980 resultados para open course
Resumo:
Gough, John, (2004) 'Holevo-Ordering and the Continuous-Time Limit for Open Floquet Dynamics', Letters in Mathematical Physcis 67(3) pp.207-221 RAE2008
Resumo:
Background: HIV infection leads to a decreasing immune response, thereby facilitating the appearance of other infections, one of the most important ones being HPV. However, studies are needed for determining associations between immunodeficiency caused by HIV and/or the presence of HPV during the course of cervical lesions and their degree of malignancy. This study describes the cytological findings revealed by the Papanicolaou test, laboratory characteristics and HPV molecular profile in women with and without HIV infection. Methods: A total of 216 HIV-positive and 1,159 HIV-negative women were invited to participate in the study; PCR was used for the molecular detection of HPV in cervical samples. Statistical analysis (such as percentages, Chi-square test and Fisher's exact test when applicable) determined human papillomavirus (HPV) infection frequency (single and multiple) and the distribution of six types of high-risk-HPV in women with and without HIV infection. Likewise, a logistic regression model was run to evaluate the relationship between HIV-HPV infection and different risk factors. Results: An association was found between the frequency of HPV infection and infection involving 2 or more HPV types (also known as multiple HPV infection) in HIV-positive women (69.0% and 54.2%, respectively); such frequency was greater than that found in HIV-negative women (44.3% and 22.7%, respectively). Statistically significant differences were observed between both groups (p = 0.001) regarding HPV presence (both in infection and multiple HPV infection). HPV-16 was the most prevalent type in the population being studied (p = 0.001); other viral types had variable distribution in both groups (HIV-positive and HIV-negative). HPV detection was associated with <500 cell/mm(3) CD4-count (p = 0.004) and higher HIV-viral-load (p = 0.001). HPV-DNA detection, <200 cell/mm(3) CD4-count (p = 0.001), and higher HIV-viral-load (p = 0.001) were associated with abnormal cytological findings. Conclusions: The HIV-1 positive population in this study had high multiple HPV infection prevalence. The results for this population group also suggested a greater association between HPV-DNA presence and cytological findings. HPV detection, together with low CD4 count, could represent useful tools for identifying HIV-positive women at risk of developing cervical lesions.
Resumo:
Wydział Historyczny
Resumo:
Sermon preached at Boston University School of Theology during Wednesday Chapel on October 24, 2007
Resumo:
The resolution passed by the BU University Council approving an initiative to establish an archive of the research and scholarship produced by the faculty of the University.
Resumo:
The Internet has brought unparalleled opportunities for expanding availability of research by bringing down economic and physical barriers to sharing. The digitally networked environment promises to democratize access, carry knowledge beyond traditional research niches, accelerate discovery, encourage new and interdisciplinary approaches to ever more complex research challenges, and enable new computational research strategies. However, despite these opportunities for increasing access to knowledge, the prices of scholarly journals have risen sharply over the past two decades, often forcing libraries to cancel subscriptions. Today even the wealthiest institutions cannot afford to sustain all of the journals needed by their faculties and students. To take advantage of the opportunities created by the Internet and to further their mission of creating, preserving, and disseminating knowledge, many academic institutions are taking steps to capture the benefits of more open research sharing. Colleges and universities have built digital repositories to preserve and distribute faculty scholarly articles and other research outputs. Many individual authors have taken steps to retain the rights they need, under copyright law, to allow their work to be made freely available on the Internet and in their institutionâ s repository. And, faculties at some institutions have adopted resolutions endorsing more open access to scholarly articles. Most recently, on February 12, 2008, the Faculty of Arts and Sciences (FAS) at Harvard University took a landmark step. The faculty voted to adopt a policy requiring that faculty authors send an electronic copy of their scholarly articles to the universityâ s digital repository and that faculty authors automatically grant copyright permission to the university to archive and to distribute these articles unless a faculty member has waived the policy for a particular article. Essentially, the faculty voted to make open access to the results of their published journal articles the default policy for the Faculty of Arts and Sciences of Harvard University. As of March 2008, a proposal is also under consideration in the University of California system by which faculty authors would commit routinely to grant copyright permission to the university to make copies of the facultyâ s scholarly work openly accessible over the Internet. Inspired by the example set by the Harvard faculty, this White Paper is addressed to the faculty and administrators of academic institutions who support equitable access to scholarly research and knowledge, and who believe that the institution can play an important role as steward of the scholarly literature produced by its faculty. This paper discusses both the motivation and the process for establishing a binding institutional policy that automatically grants a copyright license from each faculty member to permit deposit of his or her peer-reviewed scholarly articles in institutional repositories, from which the works become available for others to read and cite.
Resumo:
This module will introduce the item submission workflows available in DSpace. Workflows allow submissions to be checked before entering the repository. Submissions may be checked for accuracy, in order to improve the metadata, or simply to decide if they are OK to be archived. The module will show the three workflow steps available in DSpace, along with details about adding, changing and removing them from the submission process of collections.
Resumo:
A working paper written for Boston University Libraries to foster discussion about how to provide better support for BU faculty authors.
Resumo:
We discuss the design principles of TCP within the context of heterogeneous wired/wireless networks and mobile networking. We identify three shortcomings in TCP's behavior: (i) the protocol's error detection mechanism, which does not distinguish different types of errors and thus does not suffice for heterogeneous wired/wireless environments, (ii) the error recovery, which is not responsive to the distinctive characteristics of wireless networks such as transient or burst errors due to handoffs and fading channels, and (iii) the protocol strategy, which does not control the tradeoff between performance measures such as goodput and energy consumption, and often entails a wasteful effort of retransmission and energy expenditure. We discuss a solution-framework based on selected research proposals and the associated evaluation criteria for the suggested modifications. We highlight an important angle that did not attract the required attention so far: the need for new performance metrics, appropriate for evaluating the impact of protocol strategies on battery-powered devices.
Resumo:
More than seventeen million Chinese urban youth (Zhiqing in Chinese) went to the countryside, lived and engaged in agricultural work there during the Up to the Mountains and Down to the Countryside (UMDC) Movement (1967-1981). Although this movement was officially terminated in 1981, it has left an imprint on these people – the Zhiqing identity by which they are still characterized as a unique group in Chinese society and a special generation in Chinese history. Historical and sociological perspectives are combined in this study. By applying Glen H. Elder’s life course approach, the study reveals how Zhiqing’s life trajectories are embedded in the social history and identifies a series of interrelated factors that made Zhiqing into a unique generation. With the guidance of Henri Tajfel’s social identity theory, the study uncovers the emergence of the Zhiqing group and the Zhiqing identity, explains individuals’ acquisitions of the Zhiqing identity and analyzes how it has kept influencing individuals’ lives during and after the UMDC Movement. Using Zhiqing’s life stories allowed the researcher to combine the historical and sociological aspects in her examination of Zhiqing’s identity issues. In each life story, the narrator reviewed his/her life experience, reflected on socio-historical changes and expressed his/her emotions and ideas about identity issues. Utilizing methods of in-depth interview and thematic analysis, the researcher completed the study and presents this thesis as one interpretation on the Zhiqing identity, which, as according the researcher’s hermeneutic stance, is open to further discussion and future research.
Resumo:
Open environments involve distributed entities interacting with each other in an open manner. Many distributed entities are unknown to each other but need to collaborate and share resources in a secure fashion. Usually resource owners alone decide who is trusted to access their resources. Since resource owners in open environments do not have a complete picture of all trusted entities, trust management frameworks are used to ensure that only authorized entities will access requested resources. Every trust management system has limitations, and the limitations can be exploited by malicious entities. One vulnerability is due to the lack of globally unique interpretation for permission specifications. This limitation means that a malicious entity which receives a permission in one domain may misuse the permission in another domain via some deceptive but apparently authorized route; this malicious behaviour is called subterfuge. This thesis develops a secure approach, Subterfuge Safe Trust Management (SSTM), that prevents subterfuge by malicious entities. SSTM employs the Subterfuge Safe Authorization Language (SSAL) which uses the idea of a local permission with a globally unique interpretation (localPermission) to resolve the misinterpretation of permissions. We model and implement SSAL with an ontology-based approach, SSALO, which provides a generic representation for knowledge related to the SSAL-based security policy. SSALO enables integration of heterogeneous security policies which is useful for secure cooperation among principals in open environments where each principal may have a different security policy with different implementation. The other advantage of an ontology-based approach is the Open World Assumption, whereby reasoning over an existing security policy is easily extended to include further security policies that might be discovered in an open distributed environment. We add two extra SSAL rules to support dynamic coalition formation and secure cooperation among coalitions. Secure federation of cloud computing platforms and secure federation of XMPP servers are presented as case studies of SSTM. The results show that SSTM provides robust accountability for the use of permissions in federation. It is also shown that SSAL is a suitable policy language to express the subterfuge-safe policy statements due to its well-defined semantics, ease of use, and integrability.
Resumo:
This paper examines the effects of permanent and transitory changes in government purchases in the context of a model of a small open economy that produces and consumes both traded and nontraded goods. The model incorporates an equilibrium interpretation of the business cycle that emphasizes the responsiveness of agents to intertemporal relative price changes. It is demonstrated that transitory increases in government purchases lead to an appreciation of the real exchange rate and an ambiguous change (although a likely worsening) in the current account, while permanent increases have an ambiguous impact on the real exchange rate and no effect on the current account. When agents do not know whether a given increase in government purchases is permanent or transitory the effect is a weighted average of these separate effects. The weights depend on the relative variances of the transitory and permanent components of government purchases. © 1985.
Resumo:
BACKGROUND: In a time-course microarray experiment, the expression level for each gene is observed across a number of time-points in order to characterize the temporal trajectories of the gene-expression profiles. For many of these experiments, the scientific aim is the identification of genes for which the trajectories depend on an experimental or phenotypic factor. There is an extensive recent body of literature on statistical methodology for addressing this analytical problem. Most of the existing methods are based on estimating the time-course trajectories using parametric or non-parametric mean regression methods. The sensitivity of these regression methods to outliers, an issue that is well documented in the statistical literature, should be of concern when analyzing microarray data. RESULTS: In this paper, we propose a robust testing method for identifying genes whose expression time profiles depend on a factor. Furthermore, we propose a multiple testing procedure to adjust for multiplicity. CONCLUSIONS: Through an extensive simulation study, we will illustrate the performance of our method. Finally, we will report the results from applying our method to a case study and discussing potential extensions.
Resumo:
BACKGROUND: The ability to write clearly and effectively is of central importance to the scientific enterprise. Encouraged by the success of simulation environments in other biomedical sciences, we developed WriteSim TCExam, an open-source, Web-based, textual simulation environment for teaching effective writing techniques to novice researchers. We shortlisted and modified an existing open source application - TCExam to serve as a textual simulation environment. After testing usability internally in our team, we conducted formal field usability studies with novice researchers. These were followed by formal surveys with researchers fitting the role of administrators and users (novice researchers) RESULTS: The development process was guided by feedback from usability tests within our research team. Online surveys and formal studies, involving members of the Research on Research group and selected novice researchers, show that the application is user-friendly. Additionally it has been used to train 25 novice researchers in scientific writing to date and has generated encouraging results. CONCLUSION: WriteSim TCExam is the first Web-based, open-source textual simulation environment designed to complement traditional scientific writing instruction. While initial reviews by students and educators have been positive, a formal study is needed to measure its benefits in comparison to standard instructional methods.