7,099 research outputs found

    Consortial routes to effective repositories

    Get PDF
    A consortial approach to the establishment of repository services can help a group of Higher Education Institutions (HEIs) to share costs, share technology and share expertise. Consortial repository work can tap into existing structures, or it can involve new groupings of institutions with a common interest in exploring repository development. This Briefing Paper outlines some of the potential benefits of collaborative repository activity, and highlights some of the technical and organisational issues for consideration

    The hypertoric intersection cohomology ring

    Full text link
    We present a functorial computation of the equivariant intersection cohomology of a hypertoric variety, and endow it with a natural ring structure. When the hyperplane arrangement associated with the hypertoric variety is unimodular, we show that this ring structure is induced by a ring structure on the equivariant intersection cohomology sheaf in the equivariant derived category. The computation is given in terms of a localization functor which takes equivariant sheaves on a sufficiently nice stratified space to sheaves on a poset.Comment: Significant revisions in Section 5, with several corrected proof

    The design and relevance of a computerised therapy program for indigenous Māori adolescents.

    Get PDF
    Background: Depression is a major health issue among Māori indigenous adolescents, yet there has been little investigation into the relevance or effectiveness of psychological treatments for them. Further, consumer views are critical for engagement and adherence to therapy. However, there is little research regarding indigenous communities’ opinions about psychological interventions for depression. Objective: The objective of this study was to conduct semistructured interviews with Māori (indigenous New Zealand) young people (taitamariki) and their families to find out their opinions of a prototype computerized cognitive behavioral therapy (cCBT) program called Smart, Positive, Active, Realistic, X-factor thoughts (SPARX), a free online computer game intended to help young persons with mild to moderate depression, feeling down, stress or anxiety. The program will teach them how to resolve their issues on their own using Cognitive Behavioural Therapy as psychotherapeutic approach. Methods: There were seven focus groups on the subject of the design and cultural relevance of SPARX that were held, with a total of 26 participants (19 taitamarki, 7 parents/caregivers, all Māori). There were five of the groups that were with whānau (family groups) (n=14), one group was with Māori teenage mothers (n=4), and one group was with taitamariki (n=8). The general inductive approach was used to analyze focus group data. Results: SPARX computerized therapy has good face validity and is seen as potentially effective and appealing for Māori people. Cultural relevance was viewed as being important for the engagement of Māori young people with SPARX. Whānau are important for young peoples’ well-being. Participants generated ideas for improving SPARX for Māori and for the inclusion of whānau in its delivery. Conclusions: SPARX computerized therapy had good face validity for indigenous young people and families. In general, Māori participants were positive about the SPARX prototype and considered it both appealing and applicable to them. The results of this study were used to refine SPARX prior to it being delivered to taitamariki and non-Māori young people

    Poisson-de Rham homology of hypertoric varieties and nilpotent cones

    Get PDF
    We prove a conjecture of Etingof and the second author for hypertoric varieties, that the Poisson-de Rham homology of a unimodular hypertoric cone is isomorphic to the de Rham cohomology of its hypertoric resolution. More generally, we prove that this conjecture holds for an arbitrary conical variety admitting a symplectic resolution if and only if it holds in degree zero for all normal slices to symplectic leaves. The Poisson-de Rham homology of a Poisson cone inherits a second grading. In the hypertoric case, we compute the resulting 2-variable Poisson-de Rham-Poincare polynomial, and prove that it is equal to a specialization of an enrichment of the Tutte polynomial of a matroid that was introduced by Denham. We also compute this polynomial for S3-varieties of type A in terms of Kostka polynomials, modulo a previous conjecture of the first author, and we give a conjectural answer for nilpotent cones in arbitrary type, which we prove in rank less than or equal to 2.Comment: 25 page

    Man vs. machine: Investigating the effects of adversarial system use on end-user behavior in automated deception detection interviews

    Get PDF
    Deception is an inevitable component of human interaction. Researchers and practitioners are developing information systems to aid in the detection of deceptive communication. Information systems are typically adopted by end users to aid in completing a goal or objective (e.g., increasing the efficiency of a business process). However, end-user interactions with deception detection systems (adversarial systems) are unique because the goals of the system and the user are orthogonal. Prior work investigating systems-based deception detection has focused on the identification of reliable deception indicators. This research extends extant work by looking at how users of deception detection systems alter their behavior in response to the presence of guilty knowledge, relevant stimuli, and system knowledge. An analysis of data collected during two laboratory experiments reveals that guilty knowledge, relevant stimuli, and system knowledge all lead to increased use of countermeasures. The implications and limitations of this research are discussed and avenues for future research are outline

    Leukocyte adhesion: reconceptualizing chemokine presentation by glycosaminoglycans

    Get PDF
    Recruitment of immune cells from the vasculature relies on the presentation of glycosaminoglycan-bound chemokines on the luminal side of vascular endothelial cells. However, the current model of chemokine–glycosaminoglycan interactions, and its implications for receptor interactions, remains poorly developed. We propose a refined ‘Chemokine Cloud’ model, arguing that chemokines are not presented to leukocytes bound to glycosaminoglycans, but rather, in solution while sequestered within the hydrated glycocalyx. We posit that glycosaminoglycans provide an immobilized chemokine depot maintaining a ‘cloud’ of ‘solution-phase’ chemokines within the glycocalyx, and that it is this soluble form of any given chemokine that interacts with leukocyte-bound receptors. Our proposition clarifies certain anomalies associated with the current model of chemokine–glycosaminoglycan interactions, with implications for the design of blockers of chemokine function

    Uptake of spirometry training by GPs

    Get PDF
    Please see first page of PDF for this item. Copyright © 2006 Australian College of General Practitioners Copyright to Australian Family Physician. Reproduced with permission. Permission to reproduce must be sought from the publisher, The Royal Australian College of General Practitioners.Justin Beilby, Clare Harper, Christine Holton, Judy Proudfoot, Mark Harri

    Genome-wide analysis of poly(A) site selection in schizosaccharomyces pombe,

    Get PDF
    Polyadenylation of pre-mRNAs, a critical step in eukaryotic gene expression, is mediated by cis elements collectively called the polyadenylation signal. Genome-wide analysis of such polyadenylation signals was missing in fission yeast, even though it is an important model organism. We demonstrate that the canonical AATAAA motif is the most frequent and functional polyadenylation signal in Schizosaccharomyces pombe. Using analysis of RNA-Seq data sets from cells grown under various physiological conditions, we identify 3′ UTRs for nearly 90% of the yeast genes. Heterogeneity of cleavage sites is common, as is alternative polyadenylation within and between conditions. We validated the computationally identified sequence elements likely to promote polyadenylation by functional assays, including qRT-PCR and 3′RACE analysis. The biological importance of the AATAAA motif is underlined by functional analysis of the genes containing it. Furthermore, it has been shown that convergent genes require trans elements, like cohesin for efficient transcription termination. Here we show that convergent genes lacking cohesin (on chromosome 2) are generally associated with longer overlapping mRNA transcripts. Our bioinformatic and experimental genome-wide results are summarized and can be accessed and customized in a user-friendly database Pomb(A)

    Trends in Phishing Attacks: Suggestions for Future Research

    Get PDF
    One of the most common and costly forms of deception and fraud online is phishing. Due to the ramifications of successfulphishing attacks, security experts and researchers seek to better understand this phenomenon. Prior phishing research hasaddressed the “bait” and “hook” components of phishing attacks, the human-computer interaction that takes place as usersjudge the veracity of phishing emails and websites, and the development of technologies that can aid users in identifying andrejecting these attacks. Despite the extant research on this topic, phishing attacks continue to be successful as tactics evolve,rendering existing research less relevant. Although numerous tools have been created to aid people in recognizing phishingattacks, users disregard the recommendations of these tools. This paper summarizes the core of phishing research, providesan update on trending attack methods, and proposes future research addressing computer credibility in a phishing context

    When Disclosure is Involuntary: Empowering Users with Control to Reduce Concerns

    Get PDF
    Modern organizations must carefully balance the practice of gathering large amounts of valuable data from individuals with the associated ethical considerations and potential negative public image inherent in breaches of privacy. As it becomes increasingly commonplace for many types of information to be collected without individuals\u27 knowledge or consent, managers and researchers alike can benefit from understanding how individuals react to such involuntary disclosures, and how these reactions can impact evaluations of the data-collecting organizations. This research develops and empirically tests a theoretical model that shows how empowering individuals with a sense of control over their personal information can help mitigate privacy concerns following an invasion of privacy. Using a controlled experiment with 94 participants, we show that increasing control can reduce privacy concerns and significantly influence individuals\u27 attitudes toward the organization that has committed a privacy invasion. We discuss theoretical and practical implications of our work
    corecore