7,970 research outputs found

    Money advice outreach evaluation: the provider and partner perspectives

    Get PDF

    Physical activity and hypertension in South African adults

    Get PDF
    This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 2.5 South Africa LicenseEstimates suggest that approximately 6-million South Africans have hypertension, with half classified as stage 1 (mild). Mindful of the cost of lifelong drug therapy, the South African Hypertension Society guidelines suggest delaying drug therapy through lifestyle modification (increased physical activity and weight management) in all but those with the highest risk. This pilot study examined the relationship of BP with physical activity and bodyweight in black South African adults employed in physical occupationsNon peer reviewe

    Birds and people in Europe

    Get PDF
    At a regional scale, species richness and human population size are frequently positively correlated across space. Such patterns may arise because both species richness and human density increase with energy availability. If the species-energy relationship is generated through the 'more individuals' hypothesis, then the prediction is that areas with high human densities will also support greater numbers of individuals from other taxa. We use the unique data available for the breeding birds in Europe to test this prediction. Overall regional densities of bird species are higher in areas with more people; species of conservation concern exhibit the same pattern. Avian density also increases faster with human density than does avian biomass, indicating that areas with a higher human density have a higher proportion of small-bodied individuals. The analyses also underline the low numbers of breeding birds in Europe relative to humans, with a median of just three individual birds per person, and 4 g of bird for every kilogram of human

    Nyungar tourism in the South West region of Western Australia : A quopardar or best practice approach for Nyungar tourism operators

    Get PDF
    Nyungar Tourism Operators involved in this research project acknowledge the need for a quopardar or best practice which is underpinned by the need to strive for excellence, to have a committed approach to improvement in every area of their organization, to establish and maintain a high quality service and for continually improving performance to achieve better outcomes for their visitors. There is a desire to protect and promote Nyungar culture, its practice and Nyungar knowledge as well as increase the economic value of the Nyungar community within the tourism industry. The challenge for Nyungar Tourism Operators is to be both innovative and competitive. Each of the tourism outlets involved in the research have put together the best possible resources available to them from their own Nyungar boodjar to give the tourist or visitor a “unique, authentic Nyungar experience” through stepping back in time. This also helps the visitor to experience and understand the impact of colonisation on Nyungar culture and to also share Nyungar knowledge, spirituality and customs of our Nyungar lifestyle. Nyungar Tourism Operators and other Case Study participants share a desire for commercial viability, to encourage a sustainable, quopardar or best practice approach that respects and protects both Nyungar culture and boodjar or country. This quopardar or Best Practice Guide is aimed to incorporate these objectives, philosophies and visions

    Fingerprinting Vulnerabilities in Intelligent Electronic Device Firmware

    Get PDF
    Modern smart grid deployments heavily rely on the advanced capabilities that Intelligent Electronic Devices (IEDs) provide. Furthermore, these devices firmware often contain critical vulnerabilities that if exploited could cause large impacts on national economic security, and national safety. As such, a scalable domain specific approach is required in order to assess the security of IED firmware. In order to resolve this lack of an appropriate methodology, we present a scalable vulnerable function identification framework. It is specifically designed to analyze IED firmware and binaries that employ the ARM CPU architecture. Its core functionality revolves around a multi-stage detection methodology that is specifically designed to resolve the lack of specialization that limits other general-purpose approaches. This is achieved by compiling an extensive database of IED specific vulnerabilities and domain specific firmware that is evaluated. Its analysis approach is composed of three stages that leverage function syntactic, semantic, structural and statistical features in order to identify vulnerabilities. As such it (i) first filters out dissimilar functions based on a group of heterogeneous features, (ii) it then further filters out dissimilar functions based on their execution paths, and (iii) it finally identifies candidate functions based on fuzzy graph matching . In order to validate our methodologies capabilities, it is implemented as a binary analysis framework entitled BinArm. The resulting algorithm is then put through a rigorous set of evaluations that demonstrate its capabilities. These include the capability to identify vulnerabilities within a given IED firmware image with a total accuracy of 0.92

    Comparative gene transfer efficiency of low molecular weight polylysine DNA-condensing peptides

    Full text link
    In a previous report (M.S. Wadhwa et al . (1997) Bioconjugate Chem. 8, 81–88), we synthesized a panel of polylysine-containing peptides and determined that a minimal repeating lysine chain of 18 residues followed by a tryptophan and an alkylated cysteine residue (AlkCWK 18 ) resulted in the formation of optimal size (78 nm diameter) plasmid DNA condensates that mediated efficient in vitro gene transfer. Shorter polylysine chains produced larger DNA condensates and mediated much lower gene expression while longer lysine chains were equivalent to AlkCWK 18 . Surprisingly, AlkCWK 18 (molecular weight 2672) was a much better gene transfer agent than commercially available low molecular weight polylysine (molecular weight 1000–4000), despite its similar molecular weight. Possible explanations were that the cysteine or tryptophan residue in AlkCWK 18 contributed to the DNA binding and the formation of small condensates or that the homogeneity of AlkCWK 18 relative to low molecular weight polylysine facilitated optimal condensation. To test these hypotheses, the present study prepared AlkCYK 18 and K 20 and used these to form DNA condensates and conduct in vitro gene transfer. The results established that DNA condensates prepared with either AlkCYK 18 or K 20 possessed identical particle size and mediated in vitro gene transfer efficiencies that were indistinguishable from AlkCWK 18 DNA condensates, eliminating the possibility of contributions from cysteine or tryptophan. However, a detailed chromatographic and electrospray mass spectrometry analysis of low molecular weight polylysine revealed it to possess a much lower than anticipated average chain length of dp 6. Thus, the short chain length of low molecular weight polylysine explains its inability to form small DNA condensates and mediate efficient gene transfer relative to AlkCWK 18 DNA condensates. These experiments further emphasize the need to develop homogenous low molecular weight carrier molecules for nonviral gene delivery.Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/74767/1/j.1399-3011.1999.00104.x.pd

    Fitness landscape of the cellular automata majority problem: View from the Olympus

    Get PDF
    In this paper we study cellular automata (CAs) that perform the computational Majority task. This task is a good example of what the phenomenon of emergence in complex systems is. We take an interest in the reasons that make this particular fitness landscape a difficult one. The first goal is to study the landscape as such, and thus it is ideally independent from the actual heuristics used to search the space. However, a second goal is to understand the features a good search technique for this particular problem space should possess. We statistically quantify in various ways the degree of difficulty of searching this landscape. Due to neutrality, investigations based on sampling techniques on the whole landscape are difficult to conduct. So, we go exploring the landscape from the top. Although it has been proved that no CA can perform the task perfectly, several efficient CAs for this task have been found. Exploiting similarities between these CAs and symmetries in the landscape, we define the Olympus landscape which is regarded as the ''heavenly home'' of the best local optima known (blok). Then we measure several properties of this subspace. Although it is easier to find relevant CAs in this subspace than in the overall landscape, there are structural reasons that prevent a searcher from finding overfitted CAs in the Olympus. Finally, we study dynamics and performance of genetic algorithms on the Olympus in order to confirm our analysis and to find efficient CAs for the Majority problem with low computational cost

    A Study on Developer Perception of Transformation Languages for Refactoring

    Get PDF
    Although there is much research advancing state-of-art of program transformation tools, their application in industry source code change problems has not yet been gauged. In this context, the purpose of this paper is to better understand developer familiarity and comfort with these languages by conducting a survey. It poses, and answers, four research questions to understand how frequently source code transformation languages are applied to refactoring tasks, how well-known these languages are in industry, what developers think are obstacles to adoption, and what developer refactoring habits tell us about their current use, or underuse, of transformation languages. The results show that while source code transformation languages can fill a needed niche in refactoring, research must motivate their application. We provide explanations and insights based on data, aimed at the program transformation and refactoring communities, with a goal to motivate future research and ultimately improve industry adoption of transformation languages for refactoring tasks
    corecore