954 resultados para Lie algebra
Resumo:
In 1980 Alltop produced a family of cubic phase sequences that nearly meet the Welch bound for maximum non-peak correlation magnitude. This family of sequences were shown by Wooters and Fields to be useful for quantum state tomography. Alltop’s construction used a function that is not planar, but whose difference function is planar. In this paper we show that Alltop type functions cannot exist in fields of characteristic 3 and that for a known class of planar functions, x^3 is the only Alltop type function.
Resumo:
Mutually unbiased bases (MUBs) have been used in several cryptographic and communications applications. There has been much speculation regarding connections between MUBs and finite geometries. Most of which has focused on a connection with projective and affine planes. We propose a connection with higher dimensional projective geometries and projective Hjelmslev geometries. We show that this proposed geometric structure is present in several constructions of MUBs.
Resumo:
Despite the ubiquitous nature of the discourse on human rights there is currently little research on the emergence of disclosure by multinational corporations on their human rights obligations or the regulatory dynamic that may lie behind this trend. In an attempt to begin to explore the extent to which, if any, the language of human rights has entered the discourse of corporate accountability, this paper investigates the adoption of the International Labour Organisation's (ILO) human rights standards by major multinational garment retail companies that source products from developing countries, as disclosed through their reporting media. The paper has three objectives. Firstly, to empirically explore the extent to which a group of multinational garment retailers invoke the language of human rights when disclosing their corporate responsibilities. The paper reviews corporate reporting media including social responsibility codes of conduct, annual reports and stand-alone social responsibility reports released by 18 major global clothing and retail companies during a period from 1990 to 2007. We find that the number of companies adopting and disclosing on the ILO's workplace human rights standards has significantly increased since 1998 – the year in which the ILO's standards were endorsed and accepted by the global community (ILO, 1998). Secondly, drawing on a combination of Responsive Regulation theory and neo-institutional theory, we tentatively seek to understand the regulatory space that may have influenced these large corporations to adopt the language of human rights obligations. In particular, we study the role that International Governmental Organisation's (IGO) such as ILO may have played in these disclosures. Finally, we provide some critical reflections on the power and potential within the corporate adoption of the language of human rights.
Resumo:
Australian agriculture is faced with the dilemma of increasing food production for a growing domestic and world population while decreasing environmental impacts and supporting the social and economic future of regional communities. The challenge for farmers is compounded by declining rates of productivity growth which have been linked to changes in climate and decreasing investment in agricultural research. The answer must lie in understanding the ecological functionality of landscapes and matching management of agricultural systems and use of natural resources to landscape capacity in a changing climate. A simplified mixed grain and livestock farm case study is used to illustrate the challenges of assessing the potential for shifts in land allocation between commodities to achieve sustainable intensification of nutrition production. This study highlights the risks associated with overly-simplistic solutions and the need for increased investment in research to inform the development of practical strategies for increasing food production in Australian agro-ecosystems while managing the impacts of climate change and addressing climate change mitigation policies.
Resumo:
This paper focuses on very young students' ability to engage in repeating pattern tasks and identifying strategies that assist them to ascertain the structure of the pattern. It describes results of a study which is part of the Early Years Generalising Project (EYGP) and involves Australian students in Years 1 to 4 (ages 5-10). This paper reports on the results from the early years' cohort (Year 1 and 2 students). Clinical interviews were used to collect data concerning students' ability to determine elements in different positions when two units of a repeating pattern were shown. This meant that students were required to identify the multiplicative structure of the pattern. Results indicate there are particular strategies that assist students to predict these elements, and there appears to be a hierarchy of pattern activities that help students to understand the structure of repeating patterns.
Resumo:
The current discourse surrounding victims of online fraud is heavily premised on an individual notion of greed. The strength of this discourse permeates the thinking of those who have not experienced this type of crime, as well as victims themselves. The current discourse also manifests itself in theories of victim precipitation, which again assigns the locus of blame to individuals for their actions in an offence. While these typologies and categorisations of victims have been critiqued as “victim blaming” in other fields, this has not occurred with regard to online fraud victims, where victim focused ideas of responsibility for the offence continue to dominate. This paper illustrates the nature and extent of the greed discourse and argues that it forms part of a wider construction of online fraud that sees responsibility for victimisation lie with the victims themselves and their actions. It argues that the current discourse does not take into account the level of deception and the targeting of vulnerability that is employed by the offender in perpetrating this type of crime. It concludes by advocating the need to further examine and challenge this discourse, especially with regard to its potential impact for victim’s access to support services and the wider criminal justice system.
Resumo:
Most security models for authenticated key exchange (AKE) do not explicitly model the associated certification system, which includes the certification authority (CA) and its behaviour. However, there are several well-known and realistic attacks on AKE protocols which exploit various forms of malicious key registration and which therefore lie outside the scope of these models. We provide the first systematic analysis of AKE security incorporating certification systems (ASICS). We define a family of security models that, in addition to allowing different sets of standard AKE adversary queries, also permit the adversary to register arbitrary bitstrings as keys. For this model family we prove generic results that enable the design and verification of protocols that achieve security even if some keys have been produced maliciously. Our approach is applicable to a wide range of models and protocols; as a concrete illustration of its power, we apply it to the CMQV protocol in the natural strengthening of the eCK model to the ASICS setting.
Resumo:
The article focuses on how the information seeker makes decisions about relevance. It will employ a novel decision theory based on quantum probabilities. This direction derives from mounting research within the field of cognitive science showing that decision theory based on quantum probabilities is superior to modelling human judgements than standard probability models [2, 1]. By quantum probabilities, we mean decision event space is modelled as vector space rather than the usual Boolean algebra of sets. In this way,incompatible perspectives around a decision can be modelled leading to an interference term which modifies the law of total probability. The interference term is crucial in modifying the probability judgements made by current probabilistic systems so they align better with human judgement. The goal of this article is thus to model the information seeker user as a decision maker. For this purpose, signal detection models will be sketched which are in principle applicable in a wide variety of information seeking scenarios.
Resumo:
Sequences with optimal correlation properties are much sought after for applications in communication systems. In 1980, Alltop (\emph{IEEE Trans. Inf. Theory} 26(3):350-354, 1980) described a set of sequences based on a cubic function and showed that these sequences were optimal with respect to the known bounds on auto and crosscorrelation. Subsequently these sequences were used to construct mutually unbiased bases (MUBs), a structure of importance in quantum information theory. The key feature of this cubic function is that its difference function is a planar function. Functions with planar difference functions have been called \emph{Alltop functions}. This paper provides a new family of Alltop functions and establishes the use of Alltop functions for construction of sequence sets and MUBs.
Resumo:
Migraine with aura (MA) is a subtype of typical migraine. Migraine with aura (MA) also encompasses a rare severe subtype Familial Hemiplegic Migraine (FHM) with several known genetic loci. The type 2 FHM (FHM-2) susceptibility locus maps to chromosome 1q23 and mutations in the ATP1A2 gene at this site have recently been implicated. We have previously provided evidence of linkage of typical migraine (predominantly MA) to microsatellite markers on chromosome 1, in the 1q31 and 1q23 regions. In this study, we have undertaken a large genomic investigation involving candidate genes that lie within the chromosome 1q23 and 1q31 regions using an association analysis approach. Methods We have genotyped a large population of case-controls (243 unrelated Caucasian migraineurs versus 243 controls) examining a set of 5 single nucleotide polymorphisms (SNPs) and the Fas Ligand dinucleotide repeat marker, located within the chromosome 1q23 and 1q31 regions. Results Several genes have been studied including membrane protein (ATP 1 subtype A4 and FasL), cytoplasmic glycoprotein (CASQ 1) genes and potassium (KCN J9 and KCN J10) and calcium (CACNA1E) channel genes in 243 migraineurs (including 85% MA and 15% of migraine without aura (MO)) and 243 matched controls. After correction for multiple testing, chi-square results showed non-significant P values (P > 0.008) across all SNPs (and a CA repeat) tested in these different genes, however results with the KCN J10 marker gave interesting results (P = 0.02) that may be worth exploring further in other populations. Conclusion These results do not show a significant role for the tested candidate gene variants and also do not support the hypothesis that a common chromosome 1 defective gene influences both FHM and the more common forms of migraine.
Resumo:
OBJECTIVES: The aims of the study were: (i) to extend our linkage analysis of chromosome 1q microsatellite markers in predominantly migraine with aura pedigrees and (ii) to test the novel FHM-2 ATP1A2 gene for involvement in these migraine affected pedigrees and a previous pedigree (MF14) showing evidence of linkage of markers to C1q31. METHODS: A chromosome 1 scan (31 markers) was performed in 21 multiplex pedigrees affected predominantly with migraine with aura (MA). The known FHM-2 ATP1A2 gene mutations were tested, by sequencing, for the involvement in MA and migraine without aura (MO) in these pedigrees. Sequencing was performed in the coding areas of the ATP1A2 gene through three MA individuals from MF14. RESULTS: Evidence for linkage was obtained at C1q23 to markers spanning the ATP1A2 gene. However, testing of the known ATP1A2 gene mutations (for FHM) in common migraine probands of pedigrees showing excess allele sharing was negative. Sequencing of the entire coding areas of the gene through all the three MA affected from MF14 was also negative for mutations. DISCUSSION: Microsatellite markers on chromosome 1q23 show evidence of excess allele sharing in MA and some MO pedigrees, suggesting linkage to the common forms of migraine and the presence of a susceptibility gene in this region. The FHM-2 (ATP1A2 gene) does not seem to be involved in the common types of migraine. Despite certain clinical characteristics, the genetic correlation between FHM and familial typical migraine remains unclear. Several candidate genes lie within the C1q23 and C1q31 cytogenetic regions; therefore, further studies are needed.
Resumo:
As we race towards a new era, rapid change of conventional models has become the norm. Just as technology has etched itself to the core of society, the sheer quantity of student devices connecting to university networks presents a sector wide challenge coinciding almost perfectly with many universities creating technology rich learning spaces. New fears include future proofing. It is not just a matter of technology becoming outdated. In seeking to accommodate the teaching styles and experience of staff across diverse faculties, is this technology simply too vanilla to meet their needs as they become increasingly skilled and inspired by technology’s potential? Through the early findings of a study into staff use of technology within Queensland University of Technology's next generation collaborative learning spaces, this paper explores whether the answers lie in a model presented by students equipping themselves with the tools they need to learn in the 21st century.
Resumo:
This introductory section provides an overview of the different perspectives on reconceptualizing early mathematics learning. The chapters provide a broad scope in their topics and approaches to advancing young children’s mathematical learning. They incorporate studies that highlight the importance of pattern and structure across the curriculum, studies that target particular content such as statistics, early algebra, and beginning number, and studies that consider how technology and other tools can facilitate early mathematical development. Reconceptualizing the professional learning of teachers in promoting young children’s mathematics, including a consideration of the role of play, is also addressed. Although these themes are diffused throughout the chapters, we restrict our introduction to the core focus of each of the chapters.
Resumo:
As all hospital staff are highly likely to interact with people living with dementia, education about their needs must be accessible to all staff, not only clinicians. Catherine Travers and David Lie evaluate the results of providing dementia education to non-clinical staff in a large teaching hospital. Dementia training programs offered in the hospital setting can improve staff knowledge and confidence in caring for patients with dementia (Foreman & Gardner 2005; McPhail et al 2009). It’s also been shown that a relatively minor investment in staff education can have noticeable effects on both staff attitudes and hospital practices regarding the care and support of patients with dementia and cognitive impairment (Foreman & Gardner 2005)...
Resumo:
There has been significant debate about the value of screening for dementia, and the need for early diagnosis. Options include Gene testing, early risk assessment, screening, case finding and review when a patient or carer identify that they have symptoms. This paper is not focused on these early approaches to identifying people with dementia. It is focused on the period when a patient or a carer has recognised that there are some memory problems and they are seeking assistance with a diagnosis or explanation in relation to memory loss.