913 resultados para coded character set


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Multiple sclerosis (MS) is a serious cause of neurological disability among young adults. The clinical course remains difficult to predict, and the pathogenesis of the disease is still modestly understood. Autoimmunity is thought to be a key aspect of the disease, with autoreactive T cells thought to mediate central nervous system (CNS) inflammation to some extent. Toll-like receptors are known to mediate cellular recognition of pathogens by way of patterns of molecular presentation. Toll-like receptor 3 is coded by the gene TLR3 and is recognized as an important factor in virus recognition and is known to be involved in the expression of neuroprotective mediators. We set out to investigate two variations within the TLR3 gene, an 8 bp insertion-deletion \[-/A](8) and a single base-pair variation C1236T, in subjects with MS and matched healthy controls to determine whether significant differences exist in these markers in an Australian population. We used capillary gel electrophoresis and TaqMan genotyping assay techniques to resolve genotypes for each marker, respectively. Our work found no significant difference between frequencies for TLR3 \[-/A](8) by genotype (chi(2)=1.03, p=0.60) or allele (chi(2)=1.09, p=0.30). Similarly, we found no evidence for the association of TLR3 C1236T by genotype (chi(2)=0.35, p=0.84) or allele frequency (chi(2)=0.31, p=0.58). This work reveals no evidence to suggest that these markers are associated with MS in the tested population. Although the role of TLR3 and the wider toll-like receptor family remain significant in neurological and CNS inflammatory disorders, our current work does not support a role for the two tested variants in this gene with regard to MS susceptibility.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The question as to whether poser race affects the happy categorization advantage, the faster categorization of happy than of negative emotional expressions, has been answered inconsistently. Hugenberg (2005) found the happy categorization advantage only for own race faces whereas faster categorization of angry expressions was evident for other race faces. Kubota and Ito (2007) found a happy categorization advantage for both own race and other race faces. These results have vastly different implications for understanding the influence of race cues on the processing of emotional expressions. The current study replicates the results of both prior studies and indicates that face type (computer-generated vs. photographic), presentation duration, and especially stimulus set size influence the happy categorization advantage as well as the moderating effect of poser race.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study considers the challenges in representing women from other cultures in the crime fiction genre. The study is presented in two parts; an exegesis and a creative practice component consisting of a full length crime fiction novel, Batafurai. The exegesis examines the historical period of a section of the novel—post-war Japan—and how the area of research known as Occupation Studies provides an insight into the conditions of women during this period. The exegesis also examines selected postcolonial theory and its exposition of representations of the 'other' as a western construct designed to serve Eurocentric ends. The genre of crime fiction is reviewed, also, to determine how characters purportedly representing Oriental cultures are constricted by established stereotypes. Two case studies are examined to investigate whether these stereotypes are still apparent in contemporary Australian crime fiction. Finally, I discuss my own novel, Batafurai, to review how I represented people of Asian background, and whether my attempts to resist stereotype were successful. My conclusion illustrates how novels written in the crime fiction genre are reliant on strategies that are action-focused, rather than character-based, and thus often use easily recognizable types to quickly establish frameworks for their stories. As a sub-set of popular fiction, crime fiction has a tendency to replicate rather than challenge established stereotypes. Where it does challenge stereotypes, it reflects a territory that popular culture has already visited, such as the 'female', 'black' or 'gay' detective. Crime fiction also has, as one of its central concerns, an interest in examining and reinforcing the notion of societal order. It repeatedly demonstrates that crime either does not pay or should not pay. One of the ways it does this is to contrast what is 'good', known and understood with what is 'bad', unknown, foreign or beyond our normal comprehension. In western culture, the east has traditionally been employed as the site of difference, and has been constantly used as a setting of contrast, excitement or fear. Crime fiction conforms to this pattern, using the east to add a richness and depth to what otherwise might become a 'dry' tale. However, when used in such a way, what is variously eastern, 'other' or Oriental can never be paramount, always falling to secondary side of the binary opposites (good/evil, known/unknown, redeemed/doomed) at work. In an age of globalisation, the challenge for contemporary writers of popular fiction is to be responsive to an audience that demands respect for all cultures. Writers must demonstrate that they are sensitive to such concerns and can skillfully manage the tensions caused by the need to deliver work that operates within the parameters of the genre, and the desire to avoid offence to any cultural or ethnic group. In my work, my strategy to manage these tensions has been to create a back-story for my characters of Asian background, developing them above mere genre types, and to situate them with credibility in time and place through appropriate historical research.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Consensual stereotypes of some groups are relatively accurate, whereas others are not. Previous work suggesting that national character stereotypes are inaccurate has been criticized on several grounds. In this article we (a) provide arguments for the validity of assessed national mean trait levels as criteria for evaluating stereotype accuracy and (b) report new data on national character in 26 cultures from descriptions (N= 3323) of the typical male or female adolescent, adult, or old person in each. The average ratings were internally consistent and converged with independent stereotypes of the typical culture member, but were weakly related to objective assessments of personality. We argue that this conclusion is consistent with the broader literature on the inaccuracy of national character stereotypes

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Invited – and inspired – by Rikki Gunn of GhostNets Australia, in September 2008 sixteen Queensland University of Technology (QUT) design and engineering students and four staff set off on a 2488km journey to spend a fortnight in Karumba on the Gulf of Carpentaria. We went to undertake a strategic planning project we called Linking Karumba, to encourage social, economic, environmental and cultural linkages across the town. During this visit, we and our local project partners realised there should be a second half to the project, in the other Carpentaria Shire town of Normanton, which saw another group of us travelling north again in 2010 to undertake Get EnGulfed: Normanton2020, looking back and forwards to propose strategies to strengthen local and regional identities. The responsiveness of our students’ work to the character of Carpentarian culture and environment indicate remarkable levels of immersion, and the community expressed their enjoyment of the process and outcomes. As for us - QUT staff and students - we had a marvellous time doing these projects, and this little book is the story of our finding of the landscapes and communities of Carpentaria “where the outback meets the sea”, and of the project work we did together with locals in the two towns. We go to press as news arrives of the official opening of the Karumba Walking track, linking the two parts of the town. We can’t wait to return and make the walk. Shannon Satherley, 2013

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the latter half of the nineteenth century the railway became an emblem of technological advancement, stood for the improvement and progression of European life, and became a recognizable symbol for the achievements of governments and citizens. The implementation and use of the railway became closely linked with notions of national identity and character. The railway became an identifiable artefact in official history but at the same time it became a part of everyday life. Richard Flanagan’s Gould’s Book of Fish retells the life-story of a fictionalized convict sent to Sarah Island and who paints fish, eventually he metamorphoses into one. It could be thought that a novel set in convict times would have little to do with notions of national identity, technological advancement, and railway travel. However, Richard Flanagan, in this very complex, almost surreal, novel, has used the construction of a fictional national railway as one of the ways to explore Australia's complex relationship with history and space. The novel tells of the plans of a history-loving Commandant and his desire to build a national railway on Sarah Island. This paper explores how Sarah Island becomes a metonym for Australia as a whole and Flanagan's novel takes on a metaphysical dimension as he reveals the struggles that emerge when official history collides with non-official versions. The fabulations of the novel contribute to an historical reconstruction of the spatial/architectural history of the Tasmanian colonial project.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Textual document set has become an important and rapidly growing information source in the web. Text classification is one of the crucial technologies for information organisation and management. Text classification has become more and more important and attracted wide attention of researchers from different research fields. In this paper, many feature selection methods, the implement algorithms and applications of text classification are introduced firstly. However, because there are much noise in the knowledge extracted by current data-mining techniques for text classification, it leads to much uncertainty in the process of text classification which is produced from both the knowledge extraction and knowledge usage, therefore, more innovative techniques and methods are needed to improve the performance of text classification. It has been a critical step with great challenge to further improve the process of knowledge extraction and effectively utilization of the extracted knowledge. Rough Set decision making approach is proposed to use Rough Set decision techniques to more precisely classify the textual documents which are difficult to separate by the classic text classification methods. The purpose of this paper is to give an overview of existing text classification technologies, to demonstrate the Rough Set concepts and the decision making approach based on Rough Set theory for building more reliable and effective text classification framework with higher precision, to set up an innovative evaluation metric named CEI which is very effective for the performance assessment of the similar research, and to propose a promising research direction for addressing the challenging problems in text classification, text mining and other relative fields.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In Thomas Mann’s tetralogy of the 1930s and 1940s, Joseph and His Brothers, the narrator declares history is not only “that which has happened and that which goes on happening in time,” but it is also “the stratified record upon which we set our feet, the ground beneath us.” By opening up history to its spatial, geographical, and geological dimensions Mann both predicts and encapsulates the twentieth-century’s “spatial turn,” a critical shift that divested geography of its largely passive role as history’s “stage” and brought to the fore intersections between the humanities and the earth sciences. In this paper, I draw out the relationships between history, narrative, geography, and geology revealed by this spatial turn and the questions these pose for thinking about the disciplinary relationship between geography and the humanities. As Mann’s statement exemplifies, the spatial turn itself has often been captured most strikingly in fiction, and I would argue nowhere more so than in Graham Swift’s Waterland (1983) and Anne Michaels’s Fugitive Pieces (1996), both of which present space, place, and landscape as having a palpable influence on history and memory. The geographical/geological line that runs through both Waterland and Fugitive Pieces continues through Tim Robinson’s non-fictional, two-volume “topographical” history Stones of Aran. Robinson’s Stones of Aran—which is not history, not geography, and not literature, and yet is all three—constructs an imaginative geography that renders inseparable geography, geology, history, memory, and the act of writing.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present an approach to automatically de-identify health records. In our approach, personal health information is identified using a Conditional Random Fields machine learning classifier, a large set of linguistic and lexical features, and pattern matching techniques. Identified personal information is then removed from the reports. The de-identification of personal health information is fundamental for the sharing and secondary use of electronic health records, for example for data mining and disease monitoring. The effectiveness of our approach is first evaluated on the 2007 i2b2 Shared Task dataset, a widely adopted dataset for evaluating de-identification techniques. Subsequently, we investigate the robustness of the approach to limited training data; we study its effectiveness on different type and quality of data by evaluating the approach on scanned pathology reports from an Australian institution. This data contains optical character recognition errors, as well as linguistic conventions that differ from those contained in the i2b2 dataset, for example different date formats. The findings suggest that our approach compares to the best approach from the 2007 i2b2 Shared Task; in addition, the approach is found to be robust to variations of training size, data type and quality in presence of sufficient training data.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Numeric set watermarking is a way to provide ownership proof for numerical data. Numerical data can be considered to be primitives for multimedia types such as images and videos since they are organized forms of numeric information. Thereby, the capability to watermark numerical data directly implies the capability to watermark multimedia objects and discourage information theft on social networking sites and the Internet in general. Unfortunately, there has been very limited research done in the field of numeric set watermarking due to underlying limitations in terms of number of items in the set and LSBs in each item available for watermarking. In 2009, Gupta et al. proposed a numeric set watermarking model that embeds watermark bits in the items of the set based on a hash value of the items’ most significant bits (MSBs). If an item is chosen for watermarking, a watermark bit is embedded in the least significant bits, and the replaced bit is inserted in the fractional value to provide reversibility. The authors show their scheme to be resilient against the traditional subset addition, deletion, and modification attacks as well as secondary watermarking attacks. In this paper, we present a bucket attack on this watermarking model. The attack consists of creating buckets of items with the same MSBs and determine if the items of the bucket carry watermark bits. Experimental results show that the bucket attack is very strong and destroys the entire watermark with close to 100% success rate. We examine the inherent weaknesses in the watermarking model of Gupta et al. that leave it vulnerable to the bucket attack and propose potential safeguards that can provide resilience against this attack.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Motivated by the need of private set operations in a distributed environment, we extend the two-party private matching problem proposed by Freedman, Nissim and Pinkas (FNP) at Eurocrypt’04 to the distributed setting. By using a secret sharing scheme, we provide a distributed solution of the FNP private matching called the distributed private matching. In our distributed private matching scheme, we use a polynomial to represent one party’s dataset as in FNP and then distribute the polynomial to multiple servers. We extend our solution to the distributed set intersection and the cardinality of the intersection, and further we show how to apply the distributed private matching in order to compute distributed subset relation. Our work extends the primitives of private matching and set intersection by Freedman et al. Our distributed construction might be of great value when the dataset is outsourced and its privacy is the main concern. In such cases, our distributed solutions keep the utility of those set operations while the dataset privacy is not compromised. Comparing with previous works, we achieve a more efficient solution in terms of computation. All protocols constructed in this paper are provably secure against a semi-honest adversary under the Decisional Diffie-Hellman assumption.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose – This paper aims to examine the tendencies of sustainability reporting by major commercial banks in Bangladesh in comparison with global sustainability reporting indicators outlined in the GRI framework together with banks' predilection toward reporting 16 GRI financial service sector (FSS) specific performance indicators. Design/methodology/approach – Based on the GRI G3 guidelines, the paper investigated banks' reporting in five broad areas of sustainability, such as environment, labour practices and decent works, product responsibility, human rights and society. The 2008/2009 annual reports of 12 major commercial banks listed on Dhaka stock exchange were analysed and coded using a content-based technique. Findings – The results show that information on society is addressed most extensively with regard to extent of reporting. This is followed by the disclosures prepared on decent works and labour practices and environmental issues. Furthermore, the disclosures of product responsibility information and the information for human rights are rather scarce in banks' reporting; on the subject of FSS-specific disclosures, only seven items out of 16 are disclosed by all sample banks. Research limitations/implications – The findings of the study indicate that Bangladeshi commercial banks' social disclosures could develop in this style to become more holistic and over time (in association with the country's central bank involvement) to resemble a type of structured reporting to the point where they are properly labelled per se. Originality/value – The study contributes to the social disclosure literature, in particular in a developing countries banking sector context, seeing as it disseminates evidence of the standing on social disclosures practices at the level of GRI with developing countries' banks data.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper proposes a method for designing set-point regulation controllers for a class of underactuated mechanical systems in Port-Hamiltonian System (PHS) form. A new set of potential shape variables in closed loop is proposed, which can replace the set of open loop shape variables-the configuration variables that appear in the kinetic energy. With this choice, the closed-loop potential energy contains free functions of the new variables. By expressing the regulation objective in terms of these new potential shape variables, the desired equilibrium can be assigned and there is freedom to reshape the potential energy to achieve performance whilst maintaining the PHS form in closed loop. This complements contemporary results in the literature, which preserve the open-loop shape variables. As a case study, we consider a robotic manipulator mounted on a flexible base and compensate for the motion of the base while positioning the end effector with respect to the ground reference. We compare the proposed control strategy with special cases that correspond to other energy shaping strategies previously proposed in the literature.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background Flavonoids such as anthocyanins, flavonols and proanthocyanidins, play a central role in fruit colour, flavour and health attributes. In peach and nectarine (Prunus persica) these compounds vary during fruit growth and ripening. Flavonoids are produced by a well studied pathway which is transcriptionally regulated by members of the MYB and bHLH transcription factor families. We have isolated nectarine flavonoid regulating genes and examined their expression patterns, which suggests a critical role in the regulation of flavonoid biosynthesis. Results In nectarine, expression of the genes encoding enzymes of the flavonoid pathway correlated with the concentration of proanthocyanidins, which strongly increases at mid-development. In contrast, the only gene which showed a similar pattern to anthocyanin concentration was UDP-glucose-flavonoid-3-O-glucosyltransferase (UFGT), which was high at the beginning and end of fruit growth, remaining low during the other developmental stages. Expression of flavonol synthase (FLS1) correlated with flavonol levels, both temporally and in a tissue specific manner. The pattern of UFGT gene expression may be explained by the involvement of different transcription factors, which up-regulate flavonoid biosynthesis (MYB10, MYB123, and bHLH3), or repress (MYB111 and MYB16) the transcription of the biosynthetic genes. The expression of a potential proanthocyanidin-regulating transcription factor, MYBPA1, corresponded with proanthocyanidin levels. Functional assays of these transcription factors were used to test the specificity for flavonoid regulation. Conclusions MYB10 positively regulates the promoters of UFGT and dihydroflavonol 4-reductase (DFR) but not leucoanthocyanidin reductase (LAR). In contrast, MYBPA1 trans-activates the promoters of DFR and LAR, but not UFGT. This suggests exclusive roles of anthocyanin regulation by MYB10 and proanthocyanidin regulation by MYBPA1. Further, these transcription factors appeared to be responsive to both developmental and environmental stimuli.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background The genetic regulation of flower color has been widely studied, notably as a character used by Mendel and his predecessors in the study of inheritance in pea. Methodology/Principal Findings We used the genome sequence of model legumes, together with their known synteny to the pea genome to identify candidate genes for the A and A2 loci in pea. We then used a combination of genetic mapping, fast neutron mutant analysis, allelic diversity, transcript quantification and transient expression complementation studies to confirm the identity of the candidates. Conclusions/Significance We have identified the pea genes A and A2. A is the factor determining anthocyanin pigmentation in pea that was used by Gregor Mendel 150 years ago in his study of inheritance. The A gene encodes a bHLH transcription factor. The white flowered mutant allele most likely used by Mendel is a simple G to A transition in a splice donor site that leads to a mis-spliced mRNA with a premature stop codon, and we have identified a second rare mutant allele. The A2 gene encodes a WD40 protein that is part of an evolutionarily conserved regulatory complex.