964 resultados para Differential response
Resumo:
In our rejoinder to Don Weatherburn's paper, “Law and Order Blues”, we do not take issue with his advocacy of the need to take crime seriously and to foster a more rational approach to the problems it poses. Where differences do emerge is (1) with his claim that he is willing to do so whilst we (in our different ways) are not; and (2) on the question of what this involves. Of particular concern is the way in which his argument proceeds by a combination of simple misrepresentation of the positions it seeks to disparage, and silence concerning issues of real substance where intellectual debate and exchange would be welcome and useful. Our paper challenges, in turn, the misrepresentation of Indermaur's analysis of trends in violent crime, the misrepresentation of Hogg and Brown's Rethinking Law and Order, the misrepresentation of the findings of some of the research into the effectiveness of punitive policies and the silence on sexual assault in “Law and Order Blues”. We suggest that his silence on sexual assault reflects a more widespread unwillingness to acknowledge the methodological problems that arise in the measurement of crime because such problems severely limit the extent to which confident assertions can be made about prevalence and trends.
Resumo:
The Chinese government should be commended for its open, concerted, and rapid response to the recent H7N9 influenza outbreak. However, the first known case was not reported until 48 days after disease onset.1 Although the difficulties in detecting the virus and the lack of suitable diagnostic methods have been the focus of discussion,2 systematic limitations that may have contributed to this delay have hardly been discussed. The detection speed of surveillance systems is limited by the highly structured nature of information flow and hierarchical organisation of these systems. Flu surveillance usually relies on notification to a central authority of laboratory confirmed cases or presentations to sentinel practices for flu-like illness. Each step in this pathway presents a bottleneck at which information and time can be lost; this limitation must be dealt with...
Resumo:
Research on the achievement and retention of female students in science and mathematics is located within a context of falling levels of participation in physical science and mathematics courses in Australian schools, and underrepresentation of females in some science, technology, engineering and mathematics (STEM) courses. The Interests and Recruitment in Science (IRIS) project is an international project that aims to contribute to understanding and improving recruitment, retention and gender equity in STEM higher education. Nearly 3500 first year students in 30 Australian universities responded to the IRIS survey of 5-point Likert items and open responses. This paper explores gender differences in first year university students’ responses to three questions about important influences on their course choice. The IRIS study found good teachers were rated highly by both males and females as influential in choosing STEM courses, and significantly higher numbers of females rated personal encouragement from senior high school science teacher as very important. In suggestions for addressing sex disparities in male-dominated STEM courses, more females indicated the importance of good teaching/encouragement and more females said (unspecified) encouragement. This study relates to the influence of school science teachers and results are discussed in relation to implications for science education.
Resumo:
A victim of phishing emails could be subjected to money loss and identity theft. This paper investigates the different types of phishing email victims, with the goal of increasing such victims' defences. To obtain this kind of information, an experiment which involves sending a phishing email to participants is conducted. Quantitative and qualitative methods are also used to collect users' information. A model for detecting deception has been employed to understand victims' behaviour. This paper reports the qualitative results. The findings suggest that victims of phishing emails do not always exhibit the same vulnerability. The cause of being a victim is a result of three weaknesses in the detection process: (1) lack of knowledge; (2) weak confirmation channel, and; (3) victims' high propensity towards risk-taking. Therefore, it is suggested that users be provided with suitable confirmation channels and be more risk averse in their behaviour so that they would not fall victim to phishing emails.
Resumo:
The aim of this work is to develop a demand-side-response model, which assists electricity consumers exposed to the market price to independently and proactively manage air-conditioning peak electricity demand. The main contribution of this research is to show how consumers can optimize the energy cost caused by the air conditioning load considering to several cases e.g. normal price, spike price, and the probability of a price spike case. This model also investigated how air-conditioning applies a pre-cooling method when there is a substantial risk of a price spike. The results indicate the potential of the scheme to achieve financial benefits for consumers and target the best economic performance for electrical generation distribution and transmission. The model was tested with Queensland electricity market data from the Australian Energy Market Operator and Brisbane temperature data from the Bureau of Statistics regarding hot days from 2011 to 2012.
Resumo:
In hyper competition, firms that are agile: sensing and responding better to customer requirements tend to be more successful and achieve supernormal profits. In spite of the widely accepted importance of customer agility, research is limited on this construct. The limited research also has predominantly focussed on the firm’s perspective of agility. However, we propose that the customers are better positioned to determine how well a firm is responding to their requirements (aka a firm’s customer agility). Taking the customers’ stand point, we address the issue of sense and respond alignment in two perspectives-matching and mediating. Based on data collected from customers in a field study, we tested hypothesis pertaining to the two methods of alignment using polynomial regression and response surface methodology. The results provide a good explanation for the role of both forms of alignment on customer satisfaction. Implication for research and practice are discussed.
Resumo:
This study assessed the revised Behavioural Inhibition System (BIS), as conceptualised by Gray and McNaughton’s (2000) revised RST, by exposing participants to a loss-framed road safety message (emphasising the negative consequences of speeding behaviour) and a high performance motor vehicle promotional advertisement. Licensed young drivers (N = 40, aged 17–25 years) were randomly allocated to view either the message or both the message and advertisement. Participants then completed a computerised lexical decision task prior to completing three personality measures: Corr-Cooper RST-PQ, CARROT and Q-Task. It was predicted that those with a stronger BIS would demonstrate greater processing of these mixed message cues compared to weaker BIS individuals, and that this BIS effect would only be observed in the mixed cues condition (due to simultaneous activation of the incentive and punishment systems). Preliminary findings will be discussed in the context of the influence of personality traits on health message processing.
Resumo:
Objectives The goal of this article is to examine whether or not the results of the Queensland Community Engagement Trial (QCET)-a randomized controlled trial that tested the impact of procedural justice policing on citizen attitudes toward police-were affected by different types of nonresponse bias. Method We use two methods (Cochrane and Elffers methods) to explore nonresponse bias: First, we assess the impact of the low response rate by examining the effects of nonresponse group differences between the experimental and control conditions and pooled variance under different scenarios. Second, we assess the degree to which item response rates are influenced by the control and experimental conditions. Results Our analysis of the QCET data suggests that our substantive findings are not influenced by the low response rate in the trial. The results are robust even under extreme conditions, and statistical significance of the results would only be compromised in cases where the pooled variance was much larger for the nonresponse group and the difference between experimental and control conditions was greatly diminished. We also find that there were no biases in the item response rates across the experimental and control conditions. Conclusion RCTs that involve field survey responses-like QCET-are potentially compromised by low response rates and how item response rates might be influenced by the control or experimental conditions. Our results show that the QCET results were not sensitive to the overall low response rate across the experimental and control conditions and the item response rates were not significantly different across the experimental and control groups. Overall, our analysis suggests that the results of QCET are robust and any biases in the survey responses do not significantly influence the main experimental findings.
Resumo:
We examine the security of the 64-bit lightweight block cipher PRESENT-80 against related-key differential attacks. With a computer search we are able to prove that for any related-key differential characteristic on full-round PRESENT-80, the probability of the characteristic only in the 64-bit state is not higher than 2−64. To overcome the exponential (in the state and key sizes) computational complexity of the search we use truncated differences, however as the key schedule is not nibble oriented, we switch to actual differences and apply early abort techniques to prune the tree-based search. With a new method called extended split approach we are able to make the whole search feasible and we implement and run it in real time. Our approach targets the PRESENT-80 cipher however,with small modifications can be reused for other lightweight ciphers as well.
Resumo:
In this paper we present truncated differential analysis of reduced-round LBlock by computing the differential distribution of every nibble of the state. LLR statistical test is used as a tool to apply the distinguishing and key-recovery attacks. To build the distinguisher, all possible differences are traced through the cipher and the truncated differential probability distribution is determined for every output nibble. We concatenate additional rounds to the beginning and end of the truncated differential distribution to apply the key-recovery attack. By exploiting properties of the key schedule, we obtain a large overlap of key bits used in the beginning and final rounds. This allows us to significantly increase the differential probabilities and hence reduce the attack complexity. We validate the analysis by implementing the attack on LBlock reduced to 12 rounds. Finally, we apply single-key and related-key attacks on 18 and 21-round LBlock, respectively.
Resumo:
Upon overexpression of integrin αvβ3 and its engagement by vitronectin, we previously showed enhanced adhesion, proliferation, and motility of human ovarian cancer cells. By studying differential expression of genes possibly related to these tumor biological events, we identified the epidermal growth-factor receptor (EGF-R) to be under control of αvβ3 expression levels. Thus in the present study we characterized αvβ3-dependent changes of EGF-R and found significant upregulation of its expression and activity which was reflected by prominent changes of EGF-R promoter activity. Upon disruption of DNA-binding motifs for the transcription factors p53, ETF, the repressor ETR, p50, and c-rel, respectively, we sought to identify DNA elements contributing to αvβ3-mediated EGF-R promoter induction. Both, the p53- and ETF-mutant, while exhibiting considerably lower EGF-R promoter activity than the wild type promoter, retained inducibility by αvβ3. Mutation of the repressor motif ETR, as expected, enhanced EGF-R promoter activity with a further moderate increase upon αvβ3 elevation. The p50-mutant displayed EGF-R promoter activity almost comparable to that of the wild type promoter with no impairment of induction by αvβ3. However, the activity of an EGF-R promoter mutant displaying a disrupted c-rel-binding motif did not only prominently decline, but, moreover, was not longer responsive to enhanced αvβ3, involving this DNA element in αvβ3-dependent EGF-R upregulation. Moreover, αvβ3 did not only increase the EGF-R but, moreover, also led to obvious co-clustering on the cancer cell surface. By studying αvβ3/EGF-R-effects on the focal adhesion kinase (FAK) and the mitogen activated protein kinases (MAPK) p44/42 (erk−1/erk−2), having important functions in synergistic crosstalk between integrins and growth-factor receptors, we found for both significant enhancement of expression and activity upon αvβ3/VN interaction and cell stimulation by EGF. Upregulation of the EGF-R by integrin αvβ3, both receptor molecules with a well-defined role as targets for cancer treatment, might represent an additional mechanism to adapt synergistic receptor signaling and crosstalk in response to an altered tumor cell microenvironment during ovarian cancer progression.
Resumo:
In this paper we investigate the differential properties of block ciphers in hash function modes of operation. First we show the impact of differential trails for block ciphers on collision attacks for various hash function constructions based on block ciphers. Further, we prove the lower bound for finding a pair that follows some truncated differential in case of a random permutation. Then we present open-key differential distinguishers for some well known round-reduced block ciphers.
Resumo:
Background The learning and teaching of epidemiology is core to many public health programs. Many students find the content of epidemiology, and specifically risk of bias assessment, challenging to learn. Howbeit, learning is enhanced when knowledge is able to be acquired from an active-learning, hands-on experience. Methods The innovative use of wireless audience response technology “clickers” was incorporated into the lectures of the university’s post-graduate epidemiology units and the tailored epidemiological modules delivered for professional disciplines (e.g. optometry). Clickers were used to apply several pedagogical approaches of active learning including peer-instruction and real-world simulation. Students were also assessed for their gain in knowledge within the lecture (pre-post) and their perceptions of how the use of clickers helped them learn. The routine university-wide end of semester Insight Survey provided further information of the student’s satisfaction with the approach. Results The technology was useful in identifying deficits of knowledge of key concepts either before or after instruction. Where key concepts were re-tested post-lecture, as expected, knowledge increased significantly and provided immediate feed-back to students. Across the lecture series, typically 85% of students identified the technology helped them learn, increased their opportunity to interact with the lecturer, and recommend their use for future classes. The Insight Survey report identified 93% of respondents identified the unit in which clickers were consistently used provided good learning opportunities. Numerous student comments supported the teaching method. Conclusions Epidemiological subject matter lends itself to incorporation of audience response technology. The use of the technology to facilitate interactive voting provides an instant response and participation of everyone to enhance the classroom experience. The pedagogical approach increases students’ knowledge and increases their satisfaction with the unit.
Resumo:
This paper presents the blast response, damage mechanism and evaluation of residual load capacity of a concrete–steel composite (CSC) column using dynamic computer simulation techniques. This study is an integral part of a comprehensive research program which investigated the vulnerability of structural framing systems to catastrophic and progressive collapse under blast loading and is intended to provide design information on blast mitigation and safety evaluation of load bearing vulnerable columns that are key elements in a building. The performance of the CSC column is compared with that of a reinforced concrete (RC) column with the same dimensions and steel ratio. Results demonstrate the superior performance of the CSC column, compared to the RC column in terms of residual load carrying capacity, and its potential for use as a key element in structural systems. The procedure and results presented herein can be used in the design and safety evaluation of key elements of multi-storey buildings for mitigating the impact of blast loads.
Resumo:
Gold particle interaction with few-layer graphenes is of interest for the development of numerous optical nanodevices. The results of numerical studies of the coupling of gold nanoparticles with few-layer vertical graphene sheets are presented. The field strengths are computed and the optimum nanoparticle configurations for the formation of SERS hotpots are obtained. The nanoparticles are modeled as 8 nm diameter spheres atop 1.5 nm (5 layers) graphene sheet. The vertical orientation is of particular interest as it is possible to use both sides of the graphene structure and potentially double the number of particles in the system. Our results show that with the addition of an opposing particle a much stronger signal can be obtained as well as the particle separation can be controlled by the number of atomic carbon layers. These results provide further insights and contribute to the development of next-generation plasmonic devices based on nanostructures with hybrid dimensionality.