960 resultados para User studies
Resumo:
The syntheses, properties and electronic structures of a series of porphyrin dimers connected by two-atom bridges were compared. The study found that an azo linker results in the most efficient electronic communication between the two porphyrin rings, and is the superior connector for dimers, trimers and oligomers in the design of nonlinear optical materials. This has implications for the design of molecular probes and sensors, photodynamic therapy, microfabrication, and three-dimensional optical data storage. The research led to the synthesis of a number of new porphyrin monomers and dimers, which were characterised using structural, spectroscopic and spectrometric techniques.
Resumo:
Spectrum sensing of multiple primary user channels is a crucial function in cognitive radio networks. In this paper we propose an optimal, sensing resource allocation algorithm for multi-channel cooperative spectrum sensing. The channel target is implemented as an objective and constraint to ensure a pre-determined number of empty channels are detected for secondary user network operations. Based on primary user traffic parameters, we calculate the minimum number of primary user channels that must be sensed to satisfy the channel target. We implement a hybrid sensing structure by grouping secondary user nodes into clusters and assign each cluster to sense a different primary user channels. We then solve the resource allocation problem to find the optimal sensing configuration and node allocation to minimise sensing duration. Simulation results show that the proposed algorithm requires the shortest sensing duration to achieve the channel target compared to existing studies that require long sensing and cannot guarantee the target.
Resumo:
Term-based approaches can extract many features in text documents, but most include noise. Many popular text-mining strategies have been adapted to reduce noisy information from extracted features; however, text-mining techniques suffer from low frequency. The key issue is how to discover relevance features in text documents to fulfil user information needs. To address this issue, we propose a new method to extract specific features from user relevance feedback. The proposed approach includes two stages. The first stage extracts topics (or patterns) from text documents to focus on interesting topics. In the second stage, topics are deployed to lower level terms to address the low-frequency problem and find specific terms. The specific terms are determined based on their appearances in relevance feedback and their distribution in topics or high-level patterns. We test our proposed method with extensive experiments in the Reuters Corpus Volume 1 dataset and TREC topics. Results show that our proposed approach significantly outperforms the state-of-the-art models.
Resumo:
Proton-bound dimers consisting of two glycerophospholipids with different headgroups were prepared using negative ion electrospray ionization and dissociated in a triple quadrupole mass spectrometer. Analysis of the tandem mass spectra of the dimers using the kinetic method provides, for the first time, an order of acidity for the phospholipid classes in the gas phase of PE < PA << PG < PS < PI. Hybrid density functional calculations on model phospholipids were used to predict the absolute deprotonation enthalpies of the phospholipid classes from isodesmic proton transfer reactions with phosphoric acid. The computational data largely support the experimental acidity trend, with the exception of the relative acidity ranking of the two most acidic phospholipid species. Possible causes of the discrepancy between experiment and theory are discussed and the experimental trend is recommended. The sequence of gas phase acidities for the phospholipid headgroups is found to (1) have little correlation with the relative ionization efficiencies of the phospholipid classes observed in the negative ion electrospray process, and (2) correlate well with fragmentation trends observed upon collisional activation of phospholipid \[M - H](-) anions. (c) 2005 American Society for Mass Spectrometry.
Resumo:
Review question/objective The review objective is to synthesise the best available evidence on experiences and perceptions of family members of intensive care unit patients on the adequacy of end-of-life care, where life-support modalities have been withheld or withdrawn. Inclusion criteria Types of participants This review will consider studies that report on the experiences and perceptions of patients’ families on EOLC in the ICU, where life-support modalities have been withheld or withdrawn. The family is defined as “those who are closest to the patient... the family may include the biological family, family by acquisition, and the family of choice and friends”. Phenomena of interest The phenomena of interest for this review are the patients’ families experiences, perceptions or views on the adequacy of EOLC delivered in the ICU, where life-support modalities were withheld or withdrawn. These experiences may refer to the following views on domains of care considered important at the end-of-life in the ICU, which have been described already in the existing literature: timely, consistent, and compassionate communication, clinician availability, clinical decision making based on patients’ preferences, goals and values, physical care implemented to maintain patient comfort, holistic interdisciplinary care and bereavement care for families of patients who died.
Resumo:
To obtain accurate Monte Carlo simulations of small radiation fields, it is important model the initial source parameters (electron energy and spot size) accurately. However recent studies have shown that small field dosimetry correction factors are insensitive to these parameters. The aim of this work is to extend this concept to test if these parameters affect dose perturbations in general, which is important for detector design and calculating perturbation correction factors. The EGSnrc C++ user code cavity was used for all simulations. Varying amounts of air between 0 and 2 mm were deliberately introduced upstream to a diode and the dose perturbation caused by the air was quantified. These simulations were then repeated using a range of initial electron energies (5.5 to 7.0 MeV) and electron spot sizes (0.7 to 2.2 FWHM). The resultant dose perturbations were large. For example 2 mm of air caused a dose reduction of up to 31% when simulated with a 6 mm field size. However these values did not vary by more than 2 % when simulated across the full range of source parameters tested. If a detector is modified by the introduction of air, one can be confident that the response of the detector will be the same across all similar linear accelerators and the Monte Carlo modelling of each machine is not required.
Resumo:
Scenario 1 A buys a two storey commercial building built along the only street frontage to the property. Vehicles cannot reach the rear of the property as the building extends across the entire width of the land. A bought the building with full knowledge that vehicular access to the rest of the property had been compromised by a desire to obtain maximum street frontage for the building which was occupied by a commercial tenant. On street parking is scarce in the surrounding area. A (to the knowledge of the adjoining owner B) constructs a carpark at the rear of the building. The employees of A’s tenant have been using the carpark obtaining access via a driveway on B’s land. To formalise this arrangement, A seeks a right of way for vehicles to travel down B’s driveway to access the carpark...
Resumo:
It has been an assumption of most anti-pornography discourse that porn damages women (and children) in a variety of ways. In Porno? Chic!, the author interrogated this assumption by examining the correlation between the incidence of sexual violence and other indicators of misogyny, and the availability and accessibility of pornography within a number of societies. This article develops that work with a specific focus on the regulatory environment as it relates to pornography and sexual representation. Does a liberal regulatory regime in sexual culture correlate with a relatively advanced state of sexual politics in a given country? Conversely, does an illiberal regime, where pornography and other forms of sexual culture are banned or severely restricted, correlate with relatively strong patriarchal structures? A comparative cross-country analysis seeks to explain the correlations identified, and to assess the extent to which the availability of porn can be viewed as a causal or a consequential characteristic of those societies where feminism has achieved significant advances.
Resumo:
We propose a new kind of asymmetric mutual authentication from passwords with stronger privacy against malicious servers, lest they be tempted to engage in “cross-site user impersonation” to each other. It enables a person to authenticate (with) arbitrarily many independent servers, over adversarial channels, using a memorable and reusable single short password. Beside the usual PAKE security guarantees, our framework goes to lengths to secure the password against brute-force cracking from privileged server information.
Resumo:
This paper describes the design and implementation of a wireless neural telemetry system that enables new experimental paradigms, such as neural recordings during rodent navigation in large outdoor environments. RoSco, short for Rodent Scope, is a small lightweight user-configurable module suitable for digital wireless recording from freely behaving small animals. Due to the digital transmission technology, RoSco has advantages over most other wireless modules of noise immunity and online user-configurable settings. RoSco digitally transmits entire neural waveforms for 14 of 16 channels at 20 kHz with 8-bit encoding which are streamed to the PC as standard USB audio packets. Up to 31 RoSco wireless modules can coexist in the same environment on non-overlapping independent channels. The design has spatial diversity reception via two antennas, which makes wireless communication resilient to fading and obstacles. In comparison with most existing wireless systems, this system has online user-selectable independent gain control of each channel in 8 factors from 500 to 32,000 times, two selectable ground references from a subset of channels, selectable channel grounding to disable noisy electrodes, and selectable bandwidth suitable for action potentials (300 Hz–3 kHz) and low frequency field potentials (4 Hz–3 kHz). Indoor and outdoor recordings taken from freely behaving rodents are shown to be comparable to a commercial wired system in sorting for neural populations. The module has low input referred noise, battery life of 1.5 hours and transmission losses of 0.1% up to a range of 10 m.
Resumo:
The central document governing the global organization of Air Navigation Services (ANS) is the Convention on International Civil Aviation, commonly referred to as the “Chicago Convention,” whose original version was signed in that city in 1944. In the Convention, Contracting States agreed to ensure the minimum standards of ANS established by ICAO, a specialized United Nations agency created by the Convention. Emanating from obligations under the Chicago Convention, ANS has traditionally provided by departments of national governments. However, there is a widespread trend toward transferring delivery of ANS services outside of line departments of national governments to independent agencies or corporations. The Civil Air Navigation Services Organisation (CANSO), which is the trade association for independent ANS providers, currently counts approximately 60 members, and is steadily growing. However, whatever delivery mechanisms are chosen, national governments remain ultimately responsible for ensuring that adequate ANS services are available. The provision by governments of ANS reflects the responsibility of the state for safety, international relations, and indirectly, the macroeconomic benefits of ensuring a sound infrastructure for aviation. ANS is a “public good” and an “essential good” provided to all aircraft using a country’s airfields and airspace. However, ANS also represents a service that directly benefits only a limited number of users, notably aircraft owners and operators. The idea that the users of the system, rather than the taxpaying public, should incur the costs associated with ANS provision is inherent in the commercialization process. However, ICAO sets out broad principles for the establishment of user charges, which member states are expected to comply with. ICAO states that only distance flown and aircraft weights are acceptable parameters for use in a charging system. These two factors are considered to be easy to measure, bear a reasonable relationship to the value of service received, and do not discriminate due to factors such as where the flight originated or the nation of aircraft registration.
Resumo:
Twitter is the focus of much research attention, both in traditional academic circles and in commercial market and media research, as analytics give increasing insight into the performance of the platform in areas as diverse as political communication, crisis management, television audiencing and other industries. While methods for tracking Twitter keywords and hashtags have developed apace and are well documented, the make-up of the Twitter user base and its evolution over time have been less understood to date. Recent research efforts have taken advantage of functionality provided by Twitter's Application Programming Interface to develop methodologies to extract information that allows us to understand the growth of Twitter, its geographic spread and the processes by which particular Twitter users have attracted followers. From politicians to sporting teams, and from YouTube personalities to reality television stars, this technique enables us to gain an understanding of what prompts users to follow others on Twitter. This article outlines how we came upon this approach, describes the method we adopted to produce accession graphs and discusses their use in Twitter research. It also addresses the wider ethical implications of social network analytics, particularly in the context of a detailed study of the Twitter user base.
Resumo:
At NDSS 2012, Yan et al. analyzed the security of several challenge-response type user authentication protocols against passive observers, and proposed a generic counting based statistical attack to recover the secret of some counting based protocols given a number of observed authentication sessions. Roughly speaking, the attack is based on the fact that secret (pass) objects appear in challenges with a different probability from non-secret (decoy) objects when the responses are taken into account. Although they mentioned that a protocol susceptible to this attack should minimize this difference, they did not give details as to how this can be achieved barring a few suggestions. In this paper, we attempt to fill this gap by generalizing the attack with a much more comprehensive theoretical analysis. Our treatment is more quantitative which enables us to describe a method to theoretically estimate a lower bound on the number of sessions a protocol can be safely used against the attack. Our results include 1) two proposed fixes to make counting protocols practically safe against the attack at the cost of usability, 2) the observation that the attack can be used on non-counting based protocols too as long as challenge generation is contrived, 3) and two main design principles for user authentication protocols which can be considered as extensions of the principles from Yan et al. This detailed theoretical treatment can be used as a guideline during the design of counting based protocols to determine their susceptibility to this attack. The Foxtail protocol, one of the protocols analyzed by Yan et al., is used as a representative to illustrate our theoretical and experimental results.