981 resultados para Non-words


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Nontuberculous mycobacteria are ubiquitous environmental organisms that have been recognised as a cause of pulmonary infection for over 50 years. Traditionally patients have had underlying risk factors for development of disease; however the proportion of apparently immunocompetent patients involved appears to be rising. Not all patients culture-positive for mycobacteria will have progressive disease, making the diagnosis difficult, though criteria to aid in this process are available. The two main forms of disease are cavitary disease (usually involving the upper lobes) and fibronodular bronchiectasis (predominantly middle and lingular lobes). For patients with disease, combination antibiotic therapy for 12-24 months is generally required for successful treatment, and this may be accompanied by drug intolerances and side effects. Published success rates range from 30-82%. As the progression of disease is variable, for some patients, attention to pulmonary hygiene and underlying diseases without immediate antimycobacterial therapy may be more appropriate. Surgery can be a useful adjunct, though is associated with risks. Randomised controlled trials in well described patients would provide stronger evidence-based data to guide therapy of NTM lung diseases, and thus are much needed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Thai written language is one of the languages that does not have word boundaries. In order to discover the meaning of the document, all texts must be separated into syllables, words, sentences, and paragraphs. This paper develops a novel method to segment the Thai text by combining a non-dictionary based technique with a dictionary-based technique. This method first applies the Thai language grammar rules to the text for identifying syllables. The hidden Markov model is then used for merging possible syllables into words. The identified words are verified with a lexical dictionary and a decision tree is employed to discover the words unidentified by the lexical dictionary. Documents used in the litigation process of Thai court proceedings have been used in experiments. The results which are segmented words, obtained by the proposed method outperform the results obtained by other existing methods.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The move to a market model of schooling has seen a radical restructuring of the ways schooling is “done” in recent times in Western countries. Although there has been a great deal of work to examine the effects of a market model on local school management (LSM), teachers’ work and university systems, relatively little has been done to examine its effect on parents’ choice of school in the non-government sector in Australia. This study examines the reasons parents give for choosing a non-government school in the outer suburbs of one large city in Australia. Drawing on the work of Bourdieu specifically his ideas on “cultural capital” (1977), this study revealed that parents were choosing the non-government school over the government school to ensure that their children would be provided, through the school’s emphasis on cultural capital, access to a perceived “better life” thus enhancing the potential to facilitate “extraordinary children”, one of the school’s marketing claims.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

While it is uncontested that the medical profession makes a valuable contribution to society, doctors should not always be beyond the reach of the criminal law and they should not automatically be treated as God. Doctors should act reasonably and be conscious of their position of trust. In this sense, the notion of “doctors” is construed broadly to include a range of health care professionals such as podiatrists, radiographers, surgeons and general practitioners. This paper will explore contemporary Australian examples where doctors have acted inappropriately and been convicted of non-fatal offences against the person. The physical invasiveness involved in these scenarios varies significantly. In one example, a doctor penetrates a patient’s private body part with a probe for their own sexual gratification, and in another, a doctor covertly visually records a naked patient. The examples will be connected to the theories underpinning criminalisation, particularly social welfare and individual autonomy, with a view to framing guidelines on when doctors should not be immune from non-fatal offences against a person, and thus where the criminal law should respond.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper proposes a method of enhancing system stability with a distribution static compensator (DSTATCOM) in an autonomous microgrid with multiple distributed generators (DG). It is assumed that there are both inertial and non-inertial DGs connected to the microgrid. The inertial DG can be a synchronous machine of smaller rating while inertia less DGs (solar) are assumed as DC sources. The inertia less DGs are connected through Voltage Source Converter (VSC) to the microgrid. The VSCs are controlled by either state feedback or current feedback mode to achieve desired voltage-current or power outputs respectively. The power sharing among the DGs is achieved by drooping voltage angle. Once the reference for the output voltage magnitude and angle is calculated from the droop, state feedback controllers are used to track the reference. The angle reference for the synchronous machine is compared with the output voltage angle of the machine and the error is fed to a PI controller. The controller output is used to set the power reference of the synchronous machine. The rate of change in the angle in a synchronous machine is restricted by the machine inertia and to mimic this nature, the rate of change in the VSCs angles are restricted by a derivative feedback in the droop control. The connected distribution static compensator (DSTATCOM) provides ride through capability during power imbalance in the microgrid, especially when the stored energy of the inertial DG is not sufficient to maintain stability. The inclusion of the DSATCOM in such cases ensures the system stability. The efficacies of the controllers are established through extensive simulation studies using PSCAD.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The increasing diversity of the Internet has created a vast number of multilingual resources on the Web. A huge number of these documents are written in various languages other than English. Consequently, the demand for searching in non-English languages is growing exponentially. It is desirable that a search engine can search for information over collections of documents in other languages. This research investigates the techniques for developing high-quality Chinese information retrieval systems. A distinctive feature of Chinese text is that a Chinese document is a sequence of Chinese characters with no space or boundary between Chinese words. This feature makes Chinese information retrieval more difficult since a retrieved document which contains the query term as a sequence of Chinese characters may not be really relevant to the query since the query term (as a sequence Chinese characters) may not be a valid Chinese word in that documents. On the other hand, a document that is actually relevant may not be retrieved because it does not contain the query sequence but contains other relevant words. In this research, we propose two approaches to deal with the problems. In the first approach, we propose a hybrid Chinese information retrieval model by incorporating word-based techniques with the traditional character-based techniques. The aim of this approach is to investigate the influence of Chinese segmentation on the performance of Chinese information retrieval. Two ranking methods are proposed to rank retrieved documents based on the relevancy to the query calculated by combining character-based ranking and word-based ranking. Our experimental results show that Chinese segmentation can improve the performance of Chinese information retrieval, but the improvement is not significant if it incorporates only Chinese segmentation with the traditional character-based approach. In the second approach, we propose a novel query expansion method which applies text mining techniques in order to find the most relevant words to extend the query. Unlike most existing query expansion methods, which generally select the highly frequent indexing terms from the retrieved documents to expand the query. In our approach, we utilize text mining techniques to find patterns from the retrieved documents that highly correlate with the query term and then use the relevant words in the patterns to expand the original query. This research project develops and implements a Chinese information retrieval system for evaluating the proposed approaches. There are two stages in the experiments. The first stage is to investigate if high accuracy segmentation can make an improvement to Chinese information retrieval. In the second stage, a text mining based query expansion approach is implemented and a further experiment has been done to compare its performance with the standard Rocchio approach with the proposed text mining based query expansion method. The NTCIR5 Chinese collections are used in the experiments. The experiment results show that by incorporating the text mining based query expansion with the hybrid model, significant improvement has been achieved in both precision and recall assessments.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Dragon is a word-based stream cipher. It was submitted to the eSTREAM project in 2005 and has advanced to Phase 3 of the software profile. This paper discusses the Dragon cipher from three perspectives: design, security analysis and implementation. The design of the cipher incorporates a single word-based non-linear feedback shift register and a non-linear filter function with memory. This state is initialized with 128- or 256-bit key-IV pairs. Each clock of the stream cipher produces 64 bits of keystream, using simple operations on 32-bit words. This provides the cipher with a high degree of efficiency in a wide variety of environments, making it highly competitive relative to other symmetric ciphers. The components of Dragon were designed to resist all known attacks. Although the design has been open to public scrutiny for several years, the only published attacks to date are distinguishing attacks which require keystream lengths greatly exceeding the stated 264 bit maximum permitted keystream length for a single key-IV pair.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This chapter seeks to develop an analysis of the contemporary use of the ePortfolio (Electronic Portfolio) in education practices. Unlike other explorations of this new technology which are deterministic in their approach, the authors seek to reveal the techniques and practices of government which underpin the implementation of the e-portfolio. By interrogating a specific case study example from a large Australian university’s preservice teacher program, the authors find that the e-portfolio is represented as eLearning technology but serves to govern students via autonomization and self responsibilization. Using policy data and other key documents, they are able to reveal the e-portfolio as a delegated authority in the governance of preservice teachers. However, despite this ongoing trend, they suggest that like other practices of government, the e-portfolio will eventually fail. This however the authors conclude opens up space for critical thought and engagement which is not afforded presently.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The requirements that an insured disclose all facts material to a transaction as well as not misrepresent material facts in the formation of an insurance contract are universal requirements of insurance law. The nature and extent of these obligations varies from one jurisdiction to the next. Disclosure in the insurance context is distinct from the general approach in commercial contracts, and in others between persons dealing at arm's length. It is the purpose of this article therefore to examine, on a comparative basis, the approaches adopted in the Anglo-Commonwealth context of England, Australia New Zealand and Singapore to the resolution of disclose issues in the formation of insurance contracts. Particular attention is focused on the Insurance Contracts Act 1984 (Australia) as this statue effects the most significant overhaul of the common law and the National Consumer Council in the United Kingdom has advocated that similar reforms be adopted.