Mobile crowd sensing for traffic prediction in internet of vehicles
- Wan, Jiafu, Liu, Jianqi, Shao, Zehui, Vasilakos, Athanasios, Imran, Muhammad, Zhou, Keliang
- Authors: Wan, Jiafu , Liu, Jianqi , Shao, Zehui , Vasilakos, Athanasios , Imran, Muhammad , Zhou, Keliang
- Date: 2016
- Type: Text , Journal article
- Relation: Sensors (Switzerland) Vol. 16, no. 1 (2016), p.
- Full Text:
- Reviewed:
- Description: The advances in wireless communication techniques, mobile cloud computing, automotive and intelligent terminal technology are driving the evolution of vehicle ad hoc networks into the Internet of Vehicles (IoV) paradigm. This leads to a change in the vehicle routing problem from a calculation based on static data towards real-time traffic prediction. In this paper, we first address the taxonomy of cloud-assisted IoV from the viewpoint of the service relationship between cloud computing and IoV. Then, we review the traditional traffic prediction approached used by both Vehicle to Infrastructure (V2I) and Vehicle to Vehicle (V2V) communications. On this basis, we propose a mobile crowd sensing technology to support the creation of dynamic route choices for drivers wishing to avoid congestion. Experiments were carried out to verify the proposed approaches. Finally, we discuss the outlook of reliable traffic prediction. © 2016 by the authors, licensee MDPI, Basel, Switzerland.
- Authors: Wan, Jiafu , Liu, Jianqi , Shao, Zehui , Vasilakos, Athanasios , Imran, Muhammad , Zhou, Keliang
- Date: 2016
- Type: Text , Journal article
- Relation: Sensors (Switzerland) Vol. 16, no. 1 (2016), p.
- Full Text:
- Reviewed:
- Description: The advances in wireless communication techniques, mobile cloud computing, automotive and intelligent terminal technology are driving the evolution of vehicle ad hoc networks into the Internet of Vehicles (IoV) paradigm. This leads to a change in the vehicle routing problem from a calculation based on static data towards real-time traffic prediction. In this paper, we first address the taxonomy of cloud-assisted IoV from the viewpoint of the service relationship between cloud computing and IoV. Then, we review the traditional traffic prediction approached used by both Vehicle to Infrastructure (V2I) and Vehicle to Vehicle (V2V) communications. On this basis, we propose a mobile crowd sensing technology to support the creation of dynamic route choices for drivers wishing to avoid congestion. Experiments were carried out to verify the proposed approaches. Finally, we discuss the outlook of reliable traffic prediction. © 2016 by the authors, licensee MDPI, Basel, Switzerland.
Modeling induction and routing to monitor hospitalized patients in multi-hop mobility-aware body area sensor networks
- Javaid, Nadeem, Ahmad, Ashfaq, Tauqir, Anum, Imran, Muhammad, Guizani, Mohsen, Khan, Zahoor, Qasim, Umar
- Authors: Javaid, Nadeem , Ahmad, Ashfaq , Tauqir, Anum , Imran, Muhammad , Guizani, Mohsen , Khan, Zahoor , Qasim, Umar
- Date: 2016
- Type: Text , Journal article
- Relation: Eurasip Journal on Wireless Communications and Networking Vol. 2016, no. 1 (2016), p.
- Full Text:
- Reviewed:
- Description: In wireless body area sensor networks (WBASNs), energy efficiency is an area of extreme significance. At first, we present a mathematical model for a non-invasive inductive link which is used to recharge the battery of an implanted biomedical device (pacemaker). Afterwards, we propose a distance-aware relaying energy-efficient (DARE) and mutual information-based DARE (MI-DARE) routing protocols for multihop mobility-aware body area sensor networks (MM-BASNs). Both the routing protocols and the non-invasive inductive link model are tested with the consideration of eight patients in a hospital unit under different topologies, where the vital signs of each patient are monitored through seven on-body sensors and an implanted pacemaker. To reduce energy consumption of the network, the sensors communicate with a sink via an on-body relay which is fixed on the chest of each patient. The behavior (static/mobile) and position of the sink are changed in each topology, and the impact of mobility due to postural changes of the patient(s) arms, legs, and head is also investigated. The MI-DARE protocol further prolongs the network lifetime by minimizing the number of transmissions. Simulation results show that the proposed techniques outperform contemporary schemes in terms of the selected performance metrics. © 2016, Javaid et al.
- Authors: Javaid, Nadeem , Ahmad, Ashfaq , Tauqir, Anum , Imran, Muhammad , Guizani, Mohsen , Khan, Zahoor , Qasim, Umar
- Date: 2016
- Type: Text , Journal article
- Relation: Eurasip Journal on Wireless Communications and Networking Vol. 2016, no. 1 (2016), p.
- Full Text:
- Reviewed:
- Description: In wireless body area sensor networks (WBASNs), energy efficiency is an area of extreme significance. At first, we present a mathematical model for a non-invasive inductive link which is used to recharge the battery of an implanted biomedical device (pacemaker). Afterwards, we propose a distance-aware relaying energy-efficient (DARE) and mutual information-based DARE (MI-DARE) routing protocols for multihop mobility-aware body area sensor networks (MM-BASNs). Both the routing protocols and the non-invasive inductive link model are tested with the consideration of eight patients in a hospital unit under different topologies, where the vital signs of each patient are monitored through seven on-body sensors and an implanted pacemaker. To reduce energy consumption of the network, the sensors communicate with a sink via an on-body relay which is fixed on the chest of each patient. The behavior (static/mobile) and position of the sink are changed in each topology, and the impact of mobility due to postural changes of the patient(s) arms, legs, and head is also investigated. The MI-DARE protocol further prolongs the network lifetime by minimizing the number of transmissions. Simulation results show that the proposed techniques outperform contemporary schemes in terms of the selected performance metrics. © 2016, Javaid et al.
Molecular dynamics studies on the buffalo prion protein
- Zhang, Jiapu, Wang, Feng, Chatterjee, Subhojyoti
- Authors: Zhang, Jiapu , Wang, Feng , Chatterjee, Subhojyoti
- Date: 2016
- Type: Text , Journal article
- Relation: Journal of Biomolecular Structure and Dynamics Vol. 34, no. 4 (2016), p. 762-777
- Full Text:
- Reviewed:
- Description: It was reported that buffalo is a low susceptibility species resisting to transmissible spongiform encephalopathies (TSEs) (same as rabbits, horses, and dogs). TSEs, also called prion diseases, are invariably fatal and highly infectious neurodegenerative diseases that affect a wide variety of species (except for rabbits, dogs, horses, and buffalo), manifesting as scrapie in sheep and goats; bovine spongiform encephalopathy (BSE or "mad-cow" disease) in cattle; chronic wasting disease in deer and elk; and Creutzfeldt-Jakob diseases, Gerstmann-Straüssler-Scheinker syndrome, fatal familial insomnia, and Kulu in humans etc. In molecular structures, these neurodegenerative diseases are caused by the conversion from a soluble normal cellular prion protein (PrPC), predominantly with α-helices, into insoluble abnormally folded infectious prions (PrPSc), rich in β-sheets. In this article, we studied the molecular structure and structural dynamics of buffalo PrPC (BufPrPC), in order to understand the reason why buffalo is resistant to prion diseases. We first did molecular modeling of a homology structure constructed by one mutation at residue 143 from the NMR structure of bovine and cattle PrP(124-227); immediately we found that for BufPrPC(124-227), there are five hydrogen bonds (HBs) at Asn143, but at this position, bovine/cattle do not have such HBs. Same as that of rabbits, dogs, or horses, our molecular dynamics studies also revealed there is a strong salt bridge (SB) ASP178-ARG164 (O-N) keeping the β2-α2 loop linked in buffalo. We also found there is a very strong HB SER170-TYR218 linking this loop with the C-terminal end of α-helix H3. Other information, such as (i) there is a very strong SB HIS187-ARG156 (N-O) linking α-helices H2 and H1 (if mutation H187R is made at position 187, then the hydrophobic core of PrPC will be exposed (L.H. Zhong (2010). Exposure of hydrophobic core in human prion protein pathogenic mutant H187R. Journal of Biomolecular Structure and Dynamics 28(3), 355-361)), (ii) at D178, there is a HB Y169-D178 and a polar contact R164-D178 for BufPrPC instead of a polar contact Q168-D178 for bovine PrPC (C.J. Cheng, & V. Daggett. (2014). Molecular dynamics simulations capture the misfolding of the bovine prion protein at acidic pH. Biomolecules 4(1), 181-201), (iii) BufPrPC owns three 310 helices at 125-127, 152-156, and in the β2-α2 loop, respectively, and (iv) in the β2-α2 loop, there is a strong π-π stacking and a strong π-cation F175-Y169-R164.(N)NH2, has been discovered. © 2015 Taylor and Francis.
- Authors: Zhang, Jiapu , Wang, Feng , Chatterjee, Subhojyoti
- Date: 2016
- Type: Text , Journal article
- Relation: Journal of Biomolecular Structure and Dynamics Vol. 34, no. 4 (2016), p. 762-777
- Full Text:
- Reviewed:
- Description: It was reported that buffalo is a low susceptibility species resisting to transmissible spongiform encephalopathies (TSEs) (same as rabbits, horses, and dogs). TSEs, also called prion diseases, are invariably fatal and highly infectious neurodegenerative diseases that affect a wide variety of species (except for rabbits, dogs, horses, and buffalo), manifesting as scrapie in sheep and goats; bovine spongiform encephalopathy (BSE or "mad-cow" disease) in cattle; chronic wasting disease in deer and elk; and Creutzfeldt-Jakob diseases, Gerstmann-Straüssler-Scheinker syndrome, fatal familial insomnia, and Kulu in humans etc. In molecular structures, these neurodegenerative diseases are caused by the conversion from a soluble normal cellular prion protein (PrPC), predominantly with α-helices, into insoluble abnormally folded infectious prions (PrPSc), rich in β-sheets. In this article, we studied the molecular structure and structural dynamics of buffalo PrPC (BufPrPC), in order to understand the reason why buffalo is resistant to prion diseases. We first did molecular modeling of a homology structure constructed by one mutation at residue 143 from the NMR structure of bovine and cattle PrP(124-227); immediately we found that for BufPrPC(124-227), there are five hydrogen bonds (HBs) at Asn143, but at this position, bovine/cattle do not have such HBs. Same as that of rabbits, dogs, or horses, our molecular dynamics studies also revealed there is a strong salt bridge (SB) ASP178-ARG164 (O-N) keeping the β2-α2 loop linked in buffalo. We also found there is a very strong HB SER170-TYR218 linking this loop with the C-terminal end of α-helix H3. Other information, such as (i) there is a very strong SB HIS187-ARG156 (N-O) linking α-helices H2 and H1 (if mutation H187R is made at position 187, then the hydrophobic core of PrPC will be exposed (L.H. Zhong (2010). Exposure of hydrophobic core in human prion protein pathogenic mutant H187R. Journal of Biomolecular Structure and Dynamics 28(3), 355-361)), (ii) at D178, there is a HB Y169-D178 and a polar contact R164-D178 for BufPrPC instead of a polar contact Q168-D178 for bovine PrPC (C.J. Cheng, & V. Daggett. (2014). Molecular dynamics simulations capture the misfolding of the bovine prion protein at acidic pH. Biomolecules 4(1), 181-201), (iii) BufPrPC owns three 310 helices at 125-127, 152-156, and in the β2-α2 loop, respectively, and (iv) in the β2-α2 loop, there is a strong π-π stacking and a strong π-cation F175-Y169-R164.(N)NH2, has been discovered. © 2015 Taylor and Francis.
Monotreme glucagon-like peptide-1 in venom and gut : One gene - Two very different functions
- Tsend-Ayush, Enkhjargal, He, Chuan, Myers, Mark, Andrikopoulos, Sof, Wong, Nicole, Sexton, Patrick, Wootten, Denise, Forbes, Briony, Grutzner, Frank
- Authors: Tsend-Ayush, Enkhjargal , He, Chuan , Myers, Mark , Andrikopoulos, Sof , Wong, Nicole , Sexton, Patrick , Wootten, Denise , Forbes, Briony , Grutzner, Frank
- Date: 2016
- Type: Text , Journal article
- Relation: Scientific Reports Vol. 6, no. (2016), p. 1-12
- Full Text:
- Reviewed:
- Description: The importance of Glucagon like peptide 1 (GLP-1) for metabolic control and insulin release sparked the evolution of genes mimicking GLP-1 action in venomous species (e.g. Exendin-4 in Heloderma suspectum (gila monster)). We discovered that platypus and echidna express a single GLP-1 peptide in both intestine and venom. Specific changes in GLP-1 of monotreme mammals result in resistance to DPP-4 cleavage which is also observed in the GLP-1 like Exendin-4 expressed in Heloderma venom. Remarkably we discovered that monotremes evolved an alternative mechanism to degrade GLP-1. We also show that monotreme GLP-1 stimulates insulin release in cultured rodent islets, but surprisingly shows low receptor affinity and bias toward Erk signaling. We propose that these changes in monotreme GLP-1 are the result of conflicting function of this peptide in metabolic control and venom. This evolutionary path is fundamentally different from the generally accepted idea that conflicting functions in a single gene favour duplication and diversification, as is the case for Exendin-4 in gila monster. This provides novel insight into the remarkably different metabolic control mechanism and venom function in monotremes and an unique example of how different selective pressures act upon a single gene in the absence of gene duplication. © The Author(s) 2016.
- Authors: Tsend-Ayush, Enkhjargal , He, Chuan , Myers, Mark , Andrikopoulos, Sof , Wong, Nicole , Sexton, Patrick , Wootten, Denise , Forbes, Briony , Grutzner, Frank
- Date: 2016
- Type: Text , Journal article
- Relation: Scientific Reports Vol. 6, no. (2016), p. 1-12
- Full Text:
- Reviewed:
- Description: The importance of Glucagon like peptide 1 (GLP-1) for metabolic control and insulin release sparked the evolution of genes mimicking GLP-1 action in venomous species (e.g. Exendin-4 in Heloderma suspectum (gila monster)). We discovered that platypus and echidna express a single GLP-1 peptide in both intestine and venom. Specific changes in GLP-1 of monotreme mammals result in resistance to DPP-4 cleavage which is also observed in the GLP-1 like Exendin-4 expressed in Heloderma venom. Remarkably we discovered that monotremes evolved an alternative mechanism to degrade GLP-1. We also show that monotreme GLP-1 stimulates insulin release in cultured rodent islets, but surprisingly shows low receptor affinity and bias toward Erk signaling. We propose that these changes in monotreme GLP-1 are the result of conflicting function of this peptide in metabolic control and venom. This evolutionary path is fundamentally different from the generally accepted idea that conflicting functions in a single gene favour duplication and diversification, as is the case for Exendin-4 in gila monster. This provides novel insight into the remarkably different metabolic control mechanism and venom function in monotremes and an unique example of how different selective pressures act upon a single gene in the absence of gene duplication. © The Author(s) 2016.
Moral distinctions and structural inequality : homeless youth salvaging the self
- Farrugia, David, Smyth, John, Harrison, Tim
- Authors: Farrugia, David , Smyth, John , Harrison, Tim
- Date: 2016
- Type: Text , Journal article
- Relation: Sociological Review Vol. 64, no. 2 (2016), p. 238-255
- Full Text:
- Reviewed:
- Description: This paper explores the construction and contestation of moral distinctions as a dimension of contemporary structural inequality through a focus on the subjectivities constructed by young people who have experienced homelessness. Empirical material from two research projects shows that in young people's narratives of homelessness, material insecurity intertwines with the moral economies at work in neoliberal capitalist societies to construct homelessness as a state of moral disgrace, in which an ungovernable experience is experienced as a moral failure. When young people gain access to secure housing, the increasing stability and security of their lives is narrated in terms of a moral adherence to personal responsibility and disciplined conduct. Overall the paper describes an economy of worth organized around distinctions between order and chaos, self-governance and unruliness, morality and disgrace, which structures the experience of homelessness. As young people's position in relation to these moral ideals reflects the material conditions of their lives, their experiences demonstrate the way that moral hierarchies contribute to the existence and experience of structural inequalities in neoliberal capitalist societies. © 2016 The Editorial Board of The Sociological Review.
- Authors: Farrugia, David , Smyth, John , Harrison, Tim
- Date: 2016
- Type: Text , Journal article
- Relation: Sociological Review Vol. 64, no. 2 (2016), p. 238-255
- Full Text:
- Reviewed:
- Description: This paper explores the construction and contestation of moral distinctions as a dimension of contemporary structural inequality through a focus on the subjectivities constructed by young people who have experienced homelessness. Empirical material from two research projects shows that in young people's narratives of homelessness, material insecurity intertwines with the moral economies at work in neoliberal capitalist societies to construct homelessness as a state of moral disgrace, in which an ungovernable experience is experienced as a moral failure. When young people gain access to secure housing, the increasing stability and security of their lives is narrated in terms of a moral adherence to personal responsibility and disciplined conduct. Overall the paper describes an economy of worth organized around distinctions between order and chaos, self-governance and unruliness, morality and disgrace, which structures the experience of homelessness. As young people's position in relation to these moral ideals reflects the material conditions of their lives, their experiences demonstrate the way that moral hierarchies contribute to the existence and experience of structural inequalities in neoliberal capitalist societies. © 2016 The Editorial Board of The Sociological Review.
More indecomposable polyhedra
- Przesławski, Krzysztof, Yost, David
- Authors: Przesławski, Krzysztof , Yost, David
- Date: 2016
- Type: Text , Journal article
- Relation: Extracta Mathematicae Vol. 31, no. 2 (2016), p. 169-188
- Full Text:
- Reviewed:
- Description: We apply combinatorial methods to a geometric problem: the classification of polytopes, in terms of Minkowski decomposability. Various properties of skeletons of polytopes are exhibited, each sufficient to guarantee indecomposability of a significant class of polytopes. We illustrate further the power of these techniques, compared with the traditional method of examining triangular faces, with several applications. In any dimension d 6= 2, we show that of all the polytopes with d2 + 1 2 d or fewer edges, only one is decomposable. In 3 dimensions, we complete the classification, in terms of decomposability, of the 260 combinatorial types of polyhedra with 15 or fewer edges.
- Description: We apply combinatorial methods to a geometric problem: the classification of polytopes, in terms of Minkowski decomposability. Various properties of skeletons of polytopes are exhibited, each sufficient to guarantee indecomposability of a significant class of polytopes. We illustrate further the power of these techniques, compared with the traditional method of examining triangular faces, with several applications. In any dimension $d\neq 2$, we show that of all the polytopes with $d^2+\frac{d}{2}$ or fewer edges, only one is decomposable. In 3 dimensions, we complete the classification, in terms of decomposability, of the 260 combinatorial types of polyhedra with 15 or fewer edges.
- Authors: Przesławski, Krzysztof , Yost, David
- Date: 2016
- Type: Text , Journal article
- Relation: Extracta Mathematicae Vol. 31, no. 2 (2016), p. 169-188
- Full Text:
- Reviewed:
- Description: We apply combinatorial methods to a geometric problem: the classification of polytopes, in terms of Minkowski decomposability. Various properties of skeletons of polytopes are exhibited, each sufficient to guarantee indecomposability of a significant class of polytopes. We illustrate further the power of these techniques, compared with the traditional method of examining triangular faces, with several applications. In any dimension d 6= 2, we show that of all the polytopes with d2 + 1 2 d or fewer edges, only one is decomposable. In 3 dimensions, we complete the classification, in terms of decomposability, of the 260 combinatorial types of polyhedra with 15 or fewer edges.
- Description: We apply combinatorial methods to a geometric problem: the classification of polytopes, in terms of Minkowski decomposability. Various properties of skeletons of polytopes are exhibited, each sufficient to guarantee indecomposability of a significant class of polytopes. We illustrate further the power of these techniques, compared with the traditional method of examining triangular faces, with several applications. In any dimension $d\neq 2$, we show that of all the polytopes with $d^2+\frac{d}{2}$ or fewer edges, only one is decomposable. In 3 dimensions, we complete the classification, in terms of decomposability, of the 260 combinatorial types of polyhedra with 15 or fewer edges.
Motion picture production : A micro-budget model
- Authors: Owen, Richard
- Date: 2016
- Type: Text , Thesis , PhD
- Full Text:
- Description: The film industry plays an important cultural and economic role in Australia. However, the film industry in Australia has struggled for many years under a subsidy-driven government intervention process that creates a high degree of dependence on a subsidy-centric model. Motion picture production costs worldwide have risen dramatically over the last decade with Hollywood production budgets commonly exceeding $100 million. Australia as a nation has a proven capability to produce respectable motion pictures at varying production budgets, although this capacity has become entrenched with taxpayers’ money. Historically, subsidy-driven industries in Australia trend towards collapse due primarily to cyclical fiscal deficits and changing funding imperatives at the Commonwealth level. As a PhD by exegesis, the focus of this research was to create, as well as evaluate, a new model of film production that would not be dependent on subsidies. This study evaluated a number of factors that were relevant to establishing a viable micro-budget model. Micro-budget films have received little research attention, with the focus being on major films. This research examined an alternative model, through the creation of a feature-length micro-budget film, called Stakes, and assessed it across a range of criterion to determine whether Australia’s film industry could be strengthened and potentially become self-sufficient. The resulting motion picture premièred in Australian cinemas on October 29th 2015. The justification, methods and results are discussed in detail throughout this exegesis providing strong evidence in favour of the viability for a micro-budget segment in the Australian film industry. Such a model could reduce the risk of Australia’s film industry collapsing if subsidies are reduced or abolished. Thus, this research has significant implications for Australia’s film industry and also contributes strongly to scholarship through providing crucial information on micro-budget films.
- Description: Doctor of Philosophy
- Authors: Owen, Richard
- Date: 2016
- Type: Text , Thesis , PhD
- Full Text:
- Description: The film industry plays an important cultural and economic role in Australia. However, the film industry in Australia has struggled for many years under a subsidy-driven government intervention process that creates a high degree of dependence on a subsidy-centric model. Motion picture production costs worldwide have risen dramatically over the last decade with Hollywood production budgets commonly exceeding $100 million. Australia as a nation has a proven capability to produce respectable motion pictures at varying production budgets, although this capacity has become entrenched with taxpayers’ money. Historically, subsidy-driven industries in Australia trend towards collapse due primarily to cyclical fiscal deficits and changing funding imperatives at the Commonwealth level. As a PhD by exegesis, the focus of this research was to create, as well as evaluate, a new model of film production that would not be dependent on subsidies. This study evaluated a number of factors that were relevant to establishing a viable micro-budget model. Micro-budget films have received little research attention, with the focus being on major films. This research examined an alternative model, through the creation of a feature-length micro-budget film, called Stakes, and assessed it across a range of criterion to determine whether Australia’s film industry could be strengthened and potentially become self-sufficient. The resulting motion picture premièred in Australian cinemas on October 29th 2015. The justification, methods and results are discussed in detail throughout this exegesis providing strong evidence in favour of the viability for a micro-budget segment in the Australian film industry. Such a model could reduce the risk of Australia’s film industry collapsing if subsidies are reduced or abolished. Thus, this research has significant implications for Australia’s film industry and also contributes strongly to scholarship through providing crucial information on micro-budget films.
- Description: Doctor of Philosophy
Moving forward with dignity : exploring health awareness in an isolated deaf community of Australia
- Terry, Daniel, Lê, Quynh, Nguyen, Hoang
- Authors: Terry, Daniel , Lê, Quynh , Nguyen, Hoang
- Date: 2016
- Type: Text , Journal article
- Relation: Disability and Health Journal Vol. 9, no. 2 (2016), p. 281-288
- Full Text:
- Reviewed:
- Description: Background Those within the Deaf community are disadvantaged in a number of aspects of day-to-day life including their access to health care. At times, they may encounter barriers to health care even before they reach the consultation room. As a consequence, they may receive insufficient and inappropriate health care which may lead to poorer health outcomes. Objective A study was conducted to explore health awareness and access to health information and services of Deaf people living in Tasmania, Australia and identify ways of enhancing the interaction between the Deaf and the wider community. Methods A questionnaire was administered, including a number of demographic, health awareness and health service usage questions. In addition, semi-structured interviews and focus groups were conducted with service providers and the Deaf community between March and August 2014. An interpreter was present to translate the questions into Auslan and who then translated the Deaf participant's discussion into English for the researcher. Data were then analyzed using research software SPSS v20.0 and NVivo 10.0. Results Health as a concept was poorly understood, including mental health, sexual health and health concerning alcohol and drug abuse. Regarding health care resources, due to a sense of security, trust and confidence, the family physician or general practitioner was the single most important health care provider among the Deaf. Conclusions The Deaf remain underserved by the current health care system; however, through resourcefulness and life experiences, the Deaf have developed coping and management strategies to move forward with dignity in education, meaningful employment and health access. © 2016 Elsevier Inc. All rights reserved.
- Authors: Terry, Daniel , Lê, Quynh , Nguyen, Hoang
- Date: 2016
- Type: Text , Journal article
- Relation: Disability and Health Journal Vol. 9, no. 2 (2016), p. 281-288
- Full Text:
- Reviewed:
- Description: Background Those within the Deaf community are disadvantaged in a number of aspects of day-to-day life including their access to health care. At times, they may encounter barriers to health care even before they reach the consultation room. As a consequence, they may receive insufficient and inappropriate health care which may lead to poorer health outcomes. Objective A study was conducted to explore health awareness and access to health information and services of Deaf people living in Tasmania, Australia and identify ways of enhancing the interaction between the Deaf and the wider community. Methods A questionnaire was administered, including a number of demographic, health awareness and health service usage questions. In addition, semi-structured interviews and focus groups were conducted with service providers and the Deaf community between March and August 2014. An interpreter was present to translate the questions into Auslan and who then translated the Deaf participant's discussion into English for the researcher. Data were then analyzed using research software SPSS v20.0 and NVivo 10.0. Results Health as a concept was poorly understood, including mental health, sexual health and health concerning alcohol and drug abuse. Regarding health care resources, due to a sense of security, trust and confidence, the family physician or general practitioner was the single most important health care provider among the Deaf. Conclusions The Deaf remain underserved by the current health care system; however, through resourcefulness and life experiences, the Deaf have developed coping and management strategies to move forward with dignity in education, meaningful employment and health access. © 2016 Elsevier Inc. All rights reserved.
Multi-modal reliability analysis of slope stability
- Reale, Cormac, Gavin, Kenneth, Prendergast, Luke, Xue, Jianfeng
- Authors: Reale, Cormac , Gavin, Kenneth , Prendergast, Luke , Xue, Jianfeng
- Date: 2016
- Type: Text , Conference proceedings
- Relation: 6th Transport Research Arena; Warsaw, Poland; 18th-21st April 2016; published inTransportation Research Procedia Vol. 14, p. 2468-2476
- Full Text:
- Reviewed:
- Description: Probabilistic slope stability analysis typically requires an optimisation technique to locate the most probable slip surface. However, for many slopes particularly those containing many different soil layers or benches several distinct critical slip surfaces may exist. Furthermore, in large slopes these critical slip surfaces may be located at significant distances from each other. In such circumstances, finding and rehabilitating the most probable failure surface is of little merit, as rehabilitating that surface does not improve the safety of the slope as a whole. Unfortunately, existing slip surface search techniques were developed to converge on one global minimum. Therefore, to implement such methods to evaluate the stability of a slope with multiple failure mechanisms requires the user to define probable slip locations prior to calculation. This requires extensive engineering experience and places undue responsibility on the engineer in question. This paper proposes the use of a locally informed particle swarm optimisation method which is able to simultaneously converge to multiple critical slip surfaces. This optimisation model when combined with a reliability analysis is able to define all areas of concern within a slope. A case study of a railway slope is presented which highlights the benefits of the model over single objective optimisation models. The approach is of particular benefit when evaluating the stability of large existing slopes with complicated stratigraphy as these slopes are likely to contain multiple viable slip surfaces. © 2016 The Authors.
- Authors: Reale, Cormac , Gavin, Kenneth , Prendergast, Luke , Xue, Jianfeng
- Date: 2016
- Type: Text , Conference proceedings
- Relation: 6th Transport Research Arena; Warsaw, Poland; 18th-21st April 2016; published inTransportation Research Procedia Vol. 14, p. 2468-2476
- Full Text:
- Reviewed:
- Description: Probabilistic slope stability analysis typically requires an optimisation technique to locate the most probable slip surface. However, for many slopes particularly those containing many different soil layers or benches several distinct critical slip surfaces may exist. Furthermore, in large slopes these critical slip surfaces may be located at significant distances from each other. In such circumstances, finding and rehabilitating the most probable failure surface is of little merit, as rehabilitating that surface does not improve the safety of the slope as a whole. Unfortunately, existing slip surface search techniques were developed to converge on one global minimum. Therefore, to implement such methods to evaluate the stability of a slope with multiple failure mechanisms requires the user to define probable slip locations prior to calculation. This requires extensive engineering experience and places undue responsibility on the engineer in question. This paper proposes the use of a locally informed particle swarm optimisation method which is able to simultaneously converge to multiple critical slip surfaces. This optimisation model when combined with a reliability analysis is able to define all areas of concern within a slope. A case study of a railway slope is presented which highlights the benefits of the model over single objective optimisation models. The approach is of particular benefit when evaluating the stability of large existing slopes with complicated stratigraphy as these slopes are likely to contain multiple viable slip surfaces. © 2016 The Authors.
Muscle-enriched MicroRNAs isolated from whole blood are regulated by exercise and are potential biomarkers of cardiorespiratory fitness
- Denham, Joshua, Prestes, Priscilla
- Authors: Denham, Joshua , Prestes, Priscilla
- Date: 2016
- Type: Text , Journal article
- Relation: Frontiers in Genetics Vol. 7, no. NOV (2016), p. 1-8
- Full Text:
- Reviewed:
- Description: MicroRNAs (miRNAs) are small non-coding RNA molecules that regulate gene expression post-transcriptionally. Evidence indicating miRNAs influence exercise-induced health and performance adaptations is mounting. Circulating miRNAs are responsible for intercellular communication and could serve as biomarkers for disease and exercise-related traits. Such biomarkers would contribute to exercise screening, monitoring, and the development of personalized exercise prescription. Accordingly, we investigated the impact of long-term strenuous aerobic exercise training and a single bout of maximal aerobic exercise on five muscle-enriched miRNAs implicated in exercise adaptations (miR-1, miR-133a, miR-181a, miR-486, and miR-494). We also determined linear correlations between miRNAs, resting heart rate, and maximum oxygen uptake (V˙O2 max). We used TaqMan assay quantitative polymerase chain reaction to analyze the abundance of miR-1, miR-133a, miR-181a, miR-486, and miR-494 in resting whole blood of 67 endurance athletes and 61 healthy controls. Relative to controls, endurance athletes exhibited increased miR-1, miR-486, and miR-494 content (1.26- to 1.58-fold change, all p < 0.05). miR-1, miR-133a, and miR-486 were decreased immediately after maximal aerobic exercise (0.64- to 0.76-fold change, all p < 0.01) performed by 19 healthy, young men (20.7 ± 2.4 years). Finally, we observed positive correlations between miRNA abundance and V˙ O2 max (miR-1 and miR-486) and an inverse correlation between miR-486 and resting heart rate. Therefore, muscle-enriched miRNAs isolated from whole blood are regulated by acute and long-term aerobic exercise training and could serve as biomarkers of cardiorespiratory fitness. © 2016 Denham and Prestes.
- Authors: Denham, Joshua , Prestes, Priscilla
- Date: 2016
- Type: Text , Journal article
- Relation: Frontiers in Genetics Vol. 7, no. NOV (2016), p. 1-8
- Full Text:
- Reviewed:
- Description: MicroRNAs (miRNAs) are small non-coding RNA molecules that regulate gene expression post-transcriptionally. Evidence indicating miRNAs influence exercise-induced health and performance adaptations is mounting. Circulating miRNAs are responsible for intercellular communication and could serve as biomarkers for disease and exercise-related traits. Such biomarkers would contribute to exercise screening, monitoring, and the development of personalized exercise prescription. Accordingly, we investigated the impact of long-term strenuous aerobic exercise training and a single bout of maximal aerobic exercise on five muscle-enriched miRNAs implicated in exercise adaptations (miR-1, miR-133a, miR-181a, miR-486, and miR-494). We also determined linear correlations between miRNAs, resting heart rate, and maximum oxygen uptake (V˙O2 max). We used TaqMan assay quantitative polymerase chain reaction to analyze the abundance of miR-1, miR-133a, miR-181a, miR-486, and miR-494 in resting whole blood of 67 endurance athletes and 61 healthy controls. Relative to controls, endurance athletes exhibited increased miR-1, miR-486, and miR-494 content (1.26- to 1.58-fold change, all p < 0.05). miR-1, miR-133a, and miR-486 were decreased immediately after maximal aerobic exercise (0.64- to 0.76-fold change, all p < 0.01) performed by 19 healthy, young men (20.7 ± 2.4 years). Finally, we observed positive correlations between miRNA abundance and V˙ O2 max (miR-1 and miR-486) and an inverse correlation between miR-486 and resting heart rate. Therefore, muscle-enriched miRNAs isolated from whole blood are regulated by acute and long-term aerobic exercise training and could serve as biomarkers of cardiorespiratory fitness. © 2016 Denham and Prestes.
Nitrogen fixation and nifH diversity in human gut microbiota
- Igai, Katsura, Itakura, Manabu, Nishijima, Suguru, Tsurumaru, Hirohito, Suda, Wataru, Tsutaya, Takumi, Tomitsuka, Eriko, Tadokoro, Kiyoshi, Baba, Jun, Odani, Shingo, Natsuhara, Kazumi, Morita, Ayako, Yoneda, Minoru, Greenhill, Andrew, Horwood, Paul, Inoue, Jun-ichi, Ohkuma, Moriya, Hongoh, Yuichi, Yamamoto, Taro, Siba, Peter, Hattori, Masahira, Minamisawa, Kiwamu, Umezaki, Masahiro
- Authors: Igai, Katsura , Itakura, Manabu , Nishijima, Suguru , Tsurumaru, Hirohito , Suda, Wataru , Tsutaya, Takumi , Tomitsuka, Eriko , Tadokoro, Kiyoshi , Baba, Jun , Odani, Shingo , Natsuhara, Kazumi , Morita, Ayako , Yoneda, Minoru , Greenhill, Andrew , Horwood, Paul , Inoue, Jun-ichi , Ohkuma, Moriya , Hongoh, Yuichi , Yamamoto, Taro , Siba, Peter , Hattori, Masahira , Minamisawa, Kiwamu , Umezaki, Masahiro
- Date: 2016
- Type: Text , Journal article
- Relation: Scientific Reports Vol. 6, no. (2016), p. 1-11
- Full Text:
- Reviewed:
- Description: It has been hypothesized that nitrogen fixation occurs in the human gut. However, whether the gut microbiota truly has this potential remains unclear. We investigated the nitrogen-fixing activity and diversity of the nitrogenase reductase (NifH) genes in the faecal microbiota of humans, focusing on Papua New Guinean and Japanese individuals with low to high habitual nitrogen intake. A 15 N 2 incorporation assay showed significant enrichment of 15 N in all faecal samples, irrespective of the host nitrogen intake, which was also supported by an acetylene reduction assay. The fixed nitrogen corresponded to 0.01% of the standard nitrogen requirement for humans, although our data implied that the contribution in the gut in vivo might be higher than this value. The nifH genes recovered in cloning and metagenomic analyses were classified in two clusters: one comprising sequences almost identical to Klebsiella sequences and the other related to sequences of Clostridiales members. These results are consistent with an analysis of databases of faecal metagenomes from other human populations. Collectively, the human gut microbiota has a potential for nitrogen fixation, which may be attributable to Klebsiella and Clostridiales strains, although no evidence was found that the nitrogen-fixing activity substantially contributes to the host nitrogen balance. © The Author(s) 2016.
- Authors: Igai, Katsura , Itakura, Manabu , Nishijima, Suguru , Tsurumaru, Hirohito , Suda, Wataru , Tsutaya, Takumi , Tomitsuka, Eriko , Tadokoro, Kiyoshi , Baba, Jun , Odani, Shingo , Natsuhara, Kazumi , Morita, Ayako , Yoneda, Minoru , Greenhill, Andrew , Horwood, Paul , Inoue, Jun-ichi , Ohkuma, Moriya , Hongoh, Yuichi , Yamamoto, Taro , Siba, Peter , Hattori, Masahira , Minamisawa, Kiwamu , Umezaki, Masahiro
- Date: 2016
- Type: Text , Journal article
- Relation: Scientific Reports Vol. 6, no. (2016), p. 1-11
- Full Text:
- Reviewed:
- Description: It has been hypothesized that nitrogen fixation occurs in the human gut. However, whether the gut microbiota truly has this potential remains unclear. We investigated the nitrogen-fixing activity and diversity of the nitrogenase reductase (NifH) genes in the faecal microbiota of humans, focusing on Papua New Guinean and Japanese individuals with low to high habitual nitrogen intake. A 15 N 2 incorporation assay showed significant enrichment of 15 N in all faecal samples, irrespective of the host nitrogen intake, which was also supported by an acetylene reduction assay. The fixed nitrogen corresponded to 0.01% of the standard nitrogen requirement for humans, although our data implied that the contribution in the gut in vivo might be higher than this value. The nifH genes recovered in cloning and metagenomic analyses were classified in two clusters: one comprising sequences almost identical to Klebsiella sequences and the other related to sequences of Clostridiales members. These results are consistent with an analysis of databases of faecal metagenomes from other human populations. Collectively, the human gut microbiota has a potential for nitrogen fixation, which may be attributable to Klebsiella and Clostridiales strains, although no evidence was found that the nitrogen-fixing activity substantially contributes to the host nitrogen balance. © The Author(s) 2016.
Nonlinear metric subregularity
- Authors: Kruger, Alexander
- Date: 2016
- Type: Text , Journal article
- Relation: Journal of Optimization Theory and Applications Vol. 171, no. 3 (2016), p. 820-855
- Relation: http://purl.org/au-research/grants/arc/DP110102011
- Full Text:
- Reviewed:
- Description: In this article, we investigate nonlinear metric subregularity properties of set-valued mappings between general metric or Banach spaces. We demonstrate that these properties can be treated in the framework of the theory of (linear) error bounds for extended real-valued functions of two variables developed in Kruger (Error bounds and metric subregularity. Optimization 64(1):49-79, 2015). Several primal and dual space local quantitative and qualitative criteria of nonlinear metric subregularity are formulated. The relationships between the criteria are established and illustrated.
- Authors: Kruger, Alexander
- Date: 2016
- Type: Text , Journal article
- Relation: Journal of Optimization Theory and Applications Vol. 171, no. 3 (2016), p. 820-855
- Relation: http://purl.org/au-research/grants/arc/DP110102011
- Full Text:
- Reviewed:
- Description: In this article, we investigate nonlinear metric subregularity properties of set-valued mappings between general metric or Banach spaces. We demonstrate that these properties can be treated in the framework of the theory of (linear) error bounds for extended real-valued functions of two variables developed in Kruger (Error bounds and metric subregularity. Optimization 64(1):49-79, 2015). Several primal and dual space local quantitative and qualitative criteria of nonlinear metric subregularity are formulated. The relationships between the criteria are established and illustrated.
Nonmeasurable subgroups of compact groups
- Hernández, Salvador, Hofmann, Karl, Morris, Sidney
- Authors: Hernández, Salvador , Hofmann, Karl , Morris, Sidney
- Date: 2016
- Type: Text , Journal article
- Relation: Journal of Group Theory Vol. 19, no. 1 (2016), p. 179-189
- Full Text:
- Reviewed:
- Description: In 1985 S. Saeki and K. Stromberg published the following question: Does every infinite compact group have a subgroup which is not Haar measurable? An affirmative answer is given for all compact groups with the exception of some metric profinite groups which are almost perfect and strongly complete. In this spirit it is also shown that every compact group contains a non-Borel subgroup. © 2016 by De Gruyter 2016 Generalitat Valenciana PROMETEO/2014/062 We are grateful for our referee's useful comments. In particular, the suggestion that originally we had overlooked [Pacific J. Math. 116 (1985), 217-241] shortened the proof of Theorem 4.3 considerably.
- Authors: Hernández, Salvador , Hofmann, Karl , Morris, Sidney
- Date: 2016
- Type: Text , Journal article
- Relation: Journal of Group Theory Vol. 19, no. 1 (2016), p. 179-189
- Full Text:
- Reviewed:
- Description: In 1985 S. Saeki and K. Stromberg published the following question: Does every infinite compact group have a subgroup which is not Haar measurable? An affirmative answer is given for all compact groups with the exception of some metric profinite groups which are almost perfect and strongly complete. In this spirit it is also shown that every compact group contains a non-Borel subgroup. © 2016 by De Gruyter 2016 Generalitat Valenciana PROMETEO/2014/062 We are grateful for our referee's useful comments. In particular, the suggestion that originally we had overlooked [Pacific J. Math. 116 (1985), 217-241] shortened the proof of Theorem 4.3 considerably.
Nonsmooth Lyapunov pairs for differential inclusions governed by operators with nonempty interior domain
- Adly, Samir, Hantoute, Abderrahim, Thera, Michel
- Authors: Adly, Samir , Hantoute, Abderrahim , Thera, Michel
- Date: 2016
- Type: Text , Journal article
- Relation: Mathematical Programming Vol. 157, no. 2 (2016), p. 349-374
- Full Text:
- Reviewed:
- Description: The general theory of Lyapunov stability of first-order differential inclusions in Hilbert spaces has been studied by the authors in the previous paper (Adly et al. in Nonlinear Anal 75(3): 985–1008, 2012). This new contribution focuses on the case when the interior of the domain of the maximally monotone operator governing the given differential inclusion is nonempty; this includes in a natural way the finite-dimensional case. The current setting leads to simplified, more explicit criteria and permits some flexibility in the choice of the generalized subdifferentials. Some consequences of the viability of closed sets are given. Our analysis makes use of standard tools from convex and variational analysis. © 2015, Springer-Verlag Berlin Heidelberg and Mathematical Optimization Society.
- Authors: Adly, Samir , Hantoute, Abderrahim , Thera, Michel
- Date: 2016
- Type: Text , Journal article
- Relation: Mathematical Programming Vol. 157, no. 2 (2016), p. 349-374
- Full Text:
- Reviewed:
- Description: The general theory of Lyapunov stability of first-order differential inclusions in Hilbert spaces has been studied by the authors in the previous paper (Adly et al. in Nonlinear Anal 75(3): 985–1008, 2012). This new contribution focuses on the case when the interior of the domain of the maximally monotone operator governing the given differential inclusion is nonempty; this includes in a natural way the finite-dimensional case. The current setting leads to simplified, more explicit criteria and permits some flexibility in the choice of the generalized subdifferentials. Some consequences of the viability of closed sets are given. Our analysis makes use of standard tools from convex and variational analysis. © 2015, Springer-Verlag Berlin Heidelberg and Mathematical Optimization Society.
On lipschitzian properties of implicit multifunctions
- Gfrerer, Helmut, Outrata, Jiri
- Authors: Gfrerer, Helmut , Outrata, Jiri
- Date: 2016
- Type: Text , Journal article
- Relation: SIAM Journal on Optimization Vol. 26, no. 4 (2016), p. 2160-2189
- Relation: http://purl.org/au-research/grants/arc/DP160100854
- Full Text:
- Reviewed:
- Description: This paper is devoted to the development of new sufficient conditions for the calmness and the Aubin property of implicit multifunctions. As the basic tool we employ the directional limiting coderivative which, together with the graphical derivative, enables a fine analysis of the local behavior of the investigated multifunction along relevant directions. For verification of the calmness property, in addition, a new condition has been discovered which parallels the missing implicit function paradigm and permits us to replace the original multifunction by a substantially simpler one. Moreover, as an auxiliary tool, a handy formula for the computation of the directional limiting coderivative of the normal-cone map with a polyhedral set has been derived which perfectly matches the framework of [A. L. Dontchev and R. T. Rockafellar, SIAM J. Optim., 6 (1996), pp. 1087{1105]. All important statements are illustrated by examples. © 2016 Society for Industrial and Applied Mathematics.
- Authors: Gfrerer, Helmut , Outrata, Jiri
- Date: 2016
- Type: Text , Journal article
- Relation: SIAM Journal on Optimization Vol. 26, no. 4 (2016), p. 2160-2189
- Relation: http://purl.org/au-research/grants/arc/DP160100854
- Full Text:
- Reviewed:
- Description: This paper is devoted to the development of new sufficient conditions for the calmness and the Aubin property of implicit multifunctions. As the basic tool we employ the directional limiting coderivative which, together with the graphical derivative, enables a fine analysis of the local behavior of the investigated multifunction along relevant directions. For verification of the calmness property, in addition, a new condition has been discovered which parallels the missing implicit function paradigm and permits us to replace the original multifunction by a substantially simpler one. Moreover, as an auxiliary tool, a handy formula for the computation of the directional limiting coderivative of the normal-cone map with a polyhedral set has been derived which perfectly matches the framework of [A. L. Dontchev and R. T. Rockafellar, SIAM J. Optim., 6 (1996), pp. 1087{1105]. All important statements are illustrated by examples. © 2016 Society for Industrial and Applied Mathematics.
On the maximum order of graphs embedded in surfaces
- Nevo, Eran, Pineda-Villavicencio, Guillermo, Wood, David
- Authors: Nevo, Eran , Pineda-Villavicencio, Guillermo , Wood, David
- Date: 2016
- Type: Text , Journal article
- Relation: Journal of Combinatorial Theory. Series B Vol. 119, no. (2016), p. 28-41
- Full Text:
- Reviewed:
- Description: The maximum number of vertices in a graph of maximum degree
- Authors: Nevo, Eran , Pineda-Villavicencio, Guillermo , Wood, David
- Date: 2016
- Type: Text , Journal article
- Relation: Journal of Combinatorial Theory. Series B Vol. 119, no. (2016), p. 28-41
- Full Text:
- Reviewed:
- Description: The maximum number of vertices in a graph of maximum degree
On the security of permutation-only image encryption schemes
- Jolfaei, Alireza, Wu, Xinwen, Muthukkumarasamy, Vallipuram
- Authors: Jolfaei, Alireza , Wu, Xinwen , Muthukkumarasamy, Vallipuram
- Date: 2016
- Type: Text , Journal article
- Relation: IEEE Transactions on Information Forensics and Security Vol. 11, no. 2 (2016), p. 235-246
- Full Text:
- Reviewed:
- Description: Permutation is a commonly used primitive in multimedia (image/video) encryption schemes, and many permutation-only algorithms have been proposed in recent years for the protection of multimedia data. In permutation-only image ciphers, the entries of the image matrix are scrambled using a permutation mapping matrix which is built by a pseudo-random number generator. The literature on the cryptanalysis of image ciphers indicates that the permutation-only image ciphers are insecure against ciphertext-only attacks and/or known/chosenplaintext attacks. However, the previous studies have not been able to ensure the correct retrieval of the complete plaintext elements. In this paper, we revisited the previous works on cryptanalysis of permutation-only image encryption schemes and made the cryptanalysis work on chosen-plaintext attacks complete and more efficient. We proved that in all permutationonly image ciphers, regardless of the cipher structure, the correct permutation mapping is recovered completely by a chosenplaintext attack. To the best of our knowledge, for the first time, this paper gives a chosen-plaintext attack that completely determines the correct plaintext elements using a deterministic method. When the plain-images are of size M × N and with L different color intensities, the number n of required chosen plain-images to break the permutation-only image encryption algorithm is n = logL(MN). The complexity of the proposed attack is O (n · M N) which indicates its feasibility in a polynomial amount of computation time. To validate the performance of the proposed chosen-plaintext attack, numerous experiments were performed on two recently proposed permutation-only image/video ciphers. Both theoretical and experimental results showed that the proposed attack outperforms the state-of-theart cryptanalytic methods.
- Authors: Jolfaei, Alireza , Wu, Xinwen , Muthukkumarasamy, Vallipuram
- Date: 2016
- Type: Text , Journal article
- Relation: IEEE Transactions on Information Forensics and Security Vol. 11, no. 2 (2016), p. 235-246
- Full Text:
- Reviewed:
- Description: Permutation is a commonly used primitive in multimedia (image/video) encryption schemes, and many permutation-only algorithms have been proposed in recent years for the protection of multimedia data. In permutation-only image ciphers, the entries of the image matrix are scrambled using a permutation mapping matrix which is built by a pseudo-random number generator. The literature on the cryptanalysis of image ciphers indicates that the permutation-only image ciphers are insecure against ciphertext-only attacks and/or known/chosenplaintext attacks. However, the previous studies have not been able to ensure the correct retrieval of the complete plaintext elements. In this paper, we revisited the previous works on cryptanalysis of permutation-only image encryption schemes and made the cryptanalysis work on chosen-plaintext attacks complete and more efficient. We proved that in all permutationonly image ciphers, regardless of the cipher structure, the correct permutation mapping is recovered completely by a chosenplaintext attack. To the best of our knowledge, for the first time, this paper gives a chosen-plaintext attack that completely determines the correct plaintext elements using a deterministic method. When the plain-images are of size M × N and with L different color intensities, the number n of required chosen plain-images to break the permutation-only image encryption algorithm is n = logL(MN). The complexity of the proposed attack is O (n · M N) which indicates its feasibility in a polynomial amount of computation time. To validate the performance of the proposed chosen-plaintext attack, numerous experiments were performed on two recently proposed permutation-only image/video ciphers. Both theoretical and experimental results showed that the proposed attack outperforms the state-of-theart cryptanalytic methods.
On unified modeling, theory, and method for solving multi-scale global optimization problems
- Authors: Gao, David
- Date: 2016
- Type: Text , Conference proceedings
- Relation: 2nd International Conference on Numerical Computations: Theory and Algorithms, NUMTA 2016; Pizzo Calabro; Italy; 19th-25th June 2016; published in AIP Conference Proceedings Vol. 1776, p. 1-8
- Full Text:
- Reviewed:
- Description: A unified model is proposed for general optimization problems in multi-scale complex systems. Based on this model and necessary assumptions in physics, the canonical duality theory is presented in a precise way to include traditional duality theories and popular methods as special applications. Two conjectures on NP-hardness are proposed, which should play important roles for correctly understanding and efficiently solving challenging real-world problems. Applications are illustrated for both nonconvex continuous optimization and mixed integer nonlinear programming.
- Authors: Gao, David
- Date: 2016
- Type: Text , Conference proceedings
- Relation: 2nd International Conference on Numerical Computations: Theory and Algorithms, NUMTA 2016; Pizzo Calabro; Italy; 19th-25th June 2016; published in AIP Conference Proceedings Vol. 1776, p. 1-8
- Full Text:
- Reviewed:
- Description: A unified model is proposed for general optimization problems in multi-scale complex systems. Based on this model and necessary assumptions in physics, the canonical duality theory is presented in a precise way to include traditional duality theories and popular methods as special applications. Two conjectures on NP-hardness are proposed, which should play important roles for correctly understanding and efficiently solving challenging real-world problems. Applications are illustrated for both nonconvex continuous optimization and mixed integer nonlinear programming.
Online romance scam: Expensive e-living for romantic happiness
- Kopp, Christian, Sillitoe, James, Gondal, Iqbal, Layton, Robert
- Authors: Kopp, Christian , Sillitoe, James , Gondal, Iqbal , Layton, Robert
- Date: 2016
- Type: Text , Conference proceedings
- Relation: Proceedings of the 29th Bled eConference: Digital Economy (BLED 2016), Slovenia, pp.175-189 p. 15
- Full Text:
- Description: The Online Romance Scam is a very successful scam which causes considerable financial and emotional damage to its victims. It is based on building a relationship which establishes a deep trust that causes victims to voluntarily transfer funds to the scammer. The aim of this research is to explore online dating scams as a type of e-Living which initially creates happiness for the victim in a virtual romantic relationship, but tragically then causes the victim to be separated from his or her savings. Using narrative research methodology, this research will establish a model of the romance scam structure and its variations regarding human romantic attitudes, and will develop a theory which explains how the victim is moved through the phases of the scam. Findings of this research will contribute to the knowledge of the Online Romance Scam as e-Crime and provide information about the structure and the development of the modus operandi which can be used to identify an online relationship as a scam at an early phase in order to prevent significant harm to the victim.
- Authors: Kopp, Christian , Sillitoe, James , Gondal, Iqbal , Layton, Robert
- Date: 2016
- Type: Text , Conference proceedings
- Relation: Proceedings of the 29th Bled eConference: Digital Economy (BLED 2016), Slovenia, pp.175-189 p. 15
- Full Text:
- Description: The Online Romance Scam is a very successful scam which causes considerable financial and emotional damage to its victims. It is based on building a relationship which establishes a deep trust that causes victims to voluntarily transfer funds to the scammer. The aim of this research is to explore online dating scams as a type of e-Living which initially creates happiness for the victim in a virtual romantic relationship, but tragically then causes the victim to be separated from his or her savings. Using narrative research methodology, this research will establish a model of the romance scam structure and its variations regarding human romantic attitudes, and will develop a theory which explains how the victim is moved through the phases of the scam. Findings of this research will contribute to the knowledge of the Online Romance Scam as e-Crime and provide information about the structure and the development of the modus operandi which can be used to identify an online relationship as a scam at an early phase in order to prevent significant harm to the victim.
Optimality conditions for nonsmooth optimization problems via generalised derivatives
- Authors: Hassani, Sara
- Date: 2016
- Type: Text , Thesis , PhD
- Full Text:
- Description: Aquatic plants are integral components of freshwater ecosystems and provide essential ecosystem services. However, when invasive species establish in new aquatic environments, there are few natural checks and balances to inhibit their growth and spread. Overabundant aquatic vegetation can harm aquatic systems if left unchecked and negatively impact on agricultural productivity, social amenity and biodiversity values. Prevention and early intervention are recognised as the most cost effective means to manage invasive species that pose a biosecurity risk. This thesis contributes to the development of effective management strategies for one of the world’s most invasive aquatic plant species, known as alligator weed (Alternanthera philoxeroides (Mart.) Griseb.). It focusses on developing management strategies in an early stage of invasion, in order to achieve extirpation of this species from catchments and waterways. Developing effective detection and surveillance strategies are required for invasive aquatic plants, as a key impediment to achieving extirpation is the ability to detect infestations, so that control strategies can be enacted. This thesis investigates the effectiveness of aerial surveillance for detection of alligator weed at different spatial scales, using high altitude aerial imagery (orthophotos) and unmanned aerial vehicle (UAV) technology. An examination of the growth rate of alligator weed in Victoria, Australia, over a five year period, demonstrates the effective use of orthophotos to detect and monitor large infestations of aquatic alligator weed. The efficacy of unmanned aerial vehicle technology, including the use of automated algorithms, to detect patches of alligator weed growing in waterways is evaluated against current detection techniques. Effective management of invasive aquatic plants targeted for extirpation requires the coupling of effective detection and control efforts to prevent reproduction. To date, development of control strategies for aquatic alligator weed has been limited to evaluating the efficacy of short-term control at a local scale without regard to the effects of management strategies on dispersal of propagules throughout catchments. This thesis determines that viable alligator weed stem fragments are produced following herbicide application, which comprises extirpation efforts. This thesis has gone further than current practice in that it has evaluated the efficacy of current and novel control techniques, in both laboratory and field trials and has developed methods to manage viable fragment production post-herbicide application, to limit dispersal throughout catchments. In this respect, the application of the herbicides glyphosate, metsulfuron-methyl and imazapyr, and their effectiveness when incorporating surfactant systems and plant growth regulators, have been evaluated in field and laboratory studies to optimise control techniques for aquatic alligator weed. Results have shown that our approaches, when used in an early stage of invasion, are capable of eliminating patches of alligator weed in two to three years. Integral to the research is an experiment to determine the effect of herbicide treatments on the production of alligator weed stem fragments and their subsequent viability. Further investigation to determine the usefulness of commercially available plant growth regulators (PGRs) to reduce the number of viable propagules produced by alligator weed post-herbicide application was found to be ineffective. This thesis also evaluates the impact of herbicides and surfactant systems, on all key alligator weed response metrics in aquatic environments including; above ground biomass, below ground biomass and viable stem fragmentation. No previous studies have looked simultaneously at these three important measures for determining the efficacy of a particular control regime, and we have determined that this is essential for effective management of aquatic alligator weed in an early stage of invasion. The thesis has underscored the notion that development of more effective management strategies, based upon experimental trials, will result in an increased likelihood of eradicating invasive aquatic plants that pose a biosecurity risk, and thus move toward the mitigation of the threat that high-risk species pose to aquatic ecosystems. PLEASE NOTE: Portions of the full text have been removed due to copyright restrictions.
- Description: Doctor of Philosophy
- Authors: Hassani, Sara
- Date: 2016
- Type: Text , Thesis , PhD
- Full Text:
- Description: Aquatic plants are integral components of freshwater ecosystems and provide essential ecosystem services. However, when invasive species establish in new aquatic environments, there are few natural checks and balances to inhibit their growth and spread. Overabundant aquatic vegetation can harm aquatic systems if left unchecked and negatively impact on agricultural productivity, social amenity and biodiversity values. Prevention and early intervention are recognised as the most cost effective means to manage invasive species that pose a biosecurity risk. This thesis contributes to the development of effective management strategies for one of the world’s most invasive aquatic plant species, known as alligator weed (Alternanthera philoxeroides (Mart.) Griseb.). It focusses on developing management strategies in an early stage of invasion, in order to achieve extirpation of this species from catchments and waterways. Developing effective detection and surveillance strategies are required for invasive aquatic plants, as a key impediment to achieving extirpation is the ability to detect infestations, so that control strategies can be enacted. This thesis investigates the effectiveness of aerial surveillance for detection of alligator weed at different spatial scales, using high altitude aerial imagery (orthophotos) and unmanned aerial vehicle (UAV) technology. An examination of the growth rate of alligator weed in Victoria, Australia, over a five year period, demonstrates the effective use of orthophotos to detect and monitor large infestations of aquatic alligator weed. The efficacy of unmanned aerial vehicle technology, including the use of automated algorithms, to detect patches of alligator weed growing in waterways is evaluated against current detection techniques. Effective management of invasive aquatic plants targeted for extirpation requires the coupling of effective detection and control efforts to prevent reproduction. To date, development of control strategies for aquatic alligator weed has been limited to evaluating the efficacy of short-term control at a local scale without regard to the effects of management strategies on dispersal of propagules throughout catchments. This thesis determines that viable alligator weed stem fragments are produced following herbicide application, which comprises extirpation efforts. This thesis has gone further than current practice in that it has evaluated the efficacy of current and novel control techniques, in both laboratory and field trials and has developed methods to manage viable fragment production post-herbicide application, to limit dispersal throughout catchments. In this respect, the application of the herbicides glyphosate, metsulfuron-methyl and imazapyr, and their effectiveness when incorporating surfactant systems and plant growth regulators, have been evaluated in field and laboratory studies to optimise control techniques for aquatic alligator weed. Results have shown that our approaches, when used in an early stage of invasion, are capable of eliminating patches of alligator weed in two to three years. Integral to the research is an experiment to determine the effect of herbicide treatments on the production of alligator weed stem fragments and their subsequent viability. Further investigation to determine the usefulness of commercially available plant growth regulators (PGRs) to reduce the number of viable propagules produced by alligator weed post-herbicide application was found to be ineffective. This thesis also evaluates the impact of herbicides and surfactant systems, on all key alligator weed response metrics in aquatic environments including; above ground biomass, below ground biomass and viable stem fragmentation. No previous studies have looked simultaneously at these three important measures for determining the efficacy of a particular control regime, and we have determined that this is essential for effective management of aquatic alligator weed in an early stage of invasion. The thesis has underscored the notion that development of more effective management strategies, based upon experimental trials, will result in an increased likelihood of eradicating invasive aquatic plants that pose a biosecurity risk, and thus move toward the mitigation of the threat that high-risk species pose to aquatic ecosystems. PLEASE NOTE: Portions of the full text have been removed due to copyright restrictions.
- Description: Doctor of Philosophy