974 resultados para GIVE
Resumo:
Samples of sea water contain phytoplankton taxa in varying amounts, and marine scientists are interested in the relative abundance of each taxa. Their relative biomass can be ascertained indirectly by measuring the quantity of various pigments using high performance liquid chromatography. However, the conversion from pigment to taxa is mathematically non trivial as it is a positive matrix factorisation problem where both matrices are unknown beyond the level of initial estimates. The prior information on the pigment to taxa conversion matrix is used to give the problem a unique solution. An iteration of two non-negative least squares algorithms gives satisfactory results. Some sample analysis of data indicates prospects for this type of analysis. An alternative more computationally intensive approach using Bayesian methods is discussed.
Resumo:
THE senior Anglican clergyman at the centre of an international child sex scandal was also a governor of a prestigious English music college that is under investigation for the alleged abuse of scores of its students across decades. Robert Waddington, who is alleged to have sexually assaulted students and choirboys in Britain and Australia, was a governor of the scandal-hit Chetham's School of Music for nine years. Waddington recruited students from the school for his choir at Manchester Cathedral, and allegedly abused at least three of the boys until he retired in 1993. The police investigation into the school, which began after the conviction in February of Michael Brewer, a former Chetham's music director, for the sexual abuse of female students, has not previously looked at Waddington. A victim has told The Weekend Australian that he was aware Waddington abused several boys from Chetham's who, like him, had been in the choir. The Cambridge University-educated business analyst, who has offered to give evidence under oath to police and the Church of England's inquiry into Waddington, said the clergyman had kept a collection of pictures in his house of boys he had abused.
An improved chemically inducible gene switch that functions in the monocotyledonous plant sugar cane
Resumo:
Chemically inducible gene switches can provide precise control over gene expression, enabling more specific analyses of gene function and expanding the plant biotechnology toolkit beyond traditional constitutive expression systems. The alc gene expression system is one of the most promising chemically inducible gene switches in plants because of its potential in both fundamental research and commercial biotechnology applications. However, there are no published reports demonstrating that this versatile gene switch is functional in transgenic monocotyledonous plants, which include some of the most important agricultural crops. We found that the original alc gene switch was ineffective in the monocotyledonous plant sugar cane, and describe a modified alc system that is functional in this globally significant crop. A promoter consisting of tandem copies of the ethanol receptor inverted repeat binding site, in combination with a minimal promoter sequence, was sufficient to give enhanced sensitivity and significantly higher levels of ethanol inducible gene expression. A longer CaMV 35S minimal promoter than was used in the original alc gene switch also substantially improved ethanol inducibility. Treating the roots with ethanol effectively induced the modified alc system in sugar cane leaves and stem, while an aerial spray was relatively ineffective. The extension of this chemically inducible gene expression system to sugar cane opens the door to new opportunities for basic research and crop biotechnology.
Resumo:
Cryptosystems based on the hardness of lattice problems have recently acquired much importance due to their average-case to worst-case equivalence, their conjectured resistance to quantum cryptanalysis, their ease of implementation and increasing practicality, and, lately, their promising potential as a platform for constructing advanced functionalities. In this work, we construct “Fuzzy” Identity Based Encryption from the hardness of the Learning With Errors (LWE) problem. We note that for our parameters, the underlying lattice problems (such as gapSVP or SIVP) are assumed to be hard to approximate within supexponential factors for adversaries running in subexponential time. We give CPA and CCA secure variants of our construction, for small and large universes of attributes. All our constructions are secure against selective-identity attacks in the standard model. Our construction is made possible by observing certain special properties that secret sharing schemes need to satisfy in order to be useful for Fuzzy IBE. We also discuss some obstacles towards realizing lattice-based attribute-based encryption (ABE).
Resumo:
We describe a short signature scheme that is strongly existentially unforgeable under an adaptive chosen message attack in the standard security model. Our construction works in groups equipped with an efficient bilinear map, or, more generally, an algorithm for the Decision Diffie-Hellman problem. The security of our scheme depends on a new intractability assumption we call Strong Diffie-Hellman (SDH), by analogy to the Strong RSA assumption with which it shares many properties. Signature generation in our system is fast and the resulting signatures are as short as DSA signatures for comparable security. We give a tight reduction proving that our scheme is secure in any group in which the SDH assumption holds, without relying on the random oracle model.
Resumo:
We present two unconditional secure protocols for private set disjointness tests. In order to provide intuition of our protocols, we give a naive example that applies Sylvester matrices. Unfortunately, this simple construction is insecure as it reveals information about the intersection cardinality. More specifically, it discloses its lower bound. By using the Lagrange interpolation, we provide a protocol for the honest-but-curious case without revealing any additional information. Finally, we describe a protocol that is secure against malicious adversaries. In this protocol, a verification test is applied to detect misbehaving participants. Both protocols require O(1) rounds of communication. Our protocols are more efficient than the previous protocols in terms of communication and computation overhead. Unlike previous protocols whose security relies on computational assumptions, our protocols provide information theoretic security. To our knowledge, our protocols are the first ones that have been designed without a generic secure function evaluation. More important, they are the most efficient protocols for private disjointness tests in the malicious adversary case.
Resumo:
In this paper, the problem of moving object detection in aerial video is addressed. While motion cues have been extensively exploited in the literature, how to use spatial information is still an open problem. To deal with this issue, we propose a novel hierarchical moving target detection method based on spatiotemporal saliency. Temporal saliency is used to get a coarse segmentation, and spatial saliency is extracted to obtain the object’s appearance details in candidate motion regions. Finally, by combining temporal and spatial saliency information, we can get refined detection results. Additionally, in order to give a full description of the object distribution, spatial saliency is detected in both pixel and region levels based on local contrast. Experiments conducted on the VIVID dataset show that the proposed method is efficient and accurate.
Resumo:
Twitter is the focus of much research attention, both in traditional academic circles and in commercial market and media research, as analytics give increasing insight into the performance of the platform in areas as diverse as political communication, crisis management, television audiencing and other industries. While methods for tracking Twitter keywords and hashtags have developed apace and are well documented, the make-up of the Twitter user base and its evolution over time have been less understood to date. Recent research efforts have taken advantage of functionality provided by Twitter's Application Programming Interface to develop methodologies to extract information that allows us to understand the growth of Twitter, its geographic spread and the processes by which particular Twitter users have attracted followers. From politicians to sporting teams, and from YouTube personalities to reality television stars, this technique enables us to gain an understanding of what prompts users to follow others on Twitter. This article outlines how we came upon this approach, describes the method we adopted to produce accession graphs and discusses their use in Twitter research. It also addresses the wider ethical implications of social network analytics, particularly in the context of a detailed study of the Twitter user base.
Resumo:
Objective To examine the impact of applying for funding on personal workloads, stress and family relationships. Design Qualitative study of researchers preparing grant proposals. Setting Web-based survey on applying for the annual National Health and Medical Research Council (NHMRC) Project Grant scheme. Participants Australian researchers (n=215). Results Almost all agreed that preparing their proposals always took top priority over other work (97%) and personal (87%) commitments. Almost all researchers agreed that they became stressed by the workload (93%) and restricted their holidays during the grant writing season (88%). Most researchers agreed that they submitted proposals because chance is involved in being successful (75%), due to performance requirements at their institution (60%) and pressure from their colleagues to submit proposals (53%). Almost all researchers supported changes to the current processes to submit proposals (95%) and peer review (90%). Most researchers (59%) provided extensive comments on the impact of writing proposals on their work life and home life. Six major work life themes were: (1) top priority; (2) career development; (3) stress at work; (4) benefits at work; (5) time spent at work and (6) pressure from colleagues. Six major home life themes were: (1) restricting family holidays; (2) time spent on work at home; (3) impact on children; (4) stress at home; (5) impact on family and friends and (6) impact on partner. Additional impacts on the mental health and well-being of researchers were identified. Conclusions The process of preparing grant proposals for a single annual deadline is stressful, time consuming and conflicts with family responsibilities. The timing of the funding cycle could be shifted to minimise applicant burden, give Australian researchers more time to work on actual research and to be with their families.
Resumo:
This chapter outlines a perspective of educational assessment as enabling, whereby the learner is central and assessment is focused on supporting the knowledge, skills and dispositions necessary for lifelong learning. It argues that better education for young people is achievable when educational policy and practice give priority to learning improvement, thereby making assessment for accountability a related, though secondary, concern. The chapter describes how this work of internationally recognized scholars brings together diverse perspectives and theoretical frameworks and, in so doing, provides readers with a range of ways to consider their pathway through the book. A ‘map’ and summaries of chapters suggest a reading according to a thematic approach, geographical setting, author/s profile or content purposes depending on the reader’s own priorities. A section on assessment past, present, and futures calls for a rebalancing of improvement and accountability goals, and for countries to be careful to avoid privileging large-scale testing over other forms of data about learning and achievement.
Resumo:
At NDSS 2012, Yan et al. analyzed the security of several challenge-response type user authentication protocols against passive observers, and proposed a generic counting based statistical attack to recover the secret of some counting based protocols given a number of observed authentication sessions. Roughly speaking, the attack is based on the fact that secret (pass) objects appear in challenges with a different probability from non-secret (decoy) objects when the responses are taken into account. Although they mentioned that a protocol susceptible to this attack should minimize this difference, they did not give details as to how this can be achieved barring a few suggestions. In this paper, we attempt to fill this gap by generalizing the attack with a much more comprehensive theoretical analysis. Our treatment is more quantitative which enables us to describe a method to theoretically estimate a lower bound on the number of sessions a protocol can be safely used against the attack. Our results include 1) two proposed fixes to make counting protocols practically safe against the attack at the cost of usability, 2) the observation that the attack can be used on non-counting based protocols too as long as challenge generation is contrived, 3) and two main design principles for user authentication protocols which can be considered as extensions of the principles from Yan et al. This detailed theoretical treatment can be used as a guideline during the design of counting based protocols to determine their susceptibility to this attack. The Foxtail protocol, one of the protocols analyzed by Yan et al., is used as a representative to illustrate our theoretical and experimental results.
Resumo:
Sequential and one-pot Stille–Heck and Heck–Stille reaction processes have been invoked to give divergent access to polycyclic ring systems. Both reaction conditions and substrate structure are important in determining the nature of the reaction products formed. The Heck–Stille reactions have involved a reversal of the usual Heck regioselectivity and both cine- and ipso-substitutions have been observed in the Stille reaction.
Resumo:
Contemporary lipidomics protocols are dependent on conventional tandem mass spectrometry for lipid identification. This approach is extremely powerful for determining lipid class and identifying the number of carbons and the degree of unsaturation of any acyl-chain substituents. Such analyses are however, blind to isomeric variants arising from different carbon carbon bonding motifs within these chains including double bond position, chain branching, and cyclic structures. This limitation arises from the fact that conventional, low energy collision-induced dissociation of even-electron lipid ions does not give rise to product ions from intrachain fragmentation of the fatty acyl moieties. To overcome this limitation, we have applied radical-directed dissociation (RDD) to the study of lipids for the first time. In this approach, bifunctional molecules that contain a photocaged radical initiator and a lipid-adducting group, such as 4-iodoaniline and 4-iodobenzoic acid, are used to form noncovalent complexes (i.e., adduct ions) with a lipid during electrospray ionization. Laser irradiation of these complexes at UV wavelengths (266 nm) cleaves the carbon iodine bond to liberate a highly reactive phenyl radical. Subsequent activation of the nascent radical ions results in RDD with significant intrachain fragmentation of acyl moieties. This approach provides diagnostic fragments that are associated with the double bond position and the positions of chain branching in glycerophospholipids, sphingomyelins and triacylglycerols and thus can be used to differentiate isomeric lipids differing only in such motifs. RDD is demonstrated for well-defined lipid standards and also reveals lipid structural diversity in olive oil and human very-low density lipoprotein.
Resumo:
The growing dominance of project planning cycles and results-based management in development over the past 20 years has significant implications for the effective evaluation of communication for development and social change and the sustainability of these processes. These approaches to development and evaluation usually give priority to the linear, logical framework (or log frame) approach promoted by many development institutions. This tends to emphasize upward accountability approaches to development and its evaluation, so that development is driven by exogenous rather than endogenous models of development and social change. Such approaches are underpinned by ideas of preplanning, and predetermination of what successful out -comes look like. In this way, outcomes of complex interventions tend to be reduced to simple, cause-effect processes and the categorization of things, including people (Chambers and Pettit 2004; Eyben 2011). This runs counter to communication for development approaches, which prioritize engagement, relationships, empowerment and dialogue as important components for positive social change.
Resumo:
The phenylperoxyl radical has long been accepted as a critical intermediate in the oxidation of benzene and an archetype for arylperoxyl radicals in combustion and atmospheric chemistry. Despite being central to many contemporary mechanisms underpinning these chemistries, reports of the direct detection or isolation of phenylperoxyl radicals are rare and there is little experimental evidence connecting this intermediate with expected product channels. We have prepared and isolated two charge-tagged phenyl radical models in the gas phase [i.e., 4-(N,N,N-trimethylammonium) phenyl radical cation and 4-carboxylatophenyl radical anion] and observed their reactions with dioxygen by ion-trap mass spectrometry. Measured reaction rates show good agreement with prior reports for the neutral system (k(2)[(Me3N+)C6H4 center dot + O-2] = 2.8 x 10(-11) cm(3) molecule(-1) s(-1), Phi = 4.9%; k(2)[(-O2C)C6H4 center dot + O-2] = 5.4 x 10(-1)1 cm(3) molecule(-1) s(-1), Phi = 9.2%) and the resulting mass spectra provide unequivocal evidence for the formation of phenylperoxyl radicals. Collisional activation of isolated phenylperoxyl radicals reveals unimolecular decomposition by three pathways: (i) loss of dioxygen to reform the initial phenyl radical; (ii) loss of atomic oxygen yielding a phenoxyl radical; and (iii) ejection of the formyl radical to give cyclopentadienone. Stable isotope labeling confirms these assignments. Quantum chemical calculations for both charge-tagged and neutral phenylperoxyl radicals confirm that loss of formyl radical is accessible both thermodynamically and entropically and competitive with direct loss of both hydrogen atom and carbon dioxide.