943 resultados para zero divisione
Resumo:
A new approach for recognizing the iris of the human eye is presented. Zero-crossings of the wavelet transform at various resolution levels are calculated over concentric circles on the iris, and the resulting one-dimensional (1-D) signals are compared with model features using different dissimilarity functions.
Resumo:
A security system based on the recognition of the iris of human eyes using the wavelet transform is presented. The zero-crossings of the wavelet transform are used to extract the unique features obtained from the grey-level profiles of the iris. The recognition process is performed in two stages. The first stage consists of building a one-dimensional representation of the grey-level profiles of the iris, followed by obtaining the wavelet transform zerocrossings of the resulting representation. The second stage is the matching procedure for iris recognition. The proposed approach uses only a few selected intermediate resolution levels for matching, thus making it computationally efficient as well as less sensitive to noise and quantisation errors. A normalisation process is implemented to compensate for size variations due to the possible changes in the camera-to-face distance. The technique has been tested on real images in both noise-free and noisy conditions. The technique is being investigated for real-time implementation, as a stand-alone system, for access control to high-security areas.
Resumo:
Background Anxiety, depressive and substance use disorders account for three quarters of the disability attributed to mental disorders and frequently co-occur. While programs for the prevention and reduction of symptoms associated with (i) substance use and (ii) mental health disorders exist, research is yet to determine if a combined approach is more effective. This paper describes the study protocol of a cluster randomised controlled trial to evaluate the effectiveness of the CLIMATE Schools Combined intervention, a universal approach to preventing substance use and mental health problems among adolescents. Methods/design Participants will consist of approximately 8400 students aged 13 to 14-years-old from 84 secondary schools in New South Wales, Western Australia and Queensland, Australia. The schools will be cluster randomised to one of four groups; (i) CLIMATE Schools Combined intervention; (ii) CLIMATE Schools - Substance Use; (iii) CLIMATE Schools - Mental Health, or (iv) Control (Health and Physical Education as usual). The primary outcomes of the trial will be the uptake and harmful use of alcohol and other drugs, mental health symptomatology and anxiety, depression and substance use knowledge. Secondary outcomes include substance use related harms, self-efficacy to resist peer pressure, general disability, and truancy. The link between personality and substance use will also be examined. Discussion Compared to students who receive the universal CLIMATE Schools - Substance Use, or CLIMATE Schools - Mental Health or the Control condition (who received usual Health and Physical Education), we expect students who receive the CLIMATE Schools Combined intervention to show greater delays to the initiation of substance use, reductions in substance use and mental health symptoms, and increased substance use and mental health knowledge
Resumo:
The existence of travelling wave solutions to a haptotaxis dominated model is analysed. A version of this model has been derived in Perumpanani et al. (1999) to describe tumour invasion, where diffusion is neglected as it is assumed to play only a small role in the cell migration. By instead allowing diffusion to be small, we reformulate the model as a singular perturbation problem, which can then be analysed using geometric singular perturbation theory. We prove the existence of three types of physically realistic travelling wave solutions in the case of small diffusion. These solutions reduce to the no diffusion solutions in the singular limit as diffusion as is taken to zero. A fourth travelling wave solution is also shown to exist, but that is physically unrealistic as it has a component with negative cell population. The numerical stability, in particular the wavespeed of the travelling wave solutions is also discussed.
Resumo:
We study a version of the Keller–Segel model for bacterial chemotaxis, for which exact travelling wave solutions are explicitly known in the zero attractant diffusion limit. Using geometric singular perturbation theory, we construct travelling wave solutions in the small diffusion case that converge to these exact solutions in the singular limit.
Resumo:
BACKGROUND Dengue fever (DF) outbreaks often arise from imported DF cases in Cairns, Australia. Few studies have incorporated imported DF cases in the estimation of the relationship between weather variability and incidence of autochthonous DF. The study aimed to examine the impact of weather variability on autochthonous DF infection after accounting for imported DF cases and then to explore the possibility of developing an empirical forecast system. METHODOLOGY/PRINCIPAL FINDS Data on weather variables, notified DF cases (including those acquired locally and overseas), and population size in Cairns were supplied by the Australian Bureau of Meteorology, Queensland Health, and Australian Bureau of Statistics. A time-series negative-binomial hurdle model was used to assess the effects of imported DF cases and weather variability on autochthonous DF incidence. Our results showed that monthly autochthonous DF incidences were significantly associated with monthly imported DF cases (Relative Risk (RR):1.52; 95% confidence interval (CI): 1.01-2.28), monthly minimum temperature ((o)C) (RR: 2.28; 95% CI: 1.77-2.93), monthly relative humidity (%) (RR: 1.21; 95% CI: 1.06-1.37), monthly rainfall (mm) (RR: 0.50; 95% CI: 0.31-0.81) and monthly standard deviation of daily relative humidity (%) (RR: 1.27; 95% CI: 1.08-1.50). In the zero hurdle component, the occurrence of monthly autochthonous DF cases was significantly associated with monthly minimum temperature (Odds Ratio (OR): 1.64; 95% CI: 1.01-2.67). CONCLUSIONS/SIGNIFICANCE Our research suggested that incidences of monthly autochthonous DF were strongly positively associated with monthly imported DF cases, local minimum temperature and inter-month relative humidity variability in Cairns. Moreover, DF outbreak in Cairns was driven by imported DF cases only under favourable seasons and weather conditions in the study.
Resumo:
BACKGROUND: Variations in 'slope' (how steep or flat the ground is) may be good for health. As walking up hills is a physiologically vigorous physical activity and can contribute to weight control, greater neighbourhood slopes may provide a protective barrier to weight gain, and help prevent Type 2 diabetes onset. We explored whether living in 'hilly' neighbourhoods was associated with diabetes prevalence among the Australian adult population. METHODS: Participants ([greater than or equal to]25years; n=11,406) who completed the Western Australian Health and Wellbeing Surveillance System Survey (2003-2009) were asked whether or not they had medically-diagnosed diabetes. Geographic Information Systems (GIS) software was used to calculate a neighbourhood mean slope score, and other built environment measures at 1600m around each participant's home. Logistic regression models were used to predict the odds of self-reported diabetes after progressive adjustment for individual measures (i.e., age, sex), socioeconomic status (i.e., education, income), built environment, destinations, nutrition, and amount of walking. RESULTS: After full adjustment, the odds of self-reported diabetes was 0.72 (95% CI 0.55-0.95) and 0.52 (95% CI 0.39-0.69) for adults living in neighbourhoods with moderate and higher levels of slope, respectively, compared with adults living in neighbourhoods with the lowest levels of slope. The odds of having diabetes was 13% lower (odds ratio 0.87; 95% CI 0.80-0.94) for each increase of one percent in mean slope. CONCLUSIONS: Living in a hilly neighbourhood may be protective of diabetes onset or this finding is spurious. Nevertheless, the results are promising and have implications for future research and the practice of flattening land in new housing developments.
Resumo:
This research was commissioned by Metecno Pty Ltd, trading as Bondor®. The InsulLiving house was designed and constructed by Bondor®. The house instrumentation (electricity circuits, indoor environment, weather station) was provided by Bondor and supplied and installed by independent contractors. This report contains analysis of data collected from the InsulLiving house at Burpengary during 1 year of occupancy by a family of four for the period 1 April 2012 – 31 March 2013. The data shows a daily average electricity consumption 48% less than the regional average. The analysis confirms that the 9 star house performed thermally slightly better than the simulated performance. The home was 'near zero energy', with its modest 2.1kW solar power system meeting all of the needs for space heating and cooling, lighting and most water heating.
Resumo:
Dermal wound repair involves complex interactions between cells, cytokines and mechanics to close injuries to the skin. In particular, we investigate the contribution of fibroblasts, myofibroblasts, TGFβ, collagen and local tissue mechanics to wound repair in the human dermis. We develop a morphoelastic model where a realistic representation of tissue mechanics is key, and a fibrocontractive model that involves a reasonable approximation to the true kinetics of the important bioactive species. We use each of these descriptions to elucidate the mechanisms that generate pathologies such as hypertrophic scars, contractures and keloids. We find that for hypertrophic scar and contracture development, factors regulating the myofibroblast phenotype are critical, with heightened myofibroblast activation, reduced myofibroblast apoptosis or prolonged inflammation all predicted as mediators for scar hypertrophy and contractures. Prevention of these pathologies is predicted when myofibroblast apoptosis is induced, myofibroblast activation is blocked or TGFβ is neutralised. To investigate keloid invasion, we develop a caricature representation of the fibrocontractive model and find that TGFβ spread is the driving factor behind keloid growth. Blocking activation of TGFβ is found to cause keloid regression. Thus, we recommend myofibroblasts and TGFβ as targets for clinicians when developing intervention strategies for prevention and cure of fibrotic scars.
Resumo:
Background The effects of exposure to ultraviolet radiation are a significant concern in Australia which has one of the highest incidences of skin cancer in the world. Despite most skin cancers being preventable by encouraging consistent adoption of sun-protective behaviours, incidence rates are not decreasing. There is a dearth of research examining the factors involved in engaging in sun-protective behaviours. Further, online multi-behavioural theory-based interventions have yet to be explored fully as a medium for improving sun-protective behaviour in adults. This paper presents the study protocol of a randomised controlled trial of an online intervention based on the Theory of Planned Behaviour (TPB) that aims to improve sun safety among Australian adults. Methods/Design Approximately 420 adults aged 18 and over and predominantly from Queensland, Australia, will be recruited and randomised to the intervention (n = 200), information only (n = 200) or the control group (n = 20). The intervention focuses on encouraging supportive attitudes and beliefs toward sun-protective behaviour, fostering perceptions of normative support for sun protection, and increasing perceptions of control/self-efficacy over sun protection. The intervention will be delivered online over a single session. Data will be collected immediately prior to the intervention (Time 1), immediately following the intervention (Time 1b), and one week (Time 2) and one month (Time 3) post-intervention. Primary outcomes are intentions to sun protect and sun-protective behaviour. Secondary outcomes are the participants’ attitudes toward sun protection, perceptions of normative support for sun protection (i.e. subjective norms, group norms, personal norms and image norms) and perceptions of control/self-efficacy toward sun protection. Discussion The study will contribute to an understanding of the effectiveness of a TPB-based online intervention to improve Australian adults’ sun-protective behaviour. Trials registry Australian and New Zealand Trials Registry number ACTRN12613000470796
Resumo:
BACKGROUND: The increasing number of assembled mammalian genomes makes it possible to compare genome organisation across mammalian lineages and reconstruct chromosomes of the ancestral marsupial and therian (marsupial and eutherian) mammals. However, the reconstruction of ancestral genomes requires genome assemblies to be anchored to chromosomes. The recently sequenced tammar wallaby (Macropus eugenii) genome was assembled into over 300,000 contigs. We previously devised an efficient strategy for mapping large evolutionarily conserved blocks in non-model mammals, and applied this to determine the arrangement of conserved blocks on all wallaby chromosomes, thereby permitting comparative maps to be constructed and resolve the long debated issue between a 2n=14 and 2n=22 ancestral marsupial karyotype. RESULTS: We identified large blocks of genes conserved between human and opossum, and mapped genes corresponding to the ends of these blocks by fluorescence in situ hybridization (FISH). A total of 242 genes was assigned to wallaby chromosomes in the present study, bringing the total number of genes mapped to 554 and making it the most densely cytogenetically mapped marsupial genome. We used these gene assignments to construct comparative maps between wallaby and opossum, which uncovered many intrachromosomal rearrangements, particularly for genes found on wallaby chromosomes X and 3. Expanding comparisons to include chicken and human permitted the putative ancestral marsupial (2n=14) and therian mammal (2n=19) karyotypes to be reconstructed. CONCLUSIONS: Our physical mapping data for the tammar wallaby has uncovered the events shaping marsupial genomes and enabled us to predict the ancestral marsupial karyotype, supporting a 2n=14 ancestor. Futhermore, our predicted therian ancestral karyotype has helped to understand the evolution of the ancestral eutherian genome.
Resumo:
Background Drink driving among women is a growing problem in many motorised countries. While research has shown that male and female drink drivers differ on a number of characteristics, few studies have addressed the circumstances surrounding women’s drink driving offences specifically. Aim To add to previous research by comparing apprehension characteristics among men and women and to extend the understanding of the female drink driving problem by investigating the drink driving characteristics that are unique to women. Results The sample consisted of the 248,173 (21.5% women) drink drivers apprehended between 2000 and 2011 in Queensland, Australia. Gender comparisons showed that women were older, had lower levels of reoffending, and were more likely to be apprehended in Major Cities compared to men. Comparisons of age group and reoffending and non-reoffending among female drink drivers only revealed that higher BAC readings were more common among younger women. Moreover, a substantial minority (13.7%) of women aged 24 years or younger were apprehended with a BAC below0.05%, reflecting a breach of the zero tolerance BAC for provisional licence holders in Australia. Older women were more likely to be charged with a ‘failure to provide a test’ offence as a result of refusing to provide a breath or blood sample, indicating that drink driving is associated high levels of stigma for this group. Reoffending occurred among 16.2% of the female drink drivers and these drivers were more likely than non-reoffending drivers to record a mid to high range BAC, to be aged 30-39 or below 21years, and to be apprehended in Inner Regional or Remote locations. Conclusion Findings highlight the unique circumstances and divergent needs of female drink drivers compared to male drivers and for different groups of female drivers.
Resumo:
Distributed-password public-key cryptography (DPwPKC) allows the members of a group of people, each one holding a small secret password only, to help a leader to perform the private operation, associated to a public-key cryptosystem. Abdalla et al. recently defined this tool [1], with a practical construction. Unfortunately, the latter applied to the ElGamal decryption only, and relied on the DDH assumption, excluding any recent pairing-based cryptosystems. In this paper, we extend their techniques to support, and exploit, pairing-based properties: we take advantage of pairing-friendly groups to obtain efficient (simulation-sound) zero-knowledge proofs, whose security relies on the Decisional Linear assumption. As a consequence, we provide efficient protocols, secure in the standard model, for ElGamal decryption as in [1], but also for Linear decryption, as well as extraction of several identity-based cryptosystems [6,4]. Furthermore, we strenghten their security model by suppressing the useless testPwd queries in the functionality.
Resumo:
An encryption scheme is non-malleable if giving an encryption of a message to an adversary does not increase its chances of producing an encryption of a related message (under a given public key). Fischlin introduced a stronger notion, known as complete non-malleability, which requires attackers to have negligible advantage, even if they are allowed to transform the public key under which the related message is encrypted. Ventre and Visconti later proposed a comparison-based definition of this security notion, which is more in line with the well-studied definitions proposed by Bellare et al. The authors also provide additional feasibility results by proposing two constructions of completely non-malleable schemes, one in the common reference string model using non-interactive zero-knowledge proofs, and another using interactive encryption schemes. Therefore, the only previously known completely non-malleable (and non-interactive) scheme in the standard model, is quite inefficient as it relies on generic NIZK approach. They left the existence of efficient schemes in the common reference string model as an open problem. Recently, two efficient public-key encryption schemes have been proposed by Libert and Yung, and Barbosa and Farshim, both of them are based on pairing identity-based encryption. At ACISP 2011, Sepahi et al. proposed a method to achieve completely non-malleable encryption in the public-key setting using lattices but there is no security proof for the proposed scheme. In this paper we review the mentioned scheme and provide its security proof in the standard model. Our study shows that Sepahi’s scheme will remain secure even for post-quantum world since there are currently no known quantum algorithms for solving lattice problems that perform significantly better than the best known classical (i.e., non-quantum) algorithms.
Resumo:
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive adversary indicate that every n-variate function can be computed by n participants, such that no set of size t < n/2 participants learns any additional information other than what they could derive from their private inputs and the output of the protocol. We study unconditionally secure MPC protocols in the presence of a passive adversary in the trusted setup (‘semi-ideal’) model, in which the participants are supplied with some auxiliary information (which is random and independent from the participant inputs) ahead of the protocol execution (such information can be purchased as a “commodity” well before a run of the protocol). We present a new MPC protocol in the trusted setup model, which allows the adversary to corrupt an arbitrary number t < n of participants. Our protocol makes use of a novel subprotocol for converting an additive secret sharing over a field to a multiplicative secret sharing, and can be used to securely evaluate any n-variate polynomial G over a field F, with inputs restricted to non-zero elements of F. The communication complexity of our protocol is O(ℓ · n 2) field elements, where ℓ is the number of non-linear monomials in G. Previous protocols in the trusted setup model require communication proportional to the number of multiplications in an arithmetic circuit for G; thus, our protocol may offer savings over previous protocols for functions with a small number of monomials but a large number of multiplications.