927 resultados para Limit theorems
Resumo:
Sequencing of mba gene fragments of reference strains of Ureaplasma urealyticum serovars 1, 3, 6, 14, in addition to 33 clinical U. urealyticum isolates is reported. A phylogenetic tree deduced from an alignment of these sequences clearly demonstrates two major clusters (confidence limit 100%), which equate to the parvo and T960 biovars, and five types which we have designated mba 1, 3, 6, 8 and X. These relationships are supported by bootstrap analysis. Polymorphisms within the mba fragment of types mba 1, 3, and 6 were used to define nine subtypes (mba 1a, 1b, 3a, 3b, 3c, 3d, 3e, 6a, and 6b) thus facilitating high resolution typing of U. urealyticum. Inclusion of the reference strains for serovars 1, 3, 6, and 8 in the mba typing scheme showed that the results of this analysis are broadly consistent with currently accepted serotyping. In addition a ure gene fragment from nine of the clinical isolates was amplified and sequenced. Comparisons of the sequences clearly distinguished the two biovars of U. urealyticum; however this fragment was invariant within the parvo biovar. This study has shown that the sequence of the mba can reveal the fine details of the relationships between U. urealyticum isolates and also supports the significant evolutionary gap between the two biovars.
Resumo:
This article examines mainstream news media texts reporting sexual harassment in four industrialized countries. The study first identifies the aspects of sexual harassment cases considered newsworthy by asking how the media texts characterize such cases. Second, the study illuminates the discourses evident in these texts, which are theorized as a mode by which understandings of workplace gender (in)equality shape, and are shaped by, individuals, organizations and the community. The analysis reveals that the media most frequently reports “classic” sexual harassment and emphasizes scandalous allegations and overtly sexualized conduct. The hegemony of a discourse of sexual harassment as an individualized problem of inappropriate employee behavior is also evident. By contrast, discourses presenting sexual harassment as a systemic issue, or as symptomatic of broader gender inequality, are less frequent. We argue that these media representations limit opportunities to frame sexual harassment as dynamic, complex, and part of the practice of gendering in and beyond organizational boundaries.
Resumo:
In this paper, we propose a novel relay ordering and scheduling strategy for the sequential slotted amplify-and-forward (SAF) protocol and evaluate its performance in terms of diversity-multiplexing trade-off (DMT). The relays between the source and destination are grouped into two relay clusters based on their respective locations. The proposed strategy achieves partial relay isolation and decreases the decoding complexity at the destination. We show that the DMT upper bound of sequential-SAF with the proposed strategy outperforms other amplify and forward protocols and is more practical compared to the relay isolation assumption made in the original paper [1]. Simulation result shows that the sequential-SAF protocol with the proposed strategy has better outage performance compared to the existing AF and non-cooperative protocols in high SNR regime.
Resumo:
In this paper, we propose a novel slotted hybrid cooperative protocol named the sequential slotted amplify-decodeand-forward (SADF) protocol and evaluate its performance in terms of diversity-multiplexing trade-off (DMT). The relays between the source and destination are divided into two different groups and each relay either amplifies or decodes the received signal. We first compute the optimal DMT of the proposed protocol with the assumption of perfect decoding at the DF relays. We then derive the DMT closed-form expression of the proposed sequential-SADF and obtain the proximity gain bound for achieving the optimal DMT. With the proximity gain bound, we then found the distance ratio to achieve the optimal DMT performance. Simulation result shows that the proposed protocol with high proximity gain outperforms other cooperative communication protocols in high SNR regime.
Resumo:
The rapid increase in the deployment of CCTV systems has led to a greater demand for algorithms that are able to process incoming video feeds. These algorithms are designed to extract information of interest for human operators. During the past several years, there has been a large effort to detect abnormal activities through computer vision techniques. Typically, the problem is formulated as a novelty detection task where the system is trained on normal data and is required to detect events which do not fit the learned `normal' model. Many researchers have tried various sets of features to train different learning models to detect abnormal behaviour in video footage. In this work we propose using a Semi-2D Hidden Markov Model (HMM) to model the normal activities of people. The outliers of the model with insufficient likelihood are identified as abnormal activities. Our Semi-2D HMM is designed to model both the temporal and spatial causalities of the crowd behaviour by assuming the current state of the Hidden Markov Model depends not only on the previous state in the temporal direction, but also on the previous states of the adjacent spatial locations. Two different HMMs are trained to model both the vertical and horizontal spatial causal information. Location features, flow features and optical flow textures are used as the features for the model. The proposed approach is evaluated using the publicly available UCSD datasets and we demonstrate improved performance compared to other state of the art methods.
Resumo:
Spatio-Temporal interest points are the most popular feature representation in the field of action recognition. A variety of methods have been proposed to detect and describe local patches in video with several techniques reporting state of the art performance for action recognition. However, the reported results are obtained under different experimental settings with different datasets, making it difficult to compare the various approaches. As a result of this, we seek to comprehensively evaluate state of the art spatio- temporal features under a common evaluation framework with popular benchmark datasets (KTH, Weizmann) and more challenging datasets such as Hollywood2. The purpose of this work is to provide guidance for researchers, when selecting features for different applications with different environmental conditions. In this work we evaluate four popular descriptors (HOG, HOF, HOG/HOF, HOG3D) using a popular bag of visual features representation, and Support Vector Machines (SVM)for classification. Moreover, we provide an in-depth analysis of local feature descriptors and optimize the codebook sizes for different datasets with different descriptors. In this paper, we demonstrate that motion based features offer better performance than those that rely solely on spatial information, while features that combine both types of data are more consistent across a variety of conditions, but typically require a larger codebook for optimal performance.
Resumo:
Chlamydia continues to be a major pathogen of koalas. The bacterium is associated with ocular, respiratory and urogenital tract infections and a vaccine is considered the best option to limit the decline of mainland koala populations. Over the last 20 years, efforts to develop a chlamydial vaccine in humans have focussed on the use of the chlamydial major outer membrane protein (MOMP). Potential problems with the use of MOMP-based vaccines relate to the wide range of genetic diversity in its four variable domains. In the present study, we evaluated the immune response of koalas vaccinated with a MOMP-based C. pecorum vaccine formulated with genetically and serologically diverse MOMPs. Animals immunised with individual MOMPs developed strong antibody and lymphocyte proliferation responses to both homologous as well as heterologous MOMP proteins. Importantly, we also showed that vaccine induced antibodies which effectively neutralised various heterologous strains of koala C. pecorum in an in vitro assay. Finally, we also demonstrated that the immune responses in monovalent as well as polyvalent MOMP vaccine groups were able to recognise whole chlamydial elementary bodies, illustrating the feasibility of developing an effective MOMP based C. pecorum vaccine that could protect against a range of strains.
Resumo:
Despite increasingly stringent energy performance regulations for new homes, southeast Queensland has a high and growing penetration of, and reliance on, air conditioners to provide thermal comfort to housing inhabitants. This reliance impacts on electricity infrastructure investment which is the key driving force behind rising electricity prices. This paper reports initial findings of a research project that seeks to better understand three key issues: (i) how families manage their thermal comfort in summer and how well their homes limit overheating; (ii) the extent to which the homes have been constructed according to the building approval documentation; and (iii) the impact that these issues have on urban design, especially in relation to electricity infrastructure in urban developments.
Resumo:
The reliable operation of the electrical system at Callide Power Station is of extreme importance to the normal everyday running of the Station. This study applied the principles of reliability to do an analysis on the electrical system at Callide Power Station. It was found that the level of expected outage cost increased exponentially with a declining level of maintenance. Concluding that even in a harsh economic electricity market where CS Energy tries and push their plants to the limit, maintenance must not be neglected. A number of system configurations were found to increase the reliability of the system and reduce the expected outage costs. A number of other advantages were identified as a result of using reliability principles to do this study on the Callide electrical system configuration.
Resumo:
During the last four decades, educators have created a range of critical literacy approaches for different contexts, including compulsory schooling (Luke & Woods, 2009) and second language education (Luke & Dooley, 2011). Despite inspirational examples of critical work with young students (e.g., O’Brien, 1994; Vasquez, 1994), Comber (2012) laments the persistent myth that critical literacy is not viable in the early years. Assumptions about childhood innocence and the priorities of the back-to-basics movement seem to limit the possibilities for early years literacy teaching and learning. Yet, teachers of young students need not face an either/or choice between the basic and critical dimensions of literacy. Systematic ways of treating literacy in all its complexity exist. We argue that the integrative imperative is especially important in schools that are under pressure to improve technical literacy outcomes. In this chapter, we document how critical literacy was addressed in a fairytales unit taught to 4.5 - 5.5 year olds in a high diversity, high poverty Australian school. We analyze the affordances and challenges of different approaches to critical literacy, concluding they are complementary rather than competing sources of possibility. Furthermore, we make the case for turning familiar classroom activities to critical ends.
Resumo:
Purpose: To investigate the effect of age on the contributions of the anterior cornea and internal components to ocular aberrations in the peripheral visual field. Methods: Ocular aberrations were measured in 10 young emmetropes and 7 older emmetropes using a modified commercial Hartmann-Shack aberrometer across 42° x 32° of central visual field. Anterior corneal aberrations were estimated from anterior corneal topography using theoretical ray-tracing. Internal aberrations were calculated by subtracting anterior corneal aberrations from ocular aberrations. Results: Anterior corneal aberrations of young subjects were reasonably compensated by the internal aberrations, except for astigmatism for which the internal contribution was small out to the 21° field limit. The internal coma and spherical aberration of the older subjects were considerably smaller in magnitude than those of the young subjects such that the compensation for anterior corneal aberrations was poorer. This can be explained by age-related changes in the lens shape and refractive index distribution. Conclusion: oss of balance between anterior cornea and internal components of higher order aberrations with increasing age, found previously for on-axis vision, applies also to the peripheral visual field.
Resumo:
The problem of MHD natural convection boundary layer flow of an electrically conducting and optically dense gray viscous fluid along a heated vertical plate is analyzed in the presence of strong cross magnetic field with radiative heat transfer. In the analysis radiative heat flux is considered by adopting optically thick radiation limit. Attempt is made to obtain the solutions valid for liquid metals by taking Pr≪1. Boundary layer equations are transformed in to a convenient dimensionless form by using stream function formulation (SFF) and primitive variable formulation (PVF). Non-similar equations obtained from SFF are then simulated by implicit finite difference (Keller-box) method whereas parabolic partial differential equations obtained from PVF are integrated numerically by hiring direct finite difference method over the entire range of local Hartmann parameter, $xi$ . Further, asymptotic solutions are also obtained for large and small values of local Hartmann parameter $xi$ . A favorable agreement is found between the results for small, large and all values of $xi$ . Numerical results are also demonstrated graphically by showing the effect of various physical parameters on shear stress, rate of heat transfer, velocity and temperature.
Resumo:
Reliable communications is one of the major concerns in wireless sensor networks (WSNs). Multipath routing is an effective way to improve communication reliability in WSNs. However, most of existing multipath routing protocols for sensor networks are reactive and require dynamic route discovery. If there are many sensor nodes from a source to a destination, the route discovery process will create a long end-to-end transmission delay, which causes difficulties in some time-critical applications. To overcome this difficulty, the efficient route update and maintenance processes are proposed in this paper. It aims to limit the amount of routing overhead with two-tier routing architecture and introduce the combination of piggyback and trigger update to replace the periodic update process, which is the main source of unnecessary routing overhead. Simulations are carried out to demonstrate the effectiveness of the proposed processes in improvement of total amount of routing overhead over existing popular routing protocols.
Resumo:
Intelligent Transport Systems (ITS) resembles the infrastructure for ubiquitous computing in the car. It encompasses a) all kinds of sensing technologies within vehicles as well as road infrastructure, b) wireless communication protocols for the sensed information to be exchanged between vehicles (V2V) and between vehicles and infrastructure (V2I), and c) appropriate intelligent algorithms and computational technologies that process these real-time streams of information. As such, ITS can be considered a game changer. It provides the fundamental basis of new, innovative concepts and applications, similar to the Internet itself. The information sensed or gathered within or around the vehicle has led to a variety of context-aware in-vehicular technologies within the car. A simple example is the Anti-lock Breaking System (ABS), which releases the breaks when sensors detect that the wheels are locked. We refer to this type of context awareness as vehicle/technology awareness. V2V and V2I communication, often summarized as V2X, enables the exchange and sharing of sensed information amongst cars. As a result, the vehicle/technology awareness horizon of each individual car is expanded beyond its observable surrounding, paving the way to technologically enhance such already advanced systems. In this chapter, we draw attention to those application areas of sensing and V2X technologies, where the human (driver), the human’s behavior and hence the psychological perspective plays a more pivotal role. The focal points of our project are illustrated in Figure 1: In all areas, the vehicle first (1) gathers or senses information about the driver. Rather than to limit the use of such information towards vehicle/technology awareness, we see great potential for applications in which this sensed information is then (2) fed back to the driver for an increased self-awareness. In addition, by using V2V technologies, it can also be (3) passed to surrounding drivers for an increased social awareness, or (4), pushed even further, into the cloud, where it is collected and visualized for an increased, collective urban awareness within the urban community at large, which includes all city dwellers.
Resumo:
Retrieving information from Twitter is always challenging due to its large volume, inconsistent writing and noise. Most existing information retrieval (IR) and text mining methods focus on term-based approach, but suffers from the problems of terms variation such as polysemy and synonymy. This problem deteriorates when such methods are applied on Twitter due to the length limit. Over the years, people have held the hypothesis that pattern-based methods should perform better than term-based methods as it provides more context, but limited studies have been conducted to support such hypothesis especially in Twitter. This paper presents an innovative framework to address the issue of performing IR in microblog. The proposed framework discover patterns in tweets as higher level feature to assign weight for low-level features (i.e. terms) based on their distributions in higher level features. We present the experiment results based on TREC11 microblog dataset and shows that our proposed approach significantly outperforms term-based methods Okapi BM25, TF-IDF and pattern based methods, using precision, recall and F measures.