991 resultados para systematies Taxonomy. Distribution.


Relevância:

20.00% 20.00%

Publicador:

Resumo:

A new Expiratory Droplet Investigation System (EDIS) was used to conduct the most comprehensive program of study to date, of the dilution corrected droplet size distributions produced during different respiratory activities.----- Distinct physiological processes were responsible for specific size distribution modes. The majority of particles for all activities were produced in one or more modes, with diameters below 0.8 µm. That mode occurred during all respiratory activities, including normal breathing. A second mode at 1.8 µm was produced during all activities, but at lower concentrations.----- Speech produced particles in modes near 3.5 µm and 5 µm. The modes became most pronounced during continuous vocalization, suggesting that the aerosolization of secretions lubricating the vocal chords is a major source of droplets in terms of number.----- Non-eqilibrium droplet evaporation was not detectable for particles between 0.5 and 20 μm implying that evaporation to the equilibrium droplet size occurred within 0.8 s.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Search engines have forever changed the way people access and discover knowledge, allowing information about almost any subject to be quickly and easily retrieved within seconds. As increasingly more material becomes available electronically the influence of search engines on our lives will continue to grow. This presents the problem of how to find what information is contained in each search engine, what bias a search engine may have, and how to select the best search engine for a particular information need. This research introduces a new method, search engine content analysis, in order to solve the above problem. Search engine content analysis is a new development of traditional information retrieval field called collection selection, which deals with general information repositories. Current research in collection selection relies on full access to the collection or estimations of the size of the collections. Also collection descriptions are often represented as term occurrence statistics. An automatic ontology learning method is developed for the search engine content analysis, which trains an ontology with world knowledge of hundreds of different subjects in a multilevel taxonomy. This ontology is then mined to find important classification rules, and these rules are used to perform an extensive analysis of the content of the largest general purpose Internet search engines in use today. Instead of representing collections as a set of terms, which commonly occurs in collection selection, they are represented as a set of subjects, leading to a more robust representation of information and a decrease of synonymy. The ontology based method was compared with ReDDE (Relevant Document Distribution Estimation method for resource selection) using the standard R-value metric, with encouraging results. ReDDE is the current state of the art collection selection method which relies on collection size estimation. The method was also used to analyse the content of the most popular search engines in use today, including Google and Yahoo. In addition several specialist search engines such as Pubmed and the U.S. Department of Agriculture were analysed. In conclusion, this research shows that the ontology based method mitigates the need for collection size estimation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Quantitative behaviour analysis requires the classification of behaviour to produce the basic data. In practice, much of this work will be performed by multiple observers, and maximising inter-observer consistency is of particular importance. Another discipline where consistency in classification is vital is biological taxonomy. A classification tool of great utility, the binary key, is designed to simplify the classification decision process and ensure consistent identification of proper categories. We show how this same decision-making tool - the binary key - can be used to promote consistency in the classification of behaviour. The construction of a binary key also ensures that the categories in which behaviour is classified are complete and non-overlapping. We discuss the general principles of design of binary keys, and illustrate their construction and use with a practical example from education research.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This review outlines current international patterns in prostate cancer incidence and mortality rates and survival, including recent trends and a discussion of the possible impact of prostate-specific antigen (PSA) testing on the observed data. Internationally, prostate cancer is the second most common cancer diagnosed among men (behind lung cancer), and is the sixth most common cause of cancer death among men. Prostate cancer is particularly prevalent in developed countries such as the United States and the Scandinavian countries, with about a six-fold difference between high-incidence and low-incidence countries. Interpretation of trends in incidence and survival are complicated by the increasing impact of PSA testing, particularly in more developed countries. As Western influences become more pronounced in less developed countries, prostate cancer incidence rates in those countries are tending to increase, even though the prevalence of PSA testing is relatively low. Larger proportions of younger men are being diagnosed with prostate cancer and living longer following diagnosis of prostate cancer, which has many implications for health systems. Decreasing mortality rates are becoming widespread among more developed countries, although it is not clear whether this is due to earlier diagnosis (PSA testing), improved treatment, or some combination of these or other factors.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper reports the initial steps of research on planning of rural networks for MV and LV. In this paper, two different cases are studied. In the first case, 100 loads are distributed uniformly on a 100 km transmission line in a distribution network and in the second case, the load structure become closer to the rural situation. In case 2, 21 loads are located in a distribution system so that their distance is increasing, distance between load 1 and 2 is 3 km, between 2 and 3 is 6 km, etc). These two models to some extent represent the distribution system in urban and rural areas, respectively. The objective function for the design of the optimal system consists of three main parts: cost of transformers, and MV and LV conductors. The bus voltage is expressed as a constraint and should be maintained within a standard level, rising or falling by no more than 5%.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Thirty-five clients who had received counselling completed a letter to a friend describing in as much detail as possible what they had learned from counselling. The participants' written responses were analysed and classified using the Structure of Learning Outcomes (SOLO) taxonomy. The results suggested that an expanded SOLO offers a promising and exciting way to view the outcomes of counselling within a learning framework. If the SOLO taxonomy is found to be stable in subsequent research, and clients are easily able to be classified using the taxonomy, then this approach may have implications for the process of counselling. To maximise the learning outcomes, counsellors could use strategies and techniques to enhance their clients' learning.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructures. It can provide long-term confidentiality for encrypted information without reliance on computational assumptions. Although QKD still requires authentication to prevent man-in-the-middle attacks, it can make use of either information-theoretically secure symmetric key authentication or computationally secure public key authentication: even when using public key authentication, we argue that QKD still offers stronger security than classical key agreement.