which could be perceived as the accumulation of various factors including training approaches, choreographic movement traces and anatomical structures. The concept of the moving identity allows us to appreciate the dancer’s unique signature movement style as the collation of embodied experiences into a unique way of moving. However, the moving identity is also open to change when the dancer encounters new choreography and the choreographer. Professional dance training produces particular types of dancers, depending on the techniques with which they engage. I demonstrate how the independent contemporary dancer troubles this distinctiveness by engaging with a multitude of movement styles and approaches throughout a career. This leads me to a fresh description of the dancer’s activity through the lens of Deleuzean concepts of multiplicity and de-stratification. Finally, I propose a definition of the dancer as a fluid and mutable body-in-flux with the creative potential to significantly influence the outcome of the choreographic process.
Resumo:
This thesis investigates the role of personal Digital Stories shared in public spaces as catalysts for social change. By analysing the influence of workshop facilitators, organisations, digital platforms and networked publics on voice and self-representation, it sheds light on shifting meanings of publicness and privacy, both face to face and online. This thesis argues that, despite numerous obstacles, the cumulative influence of diverse voices dispersed among networked publics shape new cultural norms, thereby contributing to gradual social change.
Resumo:
Iris based identity verification is highly reliable but it can also be subject to attacks. Pupil dilation or constriction stimulated by the application of drugs are examples of sample presentation security attacks which can lead to higher false rejection rates. Suspects on a watch list can potentially circumvent the iris based system using such methods. This paper investigates a new approach using multiple parts of the iris (instances) and multiple iris samples in a sequential decision fusion framework that can yield robust performance. Results are presented and compared with the standard full iris based approach for a number of iris degradations. An advantage of the proposed fusion scheme is that the trade-off between detection errors can be controlled by setting parameters such as the number of instances and the number of samples used in the system. The system can then be operated to match security threat levels. It is shown that for optimal values of these parameters, the fused system also has a lower total error rate.
Resumo:
Welcome to the Quality assessment matrix. This matrix is designed for highly qualified discipline experts to evaluate their course, major or unit in a systematic manner. The primary purpose of the Quality assessment matrix is to provide a tool that a group of academic staff at universities can collaboratively review the assessment within a course, major or unit annually. The annual review will result in you being read for an external curricula review at any point in time. This tool is designed for use in a workshop format with one, two or more academic staff, and will lead to an action plan for implementation.