931 resultados para Box Behnken
Resumo:
Different reputation models are used in the web in order to generate reputation values for products using uses' review data. Most of the current reputation models use review ratings and neglect users' textual reviews, because it is more difficult to process. However, we argue that the overall reputation score for an item does not reflect the actual reputation for all of its features. And that's why the use of users' textual reviews is necessary. In our work we introduce a new reputation model that defines a new aggregation method for users' extracted opinions about products' features from users' text. Our model uses features ontology in order to define general features and sub-features of a product. It also reflects the frequencies of positive and negative opinions. We provide a case study to show how our results compare with other reputation models.
Resumo:
Ongoing innovation in digital animation and visual effects technologies has provided new opportunities for stories to be visually rendered in ways never before possible. Films featuring animation and visual effects continue to perform well at the box office, proving to be highly profitable projects. The Avengers (Whedon, 2012) holds the current record for opening weekend sales, accruing as much as $207,438,708 USD and $623,357,910 USD gross at time of writing. Life of Pi (Lee, 2012) at time of writing has grossed as much as $608,791,063 USD (Box Office Mojo, 2013). With so much creative potential and a demonstrable ability to generate a large amount of revenue, the animation and visual effects industry – otherwise known as the Post, Digital and Visual Effects (PDV) industry – has become significant to the future growth and stability of the Australian film industry as a whole.
Resumo:
"It’s late in the night. And after a long day at work, you have a splitting headache. You rattle around in the bottom drawer of the bathroom vanity to find a packet of paracetamol tablets you know are hiding there. Phew, relief is at hand! Then you turn the packet over and discover that the crumpled box of pills actually expired two years ago..."--http://theconversation.com/explainer-do-we-need-to-follow-medication-use-by-dates-4329
Resumo:
There is increasing evidence of a weakened platform of consumer trust in mass produced food products. The resistance shown by consumers to the agro-industrial paradigm is evident in an emergent phase of reflexive consumerism, public reactions to an overly-concentrated retail sector and the rise of alternative food networks such as farmers' markets and organic box schemes. Supermarkets are responding strategically by aiming to manufacture new trust relations with consumers. This paper identifies three key strategies of trust manufacturing: (i) reputational enhancement though the institution of “behind the scenes,” business-to-business private standards; (ii) direct quality claims via private standard certification badges on food products, and ; (iii) discursive claimsmaking through symbolic representations of “authenticity” and “tradition.” Drawing upon the food governance literature and a “visual sociology” of supermarkets and supermarket produce, we highlight how trust is both commoditized and increasingly embedded into the marketing of mass-produced foods.
Resumo:
RATIONALE Both traditional electron ionization and electrospray ionization tandem mass spectrometry have demonstrated limitations in the unambiguous identification of fatty acids. In the former case, high electron energies lead to extensive dissociation of the radical cations from which little specific structural information can be obtained. In the latter, conventional collision-induced dissociation (CID) of even-electron ions provides little intra-chain fragmentation and thus few structural diagnostics. New approaches that harness the desirable features of both methods, namely radical-driven dissociation with discrete energy deposition, are thus required. METHODS Herein we describe the derivatization of a structurally diverse suite of fatty acids as 4-iodobenzyl esters (FAIBE). Electrospray ionization of these derivatives in the presence of sodium acetate yields abundant [M+Na]+ ions that can be mass-selected and subjected to laser irradiation (=266nm) on a modified linear ion-trap mass spectrometer. RESULTS Photodissociation (PD) of the FAIBE derivatives yields abundant radical cations by loss of atomic iodine and in several cases selective dissociation of activated carboncarbon bonds (e.g., at allylic positions) are also observed. Subsequent CID of the [M+NaI]center dot+ radical cations yields radical-directed dissociation (RDD) mass spectra that reveal extensive carboncarbon bond dissociation without scrambling of molecular information. CONCLUSIONS Both PD and RDD spectra obtained from derivatized fatty acids provide a wealth of structural information including the position(s) of unsaturation, chain-branching and hydroxylation. The structural information obtained by this approach, in particular the ability to rapidly differentiate isomeric lipids, represents a useful addition to the lipidomics tool box. Copyright (c) 2013 John Wiley & Sons, Ltd.
Resumo:
We study the natural problem of secure n-party computation (in the computationally unbounded attack model) of circuits over an arbitrary finite non-Abelian group (G,⋅), which we call G-circuits. Besides its intrinsic interest, this problem is also motivating by a completeness result of Barrington, stating that such protocols can be applied for general secure computation of arbitrary functions. For flexibility, we are interested in protocols which only require black-box access to the group G (i.e. the only computations performed by players in the protocol are a group operation, a group inverse, or sampling a uniformly random group element). Our investigations focus on the passive adversarial model, where up to t of the n participating parties are corrupted.
Resumo:
Recently, botnet, a network of compromised computers, has been recognized as the biggest threat to the Internet. The bots in a botnet communicate with the botnet owner via a communication channel called Command and Control (C & C) channel. There are three main C & C channels: Internet Relay Chat (IRC), Peer-to-Peer (P2P) and web-based protocols. By exploiting the flexibility of the Web 2.0 technology, the web-based botnet has reached a new level of sophistication. In August 2009, such botnet was found on Twitter, one of the most popular Web 2.0 services. In this paper, we will describe a new type of botnet that uses Web 2.0 service as a C & C channel and a temporary storage for their stolen information. We will then propose a novel approach to thwart this type of attack. Our method applies a unique identifier of the computer, an encryption algorithm with session keys and a CAPTCHA verification.
Resumo:
At Crypto 2008, Shamir introduced a new algebraic attack called the cube attack, which allows us to solve black-box polynomials if we are able to tweak the inputs by varying an initialization vector. In a stream cipher setting where the filter function is known, we can extend it to the cube attack with annihilators: By applying the cube attack to Boolean functions for which we can find low-degree multiples (equivalently annihilators), the attack complexity can be improved. When the size of the filter function is smaller than the LFSR, we can improve the attack complexity further by considering a sliding window version of the cube attack with annihilators. Finally, we extend the cube attack to vectorial Boolean functions by finding implicit relations with low-degree polynomials.
Resumo:
The third edition of Global Business Today continues to effectively combine a world-wide orientation with an emphasis on the strategic issues that impact global business in our region. The authors provide background on the political, economic, social or cultural aspects of countries grappling with an international business issue, raising students' awareness of how national and geographic differences affect the conduct of international business. Chapter 7, for example, contains a new Country Focus box titled, "India's stuttering economic transformation". Developing economies are covered in the new Emerging Markets feature emphasizing the global coverage of the text and the increasing complexities and opportunities in international business. Chapter 13 contains Another Perspective box titled, "The China-plus-one Strategy."
Resumo:
The role of law in managing public health challenges such as influenza pandemics poses special challenges. This article reviews Australian plans in the context of the H1N1 09 experience to assess whether risk management was facilitated or inhibited by the "number" of levels or phases of management, the degree of prescriptive detail for particular phases, the number of plans, the clarity of the relationship between them, and the role of the media. Despite differences in the content and form of the plans at the time of the H1N1 09 emerging pandemic, the article argues that in practice, the plans proved to be responsive and robust bases for managing pandemic risks. It is suggested that this was because the plans proved to be frameworks for coordination rather than prescriptive straitjackets, to be only one component of the regulatory response, and to offer the varied tool box of possible responses, as called for by the theory of responsive regulation. Consistent with the principle of subsidiarity, it is argued that the plans did not inhibit localised responses such as selective school closures or rapid responses to selected populations such as cruise ship passengers.
Resumo:
Fluid–Structure Interaction (FSI) problem is significant in science and engineering, which leads to challenges for computational mechanics. The coupled model of Finite Element and Smoothed Particle Hydrodynamics (FE-SPH) is a robust technique for simulation of FSI problems. However, two important steps of neighbor searching and contact searching in the coupled FE-SPH model are extremely time-consuming. Point-In-Box (PIB) searching algorithm has been developed by Swegle to improve the efficiency of searching. However, it has a shortcoming that efficiency of searching can be significantly affected by the distribution of points (nodes in FEM and particles in SPH). In this paper, in order to improve the efficiency of searching, a novel Striped-PIB (S-PIB) searching algorithm is proposed to overcome the shortcoming of PIB algorithm that caused by points distribution, and the two time-consuming steps of neighbor searching and contact searching are integrated into one searching step. The accuracy and efficiency of the newly developed searching algorithm is studied on by efficiency test and FSI problems. It has been found that the newly developed model can significantly improve the computational efficiency and it is believed to be a powerful tool for the FSI analysis.
Resumo:
Background Flower development in kiwifruit (Actinidia spp.) is initiated in the first growing season, when undifferentiated primordia are established in latent shoot buds. These primordia can differentiate into flowers in the second growing season, after the winter dormancy period and upon accumulation of adequate winter chilling. Kiwifruit is an important horticultural crop, yet little is known about the molecular regulation of flower development. Results To study kiwifruit flower development, nine MADS-box genes were identified and functionally characterized. Protein sequence alignment, phenotypes obtained upon overexpression in Arabidopsis and expression patterns suggest that the identified genes are required for floral meristem and floral organ specification. Their role during budbreak and flower development was studied. A spontaneous kiwifruit mutant was utilized to correlate the extended expression domains of these flowering genes with abnormal floral development. Conclusions This study provides a description of flower development in kiwifruit at the molecular level. It has identified markers for flower development, and candidates for manipulation of kiwifruit growth, phase change and time of flowering. The expression in normal and aberrant flowers provided a model for kiwifruit flower development.
Resumo:
Light gauge steel roofing systems made of thin profiled roof sheeting and battens are used commonly in residential, industrial and commercial buildings. Their critical design load combination is that due to wind uplift forces that occur during high wind events such as tropical cyclones and thunderstorms. However, premature local failures at their screw connections have been a concern for many decades since cyclone Tracy that devastated Darwin in 1974. Extensive research that followed cyclone Tracy on the pull-through and pull-out failures of roof sheeting to batten connections has significantly improved the safety of roof sheeting. However, this has made the batten to rafter/truss connection the weakest, and recent wind damage investigations have shown the failures of these connections and the resulting loss of entire roof structures. Therefore an experimental research program using both small scale and full scale air-box tests is currently under way to investigate the pull-through failures of thin-walled steel battens under high wind uplift forces. Tests have demonstrated that occurrence of pull-through failures in the bottom flanges of steel batttens and the need to develop simple test and design methods as a function of many critical parameters such as steel batten geometry, thickness and grade, screw fastener sizes and other fastening details. This paper presents the details of local failures that occur in light fauge roofing systems, a review of the current design and test methods for steel battens and associated short comings, and the test results obtained to date on pull-through failures of battens from small scale and full scale tests. Finally, it proposes the use of suitable small scale test methods that can be used by both researchers and manufacturers of such screw-fastened light gauge steel batten systems.
Resumo:
We report a high-quality draft genome sequence of the domesticated apple (Malus × domestica). We show that a relatively recent (>50 million years ago) genome-wide duplication (GWD) has resulted in the transition from nine ancestral chromosomes to 17 chromosomes in the Pyreae. Traces of older GWDs partly support the monophyly of the ancestral paleohexaploidy of eudicots. Phylogenetic reconstruction of Pyreae and the genus Malus, relative to major Rosaceae taxa, identified the progenitor of the cultivated apple as M. sieversii. Expansion of gene families reported to be involved in fruit development may explain formation of the pome, a Pyreae-specific false fruit that develops by proliferation of the basal part of the sepals, the receptacle. In apple, a subclade of MADS-box genes, normally involved in flower and fruit development, is expanded to include 15 members, as are other gene families involved in Rosaceae-specific metabolism, such as transport and assimilation of sorbitol.
Resumo:
Public relations has traditionally claimed a close association with dialogue, but this research demonstrates that formal notions of dialogue have little relevance to the real world of public relations practice. Instead, practitioners undertake pragmatic forms of two-way communication, because the constraints within which they work mean dialogue is difficult if not impossible to carry out. This qualitative research project shows that although the label of 'dialogue' has been co-opted in both the theory and practice of public relations, this claimed connection is not supported by empirical evidence.