882 resultados para Update


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The ability to estimate the asset reliability and the probability of failure is critical to reducing maintenance costs, operation downtime, and safety hazards. Predicting the survival time and the probability of failure in future time is an indispensable requirement in prognostics and asset health management. In traditional reliability models, the lifetime of an asset is estimated using failure event data, alone; however, statistically sufficient failure event data are often difficult to attain in real-life situations due to poor data management, effective preventive maintenance, and the small population of identical assets in use. Condition indicators and operating environment indicators are two types of covariate data that are normally obtained in addition to failure event and suspended data. These data contain significant information about the state and health of an asset. Condition indicators reflect the level of degradation of assets while operating environment indicators accelerate or decelerate the lifetime of assets. When these data are available, an alternative approach to the traditional reliability analysis is the modelling of condition indicators and operating environment indicators and their failure-generating mechanisms using a covariate-based hazard model. The literature review indicates that a number of covariate-based hazard models have been developed. All of these existing covariate-based hazard models were developed based on the principle theory of the Proportional Hazard Model (PHM). However, most of these models have not attracted much attention in the field of machinery prognostics. Moreover, due to the prominence of PHM, attempts at developing alternative models, to some extent, have been stifled, although a number of alternative models to PHM have been suggested. The existing covariate-based hazard models neglect to fully utilise three types of asset health information (including failure event data (i.e. observed and/or suspended), condition data, and operating environment data) into a model to have more effective hazard and reliability predictions. In addition, current research shows that condition indicators and operating environment indicators have different characteristics and they are non-homogeneous covariate data. Condition indicators act as response variables (or dependent variables) whereas operating environment indicators act as explanatory variables (or independent variables). However, these non-homogenous covariate data were modelled in the same way for hazard prediction in the existing covariate-based hazard models. The related and yet more imperative question is how both of these indicators should be effectively modelled and integrated into the covariate-based hazard model. This work presents a new approach for addressing the aforementioned challenges. The new covariate-based hazard model, which termed as Explicit Hazard Model (EHM), explicitly and effectively incorporates all three available asset health information into the modelling of hazard and reliability predictions and also drives the relationship between actual asset health and condition measurements as well as operating environment measurements. The theoretical development of the model and its parameter estimation method are demonstrated in this work. EHM assumes that the baseline hazard is a function of the both time and condition indicators. Condition indicators provide information about the health condition of an asset; therefore they update and reform the baseline hazard of EHM according to the health state of asset at given time t. Some examples of condition indicators are the vibration of rotating machinery, the level of metal particles in engine oil analysis, and wear in a component, to name but a few. Operating environment indicators in this model are failure accelerators and/or decelerators that are included in the covariate function of EHM and may increase or decrease the value of the hazard from the baseline hazard. These indicators caused by the environment in which an asset operates, and that have not been explicitly identified by the condition indicators (e.g. Loads, environmental stresses, and other dynamically changing environment factors). While the effects of operating environment indicators could be nought in EHM; condition indicators could emerge because these indicators are observed and measured as long as an asset is operational and survived. EHM has several advantages over the existing covariate-based hazard models. One is this model utilises three different sources of asset health data (i.e. population characteristics, condition indicators, and operating environment indicators) to effectively predict hazard and reliability. Another is that EHM explicitly investigates the relationship between condition and operating environment indicators associated with the hazard of an asset. Furthermore, the proportionality assumption, which most of the covariate-based hazard models suffer from it, does not exist in EHM. According to the sample size of failure/suspension times, EHM is extended into two forms: semi-parametric and non-parametric. The semi-parametric EHM assumes a specified lifetime distribution (i.e. Weibull distribution) in the form of the baseline hazard. However, for more industry applications, due to sparse failure event data of assets, the analysis of such data often involves complex distributional shapes about which little is known. Therefore, to avoid the restrictive assumption of the semi-parametric EHM about assuming a specified lifetime distribution for failure event histories, the non-parametric EHM, which is a distribution free model, has been developed. The development of EHM into two forms is another merit of the model. A case study was conducted using laboratory experiment data to validate the practicality of the both semi-parametric and non-parametric EHMs. The performance of the newly-developed models is appraised using the comparison amongst the estimated results of these models and the other existing covariate-based hazard models. The comparison results demonstrated that both the semi-parametric and non-parametric EHMs outperform the existing covariate-based hazard models. Future research directions regarding to the new parameter estimation method in the case of time-dependent effects of covariates and missing data, application of EHM in both repairable and non-repairable systems using field data, and a decision support model in which linked to the estimated reliability results, are also identified.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This chapter presents a comparative survey of recent key management (key distribution, discovery, establishment and update) solutions for wireless sensor networks. We consider both distributed and hierarchical sensor network architectures where unicast, multicast and broadcast types of communication take place. Probabilistic, deterministic and hybrid key management solutions are presented, and we determine a set of metrics to quantify their security properties and resource usage such as processing, storage and communication overheads. We provide a taxonomy of solutions, and identify trade-offs in these schemes to conclude that there is no one-size-fits-all solution.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Sfinks is a shift register based stream cipher designed for hardware implementation and submitted to the eSTREAM project. In this paper, we analyse the initialisation process of Sfinks. We demonstrate a slid property of the loaded state of the Sfinks cipher, where multiple key-IV pairs may produce phase shifted keystream sequences. The state update functions of both the initialisation process and keystream generation and also the pattern of the padding affect generation of the slid pairs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper is concerned with the unsupervised learning of object representations by fusing visual and motor information. The problem is posed for a mobile robot that develops its representations as it incrementally gathers data. The scenario is problematic as the robot only has limited information at each time step with which it must generate and update its representations. Object representations are refined as multiple instances of sensory data are presented; however, it is uncertain whether two data instances are synonymous with the same object. This process can easily diverge from stability. The premise of the presented work is that a robot's motor information instigates successful generation of visual representations. An understanding of self-motion enables a prediction to be made before performing an action, resulting in a stronger belief of data association. The system is implemented as a data-driven partially observable semi-Markov decision process. Object representations are formed as the process's hidden states and are coordinated with motor commands through state transitions. Experiments show the prediction process is essential in enabling the unsupervised learning method to converge to a solution - improving precision and recall over using sensory data alone.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A5/1 is a shift register based stream cipher which uses a majority clocking rule to update its registers. It is designed to provide privacy for the GSM system. In this paper, we analyse the initialisation process of A5/1. We demonstrate a sliding property of the A5/1 cipher, where every valid internal state is also a legitimate loaded state and multiple key-IV pairs produce phase shifted keystream sequences. We describe a possible ciphertext only attack based on this property.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Debate about the relationships between business planning and performance has been active for decades (Bhidé, 2000; Mintzberg, 1994). While results have been inconclusive, this topic still strongly divides the research community (Brinckmann et al., 2010; Chwolka & Raith, 2011; Delmar & Shane, 2004; Frese, 2009; Gruber, 2007; Honig & Karlsson, 2004). Previous research explored the relationships between innovation and the venture creation process (Amason et al., 2006, Dewar & Dutton, 1986; Jennings et al., 2009). However, the relationships between business planning and innovation have mostly been invoked indirectly in the strategy and entrepreneurship literatures through the notion of uncertainty surrounding the development of innovation. Some posited that planning may be irrelevant due to the iterative process, the numerous changes innovation development entails and the need to be flexible (Brews & Hunt, 1999). Others suggested that planning may facilitate the achievement of goals and overcoming of obstacles (Locke and Latham, 2000), guide the venture in its allocation of resources (Delmar and Shane, 2003) and help to foster the communication about the innovation being developed (Liao & Welsh, 2008). However, the nature and extents of the relationships between business planning, innovation and performance are still largely unknown. Moreover, if the reasons why ventures should engage (Frese, 2009) –or not- (Honig, 2004) in business planning have been investigated quite extensively (Brinckmann et al., 2010), the specific value of business planning for nascent firms developing innovation is still unclear. The objective of this paper is to shed some light on these important aspects by investigating the two following questions on a large sample of random nascent firms: 1) how is business planning use over time by new ventures developing different types and degrees of innovation? 2) how do business planning and innovation impact the performance of the nascent firms? Methods & Key propositions This PSED-type study draws its data from the first three waves of the CAUSEE project where 30,105 Australian households were randomly contacted by phone using a methodology to capture emerging firms (Davidsson, Steffens, Gordon, Reynolds, 2008). This screening led to the identification of 594 nascent ventures (i.e., firms that were not operating yet at the time of the identification) that were willing to participate in the study. Comprehensive phone interviews were conducted with these 594 ventures. Likewise, two comprehensive follow-ups were organised 12 months and 24 months later where 80% of the eligible cases of the previous wave completed the interview. The questionnaire contains specific sections investigating business plans such as: presence or absence, degree of formality and updates of the plan. Four types of innovation are measured along three degrees of intensity to produce a comprehensive continuous measure ranging from 0 to 12 (Dahlqvist & Wiklund, 2011). Other sections informing on the gestation activities, industry and different types of experiences will be used as controls to measure the relationships and the impacts of business planning and innovation on the performance of nascent firms overtime. Results from two rounds of pre-testing informed the design of the instrument included in the main survey. The three waves of data are used to first test and compare the use of planning amongst nascent firms by their degrees of innovation and then to examine their impact on performance overtime through regression analyses. Results and Implications Three waves of data collection have been completed. Preliminary results show that on average, innovative firms are more likely to have a business plans than their low innovative counterpart. They are also most likely to update their plan suggesting a more continuous use of the plan over time than previously thought. Further analyses regarding the relationships between business planning, innovation and performance are undergoing. This paper is expected to contribute to the literature on business planning and innovation by measuring quantitatively their impact on nascent firms activities and performance at different stages of their development. In addition, this study will shed a new light on the business planning-performance relationship by disentangling plans, types of nascent firms regarding their innovation degres and their performance over time. Finally, we expect to increase the understanding of the venture creation process by analysing those questions on nascent firms from a large longitudinal sample of randomly selected ventures. We acknowledge the results from this study will be preliminary and will have to be interpreted with caution as the business planning-performance is not a straightforward relationship (Brinckmann et al., 2010). Meanwhile, we believe that this study is important to the field of entrepreneurship as it provides some much needed insights on the processes used by nascent firms during their creation and early operating stages.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Changes in plasma zinc concentration and markers of immune function were examined in a group of 10 male runners (n = 10) following a moderate increase in training over four weeks. Seven sedentary males acted as controls. Fasting blood samples were taken at rest, before (T0) and after (T4) four weeks of increased (+ 16 %) training and after two weeks of reduced (-31 %) training (T6). Blood was analysed for plasma zinc concentration, differential leucocyte counts, lymphocyte subpopulations and lymphocyte proliferation using incorporation of 3H-thymidine. The runners increased their training volume by 16 % over the four weeks. When compared with the nonathletes, the runners had lower concentrations of plasma zinc (p = 0.012), CD3 + (p = 0.042) and CD19 + lymphocytes (p = 0.010) over the four weeks. Lymphocyte proliferation in response to Concanavalin A stimulation was greater in the runners (p = 0.0090). Plasma zinc concentration and immune markers remained constant during the study. Plasma zinc concentration correlated with total leucocyte counts in the athletes at T6 (r = -0.72, p < 0.05) and with Pokeweed mitogen stimulation in the nonathletes at T6 (r = -0.92, p < 0.05). Therefore, athletes are unlikely to benefit from zinc supplementation during periods of moderately increased training volume.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Predicate encryption (PE) is a new primitive which supports exible control over access to encrypted data. In PE schemes, users' decryption keys are associated with predicates f and ciphertexts encode attributes a that are specified during the encryption procedure. A user can successfully decrypt if and only if f(a) = 1. In this thesis, we will investigate several properties that are crucial to PE. We focus on expressiveness of PE, Revocable PE and Hierarchical PE (HPE) with forward security. For all proposed systems, we provide a security model and analysis using the widely accepted computational complexity approach. Our first contribution is to explore the expressiveness of PE. Existing PE supports a wide class of predicates such as conjunctions of equality, comparison and subset queries, disjunctions of equality queries, and more generally, arbitrary combinations of conjunctive and disjunctive equality queries. We advance PE to evaluate more expressive predicates, e.g., disjunctive comparison or disjunctive subset queries. Such expressiveness is achieved at the cost of computational and space overhead. To improve the performance, we appropriately revise the PE to reduce the computational and space cost. Furthermore, we propose a heuristic method to reduce disjunctions in the predicates. Our schemes are proved in the standard model. We then introduce the concept of Revocable Predicate Encryption (RPE), which extends the previous PE setting with revocation support: private keys can be used to decrypt an RPE ciphertext only if they match the decryption policy (defined via attributes encoded into the ciphertext and predicates associated with private keys) and were not revoked by the time the ciphertext was created. We propose two RPE schemes. Our first scheme, termed Attribute- Hiding RPE (AH-RPE), offers attribute-hiding, which is the standard PE property. Our second scheme, termed Full-Hiding RPE (FH-RPE), offers even stronger privacy guarantees, i.e., apart from possessing the Attribute-Hiding property, the scheme also ensures that no information about revoked users is leaked from a given ciphertext. The proposed schemes are also proved to be secure under well established assumptions in the standard model. Secrecy of decryption keys is an important pre-requisite for security of (H)PE and compromised private keys must be immediately replaced. The notion of Forward Security (FS) reduces damage from compromised keys by guaranteeing confidentiality of messages that were encrypted prior to the compromise event. We present the first Forward-Secure Hierarchical Predicate Encryption (FS-HPE) that is proved secure in the standard model. Our FS-HPE scheme offers some desirable properties: time-independent delegation of predicates (to support dynamic behavior for delegation of decrypting rights to new users), local update for users' private keys (i.e., no master authority needs to be contacted), forward security, and the scheme's encryption process does not require knowledge of predicates at any level including when those predicates join the hierarchy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Obesity and type 2 diabetes are recognised risk factors for the development of some cancers and, increasingly, predict more aggressive disease, treatment failure, and cancer-specific mortality. Many factors may contribute to this clinical observation. Hyperinsulinaemia, dyslipidaemia, hypoxia, ER stress, and inflammation associated with expanded adipose tissue are thought to be among the main culprits driving malignant growth and cancer advancement. This observation has led to the proposal of the potential utility of “old players” for the treatment of type 2 diabetes and metabolic syndrome as new cancer adjuvant therapeutics. Androgen-regulated pathways drive proliferation, differentiation, and survival of benign and malignant prostate tissue. Androgen deprivation therapy (ADT) exploits this dependence to systemically treat advanced prostate cancer resulting in anticancer response and improvement of cancer symptoms. However, the initial therapeutic response from ADT eventually progresses to castrate resistant prostate cancer (CRPC) which is currently incurable. ADT rapidly induces hyperinsulinaemia which is associated with more rapid treatment failure. We discuss current observations of cancer in the context of obesity, diabetes, and insulin-lowering medication. We provide an update on current treatments for advanced prostate cancer and discuss whether metabolic dysfunction, developed during ADT, provides a unique therapeutic window for rapid translation of insulin-sensitising medication as combination therapy with antiandrogen targeting agents for the management of advanced prostate cancer.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Vehicular accidents are one of the deadliest safety hazards and accordingly an immense concern of individuals and governments. Although, a wide range of active autonomous safety systems, such as advanced driving assistance and lane keeping support, are introduced to facilitate safer driving experience, these stand-alone systems have limited capabilities in providing safety. Therefore, cooperative vehicular systems were proposed to fulfill more safety requirements. Most cooperative vehicle-to-vehicle safety applications require relative positioning accuracy of decimeter level with an update rate of at least 10 Hz. These requirements cannot be met via direct navigation or differential positioning techniques. This paper studies a cooperative vehicle platform that aims to facilitate real-time relative positioning (RRP) among adjacent vehicles. The developed system is capable of exchanging both GPS position solutions and raw observations using RTCM-104 format over vehicular dedicated short range communication (DSRC) links. Real-time kinematic (RTK) positioning technique is integrated into the system to enable RRP to be served as an embedded real-time warning system. The 5.9 GHz DSRC technology is adopted as the communication channel among road-side units (RSUs) and on-board units (OBUs) to distribute GPS corrections data received from a nearby reference station via the Internet using cellular technologies, by means of RSUs, as well as to exchange the vehicular real-time GPS raw observation data. Ultimately, each receiving vehicle calculates relative positions of its neighbors to attain a RRP map. A series of real-world data collection experiments was conducted to explore the synergies of both DSRC and positioning systems. The results demonstrate a significant enhancement in precision and availability of relative positioning at mobile vehicles.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

BACKGROUND: US Centers for Disease Control guidelines recommend replacement of peripheral intravenous (IV) catheters no more frequently than every 72 to 96 hours. Routine replacement is thought to reduce the risk of phlebitis and bloodstream infection. Catheter insertion is an unpleasant experience for patients and replacement may be unnecessary if the catheter remains functional and there are no signs of inflammation. Costs associated with routine replacement may be considerable. This is an update of a review first published in 2010. OBJECTIVES: To assess the effects of removing peripheral IV catheters when clinically indicated compared with removing and re-siting the catheter routinely. SEARCH METHODS: For this update the Cochrane Peripheral Vascular Diseases (PVD) Group Trials Search Co-ordinator searched the PVD Specialised Register (December 2012) and CENTRAL (2012, Issue 11). We also searched MEDLINE (last searched October 2012) and clinical trials registries. SELECTION CRITERIA: Randomised controlled trials that compared routine removal of peripheral IV catheters with removal only when clinically indicated in hospitalised or community dwelling patients receiving continuous or intermittent infusions. DATA COLLECTION AND ANALYSIS: Two review authors independently assessed trial quality and extracted data. MAIN RESULTS: Seven trials with a total of 4895 patients were included in the review. Catheter-related bloodstream infection (CRBSI) was assessed in five trials (4806 patients). There was no significant between group difference in the CRBSI rate (clinically-indicated 1/2365; routine change 2/2441). The risk ratio (RR) was 0.61 but the confidence interval (CI) was wide, creating uncertainty around the estimate (95% CI 0.08 to 4.68; P = 0.64). No difference in phlebitis rates was found whether catheters were changed according to clinical indications or routinely (clinically-indicated 186/2365; 3-day change 166/2441; RR 1.14, 95% CI 0.93 to 1.39). This result was unaffected by whether infusion through the catheter was continuous or intermittent. We also analysed the data by number of device days and again no differences between groups were observed (RR 1.03, 95% CI 0.84 to 1.27; P = 0.75). One trial assessed all-cause bloodstream infection. There was no difference in this outcome between the two groups (clinically-indicated 4/1593 (0.02%); routine change 9/1690 (0.05%); P = 0.21). Cannulation costs were lower by approximately AUD 7.00 in the clinically-indicated group (mean difference (MD) -6.96, 95% CI -9.05 to -4.86; P ≤ 0.00001). AUTHORS' CONCLUSIONS: The review found no evidence to support changing catheters every 72 to 96 hours. Consequently, healthcare organisations may consider changing to a policy whereby catheters are changed only if clinically indicated. This would provide significant cost savings and would spare patients the unnecessary pain of routine re-sites in the absence of clinical indications. To minimise peripheral catheter-related complications, the insertion site should be inspected at each shift change and the catheter removed if signs of inflammation, infiltration, or blockage are present. OBJECTIVES: To assess the effects of removing peripheral IV catheters when clinically indicated compared with removing and re-siting the catheter routinely. SEARCH METHODS: For this update the Cochrane Peripheral Vascular Diseases (PVD) Group Trials Search Co-ordinator searched the PVD Specialised Register (December 2012) and CENTRAL (2012, Issue 11). We also searched MEDLINE (last searched October 2012) and clinical trials registries. SELECTION CRITERIA: Randomised controlled trials that compared routine removal of peripheral IV catheters with removal only when clinically indicated in hospitalised or community dwelling patients receiving continuous or intermittent infusions. DATA COLLECTION AND ANALYSIS: Two review authors independently assessed trial quality and extracted data. MAIN RESULTS: Seven trials with a total of 4895 patients were included in the review. Catheter-related bloodstream infection (CRBSI) was assessed in five trials (4806 patients). There was no significant between group difference in the CRBSI rate (clinically-indicated 1/2365; routine change 2/2441). The risk ratio (RR) was 0.61 but the confidence interval (CI) was wide, creating uncertainty around the estimate (95% CI 0.08 to 4.68; P = 0.64). No difference in phlebitis rates was found whether catheters were changed according to clinical indications or routinely (clinically-indicated 186/2365; 3-day change 166/2441; RR 1.14, 95% CI 0.93 to 1.39). This result was unaffected by whether infusion through the catheter was continuous or intermittent. We also analysed the data by number of device days and again no differences between groups were observed (RR 1.03, 95% CI 0.84 to 1.27; P = 0.75). One trial assessed all-cause bloodstream infection. There was no difference in this outcome between the two groups (clinically-indicated 4/1593 (0.02%); routine change 9/1690 (0.05%); P = 0.21). Cannulation costs were lower by approximately AUD 7.00 in the clinically-indicated group (mean difference (MD) -6.96, 95% CI -9.05 to -4.86; P ≤ 0.00001). AUTHORS' CONCLUSIONS: The review found no evidence to support changing catheters every 72 to 96 hours. Consequently, healthcare organisations may consider changing to a policy whereby catheters are changed only if clinically indicated. This would provide significant cost savings and would spare patients the unnecessary pain of routine re-sites in the absence of clinical indications. To minimise peripheral catheter-related complications, the insertion site should be inspected at each shift change and the catheter removed if signs of inflammation, infiltration, or blockage are present.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Streamciphers are common cryptographic algorithms used to protect the confidentiality of frame-based communications like mobile phone conversations and Internet traffic. Streamciphers are ideal cryptographic algorithms to encrypt these types of traffic as they have the potential to encrypt them quickly and securely, and have low error propagation. The main objective of this thesis is to determine whether structural features of keystream generators affect the security provided by stream ciphers.These structural features pertain to the state-update and output functions used in keystream generators. Using linear sequences as keystream to encrypt messages is known to be insecure. Modern keystream generators use nonlinear sequences as keystream.The nonlinearity can be introduced through a keystream generator's state-update function, output function, or both. The first contribution of this thesis relates to nonlinear sequences produced by the well-known Trivium stream cipher. Trivium is one of the stream ciphers selected in a final portfolio resulting from a multi-year project in Europe called the ecrypt project. Trivium's structural simplicity makes it a popular cipher to cryptanalyse, but to date, there are no attacks in the public literature which are faster than exhaustive keysearch. Algebraic analyses are performed on the Trivium stream cipher, which uses a nonlinear state-update and linear output function to produce keystream. Two algebraic investigations are performed: an examination of the sliding property in the initialisation process and algebraic analyses of Trivium-like streamciphers using a combination of the algebraic techniques previously applied separately by Berbain et al. and Raddum. For certain iterations of Trivium's state-update function, we examine the sets of slid pairs, looking particularly to form chains of slid pairs. No chains exist for a small number of iterations.This has implications for the period of keystreams produced by Trivium. Secondly, using our combination of the methods of Berbain et al. and Raddum, we analysed Trivium-like ciphers and improved on previous on previous analysis with regards to forming systems of equations on these ciphers. Using these new systems of equations, we were able to successfully recover the initial state of Bivium-A.The attack complexity for Bivium-B and Trivium were, however, worse than exhaustive keysearch. We also show that the selection of stages which are used as input to the output function and the size of registers which are used in the construction of the system of equations affect the success of the attack. The second contribution of this thesis is the examination of state convergence. State convergence is an undesirable characteristic in keystream generators for stream ciphers, as it implies that the effective session key size of the stream cipher is smaller than the designers intended. We identify methods which can be used to detect state convergence. As a case study, theMixer streamcipher, which uses nonlinear state-update and output functions to produce keystream, is analysed. Mixer is found to suffer from state convergence as the state-update function used in its initialisation process is not one-to-one. A discussion of several other streamciphers which are known to suffer from state convergence is given. From our analysis of these stream ciphers, three mechanisms which can cause state convergence are identified.The effect state convergence can have on stream cipher cryptanalysis is examined. We show that state convergence can have a positive effect if the goal of the attacker is to recover the initial state of the keystream generator. The third contribution of this thesis is the examination of the distributions of bit patterns in the sequences produced by nonlinear filter generators (NLFGs) and linearly filtered nonlinear feedback shift registers. We show that the selection of stages used as input to a keystream generator's output function can affect the distribution of bit patterns in sequences produced by these keystreamgenerators, and that the effect differs for nonlinear filter generators and linearly filtered nonlinear feedback shift registers. In the case of NLFGs, the keystream sequences produced when the output functions take inputs from consecutive register stages are less uniform than sequences produced by NLFGs whose output functions take inputs from unevenly spaced register stages. The opposite is true for keystream sequences produced by linearly filtered nonlinear feedback shift registers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In 2009, Mark Deuze proposed an updated approach to media studies to incorporate ‘media life’, a concept he suggests addresses the invisibleness of ubiquitous media. Media life provides a useful lens for researchers to understand the human condition in media and not with media. At a similar time, public service media (PSM) strategies have aligned audience participation with the so‐called Reithian trinity which suggest the PSB should inform, educate and entertain while performing its core values of public service broadcasting (Enli 2008). Remix within the PSM institution relies on audience participation, employing ‘the people formerly known as the audience’ (Rosen 2006) as cultural artifact producers, and draws on their experience from within the media. Remix as a practice then enables us to examine the shift of the core PSM values by understanding how audience participation, informed by a human condition mobilised from our existence of being in media and not merely with media. However, remix within PSM challenges the once elitist construction of meaning models with an egalitarian approach towards socially reappropriated texts, questioning its affect on the cultural landscape. This paper draws on three years of ethnographic data from within the Australian Broadcasting Corporation (ABC), exploring the remix culture of ABC Pool. ABC Pool operates under a Creative Commons licensing regime to enable remix practice under the auspices of the ABC. ABC Pool users provide a useful group of remix practitioners to examine as they had access to a vast ABC archival collection and were invited to remix those cultural artefacts, often adding cultural and fiscal value. This paper maintains a focus on the audience participation within PSM through remix culture by applying media dependency theory to remix as cultural practice and calls to expand and update the societal representation within the ABC.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background This is an updated version of a Cochrane review first published in Issue 1, 2010 of The Cochrane Library. In many clinical areas, integrated care pathways are utilised as structured multidisciplinary care plans that detail essential steps in caring for patients with specific clinical problems. In particular, care pathways for the dying have been developed as a model to improve care of patients who are in the last days of life. The care pathways were designed with an aim of ensuring that the most appropriate management occurs at the most appropriate time and that it is provided by the most appropriate health professional. There have been sustained concerns about the safety of implementing end-of-life care pathways, particularly in the UK. Therefore, there is a significant need for clinicians and policy makers to be informed about the effects of end-of-life care pathways with a systematic review. Objectives To assess the effects of end-of-life care pathways, compared with usual care (no pathway) or with care guided by another end-of-life care pathway across all healthcare settings (e.g. hospitals, residential aged care facilities, community). In particular, we aimed to assess the effects on symptom severity and quality of life of people who are dying; those related to the care such as families, carers and health professionals; or a combination of these. Search Methods We searched the Cochrane Central Register of Controlled Trials (CENTRAL) (Issue 6, 2013), MEDLINE, EMBASE, PsycINFO, CINAHL, review articles and reference lists of relevant articles.We conducted the original search in September 2009, and the updated search in June 2013. Selection Criteria All randomised controlled trials (RCTs), quasi-randomised trial or high-quality controlled before-and-after studies comparing use versus non-use of an end-of-life care pathway in caring for the dying. Data Collection and Analysis Two review authors assessed the results of the searches against the predetermined criteria for inclusion. Main Results The original review identified 920 titles. The updated search found 2042 potentially relevant titles (including the original 920), but no additional studies met criteria for inclusion in the review update. Authors’ Conclusions With sustained concerns about the safety of the pathway implementation and the lack of available evidence on important patient and relative outcomes, recommendations for the use of end-of-life pathways in caring for the dying cannot be made. Since the last version of this review, no new studies met criteria for inclusion in the review update. With recently documented concerns related to the potential adverse effects associated with Liverpool Care Pathway (the most commonly used end-of-life care pathway), we do not recommend decision making based on indirect or low-quality evidence. All health services using end-of-life care pathways are encouraged to have their use of the pathway, to date, independently audited. Any subsequent use should be based on carefully documented evaluations. Large RCTs or other well-designed controlled studies are urgently required for the evaluation of the use of end-of-life care pathways in caring for dying people in various clinical settings. In future studies, outcome measures should include benefits or harms concerning the outcomes of interest in this review in relation to patients, families, carers and health professionals.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Lyngbya majuscula is a cyanobacterium (blue-green algae) occurring naturally in tropical and subtropical coastal areas worldwide. Deception Bay, in Northern Moreton Bay, Queensland, has a history of Lyngbya blooms, and forms a case study for this investigation. The South East Queensland (SEQ) Healthy Waterways Partnership, collaboration between government, industry, research and the community, was formed to address issues affecting the health of the river catchments and waterways of South East Queensland. The Partnership coordinated the Lyngbya Research and Management Program (2005-2007) which culminated in a Coastal Algal Blooms (CAB) Action Plan for harmful and nuisance algal blooms, such as Lyngbya majuscula. This first phase of the project was predominantly of a scientific nature and also facilitated the collection of additional data to better understand Lyngbya blooms. The second phase of this project, SEQ Healthy Waterways Strategy 2007-2012, is now underway to implement the CAB Action Plan and as such is more management focussed. As part of the first phase of the project, a Science model for the initiation of a Lyngbya bloom was built using Bayesian Networks (BN). The structure of the Science Bayesian Network was built by the Lyngbya Science Working Group (LSWG) which was drawn from diverse disciplines. The BN was then quantified with annual data and expert knowledge. Scenario testing confirmed the expected temporal nature of bloom initiation and it was recommended that the next version of the BN be extended to take this into account. Elicitation for this BN thus occurred at three levels: design, quantification and verification. The first level involved construction of the conceptual model itself, definition of the nodes within the model and identification of sources of information to quantify the nodes. The second level included elicitation of expert opinion and representation of this information in a form suitable for inclusion in the BN. The third and final level concerned the specification of scenarios used to verify the model. The second phase of the project provides the opportunity to update the network with the newly collected detailed data obtained during the previous phase of the project. Specifically the temporal nature of Lyngbya blooms is of interest. Management efforts need to be directed to the most vulnerable periods to bloom initiation in the Bay. To model the temporal aspects of Lyngbya we are using Object Oriented Bayesian networks (OOBN) to create ‘time slices’ for each of the periods of interest during the summer. OOBNs provide a framework to simplify knowledge representation and facilitate reuse of nodes and network fragments. An OOBN is more hierarchical than a traditional BN with any sub-network able to contain other sub-networks. Connectivity between OOBNs is an important feature and allows information flow between the time slices. This study demonstrates more sophisticated use of expert information within Bayesian networks, which combine expert knowledge with data (categorized using expert-defined thresholds) within an expert-defined model structure. Based on the results from the verification process the experts are able to target areas requiring greater precision and those exhibiting temporal behaviour. The time slices incorporate the data for that time period for each of the temporal nodes (instead of using the annual data from the previous static Science BN) and include lag effects to allow the effect from one time slice to flow to the next time slice. We demonstrate a concurrent steady increase in the probability of initiation of a Lyngbya bloom and conclude that the inclusion of temporal aspects in the BN model is consistent with the perceptions of Lyngbya behaviour held by the stakeholders. This extended model provides a more accurate representation of the increased risk of algal blooms in the summer months and show that the opinions elicited to inform a static BN can be readily extended to a dynamic OOBN, providing more comprehensive information for decision makers.