958 resultados para polylogarithms, motivic cohomology higher Chow groups


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Introduction Well-designed biodegradable scaffolds in combination with bone growth factors offer a valuable alternative to the current gold standard autograft in spinal fusion surgery Yong et al. (2013). Here we report on 6- vs 12- month data set evaluating the longitudinal performance of a CaP coated polycaprolactone (PCL) scaffold loaded with recombinant human bone morphogenetic protein-2 (rhBMP-2) as a bone graft substitute within a large preclinical animal model. Methods Twelve sheep underwent a 3-level (T6/7, T8/9 and T10/11) discectomy with randomly allocated implantation of a different graft substitute at each of the three levels; (i) calcium phosphate (CaP) coated polycaprolactone based scaffold plus 0.54µg rhBMP-2, (ii) CaP coated PCL- based scaffold alone or (iii) autograft (mulched rib head). Fusion assessments were performed via high resolution clinical computed tomography and histological evaluation were undertaken at six (n=6) and twelve (n=6) months post-surgery using the Sucato grading system (Sucato et al. 2004). Results The computed tomography fusion grades of the 6- and 12- months in the rhBMP-2 plus PCL- based scaffold group were 1.9 and 2.1 respectively, in the autograft group 1.9 and 1.3 respectively, and in the scaffold alone group 0.9 and 1.17 respectively. There were no statistically significant differences in the fusion scores between 6- and 12- month for the rhBMP plus PCL- based scaffold or PCL – based scaffold alone group however there was a significant reduction in scores in the autograft group. These scores were seen to correlate with histological evaluations of the respective groups. Conclusions The results of this study demonstrate the efficacy of scaffold-based delivery of rhBMP-2 in promoting higher fusion grades at 6- and 12- months in comparison to the scaffold alone or autograft group within the same time frame. Fusion grades achieved at six months using PCL+rhBMP-2 are not significantly increased at twelve months post-surgery.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

INTRODUCTION: Increasing health care costs, limited resources and increased demand makes cost effective and cost-efficient delivery of Adolescent Idiopathic Scoliosis (AIS) management paramount. Rising implant costs in deformity correction surgery have prompted analysis of whether high implant densities are justified. The objective of this study was to analyse the costs of thoracoscopic scoliosis surgery, comparing initial learning curve costs with those of the established technique and to the costs involved in posterior instrumented fusion from the literature. METHODS: 189 consecutive cases from April 2000 to July 2011 were assessed with a minimum of 2 years follow-up. Information was gathered from a prospective database covering perioperative factors, clinical and radiological outcomes, complications and patient reported outcomes. The patients were divided into three groups to allow comparison; 1. A learning curve cohort, 2. An intermediate cohort and 3. A third cohort of patients, using our established technique. Hospital finance records and implant manufacturer figures were corrected to 2013 costs. A literature review of AIS management costs and implant density in similar curve types was performed. RESULTS: The mean pre-op Cobb angle was 53°(95%CI 0.4) and was corrected postop to mean 22.9°(CI 0.4). The overall complication rate was 20.6%, primarily in the first cohort, with a rate of 5.6% in the third cohort. The average total costs were $46,732, operating room costs of $10,301 (22.0%) and ICU costs of $4620 (9.8%). The mean number of screws placed was 7.1 (CI 0.04) with a single rod used for each case giving average implant costs of $14,004 (29.9%). Comparison of the three groups revealed higher implant costs as the technique evolved to that in use today, from $13,049 in Group 1 to $14577 in Group 3 (P<0.001). Conversely operating room costs reduced from $10,621 in Group 1 to $7573 (P<0.001) in Group 3. ICU stay was reduced from an average of 1.2 to 0 days. In-patient stay was significantly (P=0.006) lower in Groups 2 and 3 (5.4 days) than Group 1 (5.9 days) (i.e. a reduction in cost of approximately $6,140). CONCLUSIONS: The evolution of our thoracoscopic anterior scoliosis correction has resulted in an increase in the number of levels fused and reduction in complication rate. Implant costs have risen as a result, however, there has been a concurrent decrease in those costs generated by operating room use, ICU and in-patient stay with increasing experience. Literature review of equivalent curve types treated posteriorly shows similar perioperative factors but higher implant density, 69-83% compared to the 50% in this study. Thoracoscopic Scoliosis surgery presents a low density, reliable, efficient and effective option for selected curves. A cost analysis of Thoracoscopic Scoliosis Surgery using financial records and a prospectively collected database of all patients since 2000, demonstrating a clear cost advantage compared to equivalent posterior instrumentation and fusion.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Current national reforms in Australian higher education have prioritised efforts to reduce educational disadvantage within a vernacular expression of neoliberal education policy. Student-equity policy in universities is enmeshed in a set of competitive student recruitment relations. This raises practice-based tensions as universities strive to meet specific institutional targets for low-socio-economic status (SES) and Indigenous student participation, whilst broadening participation more generally within the sector. This paper seeks empirically to trace the activation and appropriation of federal policy through two sites of higher education policy practices: a state government-sponsored equity practitioner body and two differently positioned universities, Dawson and McIllwraith, as they engage with low-SES schools. Working together Dorothy Smith’s insights into the textually mediated activation of local practices, Levinson and colleagues’ concept of the local appropriation of authorised policy, and Bourdieu’s notion of the contested field, we demonstrate that the generation of state level and institutionally specific policies for student-equity practices not only articulates to federal policy, but also appropriates the ruling relations of mandated policy. Further, the scope of these creative local appropriations is organised within a hierarchical academic field through which particular institutional imperatives, as well as the needs of low-SES students, are negotiated. The analysis demonstrates the vernacularisation of policy in the national rearticulation of global discourses, in appropriation at the level of the state body and in the practices of equity workers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Universal One-Way Hash Functions (UOWHFs) may be used in place of collision-resistant functions in many public-key cryptographic applications. At Asiacrypt 2004, Hong, Preneel and Lee introduced the stronger security notion of higher order UOWHFs to allow construction of long-input UOWHFs using the Merkle-Damgård domain extender. However, they did not provide any provably secure constructions for higher order UOWHFs. We show that the subset sum hash function is a kth order Universal One-Way Hash Function (hashing n bits to m < n bits) under the Subset Sum assumption for k = O(log m). Therefore we strengthen a previous result of Impagliazzo and Naor, who showed that the subset sum hash function is a UOWHF under the Subset Sum assumption. We believe our result is of theoretical interest; as far as we are aware, it is the first example of a natural and computationally efficient UOWHF which is also a provably secure higher order UOWHF under the same well-known cryptographic assumption, whereas this assumption does not seem sufficient to prove its collision-resistance. A consequence of our result is that one can apply the Merkle-Damgård extender to the subset sum compression function with ‘extension factor’ k+1, while losing (at most) about k bits of UOWHF security relative to the UOWHF security of the compression function. The method also leads to a saving of up to m log(k+1) bits in key length relative to the Shoup XOR-Mask domain extender applied to the subset sum compression function.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The present study compares the effects of two different material processing techniques on modifying hydrophilic SiO2 nanoparticles. In one method, the nanoparticles undergo plasma treatment by using a custom-developed atmospheric-pressure non-equilibrium plasma reactor. With the other method, they undergo chemical treatment which grafts silane groups onto their surface and turns them into hydrophobic. The treated nanoparticles are then used to synthesize epoxy resin-based nanocomposites for electrical insulation applications. Their characteristics are investigated and compared with the pure epoxy resin and nanocomposite fabricated with unmodified nanofillers counterparts. The dispersion features of the nanoparticles in the epoxy resin matrix are examined through scanning electron microscopy (SEM) images. All samples show evidence that the agglomerations are smaller than 30 nm in their diameters. This indicates good dispersion uniformity. The Weibull plot of breakdown strength and the recorded partial discharge (PD) events of the epoxy resin/plasma-treated hydrophilic SiO2 nanocomposite (ER/PTI) suggest that the plasma-treated specimen yields higher breakdown strength and lower PD magnitude as compared to the untreated ones. In contrast, surprisingly, lower breakdown strength is found for the nanocomposite made by the chemically treated hydrophobic particles, whereas the PD magnitude and PD numbers remain at a similar level as the plasma-treated ones.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Here we report on the synthesis of caesium doped graphene oxide (GO-Cs) and its application to the development of a novel NO2 gas sensor. The GO, synthesized by oxidation of graphite through chemical treatment, was doped with Cs by thermal solid-state reaction. The samples, dispersed in DI water by sonication, have been drop-casted on standard interdigitated Pt electrodes. The response of both pristine and Cs doped GO to NO2 at room temperature is studied by varying the gas concentration. The developed GO-Cs sensor shows a higher response to NO2 than the pristine GO based sensor due to the oxygen functional groups. The detection limit measured with GO-Cs sensor is ≈90 ppb.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recent research in the rapidly emerging field of plasmonics has shown the potential to significantly enhance light trapping inside thin-film solar cells by using metallic nanoparticles. In this article it is demonstrated the plasmon enhancement of optical absorption in amorphous silicon solar cells by using silver nanoparticles. Based on the analysis of the higher-order surface plasmon modes, it is shown how spectral positions of the surface plasmons affect the plasmonic enhancement of thin-film solar cells. By using the predictive 3D modeling, we investigate the effect of the higher-order modes on that enhancement. Finally, we suggest how to maximize the light trapping and optical absorption in the thin-film cell by optimizing the nanoparticle array parameters, which in turn can be used to fine tune the corresponding surface plasmon modes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper addresses of the advanced computational technique of steel structures for both simulation capacities simultaneously; specifically, they are the higher-order element formulation with element load effect (geometric nonlinearities) as well as the refined plastic hinge method (material nonlinearities). This advanced computational technique can capture the real behaviour of a whole second-order inelastic structure, which in turn ensures the structural safety and adequacy of the structure. Therefore, the emphasis of this paper is to advocate that the advanced computational technique can replace the traditional empirical design approach. In the meantime, the practitioner should be educated how to make use of the advanced computational technique on the second-order inelastic design of a structure, as this approach is the future structural engineering design. It means the future engineer should understand the computational technique clearly; realize the behaviour of a structure with respect to the numerical analysis thoroughly; justify the numerical result correctly; especially the fool-proof ultimate finite element is yet to come, of which is competent in modelling behaviour, user-friendly in numerical modelling and versatile for all structural forms and various materials. Hence the high-quality engineer is required, who can confidently manipulate the advanced computational technique for the design of a complex structure but not vice versa.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper outlines the progress by the JoMeC (Journalism, Media & Communication) Network in developing TLO (Threshold Learning Outcome) statements for Bachelor-level university programs in the disciplines of Journalism, Public Relations and Media & Communications Studies. The paper presents the finalised TLO statement for Journalism, and outlines moves to engage discipline-based groups to further develop preliminary TLOs for Public Relations and Media & Communication Studies. The JoMeC Network was formed in 2011, in response to requirements that from 2014 all degrees and qualifications at Australian universities would be able to demonstrate that they comply with the threshold learning standards set by the Australian Qualifications Framework (AQF). The AQF’s threshold standards define the minimum types and levels of knowledge, skills and capabilities that a student must demonstrate in order to graduate. The Tertiary Education Quality and Standards Agency (TEQSA) will use the AQF’s threshold standards as a key tool in recording and assessing the performance of higher educational institutions, and determining whether they should be registered as Australian Higher Education Providers under the Higher Education Standards Framework. The Office of Learning & Teaching (OLT) places the onus on discipline communities to collaborate in order to develop and ‘own’ the threshold learning standards that can be considered the minimum learning outcomes of university-level programs in that field. With the support of an OLT Grant, the JoMeC Network’s prime goal has been to develop three sets of discipline-specific TLOs – one each for the Journalism, Public Relations, and Media & Communications Studies disciplines. This paper describes the processes of research, consultation, drafting and ongoing revision of the TLO for Journalism. It outlines the processes that the JoMeC Network has taken in developing a preliminary TLO draft to initiate discussion of Public Relations and Media & Communication Studies. The JoMeC Network plans to hand management of further development of these TLOs to scholars within the discipline who will engage with academics and other stakeholders to develop statements that the respective disciplines can embrace and ‘own’.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider the following problem: a user stores encrypted documents on an untrusted server, and wishes to retrieve all documents containing some keywords without any loss of data confidentiality. Conjunctive keyword searches on encrypted data have been studied by numerous researchers over the past few years, and all existing schemes use keyword fields as compulsory information. This however is impractical for many applications. In this paper, we propose a scheme of keyword field-free conjunctive keyword searches on encrypted data, which affirmatively answers an open problem asked by Golle et al. at ACNS 2004. Furthermore, the proposed scheme is extended to the dynamic group setting. Security analysis of our constructions is given in the paper.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose To study the quality in higher education in Cambodia and explore the potential factors leading to quality in Cambodian higher education. Design/methodology/approach Five main factors that were deemed relevant in providing quality in Cambodian higher education were proposed: academic curriculum and extra-curricular activities, teachers' qualification and methods, funding and tuition, school facilities, and interactive network. These five propositions were used to compare Shu-Te University, Taiwan with the top five universities in Cambodia. The data came in the forms of questionnaire and desk research. Descriptive analytical approach is then carried out to describe these five factors. Findings Only 6 per cent of lecturers hold PhD degree and about 85 per cent never published any papers; some private universities charge as low as USD200 per academic year, there is almost no donation from international organizations, and annual government funding on higher education sector nationwide in 2005 was only about USD3.67 million; even though there is a library at each university, books, study materials etc. are not up-to-date and inadequate; 90 per cent of the lecturers never have technical discussion or meeting and about 60 per cent of students felt that their teachers did not have time for them to consult with. Originality/value A useful insight was gained into the perceived importance of quality in higher education that can stimulate debate and discussion on the role of government in building the standard quality in higher education. Also, the findings from this research can assist in the development of a framework of developing human resource.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We study the natural problem of secure n-party computation (in the passive, computationally unbounded attack model) of the n-product function f G (x 1,...,x n ) = x 1 ·x 2 ⋯ x n in an arbitrary finite group (G,·), where the input of party P i is x i  ∈ G for i = 1,...,n. For flexibility, we are interested in protocols for f G which require only black-box access to the group G (i.e. the only computations performed by players in the protocol are a group operation, a group inverse, or sampling a uniformly random group element). Our results are as follows. First, on the negative side, we show that if (G,·) is non-abelian and n ≥ 4, then no ⌈n/2⌉-private protocol for computing f G exists. Second, on the positive side, we initiate an approach for construction of black-box protocols for f G based on k-of-k threshold secret sharing schemes, which are efficiently implementable over any black-box group G. We reduce the problem of constructing such protocols to a combinatorial colouring problem in planar graphs. We then give two constructions for such graph colourings. Our first colouring construction gives a protocol with optimal collusion resistance t < n/2, but has exponential communication complexity O(n*2t+1^2/t) group elements (this construction easily extends to general adversary structures). Our second probabilistic colouring construction gives a protocol with (close to optimal) collusion resistance t < n/μ for a graph-related constant μ ≤ 2.948, and has efficient communication complexity O(n*t^2) group elements. Furthermore, we believe that our results can be improved by further study of the associated combinatorial problems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We propose a reliable and ubiquitous group key distribution scheme that is suitable for ad hoc networks. The scheme has self-initialisation and self-securing features. The former feature allows a cooperation of an arbitrary number of nodes to initialise the system, and it also allows node admission to be performed in a decentralised fashion. The latter feature allows a group member to determine the group key remotely while maintaining the system security. We also consider a decentralised solution of establishing secure point-to-point communication. The solution allows a new node to establish a secure channel with every existing node if it has pre-existing secure channels with a threshold number of the existing nodes.