915 resultados para Utilization


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Through the rise of cloud computing, on-demand applications, and business networks, services are increasingly being exposed and delivered on the Internet and through mobile communications. So far, services have mainly been described through technical interface descriptions. The description of business details, such as pricing, service-level, or licensing, has been neglected and is therefore hard to automatically process by service consumers. Also, third-party intermediaries, such as brokers, cloud providers, or channel partners, are interested in the business details in order to extend services and their delivery and, thus, further monetize services. In this paper, the constructivist design of the UnifiedServiceDescriptionLanguage (USDL), aimed at describing services across the human-to-automation continuum, is presented. The proposal of USDL follows well-defined requirements which are expressed against a common service discourse and synthesized from currently available servicedescription efforts. USDL's concepts and modules are evaluated for their support of the different requirements and use cases.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background In Australia, breast cancer is the most common cancer affecting Australian women. Inequalities in clinical and psychosocial outcomes have existed for some time, affecting particularly women from rural areas and from areas of disadvantage. We have a limited understanding of how individual and area-level factors are related to each other, and their associations with survival and other clinical and psychosocial outcomes. Methods/Design This study will examine associations between breast cancer recurrence, survival and psychosocial outcomes (e.g. distress, unmet supportive care needs, quality of life). The study will use an innovative multilevel approach using area-level factors simultaneously with detailed individual-level factors to assess the relative importance of remoteness, socioeconomic and demographic factors, diagnostic and treatment pathways and processes, and supportive care utilization to clinical and psychosocial outcomes. The study will use telephone and self-administered questionnaires to collect individual-level data from approximately 3, 300 women ascertained from the Queensland Cancer Registry diagnosed with invasive breast cancer residing in 478 Statistical Local Areas Queensland in 2011 and 2012. Area-level data will be sourced from the Australian Bureau of Statistics census data. Geo-coding and spatial technology will be used to calculate road travel distances from patients' residence to diagnostic and treatment centres. Data analysis will include a combination of standard empirical procedures and multilevel modelling. Discussion The study will address the critical question of: what are the individual- or area-level factors associated with inequalities in outcomes from breast cancer? The findings will provide health care providers and policy makers with targeted information to improve the management of women with breast cancer, and inform the development of strategies to improve psychosocial care for women with breast cancer.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Teleradiology allows medical images to be transmitted over electronic networks for clinical interpretation, and for improved healthcare access, delivery and standards. Although, such remote transmission of the images is raising various new and complex legal and ethical issues, including image retention and fraud, privacy, malpractice liability, etc., considerations of the security measures used in teleradiology remain unchanged. Addressing this problem naturally warrants investigations on the security measures for their relative functional limitations and for the scope of considering them further. In this paper, starting with various security and privacy standards, the security requirements of medical images as well as expected threats in teleradiology are reviewed. This will make it possible to determine the limitations of the conventional measures used against the expected threats. Further, we thoroughly study the utilization of digital watermarking for teleradiology. Following the key attributes and roles of various watermarking parameters, justification for watermarking over conventional security measures is made in terms of their various objectives, properties, and requirements. We also outline the main objectives of medical image watermarking for teleradiology, and provide recommendations on suitable watermarking techniques and their characterization. Finally, concluding remarks and directions for future research are presented.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Current unbalance is a significant power quality problem in distribution networks. This problem increases further with the increased penetration of single-phase photovoltaic cells. In this paper, a new approach is developed for current unbalance reduction in medium voltage distribution networks. The method is based on utilization of three single-phase voltage source converters connected in delta configuration between the phases. Each converter is controlled to function as a varying capacitor. The combination of the load and the compensator will result in a balanced load with unity power factor. The efficacy of the proposed current unbalance reduction concept is verified through dynamic simulations in PSCAD/EMTDC.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

OBJECTIVE: To identify the factors associated with infertility, seeking advice and treatment with fertility hormones and/or in vitro fertilisation (IVF) among a general population of women. METHODS: Participants in the Australian Longitudinal Study on Women's Health aged 28-33 years in 2006 had completed up to four mailed surveys over 10 years (n=9,145). Parsimonious multivariate logistic regression was used to identify the socio-demographic, biological (including reproductive histories), and behavioural factors associated with infertility, advice and hormonal/IVF treatment. RESULTS: For women who had tried to conceive or had been pregnant (n=5,936), 17% reported infertility. Among women with infertility (n=1031), 72% (n=728) sought advice but only 50% (n=356) used hormonal/IVF treatment. Women had higher odds of infertility when: they had never been pregnant (OR=7.2, 95% CI 5.6-9.1) or had a history of miscarriage (OR range=1.5-4.0) than those who had given birth (and never had a miscarriage or termination). CONCLUSION: Only one-third of women with infertility used hormonal and/or IVF treatment. Women with PCOS or endometriosis were the most proactive in having sought advice and used hormonal/IVF treatment. IMPLICATIONS: Raised awareness of age-related declining fertility is important for partnered women aged approximately 30 years to encourage pregnancy during their prime reproductive years and reduce the risk of infertility.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Utilization of multiport-antennas represents an appropriate way for the mitigation of multi-path fading in wireless communication systems. However, to obtain low correlation between the signals from different antenna ports and to prevent gain reduction by cross-talk, large antenna elements spacing is expected. Polarization diversity allows signal separation even with small antenna spacing. Although it is effective, polarization diversity alone does not suffice once the number of antennas exceeds the number of orthogonal polarizations. This paper presents an approach which combines a novel array concept with the use of dual polarization. The theory is verified by a compact dual polarized patch antenna array, which consists of four elements and a decoupling network.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Each year, organizations in Australian mining industry (asset intensive industry) spend substantial amount of capital (A$86 billion in 2009-10) (Statistics, 2011) in acquiring engineering assets. Engineering assets are put to use in operations to generate value. Different functions (departments) of an organization have different expectations and requirements from each of the engineering asset e.g. return on investment, reliability, efficiency, maintainability, low cost of running the asset, low or nil environmental impact and easy of disposal, potential salvage value etc. Assets are acquired from suppliers or built by service providers and or internally. The process of acquiring assets is supported by procurement function. One of the most costly mistakes that organizations can make is acquiring the inappropriate or non-conforming assets that do not fit the purpose. The root cause of acquiring non confirming assets belongs to incorrect acquisition decision and the process of making decisions. It is very important that an asset acquisition decision is based on inputs and multi-criteria of each function within the organization which has direct or indirect impact on the acquisition, utilization, maintenance and disposal of the asset. Literature review shows that currently there is no comprehensive process framework and tool available to evaluate the inclusiveness and breadth of asset acquisition decisions that are taken in the Mining Organizations. This thesis discusses various such criteria and inputs that need to be considered and evaluated from various functions within the organization while making the asset acquisition decision. Criteria from functions such as finance, production, maintenance, logistics, procurement, asset management, environment health and safety, material management, training and development etc. need to be considered to make an effective and coherent asset acquisition decision. The thesis also discusses a tool that is developed to be used in the multi-criteria and cross functional acquisition decision making. The development of multi-criteria and cross functional inputs based decision framework and tool which utilizes that framework to formulate cross functional and integrated asset acquisition decisions are the contribution of this research.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A paradigm shift is taking place in orthopaedic and reconstructive surgery. This transition from using medical devices and tissue grafts towards the utilization of a tissue engineering approach combines biodegradable scaffolds with cells and/or biological molecules in order to repair and/or regenerate tissues. One of the potential benefits offered by solid freeform fabrication (SFF) technologies is the ability to create such biodegradable scaffolds with highly reproducible architecture and compositional variation across the entire scaffold due to their tightly controlled computer-driven fabrication. Many of these biologically activated materials can induce bone formation at ectopic and orthotopic sites, but they have not yet gained widespread use due to several continuing limitations, including poor mechanical properties, difficulties in intraoperative handling, lack of porosity suitable for cellular and vascular infiltration, and suboptimal degradation characteristics. In this chapter, we define scaffold properties and attempt to provide some broad criteria and constraints for scaffold design and fabrication in combination with growth factors for bone engineering applications. Lastly, we comment on the current and future developments in the field, such as the functionalization of novel composite scaffolds with combinations of growth factors designed to promote cell attachment, cell survival, vascular ingrowth, and osteoinduction.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study examines disillusioned consumers. The theory proposes that this is a group learning to lower their expectations of firm integrity and who, to avoid being let down, ignore marketing activity directly from the firm. This kind of exchange orientation develops as a response to consistent failure in perceptions of firm integrity. The research includes six studies, including over 600 adult consumers, to outline the development and validation of a measure of consumer disillusionment toward marketing activity. Completing the process provides a valid and reliable four-item measure. In addition, the study includes the assessment of the nomological validity of the construct. The nomological validation includes using cue utilization theory to predict that disillusioned consumers favor advertising that provides evidence of verifiable integrity. The validation experiment uses print advertising containing high and low verifiable integrity stimuli. Results confirm the theory with disillusioned consumers focusing less on the firm as source of information. Further, these consumers respond more favorably than non-disillusioned consumers to third party endorsers who serve to verify the firm's attempts to show integrity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the past few years, remarkable progress has been made in unveiling novel and unique optical properties of strongly coupled plasmonic nanostructures. However, application of such plasmonic nanostructures in biomedicine remains challenging due to the lack of facile and robust assembly methods for producing stable nanostructures. Previous attempts to achieve plasmonic nano-assemblies using molecular ligands were limited due to the lack of flexibility that could be exercised in forming them. Here, we report the utilization of tailor-made hyperbranched polymers (HBP) as linkers to assemble gold nanoparticles (NPs) into nano-assemblies. The ease and flexibility in tuning the particle size and number of branch ends of a HBP makes it an ideal candidate as a linker, as opposed to DNA, small organic molecules and linear or dendrimeric polymers. We report a strong correlation of polymer (HBP) concentration with the size of the hybrid nano-assemblies and “hot-spot” density. We have shown that such solutions of stable HBP-gold nano-assemblies can be barcoded with various Raman tags to provide improved surface-enhanced Raman scattering (SERS) compared with non-aggregated NP systems. These Raman barcoded hybrid nano-assemblies, with further optimization of NP shape, size and “hot-spot” density, may find application as diagnostic tools in nanomedicine.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Aim. A protocol for a new peer-led self-management programme for communitydwelling older people with diabetes in Shanghai, China. Background. The increasing prevalence of type 2 diabetes poses major public health challenges. Appropriate education programmes could help people with diabetes to achieve self-management and better health outcomes. Providing education programmes to the fast growing number of people with diabetes present a real challenge to Chinese healthcare system, which is strained for personnel and funding shortages. Empirical literature and expert opinions suggest that peer education programmes are promising. Design. Quasi-experimental. Methods. This study is a non-equivalent control group design (protocol approved in January, 2008). A total of 190 people, with 95 participants in each group, will be recruited from two different, but similar, communities. The programme, based on Social Cognitive Theory, will consist of basic diabetes instruction and social support and self-efficacy enhancing group activities. Basic diabetes instruction sessions will be delivered by health professionals, whereas social support and self-efficacy enhancing group activities will be led by peer leaders. Outcome variables include: self-efficacy, social support, self-management behaviours, depressive status, quality of life and healthcare utilization, which will be measured at baseline, 4 and 12 weeks. Discussion. This theory-based programme tailored to Chinese patients has potential for improving diabetes self-management and subsequent health outcomes. In addition, the delivery mode, through involvement of peer leaders and existing community networks,is especially promising considering healthcare resource shortage in China.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The IEEE Subcommittee on the Application of Probability Methods (APM) published the IEEE Reliability Test System (RTS) [1] in 1979. This system provides a consistent and generally acceptable set of data that can be used both in generation capacity and in composite system reliability evaluation [2,3]. The test system provides a basis for the comparison of results obtained by different people using different methods. Prior to its publication, there was no general agreement on either the system or the data that should be used to demonstrate or test various techniques developed to conduct reliability studies. Development of reliability assessment techniques and programs are very dependent on the intent behind the development as the experience of one power utility with their system may be quite different from that of another utility. The development and the utilization of a reliability program are, therefore, greatly influenced by the experience of a utlity and the intent of the system manager, planner and designer conducting the reliability studies. The IEEE-RTS has proved to be extremely valuable in highlighting and comparing the capabilities (or incapabilities) of programs used in reliability studies, the differences in the perception of various power utilities and the differences in the solution techniques. The IEEE-RTS contains a reasonably large power network which can be difficult to use for initial studies in an educational environment.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Objective: To establish risk factors for moderate and severe microbial keratitis among daily contact lens (CL) wearers in Australia. Design: A prospective, 12-month, population-based, case-control study. Participants: New cases of moderate and severe microbial keratitis in daily wear CL users presenting in Australia over a 12-month period were identified through surveillance of all ophthalmic practitioners. Case detection was augmented by record audits at major ophthalmic centers. Controls were users of daily wear CLs in the community identified using a national telephone survey. Testing: Cases and controls were interviewed by telephone to determine subject demographics and CL wear history. Multiple binary logistic regression was used to determine independent risk factors and univariate population attributable risk percentage (PAR%) was estimated for each risk factor.; Main Outcome Measures: Independent risk factors, relative risk (with 95% confidence intervals [CIs]), and PAR%. Results: There were 90 eligible moderate and severe cases related to daily wear of CLs reported during the study period. We identified 1090 community controls using daily wear CLs. Independent risk factors for moderate and severe keratitis while adjusting for age, gender, and lens material type included poor storage case hygiene 6.4× (95% CI, 1.9-21.8; PAR, 49%), infrequent storage case replacement 5.4× (95% CI, 1.5-18.9; PAR, 27%), solution type 7.2× (95% CI, 2.3-22.5; PAR, 35%), occasional overnight lens use (<1 night per week) 6.5× (95% CI, 1.3-31.7; PAR, 23%), high socioeconomic status 4.1× (95% CI, 1.2-14.4; PAR, 31%), and smoking 3.7× (95% CI, 1.1-12.8; PAR, 31%). Conclusions: Moderate and severe microbial keratitis associated with daily use of CLs was independently associated with factors likely to cause contamination of CL storage cases (frequency of storage case replacement, hygiene, and solution type). Other factors included occasional overnight use of CLs, smoking, and socioeconomic class. Disease load may be considerably reduced by attention to modifiable risk factors related to CL storage case practice.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the modern connected world, pervasive computing has become reality. Thanks to the ubiquity of mobile computing devices and emerging cloud-based services, the users permanently stay connected to their data. This introduces a slew of new security challenges, including the problem of multi-device key management and single-sign-on architectures. One solution to this problem is the utilization of secure side-channels for authentication, including the visual channel as vicinity proof. However, existing approaches often assume confidentiality of the visual channel, or provide only insufficient means of mitigating a man-in-the-middle attack. In this work, we introduce QR-Auth, a two-step, 2D barcode based authentication scheme for mobile devices which aims specifically at key management and key sharing across devices in a pervasive environment. It requires minimal user interaction and therefore provides better usability than most existing schemes, without compromising its security. We show how our approach fits in existing authorization delegation and one-time-password generation schemes, and that it is resilient to man-in-the-middle attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We consider Cooperative Intrusion Detection System (CIDS) which is a distributed AIS-based (Artificial Immune System) IDS where nodes collaborate over a peer-to-peer overlay network. The AIS uses the negative selection algorithm for the selection of detectors (e.g., vectors of features such as CPU utilization, memory usage and network activity). For better detection performance, selection of all possible detectors for a node is desirable but it may not be feasible due to storage and computational overheads. Limiting the number of detectors on the other hand comes with the danger of missing attacks. We present a scheme for the controlled and decentralized division of detector sets where each IDS is assigned to a region of the feature space. We investigate the trade-off between scalability and robustness of detector sets. We address the problem of self-organization in CIDS so that each node generates a distinct set of the detectors to maximize the coverage of the feature space while pairs of nodes exchange their detector sets to provide a controlled level of redundancy. Our contribution is twofold. First, we use Symmetric Balanced Incomplete Block Design, Generalized Quadrangles and Ramanujan Expander Graph based deterministic techniques from combinatorial design theory and graph theory to decide how many and which detectors are exchanged between which pair of IDS nodes. Second, we use a classical epidemic model (SIR model) to show how properties from deterministic techniques can help us to reduce the attack spread rate.