896 resultados para multiple choice questions (MCQs)
Resumo:
Table of Contents Timeline of Thinkers Timeline of Thoughts Evolution of Science Chapter 1. Introduction Chapter 2. Humans: the measure of all things Chapter 3. Men with beards: long beards Chapter 4. I doubt it Chapter 5. With good reason Chapter 6. Here be dragons Chapter 7. Stirrings of science Chapter 8. Degrees of separation Chapter 9. The Greek legacy Chapter 10. A scientific focus Chapter 11. Questions of science Chapter 12. Creatures of habit Chapter 13. A scientific method Chapter 14. Outside the square Chapter 15. Probably Chapter 16. Human, all too human Chapter 17. Cultures of science Chapter 18. 21st Century Science Chapter 19. Science in question Chapter 20. How do we know? Chapter 21. Sources
Resumo:
A salient but rarely explicitly studied characteristic of interfirm relationships is that they can intentionally be formed for finite periods of time. What determines firms' intertemporal choices between different alliance time horizons? Shadow of the future theorists suggest that when an alliance has an explicitly set short-term time frame, there is an increased risk that partners may behave opportunistically. This does not readily explain the high incidence of time-bound alliances being formed. Reconciling insights from the shadow of the future perspective with nascent research on the flexibility of temporary organizations, and shifting the focus from the level of individual transactions to that of strategic alliance portfolios, we argue that firms may be willing to accept a higher risk of opportunism when there are offsetting gains in strategic flexibility in managing their strategic alliance portfolio. Consequently, we hypothesize that environmental factors that increase the need for strategic flexibility—namely, dynamism and complexity in the environment—are likely to increase the relative share of time-bound alliances in strategic alliance portfolios. Our analysis of longitudinal data on the intertemporal alliance choices of a large sample of small and medium-sized enterprises provides support for this argument. Our findings fill an important gap in theory about time horizons in interfirm relationships and temporary organizations and show the importance of separating planned terminations from duration-based performance measures.
Resumo:
A multi-secret sharing scheme allows several secrets to be shared amongst a group of participants. In 2005, Shao and Cao developed a verifiable multi-secret sharing scheme where each participant’s share can be used several times which reduces the number of interactions between the dealer and the group members. In addition some secrets may require a higher security level than others involving the need for different threshold values. Recently Chan and Chang designed such a scheme but their construction only allows a single secret to be shared per threshold value. In this article we combine the previous two approaches to design a multiple time verifiable multi-secret sharing scheme where several secrets can be shared for each threshold value. Since the running time is an important factor for practical applications, we will provide a complexity comparison of our combined approach with respect to the previous schemes.
Resumo:
The swine influenza (H1N1) outbreak in 2009 highlighted the ethical and legal pressures facing general practitioners and health workers in emergency departments in determining the nature and limits of their obligations to their patients and the public. Health workers require guidance on the multiple, overlapping, and at times conflicting legal and ethical duties owed to patients and prospective patients, employers and fellow health workers, and their families. Existing sources of advice on these issues in Australia, by way of statements of medical ethics and other sources of advice, are shown to be in need of further amplification if health workers are to be provided with the certainty and guidance required. Given the complexity of the issues, Australia would therefore benefit from more extensive consultation with the variety of stakeholders involved in these questions if pandemic plans are to smoothly deal with future crises in an ethically and legally sound manner.
Resumo:
The interest in utilising multiple heterogeneous Unmanned Aerial Vehicles (UAVs) in close proximity is growing rapidly. As such, many challenges are presented in the effective coordination and management of these UAVs; converting the current n-to-1 paradigm (n operators operating a single UAV) to the 1-to-n paradigm (one operator managing n UAVs). This paper introduces an Information Abstraction methodology used to produce the functional capability framework initially proposed by Chen et al. and its Level Of Detail (LOD) indexing scale. This framework was validated through comparing the operator workload and Situation Awareness (SA) of three experiment scenarios involving multiple autonomously heterogeneous UAVs. The first scenario was set in a high LOD configuration with highly abstracted UAV functional information; the second scenario was set in a mixed LOD configuration; and the final scenario was set in a low LOD configuration with maximal UAV functional information. Results show that there is a significant statistical decrease in operator workload when a UAV’s functional information is displayed at its physical form (low LOD - maximal information) when comparing to the mixed LOD configuration.
Resumo:
This chapter draws on biographical data about two notable pattern designers of wall surfaces in the interior. Both had personal histories of multiple careers and geographical locations and both their lives ended in mysterious circumstances. One of the pattern designers, Jim Thompson, disappeared in the Malaysian highlands in 1967 and was never found. The other, Florence Broadhurst, was brutally murdered in 1977; her case remains unsolved. This chapter theorizes that the patterned surface attracted Broadhurst and Thompson as a space to occupy and record their divergent pasts, and questions what it is to lose oneself in the surface of the interior, to find freedom (or slavery) in the abdication of control. This notion is further evidenced in creative works, including the Australian film Candy and the work by skin illustrator Emma Hack. What is it to work with the self as a two-dimensional representation in the outside world? Occupying the surface suggests a reflexive relationship with identity, that makes-over and re-shapes truths, lies and re-constructions. The chapter reminds us that the surface is never in stasis.
Resumo:
Introduction Female sexual functioning is affected by a range of factors including motivation, psychological well-being, and relationship issues. In understanding female sexual dysfunction (FSD), there has been a tendency to privilege diagnostic and medical over relationship issues. Aim To investigate the association between women’s experience of intimacy in close relationships - operationalized in terms of attachment and degree of differentiation of self - and FSD. Methods Two hundred and thirty sexually active Australian women responded to an invitation to complete a set of validated scales to assess potential correlates of sexual functioning. Main Outcome Measures The Female Sexuality Function Index, the Experiences in Close Relationships Scale, the Differentiation of Self Inventory, as well as a set of study-specific questions were subject to hierarchical multiple regression analyses Results Relational variables of attachment avoidance and to a lesser degree, attachment anxiety were associated with FSD. Participants with lower levels of differentiation of self were more likely to report sexual difficulties. The inability to maintain a sense of self in the presence of intimate others was the strongest predictors of sexual problems. A history of sexual abuse in adulthood and higher levels of psychological distress were also associated with sexual difficulties. Conclusions The findings provide support for a relational understanding of female sexual functioning. Attachment avoidance, attachment anxiety, and degree of differentiation of self are shown to be associated with sexual difficulties. The findings support the need to focus on relational and psychological factors in women’s experience of sex.
Resumo:
Mutations in the genes encoding for either the biosynthetic or transcriptional regulation of the anthocyanin pathway have been linked to color phenotypes. Generally, this is a loss of function resulting in a reduction or a change in the distribution of anthocyanin. Here, we describe a rearrangement in the upstream regulatory region of the gene encoding an apple (Malus x domestica) anthocyanin-regulating transcription factor, MYB10. We show that this modification is responsible for increasing the level of anthocyanin throughout the plant to produce a striking phenotype that includes red foliage and red fruit flesh. This rearrangement is a series of multiple repeats, forming a minisatellite-like structure that comprises five direct tandem repeats of a 23-bp sequence. This MYB10 rearrangement is present in all the red foliage apple varieties and species tested but in none of the white fleshed varieties. Transient assays demonstrated that the 23-bp sequence motif is a target of the MYB10 protein itself, and the number of repeat units correlates with an increase in transactivation by MYB10 protein. We show that the repeat motif is capable of binding MYB10 protein in electrophoretic mobility shift assays. Taken together, these results indicate that an allelic rearrangement in the promoter of MYB10 has generated an autoregulatory locus, and this autoregulation is sufficient to account for the increase in MYB10 transcript levels and subsequent ectopic accumulation of anthocyanins throughout the plant.
Resumo:
This paper presents a novel framework to further advance the recent trend of using query decomposition and high-order term relationships in query language modeling, which takes into account terms implicitly associated with different subsets of query terms. Existing approaches, most remarkably the language model based on the Information Flow method are however unable to capture multiple levels of associations and also suffer from a high computational overhead. In this paper, we propose to compute association rules from pseudo feedback documents that are segmented into variable length chunks via multiple sliding windows of different sizes. Extensive experiments have been conducted on various TREC collections and our approach significantly outperforms a baseline Query Likelihood language model, the Relevance Model and the Information Flow model.
Resumo:
It has been 21 years since the decision in Rogers v Whitaker and the legal principles concerning informed consent and liability for negligence are still strongly grounded in this landmark High Court decision. This paper considers more recent developments in the law concerning the failure to disclose inherent risks in medical procedures, focusing on the decision in Wallace v Kam [2013] HCA 19. In this case, the appellant underwent a surgical procedure that carried a number of risks. The surgery itself was not performed in a sub-standard way, but the surgeon failed to disclose two risks to the patient, a failure that constituted a breach of the surgeon’s duty of care in negligence. One of the undisclosed risks was considered to be less serious than the other, and this lesser risk eventuated causing injury to the appellant. The more serious risk did not eventuate, but the appellant argued that if the more serious risk had been disclosed, he would have avoided his injuries completely because he would have refused to undergo the procedure. Liability was disputed by the surgeon, with particular reference to causation principles. The High Court of Australia held that the appellant should not be compensated for harm that resulted from a risk he would have been willing to run. We examine the policy reasons underpinning the law of negligence in this specific context and consider some of the issues raised by this unusual case. We question whether some of the judicial reasoning adopted in this case, represents a significant shift in traditional causation principles.
Resumo:
Research Background Young people’s avid use of mobile technologies in daily life has led to an increase in the design and research on mHealth (mobile health) interventions targeting young people. ‘Music eScape’ is a mobile based mood regulation app that uses an innovative approach to promoting young people’s wellbeing using music. Research Question The design, research, development and evaluation of ‘Music eScape’ addressed a number of research questions from across the fields of Psychology and Interactive and Visual Design. The specific design research question addressed was: How can interaction and visual design be utilized to promote and enable young people to effectively regulate their mood using music and how can the new design further promote their experience of empowerment, control and agency over actively directing their mood journey? Research Contribution Innovation and New Knowledge Through its unique visual interface design and interactivity, the application presents a novel approach to promoting young people’s wellbeing using music and a specific function that allows users to ‘draw’ their mood journey in order to generate a playlist. The mobile app is the first to contain a function that enables users to plan their mood journey and exercise a sense of agency, intentional choice and control over the mood shift and by extension, their wellbeing. The feature ‘drawing’ interface was designed by Oksana Zelenko using participatory design research and Russell’s circumplex model of affect (1980) to inform the key visual design concept and underpinning interaction design. Research Significance The significance of the design research component within the larger interdisciplinary practices that have informed ‘Music eScape’ (e.g. field of psychology, reported through journal articles and other related outcomes), is the unique visual and interactive presentation of participant data and music therapy research within the app interface and interaction design which improves and increases young people’s engagement with the health messages it contains. The industry quality standard is further demonstrated by the launch on Apple iTunes. This demonstrates the application meets the high professional requirements for national release and meets international standards. The app also creates a new benchmark for the quality of health apps on the market as it marks the industry release of a trialled evidence-based mHealth intervention co-designed with young people.
Resumo:
Although tissue inhibitor of metalloproteinase-2 (TIMP-2) is known to be not only an inhibitor of matrix metalloproteinases (MMP) but also a cofactor for membrane-type 1 MMP (MT1-MMP)-mediated MMP-2 activation, it is still unclear how TIMP-2 regulates MMP-2 activation and cleavage of substrates by MT1-MMP. In the present study we examined the levels of cell-surface MT1-MMP, MMP-2 activation and cleavage of MT1-MMP substrates in 293T cells transfected with the MT1-MMP and TIMP-2 genes. Co-expression of TIMP-2 at an appropriate level increased the level of cell-surface MT1-MMP, both the TIMP-2-bound and free forms, and generated processed MMP-2 with gelatin-degrading activity. In contrast, MT1-MMP substrates testican-1 and syndecan-1 were cleaved by the cells expressing MT1-MMP, which was inhibited by TIMP-2 even at levels that stimulate MMP-2 activation. These results suggest that TIMP-2 environment determines MT1-MMP substrate choice between direct cleavage of its own substrates and MMP-2 activation.
Resumo:
Voltage rise is the main issue which limits the capacity of Low Voltage (LV) network to accommodate more Renewable Energy (RE) sources. In addition, voltage drop at peak load period is a significant power quality concern. This paper proposes a new robust voltage support strategy based on distributed coordination of multiple distribution static synchronous compensators (DSTATCOMs). The study focuses on LV networks with PV as the RE source for customers. The proposed approach applied to a typical LV network and its advantages are shown comparing with other voltage control strategies.