923 resultados para Colony Count
Resumo:
A fundamental prerequisite of population health research is the ability to establish an accurate denominator. This in turn requires that every individual in the study population is counted. However, this seemingly simple principle has become a point of conflict between researchers whose aim is to produce evidence of disparities in population health outcomes and governments whose policies promote(intentionally or not) inequalities that are the underlying causes of health disparities. Research into the health of asylum seekers is a case in point. There is a growing body of evidence documenting the adverse affects of recent changes in asylum-seeking legislation, including mandatory detention. However, much of this evidence has been dismissed by some governments as being unsound, biased and unscientific because, it is argued, evidence is derived from small samples or from case studies. Yet, it is the policies of governments that are the key barrier to the conduct of rigorous population health research on asylum seekers. In this paper, the authors discuss the challenges of counting asylum seekers and the limitations of data reported in some industrialized countries. They argue that the lack of accurate statistical data on asylum seekers has been an effective neo-conservative strategy for erasing the health inequalities in this vulnerable population, indeed a strategy that renders invisible this population. They describe some alternative strategies that may be used by researchers to obtain denominator data on hard-to-reach populations such as asylum seekers.
Resumo:
Large-scale international comparative studies and cross-ethnic studies have revealed that Chinese students, whether living in China or overseas, consistently outperform their counterparts in mathematics achievement. These studies tended to explain this result from psychological, educational, or cultural perspectives. However, there is scant sociological investigation addressing Chinese students’ better mathematics achievement. Drawing on Bourdieu’s sociological theory, this study conceptualises Chinese Australians’ “Chineseness” by the notion of ‘habitus’ and considers this “Chineseness” generating but not determinating mechanism that underpins Chinese Australians’ mathematics learning. Two hundred and thirty complete responses from Chinese Australian participants were collected by an online questionnaire. Simple regression model statistically significantly well predicted mathematics achievement by “Chineseness” (F = 141.90, R = .62, t = 11.91, p < .001). Taking account of “Chineseness” as a sociological mechanism for Chinese Australians’ mathematics learning, this study complements psychological and educational impacts on better mathematics achievement of Chinese students revealed by previous studies. This study also challenges the cultural superiority discourse that attributes better mathematics achievement of Chinese students to cultural factors.
Resumo:
Introduction: Unaccustomed eccentric exercise often results in muscle damage and neutrophil activation. We examined changes in plasma cytokines stress hormones, creatine kinase activity and myoglobin concentration, neutrophil surface receptor expression, degranulation, and the capacity of neutrophils to generate reactive oxygen species in response to in vitro stimulation after downhill running. Methods: Ten well-trained male runners ran downhill on a treadmill at a gradient of -10% for 45 min at 60% V̇O2max. Blood was sampled immediately before (PRE) and after (POST), 1 h (1 h POST), and 24 h (24 h POST) after exercise. Results: At POST, there were significant increases (P < 0.01) in neutrophil count (32%), plasma interleukin (IL)-6 concentration (460%), myoglobin (Mb) concentration (1100%), and creatine kinase (CK) activity (40%). At 1 h POST, there were further increases above preexercise values for neutrophil count (85%), plasma Mb levels (1800%), and CK activity (56%), and plasma IL-6 concentration remained above preexercise values (410%) (P < 0.01). At 24 h POST, neutrophil counts and plasma IL-6 levels had returned to baseline, whereas plasma Mb concentration (100%) and CK activity (420%) were elevated above preexercise values (P < 0.01). There were no significant changes in neutrophil receptor expression, degranulation and respiratory burst activity, and plasma IL-8 and granulocyte-colony stimulating factor concentrations at any time after exercise. Neutrophil count correlated with plasma Mb concentration at POST (r = 0.64, P < 0.05), and with plasma CK activity at POST (r = 0.83, P < 0.01) and 1 h POST (r = 0.78, P < 0.01). Conclusion: Neutrophil activation remains unchanged after downhill running in well-trained runners, despite increases in plasma markers of muscle damage.
Resumo:
In this paper we present a new simulation methodology in order to obtain exact or approximate Bayesian inference for models for low-valued count time series data that have computationally demanding likelihood functions. The algorithm fits within the framework of particle Markov chain Monte Carlo (PMCMC) methods. The particle filter requires only model simulations and, in this regard, our approach has connections with approximate Bayesian computation (ABC). However, an advantage of using the PMCMC approach in this setting is that simulated data can be matched with data observed one-at-a-time, rather than attempting to match on the full dataset simultaneously or on a low-dimensional non-sufficient summary statistic, which is common practice in ABC. For low-valued count time series data we find that it is often computationally feasible to match simulated data with observed data exactly. Our particle filter maintains $N$ particles by repeating the simulation until $N+1$ exact matches are obtained. Our algorithm creates an unbiased estimate of the likelihood, resulting in exact posterior inferences when included in an MCMC algorithm. In cases where exact matching is computationally prohibitive, a tolerance is introduced as per ABC. A novel aspect of our approach is that we introduce auxiliary variables into our particle filter so that partially observed and/or non-Markovian models can be accommodated. We demonstrate that Bayesian model choice problems can be easily handled in this framework.
Resumo:
The count-min sketch is a useful data structure for recording and estimating the frequency of string occurrences, such as passwords, in sub-linear space with high accuracy. However, it cannot be used to draw conclusions on groups of strings that are similar, for example close in Hamming distance. This paper introduces a variant of the count-min sketch which allows for estimating counts within a specified Hamming distance of the queried string. This variant can be used to prevent users from choosing popular passwords, like the original sketch, but it also allows for a more efficient method of analysing password statistics.
Resumo:
Australia's economic growth and national identity have been widely celebrated as being founded on the nation's natural resources. With the golden era of pastoralism fading into the distance, a renewed love affair with primary industries has been much lauded, particularly by purveyors of neoliberal ideology. The considerable wealth generated by resource extraction has, despite its environmental and social record, proved seductive to the university sector. The mining industry is one of a number of industries and sectors (alongside pharmaceutical, chemical and biotechnological) that is increasingly courting Australian universities. These new public-private alliances are often viewed as the much-needed cash cow to bridge the public funding shortfall in the tertiary sector. However, this trend also raises profound questions about the capacity of public good institutions, as universities were once assumed to be, to maintain institutional independence and academic freedoms.
Resumo:
At NDSS 2012, Yan et al. analyzed the security of several challenge-response type user authentication protocols against passive observers, and proposed a generic counting based statistical attack to recover the secret of some counting based protocols given a number of observed authentication sessions. Roughly speaking, the attack is based on the fact that secret (pass) objects appear in challenges with a different probability from non-secret (decoy) objects when the responses are taken into account. Although they mentioned that a protocol susceptible to this attack should minimize this difference, they did not give details as to how this can be achieved barring a few suggestions. In this paper, we attempt to fill this gap by generalizing the attack with a much more comprehensive theoretical analysis. Our treatment is more quantitative which enables us to describe a method to theoretically estimate a lower bound on the number of sessions a protocol can be safely used against the attack. Our results include 1) two proposed fixes to make counting protocols practically safe against the attack at the cost of usability, 2) the observation that the attack can be used on non-counting based protocols too as long as challenge generation is contrived, 3) and two main design principles for user authentication protocols which can be considered as extensions of the principles from Yan et al. This detailed theoretical treatment can be used as a guideline during the design of counting based protocols to determine their susceptibility to this attack. The Foxtail protocol, one of the protocols analyzed by Yan et al., is used as a representative to illustrate our theoretical and experimental results.
Resumo:
This paper develops a semiparametric estimation approach for mixed count regression models based on series expansion for the unknown density of the unobserved heterogeneity. We use the generalized Laguerre series expansion around a gamma baseline density to model unobserved heterogeneity in a Poisson mixture model. We establish the consistency of the estimator and present a computational strategy to implement the proposed estimation techniques in the standard count model as well as in truncated, censored, and zero-inflated count regression models. Monte Carlo evidence shows that the finite sample behavior of the estimator is quite good. The paper applies the method to a model of individual shopping behavior. © 1999 Elsevier Science S.A. All rights reserved.