880 resultados para Prospective Analysis
Resumo:
Two kinds of coal-bearing kaolinite from China were analysed by X-ray diffraction (XRD), Thermogravimetric analysis-mass spectrometry (TG-MS), infrared emission spectroscopy. Thermal decomposition occurs in a series of steps attributed to (a) desorption of water at 68 °C for Datong coal bearing strata kaolinite and 56 °C for Xiaoxian with mass losses of 0.36 % and 0.51 % (b) decarbonization at 456 °C for Datong coal bearing strata kaolinite and 431 °C for Xiaoxian kaolinite, (c) dehydroxylation takes place in two steps at 589 and 633 °C for Datong coal bearing strata kaolinite and at 507 °C and 579 °C for Xiaoxian kaolinite. This mineral were further characterised by infrared emission spectroscopy (IES). Well defined hydroxyl stretching bands at around 3695, 3679, 3652 and 3625 cm-1 are observed. At 650 °C all intensity in these bands is lost in harmony with the thermal analysis results. Characteristic functional groups from coal are observed at 1918, 1724 and 1459 cm-1. The intensity of these bands decrease by thermal treatment and is lost by 700 °C.
Resumo:
This technical report is concerned with one aspect of environmental monitoring—the detection and analysis of acoustic events in sound recordings of the environment. Sound recordings offer ecologists the potential advantages of cheaper and increased sampling. An acoustic event detection algorithm is introduced that outputs a compact rectangular marquee description of each event. It can disentangle superimposed events, which are a common occurrence during morning and evening choruses. Next, three uses to which acoustic event detection can be put are illustrated. These tasks have been selected because they illustrate quite different modes of analysis: (1) the detection of diffuse events caused by wind and rain, which are a frequent contaminant of recordings of the terrestrial environment; (2) the detection of bird calls using the spatial distribution of their component events; and (3) the preparation of acoustic maps for whole ecosystem analysis. This last task utilises the temporal distribution of events over a daily, monthly or yearly cycle.
Resumo:
BACKGROUND: Western studies have suggested that emotional stress and distress impacted on the morbidity and mortality in people following acute coronary events. Symptoms of anxiety and depression have been associated with re-infarction and death, prolonged recovery and disability and depression may precipitate the client's low self-esteem. This study examined perceived anxiety, depression and self-esteem of Hong Kong Chinese clients diagnosed with acute coronary syndrome (ACS) over a 6-month period following hospital admission. OBJECTIVES: To examine: DESIGN: A prospective, repeated measures design with measures taken on two occasions over a 6-month period; (1) within the 1st week of hospital admission following the onset of ACS and (2) at 6 months follow up. SETTING AND PARTICIPANTS: Convenient sample of 182 voluntary consented clients admitted with ACS to a major public hospital in Hong Kong who could communicate in Chinese, complete questionnaires, cognitive intact, and were haemodynamically stable and free from acute chest pain at the time of interview. METHODS: Baseline data were obtained within 1 week after hospital admission. The follow-up data was collected 6 months after hospital discharge. The Chinese version of the Hospital Anxiety and Depression Scale (HADS), State Self-esteem Scale (SSES), and Rosenberg's Self-Esteem Scale (RSES) were used to assess anxiety and depression, state self-esteem, and trait self-esteem, respectively. RESULTS: Findings suggested gender differences in clients' perception in anxiety, depression and self-esteem. Improvements in clients' perception of these variables were evident over the 6-month period following their acute coronary events. CONCLUSION: The study confirmed the western notion that psychosocial problems are common among coronary clients and this also applies to Hong Kong Chinese diagnosed with ACS. Further studies to explore effective interventions to address these psychosocial issues are recommended.
Resumo:
Personality factors implicated in alcohol misuse have been extensively investigated in adult populations. Fewer studies have clarified the robustness of personality dimensions in predicting early onset alcohol misuse in adolescence. The aim of this study was to examine the predictive utility of two prominent models of personality (Cloninger, 1987; Eysenck & Eysenck, 1975) in emergent alcohol misuse in adolescence. One hundred and 92 secondary school students (mean age = 13.8 years, SD = 0.5) were administered measures of personality (Revised Junior Eysenck Personality Questionnaire – abbreviated; Temperament scale of Junior Temperament and Character Inventory) and drinking behavior (quantity and frequency of consumption, Alcohol Use Disorders Identification Test) at Time 1. At 12-month follow-up, 170 students (88.5%) were retained. Hierarchical multiple regressions revealed the dimensions of psychoticism, extraversion, and Novelty-Seeking to be the most powerful predictors of future alcohol misuse in adolescents. Results provide support for the etiological relevance of these dimensions in the development of early onset alcohol misuse. Findings can be used to develop early intervention programs that target personality risk factors for alcohol misuse in high-risk youth.
Resumo:
Today’s evolving networks are experiencing a large number of different attacks ranging from system break-ins, infection from automatic attack tools such as worms, viruses, trojan horses and denial of service (DoS). One important aspect of such attacks is that they are often indiscriminate and target Internet addresses without regard to whether they are bona fide allocated or not. Due to the absence of any advertised host services the traffic observed on unused IP addresses is by definition unsolicited and likely to be either opportunistic or malicious. The analysis of large repositories of such traffic can be used to extract useful information about both ongoing and new attack patterns and unearth unusual attack behaviors. However, such an analysis is difficult due to the size and nature of the collected traffic on unused address spaces. In this dissertation, we present a network traffic analysis technique which uses traffic collected from unused address spaces and relies on the statistical properties of the collected traffic, in order to accurately and quickly detect new and ongoing network anomalies. Detection of network anomalies is based on the concept that an anomalous activity usually transforms the network parameters in such a way that their statistical properties no longer remain constant, resulting in abrupt changes. In this dissertation, we use sequential analysis techniques to identify changes in the behavior of network traffic targeting unused address spaces to unveil both ongoing and new attack patterns. Specifically, we have developed a dynamic sliding window based non-parametric cumulative sum change detection techniques for identification of changes in network traffic. Furthermore we have introduced dynamic thresholds to detect changes in network traffic behavior and also detect when a particular change has ended. Experimental results are presented that demonstrate the operational effectiveness and efficiency of the proposed approach, using both synthetically generated datasets and real network traces collected from a dedicated block of unused IP addresses.
Resumo:
Confirmatory factor analyses were conducted to evaluate the factorial validity of the Toronto Alexithymia Scale in an alcohol-dependent sample. Several factor models were examined, but all models were rejected given their poor fit. A revision of the TAS-20 in alcohol-dependent populations may be needed.
Resumo:
Since the formal recognition of practice-led research in the 1990s, many higher research degree candidates in art, design and media have submitted creative works along with an accompanying written document or ‘exegesis’ for examination. Various models for the exegesis have been proposed in university guidelines and academic texts during the past decade, and students and supervisors have experimented with its contents and structure. With a substantial number of exegeses submitted and archived, it has now become possible to move beyond proposition to empirical analysis. In this article we present the findings of a content analysis of a large, local sample of submitted exegeses. We identify the emergence of a persistent pattern in the types of content included as well as overall structure. Besides an introduction and conclusion, this pattern includes three main parts, which can be summarized as situating concepts (conceptual definitions and theories); precedents of practice (traditions and exemplars in the field); and researcher’s creative practice (the creative process, the artifacts produced and their value as research). We argue that this model combines earlier approaches to the exegesis, which oscillated between academic objectivity, by providing a contextual framework for the practice, and personal reflexivity, by providing commentary on the creative practice. But this model is more than simply a hybrid: it provides a dual orientation, which allows the researcher to both situate their creative practice within a trajectory of research and do justice to its personally invested poetics. By performing the important function of connecting the practice and creative work to a wider emergent field, the model helps to support claims for a research contribution to the field. We call it a connective model of exegesis.
Resumo:
This technical report is concerned with one aspect of environmental monitoring—the detection and analysis of acoustic events in sound recordings of the environment. Sound recordings offer ecologists the potential advantages of cheaper and increased sampling. An acoustic event detection algorithm is introduced that outputs a compact rectangular marquee description of each event. It can disentangle superimposed events, which are a common occurrence during morning and evening choruses. Next, three uses to which acoustic event detection can be put are illustrated. These tasks have been selected because they illustrate quite different modes of analysis: (1) the detection of diffuse events caused by wind and rain, which are a frequent contaminant of recordings of the terrestrial environment; (2) the detection of bird calls using the spatial distribution of their component events; and (3) the preparation of acoustic maps for whole ecosystem analysis. This last task utilises the temporal distribution of events over a daily, monthly or yearly cycle.
Resumo:
The large deformation analysis is one of major challenges in numerical modelling and simulation of metal forming. Because no mesh is used, the meshfree methods show good potential for the large deformation analysis. In this paper, a local meshfree formulation, based on the local weak-forms and the updated Lagrangian (UL) approach, is developed for the large deformation analysis. To fully employ the advantages of meshfree methods, a simple and effective adaptive technique is proposed, and this procedure is much easier than the re-meshing in FEM. Numerical examples of large deformation analysis are presented to demonstrate the effectiveness of the newly developed nonlinear meshfree approach. It has been found that the developed meshfree technique provides a superior performance to the conventional FEM in dealing with large deformation problems for metal forming.
Resumo:
This report applies CCI’s creative trident methodology with the definition of the arts as established by the Australia Council for the Arts to data sourced from Australia’s national census data (from 1996, 2001 and the most recent one in 2006). Analysis has been conducted on employment, income, gender, age and the nature of employment for artists and arts related workers within and beyond the arts industries, as well as other support workers in the arts industries.
Resumo:
This paper examines the algebraic cryptanalysis of small scale variants of the LEX-BES. LEX-BES is a stream cipher based on the Advanced Encryption Standard (AES) block cipher. LEX is a generic method proposed for constructing a stream cipher from a block cipher, initially introduced by Biryukov at eSTREAM, the ECRYPT Stream Cipher project in 2005. The Big Encryption System (BES) is a block cipher introduced at CRYPTO 2002 which facilitates the algebraic analysis of the AES block cipher. In this paper, experiments were conducted to find solution of the equation system describing small scale LEX-BES using Gröbner Basis computations. This follows a similar approach to the work by Cid, Murphy and Robshaw at FSE 2005 that investigated algebraic cryptanalysis on small scale variants of the BES. The difference between LEX-BES and BES is that due to the way the keystream is extracted, the number of unknowns in LEX-BES equations is fewer than the number in BES. As far as the author knows, this attempt is the first at creating solvable equation systems for stream ciphers based on the LEX method using Gröbner Basis computations.
Resumo:
Background: There is an increasing interest in measuring quality of life (QOL) in clinical settings and in clinical trials. None of the commonly used QOL instrument have been validated for use postnatally. Aim: To assess the psychometric properties of the 26-item WHOQOL-BREF among women following childbirth. Methods: Using a prospective cohort design we recruited 320 women within the first few days of childbirth. At six weeks postpartum, participants were asked to complete the WHOQOL-BREF, the Edinburgh Postnatal Depression Index and the Australian Unity Wellbeing Index. Validation of the WHOQOL-BREF included an analysis of internal consistency, discriminate validity, convergent validity and an examination of the domain structure. Results: 221 (69.1%) women returned their six-week questionnaire. All domains of the WHOQOL-BREF met reliability standards (alpha coefficient exceeding 0.70). The questionnaire discriminated well between known groups (depressed and non-depressed women. P = <0.000) and demonstrated satisfactory correlations with the Australian Unity Wellbeing index (r = >0.45). The domain structure of the WHOQOL-BREF was also valid in this population of new mothers, with moderate to high correlation between individual items and the domain structure to which the items were originally assigned. Conclusion: The WHOQOL-BRF is well-accepted and valid instrument in this population and may be used in postnatal clinical settings or for assessing intervention effects in research studies.
Resumo:
In a resource constrained business world, strategic choices must be made on process improvement and service delivery. There are calls for more agile forms of enterprises and much effort is being directed at moving organizations from a complex landscape of disparate application systems to that of an integrated and flexible enterprise accessing complex systems landscapes through service oriented architecture (SOA). This paper describes the deconstruction of an enterprise into business services using value chain analysis as each element in the value chain can be rendered as a business service in the SOA. These business services are explicitly linked to the attainment of specific organizational strategies and their contribution to the attainment of strategy is assessed and recorded. This contribution is then used to provide a rank order of business service to strategy. This information facilitates executive decision making on which business service to develop into the SOA. The paper describes an application of this Critical Service Identification Methodology (CSIM) to a case study.
Resumo:
Insight into the unique structure of layered double hydroxides has been obtained using a combination of X-ray diffraction and thermal analysis. Indium containing hydrotalcites of formula Mg4In2(CO3)(OH)12•4H2O (2:1 In-LDH) through to Mg8In2(CO3)(OH)18•4H2O (4:1 In-LDH) with variation in the Mg:In ratio have been successfully synthesised. The d(003) spacing varied from 7.83 Å for the 2:1 LDH to 8.15 Å for the 3:1 indium containing layered double hydroxide. Distinct mass loss steps attributed to dehydration, dehydroxylation and decarbonation are observed for the indium containing hydrotalcite. Dehydration occurs over the temperature range ambient to 205 °C. Dehydroxylation takes place in a series of steps over the 238 to 277 °C temperature range. Decarbonation occurs between 763 and 795 °C. The dehydroxylation and decarbonation steps depend upon the Mg:In ratio. The formation of indium containing hydrotalcites and their thermal activation provides a method for the synthesis of indium oxide based catalysts.