655 resultados para Rin chen gter mdzod chen mo
Resumo:
In sustainable development projects, as well as other types of projects, knowledge transfer is important for the organisations managing the project. Nevertheless, knowledge transfer among employees does not happen automatically and it has been found that the lack of social networks and the lack of trust among employees are the major barriers to effective knowledge transfer. Social network analysis has been recognised as a very important tool for improving knowledge transfer in the project environment. Transfer of knowledge is more effective where it depends heavily on social networks and informal dialogue. Based on the theory of social capital, social capital consists of two parts: conduits network and resource exchange network. This research studies the relationships among performance, the resource exchange network (such as the knowledge network) and the relationship network (such as strong ties network, energy network, and trust network) at the individual and project levels. The aim of this chapter is to present an approach to overcoming the lack of social networks and lack of trust to improve knowledge transfer within project-based organisations. This is to be done by identifying the optimum structure of relationship networks and knowledge networks within small and medium projects. The optimal structure of the relationship networks and knowledge networks is measured using two dimensions: intra-project and inter-project. This chapter also outlines an extensive literature review in the areas of social capital, knowledge management and project management, and presents the conceptual model of the research approach.
Resumo:
Aim: Bone loss associated with trauma, osteo-degenerative diseases and tumors has tremendous socioeconomic impact related to personal and occupation disability and health care costs. In the present climate of increasing life expectancy with an ensuing increase in bone-related injuries, orthopaedic surgery is undergoing a paradigm shift from bone-grafting to bone engineering, where a scaffold is implanted to provide adequate load bearing and enhance tissue regeneration. We aim to develop composite scaffolds for bone tissue engineering applications to replace the current gold standard of autografting. ---------- Methods: Medical grade polycaprolactone-tricalcium phosphate (mPCL/TCP) scaffolds (80/20 wt%) were custom made using fused deposition modelling to produce 1x1.5x2 cm sized implants for critical-sized pig cranial implantations, empty defects were used as a control. Autologous bone marrow stromal cells (BMSCs) were extracted and precultured for 2 weeks, dispersed within fibrin glue and injected during scaffold implantation. After 2 years, microcomputed tomography and histology were used to assess bone regenerative capabilities of cell versus cell-free scaffolds. ---------- Results: Extensive bone regeneration was evident throughout the entire scaffold. Clear osteocytes embedded within mineralised matrix and active osteoblasts present around scaffold struts were observed. Cell groups performed better than cell-free scaffolds. ---------- Conclusions: Bone regeneration within defects which cannot heal unassisted can be achieved using mPCL/TCP scaffolds. This is improved by the inclusion of autogenous BMSCs. Further work will include the inclusion of growth factors including BMP-2, VEGF and PDGF to provide multifunctional scaffolds, where the three-dimensional (3D) template itself acts as a biomimetic, programmable and multi-drug delivery device.
Resumo:
An academic literacies approach frames students as active participants in their own learning as they develop their voice and identity. This paper describes teachers’ perceptions of developing and delivering an academic literacies program to TESOL pre-service teachers in a B.Ed twinning program. Data indicates that an academic literacies program is a dynamic process that is ever evolving in order to meet students’ needs. A cornerstone of the program was the continual and open communication between teachers to ensure that students’ needs were met. Additionally, a collaborative approach between twinning partners needs to occur in order for the benefits of the academic literacies program to continue for students.
Resumo:
In wireless mobile ad hoc networks (MANETs), packet transmission is impaired by radio link fluctuations. This paper proposes a novel channel adaptive routing protocol which extends the Ad-hoc On-Demand Multipath Distance Vector routing protocol (AOMDV) to accommodate channel fading. Specifically, the proposed Channel Aware AOMDV (CA-AOMDV) uses the channel average non-fading duration as a routing metric to select stable links for path discovery, and applies a preemptive handoff strategy to maintain reliable connections by exploiting channel state information. Using the same information, paths can be reused when they become available again, rather than being discarded. We provide new theoretical results for the downtime and lifetime of a live-die-live multiple path system, as well as detailed theoretical expressions for common network performance measures, providing useful insights into the differences in performance between CA-AOMDV and AOMDV. Simulation and theoretical results show that CA-AOMDV has greatly improved network performance over AOMDV.
Resumo:
Thermally activated Palygorskite (Pg) has been found to be a good adsorbent material for ammonia (NH3) and sulfur dioxide (SO2). This research investigated the effect of thermal treatment on pore structure and surface acid-alkali properties of Pg through the adsorption-desorption of NH3 and SO2. The results showed that, up to 200 °C, the adsorption of NH3 on Pg was significantly higher than SO2. This was due to NH3 being adsorbed in the internal surface of Pg and forming hydrogen bonds (H-bonds) with coordinated water. The increase in thermal treatment temp. from 150 to 550 °C, showed a gradual decrease in the no. of surface acid sites, while the no. of surface alk. sites increased from 200 to 400 °C. The change of surface acidity-alk. sites is due to the collapse of internal channels of Pg and desorption of different types of hydroxyls assocd. with the Pg structure.
Resumo:
Client puzzles are meant to act as a defense against denial of service (DoS) attacks by requiring a client to solve some moderately hard problem before being granted access to a resource. However, recent client puzzle difficulty definitions (Stebila and Ustaoglu, 2009; Chen et al., 2009) do not ensure that solving n puzzles is n times harder than solving one puzzle. Motivated by examples of puzzles where this is the case, we present stronger definitions of difficulty for client puzzles that are meaningful in the context of adversaries with more computational power than required to solve a single puzzle. A protocol using strong client puzzles may still not be secure against DoS attacks if the puzzles are not used in a secure manner. We describe a security model for analyzing the DoS resistance of any protocol in the context of client puzzles and give a generic technique for combining any protocol with a strong client puzzle to obtain a DoS-resistant protocol.
Resumo:
Online dating networks, a type of social network, are gaining popularity. With many people joining and being available in the network, users are overwhelmed with choices when choosing their ideal partners. This problem can be overcome by utilizing recommendation methods. However, traditional recommendation methods are ineffective and inefficient for online dating networks where the dataset is sparse and/or large and two-way matching is required. We propose a methodology by using clustering, SimRank to recommend matching candidates to users in an online dating network. Data from a live online dating network is used in evaluation. The success rate of recommendation obtained using the proposed method is compared with baseline success rate of the network and the performance is improved by double.
Resumo:
Due to the change in attitudes and lifestyles, people expect to find new partners and friends via various ways now-a-days. Online dating networks create a network for people to meet each other and allow making contact with different objectives of developing a personal, romantic or sexual relationship. Due to the higher expectation of users, online matching companies are trying to adopt recommender systems. However, the existing recommendation techniques such as content-based, collaborative filtering or hybrid techniques focus on users explicit contact behaviors but ignore the implicit relationship among users in the network. This paper proposes a social matching system that uses past relations and user similarities in finding potential matches. The proposed system is evaluated on the dataset collected from an online dating network. Empirical analysis shows that the recommendation success rate has increased to 31% as compared to the baseline success rate of 19%.
Resumo:
A protein-truncating variant of CHEK2, 1100delC, is associated with a moderate increase in breast cancer risk. We have determined the prevalence of this allele in index cases from 300 Australian multiple-case breast cancer families, 95% of which had been found to be negative for mutations in BRCA1 and BRCA2. Only two (0.6%) index cases heterozygous for the CHEK2 mutation were identified. All available relatives in these two families were genotyped, but there was no evidence of co-segregation between the CHEK2 variant and breast cancer. Lymphoblastoid cell lines established from a heterozygous carrier contained approximately 20% of the CHEK2 1100delC mRNA relative to wild-type CHEK2 transcript. However, no truncated CHK2 protein was detectable. Analyses of expression and phosphorylation of wild-type CHK2 suggest that the variant is likely to act by haploinsufficiency. Analysis of CDC25A degradation, a downstream target of CHK2, suggests that some compensation occurs to allow normal degradation of CDC25A. Such compensation of the 1100delC defect in CHEK2 might explain the rather low breast cancer risk associated with the CHEK2 variant, compared to that associated with truncating mutations in BRCA1 or BRCA2.
Resumo:
hSSB1 is a newly discovered single-stranded DNA (ssDNA)-binding protein that is essential for efficient DNA double-strand break signalling through ATM. However, the mechanism by which hSSB1 functions to allow efficient signalling is unknown. Here, we show that hSSB1 is recruited rapidly to sites of double-strand DNA breaks (DSBs) in all interphase cells (G1, S and G2) independently of, CtIP, MDC1 and the MRN complex (Rad50, Mre11, NBS1). However expansion of hSSB1 from the DSB site requires the function of MRN. Strikingly, silencing of hSSB1 prevents foci formation as well as recruitment of MRN to sites of DSBs and leads to a subsequent defect in resection of DSBs as evident by defective RPA and ssDNA generation. Our data suggests that hSSB1 functions upstream of MRN to promote its recruitment at DSBs and is required for efficient resection of DSBs. These findings, together with previous work establish essential roles of hSSB1 in controlling ATM activation and activity, and subsequent DSB resection and homologous recombination (HR).
Resumo:
Personalised social matching systems can be seen as recommender systems that recommend people to others in the social networks. However, with the rapid growth of users in social networks and the information that a social matching system requires about the users, recommender system techniques have become insufficiently adept at matching users in social networks. This paper presents a hybrid social matching system that takes advantage of both collaborative and content-based concepts of recommendation. The clustering technique is used to reduce the number of users that the matching system needs to consider and to overcome other problems from which social matching systems suffer, such as cold start problem due to the absence of implicit information about a new user. The proposed system has been evaluated on a dataset obtained from an online dating website. Empirical analysis shows that accuracy of the matching process is increased, using both user information (explicit data) and user behavior (implicit data).
Resumo:
In the face of increasing concern over global warming and climate change, interest in the utilizzation of solar energy for building operations is rapidly growing. In this entry, the importance of using renewable energy in building operations is first introduced. This is followed by a general overview on the energy from the sun and the methods to utilize solar energy. Possible applications of solar energy in building operations are then discussed, which include the use of solar energy in the forms of daylighting, hot water heating, space heating and cooling, and building-integrated photovoltaics.
Resumo:
Hot spot identification (HSID) plays a significant role in improving the safety of transportation networks. Numerous HSID methods have been proposed, developed, and evaluated in the literature. The vast majority of HSID methods reported and evaluated in the literature assume that crash data are complete, reliable, and accurate. Crash under-reporting, however, has long been recognized as a threat to the accuracy and completeness of historical traffic crash records. As a natural continuation of prior studies, the paper evaluates the influence that under-reported crashes exert on HSID methods. To conduct the evaluation, five groups of data gathered from Arizona Department of Transportation (ADOT) over the course of three years are adjusted to account for fifteen different assumed levels of under-reporting. Three identification methods are evaluated: simple ranking (SR), empirical Bayes (EB) and full Bayes (FB). Various threshold levels for establishing hotspots are explored. Finally, two evaluation criteria are compared across HSID methods. The results illustrate that the identification bias—the ability to correctly identify at risk sites--under-reporting is influenced by the degree of under-reporting. Comparatively speaking, crash under-reporting has the largest influence on the FB method and the least influence on the SR method. Additionally, the impact is positively related to the percentage of the under-reported PDO crashes and inversely related to the percentage of the under-reported injury crashes. This finding is significant because it reveals that despite PDO crashes being least severe and costly, they have the most significant influence on the accuracy of HSID.
Resumo:
Planning on utilization of train-set is one of the key tasks of transport organization for passenger dedicated railway in China. It also has strong relationships with timetable scheduling and operation plans at a station. To execute such a task in a railway hub pooling multiple railway lines, the characteristics of multiple routing for train-set is discussed in term of semicircle of train-sets' turnover. In programming the described problem, the minimum dwell time is selected as the objectives with special derive constraints of the train-set's dispatch, the connecting conditions, the principle of uniqueness for train-sets, and the first plus for connection in the same direction based on time tolerance σ. A compact connection algorithm based on time tolerance is then designed. The feasibility of the model and the algorithm is proved by the case study. The result indicates that the circulation model and algorithm about multiple routing can deal with the connections between the train-sets of multiple directions, and reduce the train's pulling in or leaving impact on the station's throat.
Resumo:
Gradual authentication is a principle proposed by Meadows as a way to tackle denial-of-service attacks on network protocols by gradually increasing the confidence in clients before the server commits resources. In this paper, we propose an efficient method that allows a defending server to authenticate its clients gradually with the help of some fast-to-verify measures. Our method integrates hash-based client puzzles along with a special class of digital signatures supporting fast verification. Our hash-based client puzzle provides finer granularity of difficulty and is proven secure in the puzzle difficulty model of Chen et al. (2009). We integrate this with the fast-verification digital signature scheme proposed by Bernstein (2000, 2008). These schemes can be up to 20 times faster for client authentication compared to RSA-based schemes. Our experimental results show that, in the Secure Sockets Layer (SSL) protocol, fast verification digital signatures can provide a 7% increase in connections per second compared to RSA signatures, and our integration of client puzzles with client authentication imposes no performance penalty on the server since puzzle verification is a part of signature verification.