956 resultados para Embryo Culture Techniques
Resumo:
Despite the presence of many regulations governing the operation of heavy vehicles and supply chains in Australia, the truck driving sector continues to have the highest incidence of fatal injuries compared to all other industries. The working environment has been the focus of attention by safety researchers during the past few decades, with particular consideration been given to the concept ‘safety culture’ and how to maintain, modify and advance responses to occupational risk. One important aspect of the heavy industry which sets it apart is the existence of cultural or sub-cultural influences at an industry wide and occupation-specific level rather than organisational level. This paper reports on the findings of stakeholder’s perceptions of the influences of power and control, and culture on industry safety. In-depth structured interviews were conducted during 2011 with Australian industry stakeholders (n=31). The questioning surrounded decision-making processes with regards to identifying risks, self-monitoring and reducing risky activities; as well as how power-affected relationships may influence the operational performance of supply chains and impacts on driver safety. One of the most significant findings from these interviews relates to the notion of power. The perception that the ‘Customer is King’ was widely viewed, with the majority of stakeholders believing that there exists a ‘master slave mentality’ in the industry. There appears to be great frustration in the industry as to the apparent immunity of customers (particularly retail supply chains) to their responsibilities. There was also a strong perception that the customer holds the balance of power by covertly employing remuneration-related incentives and pressures. Smaller trucking companies are perceived as being more vulnerable to the pressure of customer expectations.
Resumo:
Despite significant research, there is still little agreement over how to define safety culture or of what it is comprised. Due to this lack of agreement, much of the safety culture research has little more than safety management strategies in common. There is, however, a degree of acceptance of the close relationship between safety culture and organisational culture. Organisational culture can be described using traditional views of culture drawn from the anthropology and cultural psychology literature. However, the safety culture literature rarely ventures beyond organisational culture into discussions of these more traditional concepts of culture. There is a need to discuss how these concepts of culture can be applied to safety culture to provide greater understanding of safety culture and additional means by which to approach safety in the workplace. This review explores how three traditional conceptualisations of culture; the normative, anthropological and pragmatist conceptualisations, can and have been be applied to safety culture. Finally the review proposes a synthesised conceptualisation of safety culture which can be used to provide greater depth and practical applicability of safety culture, by increasing our understanding of the interactions between cultural and contextual variables in a given workplace and the effect they have on safety.
Resumo:
With the explosive growth of resources available through the Internet, information mismatching and overload have become a severe concern to users. Web users are commonly overwhelmed by huge volume of information and are faced with the challenge of finding the most relevant and reliable information in a timely manner. Personalised information gathering and recommender systems represent state-of-the-art tools for efficient selection of the most relevant and reliable information resources, and the interest in such systems has increased dramatically over the last few years. However, web personalization has not yet been well-exploited; difficulties arise while selecting resources through recommender systems from a technological and social perspective. Aiming to promote high quality research in order to overcome these challenges, this paper provides a comprehensive survey on the recent work and achievements in the areas of personalised web information gathering and recommender systems. The report covers concept-based techniques exploited in personalised information gathering and recommender systems.
Resumo:
Research capacity building has become a prominent theme in higher education institutions in China and across the world. However, Chinese Teaching English as a Foreign Language academics' research output has been quite limited. In order to build their research capacity, it is necessary to understand their perceptions about research. This case study presents the perceptions about research of six Chinese Teaching English as a Foreign Language academics in a context of growing institutional demands for research. One-on-one interviews of 35-60 minutes' duration were conducted with these academics from an institution in north China. Thematic analysis of the transcribed interviews indicated that the Chinese Teaching English as a Foreign Language academics held positive perceptions about the teaching-research nexus. However, the value of research to them seemed to be limited to teaching and career advancement. They also expressed varied concerns about the institutional research requirements. The findings suggested several implications for the institution's administrators to further enhance academics' research capacity building.
Resumo:
Principal Topic Counties in Northern Europe, such as Sweden, Finland and Denmark, have comparatively low per capita rates of entrepreneurship as measured by independent new venture start-up rates – as for example measured by the Global Entrepreneurship Monitor (GEM) Total entrepreneurial activity (TEA) rate. However, the latest 2011 GEM data reveals that these same countries have comparatively very high Employee Entrepreneurship Activity (EEA) rates – that is a high rate per capita of employees involved in new product development or new enterprise activities. This observation has prompted us to investigate the role of national culture in driving independent versus employee entrepreneurial activities. Prior research has established that national (and regional) culture plays an important role in forming an “entrepreneurial culture” that encourages (or discourages) independent business start-ups and TEA (e.g. Davidsson, 1995; Beugelsdijk, 2007). However, the relationship of culture and EEA has not received research attention. Moreover, empirical relationships between elements of national culture and independent entrepreneurship have revealed some surprising results. For example, Wildeman et al. (1999) report an unexpected higher share of individual business ownership in countries that have higher uncertainty avoidance, higher power distance and lower individualism according to Hofstede’s dimensions of culture. They speculate that dissatisfaction can be a source of entrepreneurship: in countries with a high power distance, a high uncertainty avoidance and low individualism, there may be relatively more business owners since enterprising individuals cannot satisfy their needs within existing organizations. Yet it remains a rather open question whether entrepreneurial behaviour in existing organisations provides a satisfactory explanation for these empirical findings. Methods We will conduct a cross sectional study of the influence of national culture according to the five / six dimensions of Hofstede (1980; 2001) on both TEA and EEA for the 54 countries that participated in GEM 2011. Since it is well established that the opportunities for entrepreneurship vary substantially with a country’s level of economic development, we intend to conduct separate analyses for the three categories of development – innovation driven economies, efficient driven economies and factor driven economies. We also intend to restrict our assessment of TEA to opportunity driven entrepreneurship, as necessity driven entrepreneurship has a different relationship to the “entrepreneurial culture” that is the focus of our study. We will control for a range of factors such as GDP growth, ease of doing business index and unemployment. Results and Implications Descriptive analyses of the GEM TEA and EEA data reveal clusters of countries that appear to be have similar national culture. We are yet to conduct regression analyses.
Resumo:
This paper investigates advanced channel compensation techniques for the purpose of improving i-vector speaker verification performance in the presence of high intersession variability using the NIST 2008 and 2010 SRE corpora. The performance of four channel compensation techniques: (a) weighted maximum margin criterion (WMMC), (b) source-normalized WMMC (SN-WMMC), (c) weighted linear discriminant analysis (WLDA), and; (d) source-normalized WLDA (SN-WLDA) have been investigated. We show that, by extracting the discriminatory information between pairs of speakers as well as capturing the source variation information in the development i-vector space, the SN-WLDA based cosine similarity scoring (CSS) i-vector system is shown to provide over 20% improvement in EER for NIST 2008 interview and microphone verification and over 10% improvement in EER for NIST 2008 telephone verification, when compared to SN-LDA based CSS i-vector system. Further, score-level fusion techniques are analyzed to combine the best channel compensation approaches, to provide over 8% improvement in DCF over the best single approach, (SN-WLDA), for NIST 2008 interview/ telephone enrolment-verification condition. Finally, we demonstrate that the improvements found in the context of CSS also generalize to state-of-the-art GPLDA with up to 14% relative improvement in EER for NIST SRE 2010 interview and microphone verification and over 7% relative improvement in EER for NIST SRE 2010 telephone verification.
Resumo:
Background: Ureaplasma species in amniotic fluid at the time of second-trimester amniocentesis increases the risk of preterm birth, but most affected pregnancies continue to term (Gerber et al. J Infect Dis 2003). We aimed to model intra-amniotic (IA) ureaplasma infection in spiny mice, a species with a relatively long gestation (39 days) that allows investigation of the disposition and possible clearance of ureaplasmas in the feto-placental compartment. Method: Pregnant spiny mice received IA injections of U. parvum serovar 6 (10µL, 1x104 colony-forming-units in PBS) or 10B media (10µL; control) at 20 days (d) of gestation (term=39d). At 37d fetuses (n=3 ureaplasma, n=4 control) were surgically delivered and tissues were collected for; bacterial culture, ureaplasma mba and urease gene expression by PCR, tissue WBC counts and indirect fluorescent antibody (IFA) staining using anti-ureaplasma serovar 6 (rabbit) antiserum. Maternal and fetal plasma IgG was measured by Western blot. Results: Ureaplasmas were not detected by culture or PCR in fetal or maternal tissues but were visualized by IFA within placental and fetal lung tissues, in association with inflammatory changes and elevated WBC counts (p<0.0001). Anti-ureaplasma IgG was detected in maternal (2/2 tested) and fetal (1/2 tested) plasma but not in controls (0/3). Conclusions: IA injection of ureaplasmas in mid-gestation spiny mice caused persistent fetal lung and placental infection even though ureaplasmas were undetectable using standard culture or PCR techniques. This is consistent with resolution of IA infection, which may occur in human pregnancies that continue to term despite detection of ureaplasmas in mid-gestation.
Resumo:
In this presentation, renowned arts practitioner, Sean Mee, and Nigel Lavender, Executive Director of the Queensland Music Festival, talk about how community arts practice can be used to build cultural captial in communities, using examples such large-scale musicals such as The Road We're ON (Charleville) and Behind the Cand (Bowen), Mee and Lavender highlight the importance of community-driven narrative and particiaption.
Resumo:
A number of mathematical models investigating certain aspects of the complicated process of wound healing are reported in the literature in recent years. However, effective numerical methods and supporting error analysis for the fractional equations which describe the process of wound healing are still limited. In this paper, we consider the numerical simulation of a fractional mathematical model of epidermal wound healing (FMM-EWH), which is based on the coupled advection-diffusion equations for cell and chemical concentration in a polar coordinate system. The space fractional derivatives are defined in the Left and Right Riemann-Liouville sense. Fractional orders in the advection and diffusion terms belong to the intervals (0, 1) or (1, 2], respectively. Some numerical techniques will be used. Firstly, the coupled advection-diffusion equations are decoupled to a single space fractional advection-diffusion equation in a polar coordinate system. Secondly, we propose a new implicit difference method for simulating this equation by using the equivalent of Riemann-Liouville and Grünwald-Letnikov fractional derivative definitions. Thirdly, its stability and convergence are discussed, respectively. Finally, some numerical results are given to demonstrate the theoretical analysis.
Resumo:
This chapter provides researchers with a guide to some of the types of dating techniques that can be used in geomorpological investigations and issues that need to be addressed when using gechronological data, specifically issues relating to accuracy and precision. This chapter also introduces the 'types' of dating methods that are commonly used in geomorphological studies. This includes sidereal, isotopic, radiogenic, and chemical dating methods.
Resumo:
Corporate scandals are as old as the corporate form itself. Consider, for example, the controversies surrounding the role of one of the first modern corporations, the British East India Company, in the Bengal famine of 1770 and in the Chinese opium trade. Yet it is the increasing scale and scope of unethical acts carried out by individuals in the name, and interests, of corporations that continue to be concerning. Recent revelations surrounding the extent of bribery and covert surveillance used by News Corporation journalists in its British operations continue to shock the world and undermine confidence in that organiszation and journalists in general. Yet despite the systemic nature of many of these unethical activities, corporate leaders generally plead ignorance when transgressions come to light. During the enquity into the News Corporation scandal, Rupert Murdoch, the CEO and chairman, rejected the assertion that he was ultimately 'responsible for this whole fiasco' (House of Commons, 2011, Q.230). Instead, like many corporate leaders before him, Murdoch placed blame on the employees within the newspaper. His responses poses an increasingly important question: Do corporate leaders bear responsibility for the conduct of individuals within a corporation and, if so, why?
Resumo:
Availability has become a primary goal of information security and is as significant as other goals, in particular, confidentiality and integrity. Maintaining availability of essential services on the public Internet is an increasingly difficult task in the presence of sophisticated attackers. Attackers may abuse limited computational resources of a service provider and thus managing computational costs is a key strategy for achieving the goal of availability. In this thesis we focus on cryptographic approaches for managing computational costs, in particular computational effort. We focus on two cryptographic techniques: computational puzzles in cryptographic protocols and secure outsourcing of cryptographic computations. This thesis contributes to the area of cryptographic protocols in the following ways. First we propose the most efficient puzzle scheme based on modular exponentiations which, unlike previous schemes of the same type, involves only a few modular multiplications for solution verification; our scheme is provably secure. We then introduce a new efficient gradual authentication protocol by integrating a puzzle into a specific signature scheme. Our software implementation results for the new authentication protocol show that our approach is more efficient and effective than the traditional RSA signature-based one and improves the DoSresilience of Secure Socket Layer (SSL) protocol, the most widely used security protocol on the Internet. Our next contributions are related to capturing a specific property that enables secure outsourcing of cryptographic tasks in partial-decryption. We formally define the property of (non-trivial) public verifiability for general encryption schemes, key encapsulation mechanisms (KEMs), and hybrid encryption schemes, encompassing public-key, identity-based, and tag-based encryption avors. We show that some generic transformations and concrete constructions enjoy this property and then present a new public-key encryption (PKE) scheme having this property and proof of security under the standard assumptions. Finally, we combine puzzles with PKE schemes for enabling delayed decryption in applications such as e-auctions and e-voting. For this we first introduce the notion of effort-release PKE (ER-PKE), encompassing the well-known timedrelease encryption and encapsulated key escrow techniques. We then present a security model for ER-PKE and a generic construction of ER-PKE complying with our security notion.