251 resultados para Pauli-like contributions


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Presented is the material and gas sensing properties of graphene-like nano-sheets deposited on 36° YX lithium tantalate (LiTaO3) surface acoustic wave (SAW) transducers. The graphene-like nano-sheets were characterized via scanning electron microscopy (SEM), atomic force microscopy(AFM)and X-ray photoelectron spectroscopy (XPS). The graphenelike nano-sheet/SAW sensors were exposed to different concentrations of hydrogen (H2) gas in a synthetic air at room temperature. The developed sensors exhibit good sensitivity towards low concentrations of H2 in ambient conditions, as well as excellent dynamic performance towards H2 at room temperature.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Thin films consisting of graphene-like nano-sheets were deposited onto LiTaO3 surface acoustic wave transducers. A thickness of less than 10 nm and the existence of C-C bond were observed during the characterization of graphene-like nano-sheets. Frequency shift of 18.7 kHz and 14.9 kHz towards 8.5 ppm NO2 at two different operating temperature, 40°C and 25°C, respectively, was observed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Biological validation of new radiotherapy modalities is essential to understand their therapeutic potential. Antiprotons have been proposed for cancer therapy due to enhanced dose deposition provided by antiproton-nucleon annihilation. We assessed cellular DNA damage and relative biological effectiveness (RBE) of a clinically relevant antiproton beam. Despite a modest LET (~19 keV/μm), antiproton spread out Bragg peak (SOBP) irradiation caused significant residual γ-H2AX foci compared to X-ray, proton and antiproton plateau irradiation. RBE of ~1.48 in the SOBP and ~1 in the plateau were measured and used for a qualitative effective dose curve comparison with proton and carbon-ions. Foci in the antiproton SOBP were larger and more structured compared to X-rays, protons and carbon-ions. This is likely due to overlapping particle tracks near the annihilation vertex, creating spatially correlated DNA lesions. No biological effects were observed at 28–42 mm away from the primary beam suggesting minimal risk from long-range secondary particles.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Schizosaccharomyces pombe Mei2 gene encodes an RNA recognition motif (RRM) protein that stimulates meiosis upon binding a specific non-coding RNA and subsequent accumulation in a “mei2-dot” in the nucleus. We present here the first systematic characterization of the family of proteins with characteristic Mei2-like amino acid sequences. Mei2-like proteins are an ancient eukaryotic protein family with three identifiable RRMs. The C-terminal RRM (RRM3) is unique to Mei2-like proteins and is the most highly conserved of the three RRMs. RRM3 also contains conserved sequence elements at its C-terminus not found in other RRM domains. Single copy Mei2-like genes are present in some fungi, in alveolates such as Paramecium and in the early branching eukaryote Entamoeba histolytica, while plants contain small families of Mei2-like genes. While the C-terminal RRM is highly conserved between plants and fungi, indicating conservation of molecular mechanisms, plant Mei2-like genes have changed biological context to regulate various aspects of developmental pattern formation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Given that both academics and marketers are dissatisfied with the current state of advertising research (Kerr and Schultz, 2010; Neff, 2011), the objective of this exploratory paper is to determine the position of world-leading advertising professionals on the use of social media to test, track and evaluate campaigns. Using Delphi methodology, an international panel of Cannes Gold Lion winners acknowledged that social media research has both strengths and weaknesses, the same as any research. Its strengths are its intimacy and spontaneity, bringing the brand and consumer closer. The real risk is the loss of control in this research environment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Growing food presents diverse challenges and opportunities within the urban environment. As cities develop, population density rises, land prices rise, and the opportunity to use land for traditional farming and gardening diminishes. Counter to this trend there are a growing number of both community gardens, city farms, guerrilla gardening, rooftop and vertical gardens, pot plants, windowsill herbs, and other balcony or backyard gardens cropping up in different cities, all with a purpose to produce food. This workshop brings to-gether practitioners and researchers in the field of urban agriculture and Hu-man-Computer Interaction to explore and opportunities for technology design to support the different forms of growing practice and foster local food production in cities. This 1-day workshop will serve as an active forum for researchers and practi-tioners across various fields including, but not limited to, agriculture and gar-dening, education, urban planning, human-computer interaction, and communi-ty engagement. This workshop has three distinct points of focus: i) Individual and small-scale gardening and food production, and how to connect like minded people who are involved in these practices to share their knowledge ii) Com-munities involved in urban agriculture, either through community gardens, city farms, or grassroots movements, often dependant on volunteer participation, providing the challenge of managing limited resources iii) Environmental and sociocultural sustainability through urban agriculture. The participants will have an opportunity to present their own work. This will be followed by a visit to a nearby city farm, which will provide a local context for a group design exercise. Finally the workshop will conclude with panel dis-cussions to review opportunities for further research and collaborations beyond the conference. For more information, please visit the workshop website, at http://www.urbaninformatics.net/resources/interact2013cfp/

Relevância:

20.00% 20.00%

Publicador:

Resumo:

BACKGROUND: Despite the fact that traditional Chinese medicine (TCM) has been developed and used to treat acute and urgent illness for many thousands of years. TCM has been widely perceived in western societies that TCM may only be effective to treat chronic diseases. The aim of this article is to provide some scientific evidence regarding the application of TCM in emergency medicine and its future potential. METHODS: Multiple databases (PubMed, ProQuest, Academic Search Elite and Science Direct) were searched using the terms: Traditional Chinese Medicine/ Chinese Medicine, Emergency Medicine, China. In addition, three leading TCM Journals in China were searched via Oriprobe Information Services for relevant articles (published from 1990—2012). Particular attention was paid to those articles that are related to TCM treatments or combined medicine in dealing with intensive and critical care. RESULTS: TCM is a systematic traditional macro medicine. The clinical practice of TCM is guided by the TCM theoretical framework – a methodology founded thousands of years ago. As the methodologies between TCM and Biomedicine are significantly different, it provides an opportunity to combine two medicines, in order to achieve clinical efficacy. Nowadays, combined medicine has become a common clinical model particular in TCM hospitals in China. CONCLUSIONS: It is evident that TCM can provide some assistance in emergency although to combine them in practice is stillits infant form and is mainly at TCM hospitals in China. The future effort could be put into TCM research, both in laboratories and clinics, with high quality designs, so that TCM could be better understood and then applied in emergency medicine.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Denial-of-service (DoS) attacks are a growing concern to networked services like the Internet. In recent years, major Internet e-commerce and government sites have been disabled due to various DoS attacks. A common form of DoS attack is a resource depletion attack, in which an attacker tries to overload the server's resources, such as memory or computational power, rendering the server unable to service honest clients. A promising way to deal with this problem is for a defending server to identify and segregate malicious traffic as earlier as possible. Client puzzles, also known as proofs of work, have been shown to be a promising tool to thwart DoS attacks in network protocols, particularly in authentication protocols. In this thesis, we design efficient client puzzles and propose a stronger security model to analyse client puzzles. We revisit a few key establishment protocols to analyse their DoS resilient properties and strengthen them using existing and novel techniques. Our contributions in the thesis are manifold. We propose an efficient client puzzle that enjoys its security in the standard model under new computational assumptions. Assuming the presence of powerful DoS attackers, we find a weakness in the most recent security model proposed to analyse client puzzles and this study leads us to introduce a better security model for analysing client puzzles. We demonstrate the utility of our new security definitions by including two hash based stronger client puzzles. We also show that using stronger client puzzles any protocol can be converted into a provably secure DoS resilient key exchange protocol. In other contributions, we analyse DoS resilient properties of network protocols such as Just Fast Keying (JFK) and Transport Layer Security (TLS). In the JFK protocol, we identify a new DoS attack by applying Meadows' cost based framework to analyse DoS resilient properties. We also prove that the original security claim of JFK does not hold. Then we combine an existing technique to reduce the server cost and prove that the new variant of JFK achieves perfect forward secrecy (the property not achieved by original JFK protocol) and secure under the original security assumptions of JFK. Finally, we introduce a novel cost shifting technique which reduces the computation cost of the server significantly and employ the technique in the most important network protocol, TLS, to analyse the security of the resultant protocol. We also observe that the cost shifting technique can be incorporated in any Diffine{Hellman based key exchange protocol to reduce the Diffie{Hellman exponential cost of a party by one multiplication and one addition.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Universities are more and more challenged by the emerging global higher education market, facilitated by advances in Information and Communication Technologies (ICT). This requires them to reconsider their mission and direction in order to function effectively and efficiently, and to be responsive to changes in their environment. In the face of increasing demands and competitive pressures, Universities like other companies, seek to continuously innovate and improve their performance. Universities are considering co-operating or sharing, both internally and externally, in a wide range of areas to achieve cost effectiveness and improvements in performance. Shared services are an effective model for re-organizing to reduce costs, increase quality and create new capabilities. Shared services are not limited to the Higher Education (HE) sector. Organizations across different sectors are adopting shared services, in particular for support functions such as Finance, Accounting, Human Resources and Information Technology. While shared services has been around for more than three decades, commencing in the 1970’s in the banking sector and then been adopted by other sectors, it is an under researched domain, with little consensus on the most fundamental issues even as basic as defining what shared services is. Moreover, the interest in shared services within Higher Education is a global phenomenon. This study on shared services is situated within the Higher Education Sector of Malaysia, and originated as an outcome resulting from a national project (2005 – 2007) conducted by the Ministry of Higher Education (MOHE) entitled "Knowledge, Information Communication Technology Strategic Plan (KICTSP) for Malaysian Public Higher Education"- where progress towards more collaborations via shared services was a key recommendation. The study’s primary objective was to understand the nature and potential for ICT shared services, in particular in the Malaysian HE sector; by laying a foundation in terms of definition, typologies and research agenda and deriving theoretically based conceptualisations of the potential benefits of shared services, success factors and issues of pursuing shared services. The study embarked on this objective with a literature review and pilot case study as a means to further define the context of the study, given the current under-researched status of ICT shared services and of shared services in Higher Education. This context definition phase illustrated a range of unaddressed issues; including a lack of common understanding of what shared services are, how they are formed, what objectives they full fill, who is involved etc. The study thus embarked on a further investigation of a more foundational nature with an exploratory phase that aimed to address these gaps, where a detailed archival analysis of shared services literature within the IS context was conducted to better understand shared services from an IS perspective. The IS literature on shared services was analysed in depth to report on the current status of shared services research in the IS domain; in particular definitions, objectives, stakeholders, the notion of sharing, theories used, and research methods applied were analysed, which provided a firmer base to this study’s design. The study also conducted a detailed content analysis of 36 cases (globally) of shared services implementations in the HE sector to better understand how shared services are structured within the HE sector and what is been shared. The results of the context definition phase and exploratory phase formed a firm basis in the multiple case studies phase which was designed to address the primary goals of this study (as presented above). Three case sites within the Malaysian HE sector was included in this analysis, resulting in empirically supported theoretical conceptualizations of shared services success factors, issues and benefits. A range of contributions are made through this study. First, the detailed archival analysis of shared services in Information Systems (IS) demonstrated the dearth of research on shared services within Information Systems. While the existing literature was synthesised to contribute towards an improved understanding of shared services in the IS domain, the areas that are yet under-developed and requires further exploration is identified and presented as a proposed research agenda for the field. This study also provides theoretical considerations and methodological guidelines to support the research agenda; to conduct better empirical research in this domain. A number of literatures based a priori frameworks (i.e. on the forms of sharing and shared services stakeholders etc) are derived in this phase, contributing to practice and research with early conceptualisations of critical aspects of shared services. Furthermore, the comprehensive archival analysis design presented and executed here is an exemplary approach of a systematic, pre-defined and tool-supported method to extract, analyse and report literature, and is documented as guidelines that can be applied for other similar literature analysis, with particular attention to supporting novice researchers. Second, the content analysis of 36 shared services initiatives in the Higher Education sector presented eight different types of structural arrangements for shared services, as observed in practice, and the salient dimensions along which those types can be usefully differentiated. Each of the eight structural arrangement types are defined and demonstrated through case examples, with further descriptive details and insights to what is shared and how the sharing occurs. This typology, grounded on secondary empirical evidence, can serve as a useful analytical tool for researchers investigating the shared services phenomenon further, and for practitioners considering the introduction or further development of shared services. Finally, the multiple case studies conducted in the Malaysian Higher Education sector, provided further empirical basis to instantiate the conceptual frameworks and typology derived from the prior phases and develops an empirically supported: (i) framework of issues and challenges, (ii) a preliminary theory of shared services success, and (iii) a benefits framework, for shared services in the Higher Education sector.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

First principle calculations for a hexagonal (graphene-like) boron nitride (g-BN) monolayer sheet in the presence of a boron-atom vacancy show promising properties for capture and activation of carbon dioxide. CO2 is found to decompose to produce an oxygen molecule via an intermediate chemisorption state on the defect g-BN sheet. The three stationary states and two transition states in the reaction pathway are confirmed by minimum energy pathway search and frequency analysis. The values computed for the two energy barriers involved in this catalytic reaction after enthalpy correction indicate that the catalytic reaction should proceed readily at room temperature.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Physical activity has been identified as a key behaviour in determining an individual’s health and functioning. Adolescent physical inactivity has been shown to track strongly through to adulthood. Interventions in youth to promote and increase physical activity have had mixed results. The significant rise over the past decade in time spent by adolescents performing social networking may provide a unique opportunity for health promoters to interact with adolescents through a familiar medium. The purpose of was study is to investigate the potential utility of social networking and associated technologies for the promotion of physical activity amongst adolescents. Participants were recruited from two nondenominational same-sex private schools, from high socioeconomic backgrounds in Brisbane, Australia. A total of 112 (90.3%) participants had complete data sets and were included in the analysis. Account ownership and rates of access to some social networking sites were high. However, a combination of a lack of interest and additional risks associated with social networking utilities, means that caution should be undertaken prior to the commencement of any intervention seeking to increase engagement in physical activities through these mediums. Student smart phone access and interest in smart phone applications for physical activity promotion purposes were moderate, and may provide opportunities for samples of adolescents from high socioeconomic backgrounds who are more likely to have access to appropriate technologies. As technology advances, the rate of smart phone ownership as opposed to overall phone ownership is likely to steadily increase over time. Access and use of information technology by children likely to continue to become more convenient. This makes smart phone applications as a means for physical activity promotion progressively more practical, and a promising future option.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A synthetic reevesite-like material has been shown to decolorize selected dyes and degrade phenolic contaminants photocatalytically in water when irradiated with visible light. This material can photoactively decolorize dyes such as bromophenol blue, bromocresol green, bromothymol blue, thymol blue and methyl orange in less than 15 min under visible light radiation in the absence of additional oxidizing agents. Conversely, phenolic compounds suc has phenol, p-chlorophenol and p-nitrophenol are photocat- alytically degraded in approximately 3hwith additional H2O2 when irradiated with visible light. These reactions offer potentially energy effective pathways for the removal of recalcitrant organic waste contaminants.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Despite its potential multiple contributions to sustainable policy objectives, urban transit is generally not widely used by the public in terms of its market share compared to that of automobiles, particularly in affluent societies with low-density urban forms like Australia. Transit service providers need to attract more people to transit by improving transit quality of service. The key to cost-effective transit service improvements lies in accurate evaluation of policy proposals by taking into account their impacts on transit users. If transit providers knew what is more or less important to their customers, they could focus their efforts on optimising customer-oriented service. Policy interventions could also be specified to influence transit users’ travel decisions, with targets of customer satisfaction and broader community welfare. This significance motivates the research into the relationship between urban transit quality of service and its user perception as well as behaviour. This research focused on two dimensions of transit user’s travel behaviour: route choice and access arrival time choice. The study area chosen was a busy urban transit corridor linking Brisbane central business district (CBD) and the St. Lucia campus of The University of Queensland (UQ). This multi-system corridor provided a ‘natural experiment’ for transit users between the CBD and UQ, as they can choose between busway 109 (with grade-separate exclusive right-of-way), ordinary on-street bus 412, and linear fast ferry CityCat on the Brisbane River. The population of interest was set as the attendees to UQ, who travelled from the CBD or from a suburb via the CBD. Two waves of internet-based self-completion questionnaire surveys were conducted to collect data on sampled passengers’ perception of transit service quality and behaviour of using public transit in the study area. The first wave survey is to collect behaviour and attitude data on respondents’ daily transit usage and their direct rating of importance on factors of route-level transit quality of service. A series of statistical analyses is conducted to examine the relationships between transit users’ travel and personal characteristics and their transit usage characteristics. A factor-cluster segmentation procedure is applied to respodents’ importance ratings on service quality variables regarding transit route preference to explore users’ various perspectives to transit quality of service. Based on the perceptions of service quality collected from the second wave survey, a series of quality criteria of the transit routes under study was quantitatively measured, particularly, the travel time reliability in terms of schedule adherence. It was proved that mixed traffic conditions and peak-period effects can affect transit service reliability. Multinomial logit models of transit user’s route choice were estimated using route-level service quality perceptions collected in the second wave survey. Relative importance of service quality factors were derived from choice model’s significant parameter estimates, such as access and egress times, seat availability, and busway system. Interpretations of the parameter estimates were conducted, particularly the equivalent in-vehicle time of access and egress times, and busway in-vehicle time. Market segmentation by trip origin was applied to investigate the difference in magnitude between the parameter estimates of access and egress times. The significant costs of transfer in transit trips were highlighted. These importance ratios were applied back to quality perceptions collected as RP data to compare the satisfaction levels between the service attributes and to generate an action relevance matrix to prioritise attributes for quality improvement. An empirical study on the relationship between average passenger waiting time and transit service characteristics was performed using the service quality perceived. Passenger arrivals for services with long headways (over 15 minutes) were found to be obviously coordinated with scheduled departure times of transit vehicles in order to reduce waiting time. This drove further investigations and modelling innovations in passenger’ access arrival time choice and its relationships with transit service characteristics and average passenger waiting time. Specifically, original contributions were made in formulation of expected waiting time, analysis of the risk-aversion attitude to missing desired service run in the passengers’ access time arrivals’ choice, and extensions of the utility function specification for modelling passenger access arrival distribution, by using complicated expected utility forms and non-linear probability weighting to explicitly accommodate the risk of missing an intended service and passenger’s risk-aversion attitude. Discussions on this research’s contributions to knowledge, its limitations, and recommendations for future research are provided at the concluding section of this thesis.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Synopsis and review of For the Term of His Natural Life (Norman Dawn, 1927). Includes cast and credits. For the Term of His Natural Life was one of the last Australian silent films, and also one of the most significant in the history of Australian cinema. At the time of its production, controversy raged over its depiction of convict life, its scale and cost (which was reported to be around 50,000 pounds at a time when most Australian films had budgets of less than 2,000 pounds1) and the fact that the director, several of the crew and the leading cast members were American. Australasian Films launched a publicity campaign of unprecedented scale to counter opposition to the film’s subject matter and the charge that they were “seeking to make capital out of the drab and sordid days of Australia”.2 The film’s expense was turned into a virtue: hundreds of unemployed men were used as extras, while the film also provided work for many within the Australian film industry and, according to Australasian, enabled the establishment of new production companies. The American imports who earlier had been accused of being “party to the slaughtering” of the Australian film industry, were feted for their artistic contributions, and the concerns raised in federal parliament about an American “invasion” were deflected by claims about what the local industry could learn from those with Hollywood experience.3 The publicity campaign was successful, as the film proved enormously popular at the Australian box office in its initial run. But the coming of sound film in 1928 had a considerable impact on audiences for silent films like For the Term, and its early local success was not repeated in subsequent seasons or in overseas markets...

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Multiple sclerosis (MS) is a serious cause of neurological disability among young adults. The clinical course remains difficult to predict, and the pathogenesis of the disease is still modestly understood. Autoimmunity is thought to be a key aspect of the disease, with autoreactive T cells thought to mediate central nervous system (CNS) inflammation to some extent. Toll-like receptors are known to mediate cellular recognition of pathogens by way of patterns of molecular presentation. Toll-like receptor 3 is coded by the gene TLR3 and is recognized as an important factor in virus recognition and is known to be involved in the expression of neuroprotective mediators. We set out to investigate two variations within the TLR3 gene, an 8 bp insertion-deletion \[-/A](8) and a single base-pair variation C1236T, in subjects with MS and matched healthy controls to determine whether significant differences exist in these markers in an Australian population. We used capillary gel electrophoresis and TaqMan genotyping assay techniques to resolve genotypes for each marker, respectively. Our work found no significant difference between frequencies for TLR3 \[-/A](8) by genotype (chi(2)=1.03, p=0.60) or allele (chi(2)=1.09, p=0.30). Similarly, we found no evidence for the association of TLR3 C1236T by genotype (chi(2)=0.35, p=0.84) or allele frequency (chi(2)=0.31, p=0.58). This work reveals no evidence to suggest that these markers are associated with MS in the tested population. Although the role of TLR3 and the wider toll-like receptor family remain significant in neurological and CNS inflammatory disorders, our current work does not support a role for the two tested variants in this gene with regard to MS susceptibility.