890 resultados para Multiple Endocrine Neoplasia Type 2b
Resumo:
In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least theoretically, join various types of IMSs to make them interoperable and give users the illusion that they are interacting with just one IMS. However, due to the complexity of an IMS, attempting to join various types of IMSs is a technically challenging task, let alone assessing how well an IMetS manages to integrate these IMSs. The first contribution of this thesis is the development of a generic IMS model called the Layered Identity Infrastructure Model (LIIM). Using this model, we develop a set of properties that an ideal IMetS should provide. This idealized form is then used as a benchmark to evaluate existing IMetSs. Different types of IMS provide varying levels of privacy protection support. Unfortunately, as observed by Jøsang et al (2007), there is insufficient privacy protection in many of the existing IMSs. In this thesis, we study and extend a type of privacy enhancing technology known as an Anonymous Credential System (ACS). In particular, we extend the ACS which is built on the cryptographic primitives proposed by Camenisch, Lysyanskaya, and Shoup. We call this system the Camenisch, Lysyanskaya, Shoup - Anonymous Credential System (CLS-ACS). The goal of CLS-ACS is to let users be as anonymous as possible. Unfortunately, CLS-ACS has problems, including (1) the concentration of power to a single entity - known as the Anonymity Revocation Manager (ARM) - who, if malicious, can trivially reveal a user’s PII (resulting in an illegal revocation of the user’s anonymity), and (2) poor performance due to the resource-intensive cryptographic operations required. The second and third contributions of this thesis are the proposal of two protocols that reduce the trust dependencies on the ARM during users’ anonymity revocation. Both protocols distribute trust from the ARM to a set of n referees (n > 1), resulting in a significant reduction of the probability of an anonymity revocation being performed illegally. The first protocol, called the User Centric Anonymity Revocation Protocol (UCARP), allows a user’s anonymity to be revoked in a user-centric manner (that is, the user is aware that his/her anonymity is about to be revoked). The second protocol, called the Anonymity Revocation Protocol with Re-encryption (ARPR), allows a user’s anonymity to be revoked by a service provider in an accountable manner (that is, there is a clear mechanism to determine which entity who can eventually learn - and possibly misuse - the identity of the user). The fourth contribution of this thesis is the proposal of a protocol called the Private Information Escrow bound to Multiple Conditions Protocol (PIEMCP). This protocol is designed to address the performance issue of CLS-ACS by applying the CLS-ACS in a federated single sign-on (FSSO) environment. Our analysis shows that PIEMCP can both reduce the amount of expensive modular exponentiation operations required and lower the risk of illegal revocation of users’ anonymity. Finally, the protocols proposed in this thesis are complex and need to be formally evaluated to ensure that their required security properties are satisfied. In this thesis, we use Coloured Petri nets (CPNs) and its corresponding state space analysis techniques. All of the protocols proposed in this thesis have been formally modeled and verified using these formal techniques. Therefore, the fifth contribution of this thesis is a demonstration of the applicability of CPN and its corresponding analysis techniques in modeling and verifying privacy enhancing protocols. To our knowledge, this is the first time that CPN has been comprehensively applied to model and verify privacy enhancing protocols. From our experience, we also propose several CPN modeling approaches, including complex cryptographic primitives (such as zero-knowledge proof protocol) modeling, attack parameterization, and others. The proposed approaches can be applied to other security protocols, not just privacy enhancing protocols.
Resumo:
Many of the power utilities around the world experienced spurious tripping of directional earth fault relays in their mesh distribution networks due to induced circulating currents. This circulating current is zero sequence and induced in the healthy circuit due to the zero sequence current flow resulting from a ground fault of a parallel circuit. This paper quantitatively discusses the effects of mutual coupling on earth fault protection of distribution systems. An actual spurious tripping event is analyzed to support the theory and to present options for improved resilience to spurious tripping.
Resumo:
Purpose: To analyze the repeatability of measuring nerve fiber length (NFL) from images of the human corneal subbasal nerve plexus using semiautomated software. Methods: Images were captured from the corneas of 50 subjects with type 2 diabetes mellitus who showed varying severity of neuropathy, using the Heidelberg Retina Tomograph 3 with Rostock Corneal Module. Semiautomated nerve analysis software was independently used by two observers to determine NFL from images of the subbasal nerve plexus. This procedure was undertaken on two occasions, 3 days apart. Results: The intraclass correlation coefficient values were 0.95 (95% confidence intervals: 0.92–0.97) for individual subjects and 0.95 (95% confidence intervals: 0.74–1.00) for observer. Bland-Altman plots of the NFL values indicated a reduced spread of data with lower NFL values. The overall spread of data was less for (a) the observer who was more experienced at analyzing nerve fiber images and (b) the second measurement occasion. Conclusions: Semiautomated measurement of NFL in the subbasal nerve fiber layer is highly repeatable. Repeatability can be enhanced by using more experienced observers. It may be possible to markedly improve repeatability when measuring this anatomic structure using fully automated image analysis software.
Resumo:
Since the 1970s the internationalisation process of firms has attracted wide research interest. One of the dominant explanations of firm internationalisation resulting from this research activity is the Uppsala stages model. In this paper, a pre-internationalisation phase is incorporated into the traditional Uppsala model to address the question: What are the antecedents of this model? Four concepts are proposed as the key components that define the experiential learning process underlying a firm’s pre-export phase: export stimuli, attitudinal/psychological commitment, resources and lateral rigidity. Through a survey of 290 Australian exporting and non-exporting small-medium sized firms, data relating to the four pre-internationalisation concepts is collected and an Export Readiness Index (ERI) is constructed through factor analysis. Using logistic regression, the ERI is tested as a tool for analysing export readiness among Australian SMEs.
Resumo:
This is the second part of a paper that explores a range of magico-religious experiences such as immaterial voices and visions, in terms of local cultural, moral and socio-political circumstances in an Aboriginal town in rural Queensland. This part of the paper explores the political and cultural symbolism and meaning of suicide. It charts the saliency of suicide amongst two groups of kin and cohorts and the social meaningfulness and problematic of the voices and visions in relation to suicide, to identity and family forms and to funerals and a heavily drinking lifestyle. I argue that voices and visions are used to reinterpret social experience and to establish meaning and that tragically suicide evokes connectivity rather than anomie and here cannot be understood merely as an individualistic act or evidence of individual pathology. Rather it is about transformation and crossing a threshold to join an enduring domain of Aboriginality. In this life world, where family is the highest social value and where a relational view of persons holds sway, the individualistic practice of psychiatric and other helping professions, is a considerable problem.
Resumo:
The purpose of this article is to examine how a consumer’s weight control beliefs (WCB), a female advertising model’s body size (slim or large) and product type influence consumer evaluations and consumer body perceptions. The study uses an experiment of 371 consumers. The design of the experiment was a 2 (weight control belief: internal, external) X 2 (model size: larger sized, slim) X 2 (product type: weight controlling, non-weight controlling) between-participants factorial design. Results reveal two key contributions. First, larger sized models result in consumers feeling less pressure from society to be thin, viewing their actual shape as slimmer relative to viewing a slim model and wanting a thinner ideal body shape. Slim models result in the opposite effects. Second this research reveals a boundary condition for the extent to which endorser–product congruency theory can be generalized to endorsers of a larger body size. Results indicate that consumer WCB may be a useful variable to consider when marketers consider the use of larger models in advertising.
Resumo:
Lactobacillus reuteri BR11 possesses an abundant cystine uptake (Cyu) ABC-transporter that was previously found to be involved in a novel mechanism of oxidative defence mediated by cystine. The current study aimed to elucidate this mechanism with a focus on the role of the co-transcribed cystathionine ã-lyase (Cgl). Growth studies of wild-type L. reuteri BR11 and mutants inactivated in cgl and the cystine-binding protein encoding gene cyuC showed that in contrast to the Cyu transporter, whose inactivation led to growth arrest in aerated cultures, Cgl is not crucial for oxidative defence. However, the role of Cgl in oxidative defence became apparent in the presence of severe oxidative damage and cysteine deprivation. Cysteine was found to be protective against oxidative stress, and the action of Cgl in both cysteine biosynthesis and degradation poses a seemingly futile pathway that deprives the intracellular cysteine pool. To further characterise the relationship between Cgl activity and cysteine and their roles in oxidative defence, enzymatic assays were performed on purified Cgl, and intracellular concentrations of cysteine, cystathionine and methionine were determined. Cgl was highly active towards cystine and cystathionine and less active towards cysteine in vitro, suggesting the main function of Cgl to be cysteine biosynthesis. Cysteine was found at high concentrations in the cell, but the levels were not significantly affected by inactivation of cgl or growth under aerobic conditions. It was concluded that both anabolic and catabolic activities of Cgl towards cysteine contribute to oxidative defence, the former by maintaining an intracellular reservoir of thiol analogous to glutathione, and the latter by producing H2S which is readily secreted, thus creating a reducing extracellular environment. The significance of the Cyu transporter to the physiology of L. reuteri BR11 prompted a phylogenetic study to determine its presence in bacteria. Orthologs of the Cyu transporter that are closest matches to the Cyu transporter are only limited to several species of Lactobacillus and Leuconostoc. Outside the Lactobacillales order, the closest matching orthologs belong to Proteobacteria, and there are more orthologs in Proteobacteria than non-Lactobacillales Firmicutes, suggesting that the Cyu transporter locus was present in the ancestor of the Proteobacteria and Firmicutes, and over evolutionary time has been lost or diverged in many Firmicutes. The clustering of the Cyu transporter locus with a gene encoding a Cgl family protein is even rarer. It was only found in L. reuteri, Lactobacillus vaginalis, Weissella paramesenteroides, the Lactobacillus casei group, and several Campylobacter sp. An accompanying phylogenetic study of L. reuteri BR11 using multi-locus sequence analysis showed that L. reuteri BR11 had diverged from more than 100 strains of L. reuteri isolated from various hosts and geographical locations. However, comparison with other Lactobacillus species supported the current classification of BR11 as L. reuteri. The most closely related species to L. reuteri is L. vaginalis or Lactobacillus antri, depending on the housekeeping gene used for analysis. The close evolutionary relationship of L. vaginalis to L. reuteri and the high degree of sequence identity between the cgl-cyuABC loci in both species suggest that the Cyu system is highly likely to perform similar functions in L. vaginalis. In search of other genes that function in oxidative defence, a number of mutants which were inactivated in genes that confer increased resistance to oxidative stress in other bacteria were constructed. The genes targeted were ahpC (peroxidase component of the alkyl hydroperoxide reductase system), tpx (thiol peroxidase), osmC (osmotically induced protein C), mntH (Mn2+/Fe2+ transporter), gshA (ã-glutamylcysteine synthetase) and msrA (methionine sulfoxide reductase). The ahpC and mntH mutants had slightly lower minimum inhibitory concentrations of organic peroxides, suggesting these genes might be involved in resistance to organic peroxides in L. reuteri. However, none of the mutants exhibited growth defects in aerated cultures, in stark contrast to the cyuC mutant. This may be due to compensatory functions of other genes, a hypothesis which cannot be tested until a robust protocol for constructing markerless multiple gene deletion mutants in L. reuteri is developed. These results highlight the importance of the Cyu transporter in oxidative defence and provide a foundation for extending the research of this system in other bacteria.
Resumo:
With regard to the long-standing problem of the semantic gap between low-level image features and high-level human knowledge, the image retrieval community has recently shifted its emphasis from low-level features analysis to high-level image semantics extrac- tion. User studies reveal that users tend to seek information using high-level semantics. Therefore, image semantics extraction is of great importance to content-based image retrieval because it allows the users to freely express what images they want. Semantic content annotation is the basis for semantic content retrieval. The aim of image anno- tation is to automatically obtain keywords that can be used to represent the content of images. The major research challenges in image semantic annotation are: what is the basic unit of semantic representation? how can the semantic unit be linked to high-level image knowledge? how can the contextual information be stored and utilized for image annotation? In this thesis, the Semantic Web technology (i.e. ontology) is introduced to the image semantic annotation problem. Semantic Web, the next generation web, aims at mak- ing the content of whatever type of media not only understandable to humans but also to machines. Due to the large amounts of multimedia data prevalent on the Web, re- searchers and industries are beginning to pay more attention to the Multimedia Semantic Web. The Semantic Web technology provides a new opportunity for multimedia-based applications, but the research in this area is still in its infancy. Whether ontology can be used to improve image annotation and how to best use ontology in semantic repre- sentation and extraction is still a worth-while investigation. This thesis deals with the problem of image semantic annotation using ontology and machine learning techniques in four phases as below. 1) Salient object extraction. A salient object servers as the basic unit in image semantic extraction as it captures the common visual property of the objects. Image segmen- tation is often used as the �rst step for detecting salient objects, but most segmenta- tion algorithms often fail to generate meaningful regions due to over-segmentation and under-segmentation. We develop a new salient object detection algorithm by combining multiple homogeneity criteria in a region merging framework. 2) Ontology construction. Since real-world objects tend to exist in a context within their environment, contextual information has been increasingly used for improving object recognition. In the ontology construction phase, visual-contextual ontologies are built from a large set of fully segmented and annotated images. The ontologies are composed of several types of concepts (i.e. mid-level and high-level concepts), and domain contextual knowledge. The visual-contextual ontologies stand as a user-friendly interface between low-level features and high-level concepts. 3) Image objects annotation. In this phase, each object is labelled with a mid-level concept in ontologies. First, a set of candidate labels are obtained by training Support Vectors Machines with features extracted from salient objects. After that, contextual knowledge contained in ontologies is used to obtain the �nal labels by removing the ambiguity concepts. 4) Scene semantic annotation. The scene semantic extraction phase is to get the scene type by using both mid-level concepts and domain contextual knowledge in ontologies. Domain contextual knowledge is used to create scene con�guration that describes which objects co-exist with which scene type more frequently. The scene con�guration is represented in a probabilistic graph model, and probabilistic inference is employed to calculate the scene type given an annotated image. To evaluate the proposed methods, a series of experiments have been conducted in a large set of fully annotated outdoor scene images. These include a subset of the Corel database, a subset of the LabelMe dataset, the evaluation dataset of localized semantics in images, the spatial context evaluation dataset, and the segmented and annotated IAPR TC-12 benchmark.
Resumo:
Comorbid depression and anxiety in late life present challenges for geriatric mental health care providers. These challenges include identifying the often complex diagnostic presentations both clinically and in a research context. This potent comorbidity can be conceived as double jeopardy in older adults, further diminishing their quality of life. Geriatric health care providers need to understand psychiatric comorbidity of this type for accurate diagnosis and early referral to specialists, and to coordinate interdisciplinary care. Researchers in the field also need to recognize potential multiple impacts of comorbidities with respect to assessment and treatment domains. This article describes the prevalence of late-life depression and anxiety disorders and reviews studies on this comorbidity in older adults. Risk factors and protective factors for anxiety and depression in later life are reviewed, and information is provided about comparative symptoms, the selection of assessment tools, and challenges to the provision of interdisciplinary, evidence-based care.
Resumo:
The present study tested the utility of an extended version of the theory of planned behaviour that included a measure of planning, in the prediction of eating foods low in saturated fats among adults diagnosed with Type 2 diabetes and/or cardiovascular disease. Participants (N = 184) completed questionnaires assessing standard theory of planned behaviour measures (attitude, subjective norm, and perceived behavioural control) and the additional volitional variable of planning in relation to eating foods low in saturated fats. Self-report consumption of foods low insaturated fats was assessed 1 month later. In partial support of the theory of planned behaviour, results indicated that attitude and subjective norm predicted intentions to eat foods low in saturated fats and intentions and perceived behavioural control predicted the consumption of foods low in saturated fats. As an additional variable, planning predicted the consumption of foods low in saturated fats directly and also mediated the intention–behaviour and perceived behavioural control–behaviour relationships, suggesting an important role for planning as a post-intentional construct determining healthy eating choices. Suggestions are offered for interventions designed to improve adherence to healthy eating recommendations for people diagnosed with these chronic conditions with a specific emphasis on the steps and activities that are required to promote a healthier lifestyle.
Resumo:
Background: An estimated 285 million people worldwide have diabetes and its prevalence is predicted to increase to 439 million by 2030. For the year 2010, it is estimated that 3.96 million excess deaths in the age group 20-79 years are attributable to diabetes around the world. Self-management is recognised as an integral part of diabetes care. This paper describes the protocol of a randomised controlled trial of an automated interactive telephone system aiming to improve the uptake and maintenance of essential diabetes self-management behaviours. ---------- Methods/Design: A total of 340 individuals with type 2 diabetes will be randomised, either to the routine care arm, or to the intervention arm in which participants receive the Telephone-Linked Care (TLC) Diabetes program in addition to their routine care. The intervention requires the participants to telephone the TLC Diabetes phone system weekly for 6 months. They receive the study handbook and a glucose meter linked to a data uploading device. The TLC system consists of a computer with software designed to provide monitoring, tailored feedback and education on key aspects of diabetes self-management, based on answers voiced or entered during the current or previous conversations. Data collection is conducted at baseline (Time 1), 6-month follow-up (Time 2), and 12-month follow-up (Time 3). The primary outcomes are glycaemic control (HbA1c) and quality of life (Short Form-36 Health Survey version 2). Secondary outcomes include anthropometric measures, blood pressure, blood lipid profile, psychosocial measures as well as measures of diet, physical activity, blood glucose monitoring, foot care and medication taking. Information on utilisation of healthcare services including hospital admissions, medication use and costs is collected. An economic evaluation is also planned.---------- Discussion: Outcomes will provide evidence concerning the efficacy of a telephone-linked care intervention for self-management of diabetes. Furthermore, the study will provide insight into the potential for more widespread uptake of automated telehealth interventions, globally.
Resumo:
In cloud computing resource allocation and scheduling of multiple composite web services is an important challenge. This is especially so in a hybrid cloud where there may be some free resources available from private clouds but some fee-paying resources from public clouds. Meeting this challenge involves two classical computational problems. One is assigning resources to each of the tasks in the composite web service. The other is scheduling the allocated resources when each resource may be used by more than one task and may be needed at different points of time. In addition, we must consider Quality-of-Service issues, such as execution time and running costs. Existing approaches to resource allocation and scheduling in public clouds and grid computing are not applicable to this new problem. This paper presents a random-key genetic algorithm that solves new resource allocation and scheduling problem. Experimental results demonstrate the effectiveness and scalability of the algorithm.
Resumo:
The development and use of a virtual assessment tool for a signal processing unit is described. It allows students to take a test from anywhere using a web browser to connect to the university server that hosts the test. While student responses are of the multiple choice type, they have to work out problems to arrive at the answer to be entered. CGI programming is used to verify student identification information and record their scores as well as provide immediate feedback after the test is complete. The tool has been used at QUT for the past 3 years and student feedback is discussed. The virtual assessment tool is an efficient alternative to marking written assignment reports that can often take more hours than actual lecture hall contact from a lecturer or tutor. It is especially attractive for very large classes that are now the norm at many universities in the first two years.
Resumo:
-
Resumo:
Objective: Because studies of crowding in long-term care settings are lacking, the authors sought to: (1) generate initial estimates of crowding in nursing homes and assisted living facilities; and (2) evaluate two operational approaches to its measurement. ----- ----- Background: Reactions to density and proximity are complex. Greater density intensifies people's reaction to a situation in the direction (positive or negative) that they would react if the situation were to occur under less dense conditions. People with dementia are especially reactive to the environment. ----- ----- Methods: Using a cross-sectional correlational design in nursing homes and assisted living facilities involving 185 participants, multiple observations (N = 6,455) of crowding and other environmental variables were made. Crowding, location, and sound were measured three times per observation; ambiance was measured once. Data analyses consisted of descriptive statistics, t-tests, and one-way analysis of variance. ----- ----- Results: Crowding estimates were higher for nursing homes and in dining and activity rooms. Crowding also varied across settings and locations by time of day. Overall, the interaction of location and time affected crowding significantly (N = 5,559, df [47, 511], F = 105.69, p < .0001); effects were greater within location-by-hour than between location-by-hour, but the effect explained slightly less variance in Long-Term Care Crowding Index (LTC-CI) estimates (47.41%) than location alone. Crowding had small, direct, and highly significant correlations with sound and with the engaging subscale for ambiance; a similar, though inverse, correlation was seen with the soothing subscale for ambiance. ----- ----- Conclusions: Crowding fluctuates consistent with routine activities such as meals in long-term care settings. Furthermore, a relationship between crowding and other physical characteristics of the environment was found. The LTC-CI is likely to be more sensitive than simple people counts when seeking to evaluate the effects of crowding on the behavior of elders-particularly those with dementia-in long-term care settings. aging in place.