969 resultados para technology standard
Resumo:
Basal cell carcinoma (BCC) is a skin cancer of particular importance to the Australian community. Its rate of occurrence is highest in Queensland, where 1% to 2% of people are newly affected annually. This is an order of magnitude higher than corresponding incidence estimates in European and North American populations. Individuals with a sun-sensitive complexion are particularly susceptible because sun exposure is the single most important causative agent, as shown by the anatomic distribution of BCC which is in general consistent with the levels of sun exposure across body sites. A distinguishing feature of BCC is the occurrence of multiple primary tumours within individuals, synchronously or over time, and their diagnosis and treatment costs contribute substantially to the major public health burden caused by BCC. A primary knowledge gap about BCC pathogenesis however was an understanding of the true frequency of multiple BCC occurrences and their body distribution, and why a proportion of people do develop more than one BCC in their life. This research project sought to address this gap under an overarching research aim to better understand the detailed epidemiology of BCC with the ultimate goal of reducing the burden of this skin cancer through prevention. The particular aim was to document prospectively the rate of BCC occurrence and its associations with constitutional and environmental (solar) factors, all the while paying special attention to persons affected by more than one BCC. The study built on previous findings and recent developments in the field but set out to confirm and extend these and propose more adequate theories about the complex epidemiology of this cancer. Addressing these goals required a new approach to researching basal cell carcinoma, due to the need to account for the phenomenon of multiple incident BCCs per person. This was enabled by a 20 year community-based study of skin cancer in Australians that provided the methodological foundation for this thesis. Study participants were originally randomly selected in 1986 from the electoral register of all adult residents of the subtropical township of Nambour in Queensland, Australia. On various occasions during the study, participants were fully examined by dermatologists who documented cumulative photodamage as well as skin cancers. Participants completed standard questionnaires about skin cancer-related factors, and consented to have any diagnosed skin cancers notified to the investigators by regional pathology laboratories in Queensland. These methods allowed 100% ascertainment of histologically confirmed BCCs in this study population. 1339 participants had complete follow-up to the end of 2007. Statistical analyses in this thesis were carried out using SAS and SUDAAN statistical software packages. Modelling methods, including multivariate logistic regressions, allowed for repeated measures in terms of multiple BCCs per person. This innovative approach gave new findings on two levels, presented in five chapters as scientific papers: 1. Incidence of basal cell carcinoma multiplicity and detailed anatomic distribution: longitudinal study of an Australian population The incidence of people affected multiple times by BCC was 705 per 100,000 person years compared to an incidence rate of people singly affected of 935 per 100,000 person years. Among multiply and singly affected persons alike, site-specific BCC incidence rates were far highest on facial subsites, followed by upper limbs, trunk, and then lower limbs 2. Melanocytic nevi and basal cell carcinoma: is there an association? BCC risk was significantly increased in those with forearm nevi (Odds Ratios (OR) 1.43, 95% Confidence Intervals (CI) 1.09-1.89) compared to people without forearm nevi, especially among those who spent their time mainly outdoors (OR 1.6, 95%CI 1.1-2.3) compared to those who spent their time mainly indoors. Nevi on the back were not associated with BCC. 3. Clinical signs of photodamage are associated with basal cell carcinoma multiplicity and site: a 16-year longitudinal study Over a 16-year follow-up period, 58% of people affected by BCC developed more than one BCC. Among these people 60% developed BCCs across different anatomic sites. Participants with high numbers of solar keratoses, compared to people without solar keratoses, were most likely to experience the highest BCC counts overall (OR 3.3, 95%CI 1.4-13.5). Occurrences of BCC on the trunk (OR 3.3, 95%CI 1.4-7.6) and on the limbs (OR 3.7, 95%CI 2.0-7.0) were strongly associated with high numbers of solar keratoses on these sites. 4. Occurrence and determinants of basal cell carcinoma by histological subtype in an Australian community Among 1202 BCCs, 77% had a single growth pattern and 23% were of mixed histological composition. Among all BCCs the nodular followed by the superficial growth patterns were commonest. Risk of nodular and superficial BCCs on the head was raised if 5 or more solar keratoses were present on the face (OR 1.8, 95%CI 1.2-2.7 and OR 4.5, 95%CI 2.1-9.7 respectively) and similarly on the trunk in the presence of multiple solar keratoses on the trunk (OR 4.2, 95%CI 1.5-11.9 and OR 2.2, 95%CI 1.1-4.4 respectively). 5. Basal cell carcinoma and measures of cumulative sun exposure: an Australian longitudinal community-based study Dermal elastosis was more likely to be seen adjacent to head and neck BCCs than trunk BCCs (p=0.01). Severity of dermal elastosis increased on each site with increasing clinical signs of cutaneous sun damage on that site. BCCs that occurred without perilesional elastosis per se, were always found in an anatomic region with signs of photodamage. This thesis thus has identified the magnitude of the burden of multiple BCCs. It does not support the view that people affected by more than one BCC represent a distinct group of people who are prone to BCCs on certain body sites. The results also demonstrate that BCCs regardless of site, histology or order of occurrence are strongly associated with cumulative sun exposure causing photodamage to the skin, and hence challenge the view that BCCs occurring on body sites with typically low opportunities for sun exposure or of the superficial growth pattern are different in their association with the sun from those on typically sun-exposed sites, or nodular BCCs, respectively. Through dissemination in the scientific and medical literature, and to the community at large, these findings can ultimately assist in the primary and secondary prevention of BCC, perhaps especially in high-risk populations.
Resumo:
Young people’s participation in science, technology, engineering and mathematics (STEM) is a matter of international concern. Studies and careers that require physical sciences and advanced mathematics are most affected by the problem and women in particular are under-represented in many STEM fields. This article views international research about young people’s relationships to, and participation in, STEM subjects and careers through the lens of an expectancy value model of achievement-related choices. In addition it draws on sociological theories of late-modernity and identity, which situate decision-making in a cultural context. The article examines how these frameworks are useful in explaining the decisions of young people – and young women in particular – about participating in STEM and proposes possible strategies for removing barriers to participation.
Islamic contributions to the International Organization for Science and Technology Education (IOSTE)
Resumo:
This presentation introduces the International Organization for Science and Technology Education (IOSTE), outlining its history, structure, principles and activities. It discusses the role of IOSTE as a values-oriented STE research organization established in response to cold war ideologies with the aim of encouraging dialogue and academic exchange. The presentation then highlights the recent engagement of IOSTE with STE in predominantly Muslim countries. It examines quantitatively and qualitatively the increasing contributions from researchers in these countries, and outlines possible future engagements which could lead to closer research collaborations and relationships between STE academics in Muslim and non-Muslim countries.
Resumo:
In late 2011, first year university students in science, technology, engineering and mathematics (STEM) courses across Australia were invited to participate in the international Interests and Recruitment in Science (IRIS) study. IRIS investigates the influences on young people's decisions to choose university STEM courses and their subsequent experiences of these courses. The study also has a particular focus on the motivations and experiences of young women in courses such as physics, IT and engineering given the low rates of female participation in these fields. Around 3500 students from 30 Australian universities contributed their views on the relative importance of various school and non-school influences on their decisions, as well as insights into their experiences of university STEM courses so far. It is hoped that their contributions will help improve recruitment, retention and gender equity in STEM higher education and careers.
Resumo:
This special issue of the Journal of Learning Design, led by Jill Franz and Lindy Osborne, from the School of Design in the Creative Industries Faculty at the Queensland University of Technology, is grounded in Design Education. Its papers are drawn from differing fields of design: digital media, architecture, and environmental design. Each makes use of technologies in differing ways but all share the singular purpose of achieving enhanced learning outcomes from students.
Resumo:
This research introduces a general methodology in order to create a Coloured Petri Net (CPN) model of a security protocol. Then standard or user-defined security properties of the created CPN model are identified. After adding an attacker model to the protocol model, the security property is verified using state space method. This approach is applied to analyse a number of trusted computing protocols. The results show the applicability of proposed method to analyse both standard and user-defined properties.
Resumo:
My practice-led research explores and maps workflows for generating experimental creative work involving inertia based motion capture technology. Motion capture has often been used as a way to bridge animation and dance resulting in abstracted visuals outcomes. In early works this process was largely done by rotoscoping, reference footage and mechanical forms of motion capture. With the evolution of technology, optical and inertial forms of motion capture are now more accessible and able to accurately capture a larger range of complex movements. The creative work titled “Contours in Motion” was the first in a series of studies on captured motion data used to generating experimental visual forms that reverberate in space and time. With the source or ‘seed’ comes from using an Xsens MVN - Inertial Motion Capture system to capture spontaneous dance movements, with the visual generation conducted through a customised dynamics simulation. The aim of the creative work was to diverge way from a standard practice of using particle system and/or a simple re-targeting of the motion data to drive a 3d character as a means to produce abstracted visual forms. To facilitate this divergence a virtual dynamic object was tether to a selection of data points from a captured performance. The proprieties of the dynamic object were then adjusted to balance the influences from the human movement data with the influence of computer based randomization. The resulting outcome was a visual form that surpassed simple data visualization to project the intent of the performer’s movements into a visual shape itself. The reported outcomes from this investigation have contributed to a larger study on the use of motion capture in the generative arts, furthering the understanding of and generating theories on practice.
Resumo:
We construct an efficient identity based encryption system based on the standard learning with errors (LWE) problem. Our security proof holds in the standard model. The key step in the construction is a family of lattices for which there are two distinct trapdoors for finding short vectors. One trapdoor enables the real system to generate short vectors in all lattices in the family. The other trapdoor enables the simulator to generate short vectors for all lattices in the family except for one. We extend this basic technique to an adaptively-secure IBE and a Hierarchical IBE.
Resumo:
The notion of certificateless public-key encryption (CL-PKE) was introduced by Al-Riyami and Paterson in 2003 that avoids the drawbacks of both traditional PKI-based public-key encryption (i.e., establishing public-key infrastructure) and identity-based encryption (i.e., key escrow). So CL-PKE like identity-based encryption is certificate-free, and unlike identity-based encryption is key escrow-free. In this paper, we introduce simple and efficient CCA-secure CL-PKE based on (hierarchical) identity-based encryption. Our construction has both theoretical and practical interests. First, our generic transformation gives a new way of constructing CCA-secure CL-PKE. Second, instantiating our transformation using lattice-based primitives results in a more efficient CCA-secure CL-PKE than its counterpart introduced by Dent in 2008.
Resumo:
For TREC Crowdsourcing 2011 (Stage 2) we propose a networkbased approach for assigning an indicative measure of worker trustworthiness in crowdsourced labelling tasks. Workers, the gold standard and worker/gold standard agreements are modelled as a network. For the purpose of worker trustworthiness assignment, a variant of the PageRank algorithm, named TurkRank, is used to adaptively combine evidence that suggests worker trustworthiness, i.e., agreement with other trustworthy co-workers and agreement with the gold standard. A single parameter controls the importance of co-worker agreement versus gold standard agreement. The TurkRank score calculated for each worker is incorporated with a worker-weighted mean label aggregation.
Resumo:
An encryption scheme is non-malleable if giving an encryption of a message to an adversary does not increase its chances of producing an encryption of a related message (under a given public key). Fischlin introduced a stronger notion, known as complete non-malleability, which requires attackers to have negligible advantage, even if they are allowed to transform the public key under which the related message is encrypted. Ventre and Visconti later proposed a comparison-based definition of this security notion, which is more in line with the well-studied definitions proposed by Bellare et al. The authors also provide additional feasibility results by proposing two constructions of completely non-malleable schemes, one in the common reference string model using non-interactive zero-knowledge proofs, and another using interactive encryption schemes. Therefore, the only previously known completely non-malleable (and non-interactive) scheme in the standard model, is quite inefficient as it relies on generic NIZK approach. They left the existence of efficient schemes in the common reference string model as an open problem. Recently, two efficient public-key encryption schemes have been proposed by Libert and Yung, and Barbosa and Farshim, both of them are based on pairing identity-based encryption. At ACISP 2011, Sepahi et al. proposed a method to achieve completely non-malleable encryption in the public-key setting using lattices but there is no security proof for the proposed scheme. In this paper we review the mentioned scheme and provide its security proof in the standard model. Our study shows that Sepahi’s scheme will remain secure even for post-quantum world since there are currently no known quantum algorithms for solving lattice problems that perform significantly better than the best known classical (i.e., non-quantum) algorithms.
Resumo:
Most existing marinas are boat parking/storing and servicing facilities that have been built over a long period of time for the convenience of local boat owners.
Resumo:
We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution) phase, without further communication between the dealer and the shareholders. Previous solutions to this problem require one to start off with a nonstandard scheme designed specifically for this purpose, or to have communication between shareholders. In contrast, we show how to increase the threshold parameter of the standard Shamir secret-sharing scheme without communication between the shareholders. Our technique can thus be applied to existing Shamir schemes even if they were set up without consideration to future threshold increases. Our method is a new positive cryptographic application for lattice reduction algorithms, inspired by recent work on lattice-based list decoding of Reed-Solomon codes with noise bounded in the Lee norm. We use fundamental results from the theory of lattices (geometry of numbers) to prove quantitative statements about the information-theoretic security of our construction. These lattice-based security proof techniques may be of independent interest.
Resumo:
This paper describes the design and implementation of a wireless neural telemetry system that enables new experimental paradigms, such as neural recordings during rodent navigation in large outdoor environments. RoSco, short for Rodent Scope, is a small lightweight user-configurable module suitable for digital wireless recording from freely behaving small animals. Due to the digital transmission technology, RoSco has advantages over most other wireless modules of noise immunity and online user-configurable settings. RoSco digitally transmits entire neural waveforms for 14 of 16 channels at 20 kHz with 8-bit encoding which are streamed to the PC as standard USB audio packets. Up to 31 RoSco wireless modules can coexist in the same environment on non-overlapping independent channels. The design has spatial diversity reception via two antennas, which makes wireless communication resilient to fading and obstacles. In comparison with most existing wireless systems, this system has online user-selectable independent gain control of each channel in 8 factors from 500 to 32,000 times, two selectable ground references from a subset of channels, selectable channel grounding to disable noisy electrodes, and selectable bandwidth suitable for action potentials (300 Hz–3 kHz) and low frequency field potentials (4 Hz–3 kHz). Indoor and outdoor recordings taken from freely behaving rodents are shown to be comparable to a commercial wired system in sorting for neural populations. The module has low input referred noise, battery life of 1.5 hours and transmission losses of 0.1% up to a range of 10 m.