234 resultados para historical source
Resumo:
Several I- and A-type granite, syenite plutons and spatially associated, giant Fe–Ti–V deposit-bearing mafic ultramafic layered intrusions occur in the Pan–Xi(Panzhihua–Xichang) area within the inner zone of the Emeishan large igneous province (ELIP). These complexes are interpreted to be related to the Emeishan mantle plume. We present LA-ICP-MS and SIMS zircon U–Pb ages and Hf–Nd isotopic compositions for the gabbros, syenites and granites from these complexes. The dating shows that the age of the felsic intrusive magmatism (256.2 ± 3.0–259.8 ± 1.6 Ma) is indistinguishable from that of the mafic intrusive magmatism (255.4 ± 3.1–259.5 ± 2.7 Ma) and represents the final phase of a continuous magmatic episode that lasted no more than 10 Myr. The upper gabbros in the mafic–ultramafic intrusions are generally more isotopically enriched (lower eNd and eHf) than the middle and lower gabbros, suggesting that the upper gabbros have experienced a higher level of crustal contamination than the lower gabbros. The significantly positive eHf(t) values of the A-type granites and syenites (+4.9 to +10.8) are higher than those of the upper gabbros of the associated mafic intrusion, which shows that they cannot be derived by fractional crystallization of these bodies. They are however identical to those of the mafic enclaves (+7.0 to +11.4) and middle and lower gabbros, implying that they are cogenetic. We suggest that they were generated by fractionation of large-volume, plume-related basaltic magmas that ponded deep in the crust. The deep-seated magma chamber erupted in two stages: the first near a density minimum in the basaltic fractionation trend and the second during the final stage of fractionation when the magma was a low density Fe-poor, Si-rich felsic magma. The basaltic magmas emplaced in the shallowlevel magma chambers differentiated to form mafic–ultramafic layered intrusions accompanied by a small amount of crustal assimilation through roof melting. Evolved A-type granites (synenites and syenodiorites) were produced dominantly by crystallization in the deep crustal magma chamber. In contrast, the I-type granites have negative eNd(t) [-6.3 to -7.5] and eHf(t) [-1.3 to -6.7] values, with the Nd model ages (T Nd DM2) of 1.63-1.67 Ga and Hf model ages (T Hf DM2) of 1.56-1.58 Ga, suggesting that they were mainly derived from partial melting of Mesoproterozoic crust. In combination with previous studies, this study also shows that plume activity not only gave rise to reworking of ancient crust, but also significant growth of juvenile crust in the center of the ELIP.
Resumo:
Relationships between LGBT people and police have been turbulent for some time now, and have been variously characterized as supportive (McGhee, 2004) and antagonistic (Radford, Betts, & Ostermeyer, 2006). These relationships were, and continue to be, influenced by a range of political, legal, cultural, and social factors. This chapter will examine historical and social science accounts of LGBT-police histories to chart the historical peaks and troughs in these relationships. The discussion demonstrates how, in Western contexts, we oscillate between historical moments of police criminalizing homosexual perversity and contemporary landscapes of partnership between police and LGBT people. However, the chapter challenges the notion that it is possible to trace this as a lineal progression from a painful past to a more productive present. Rather, it focuses on specific moments, marked by pain or pleasure or both, and how these moments emerge and re-emerge in ways that shaped LGBT-police landscapes in potted, uneven ways. The chapter concludes noting how, although certain ideas and police practices may shift towards more progressive notions of partnership policing, we cannot just take away the history that emerged out of mistrust and pain.
Resumo:
This paper presents the design of μAV, a palm size open source micro quadrotor constructed on a single Printed Circuit Board. The aim of the micro quadrotor is to provide a lightweight (approximately 86g) and cheap robotic research platform that can be used for a range of robotic applications. One possible application could be a cheap test bed for robotic swarm research. The goal of this paper is to give an overview of the design and capabilities of the micro quadrotor. The micro quadrotor is complete with a 9 Degree of Freedom Inertial Measurement Unit, a Gumstix Overo® Computer-On-Module which can run the widely used Robot Operating System (ROS) for use with other research algorithms.
Resumo:
Background Mycobacterium abscessus is a rapidly growing mycobacterium responsible for progressive pulmonary disease, soft tissue and wound infections. The incidence of disease due to M. abscessus has been increasing in Queensland. In a study of Brisbane drinking water, M. abscessus was isolated from ten different locations. The aim of this study was to compare genotypically the M. abscessus isolates obtained from water to those obtained from human clinical specimens. Methods Between 2007 and 2009, eleven isolates confirmed as M. abscessus were recovered from potable water, one strain was isolated from a rainwater tank and another from a swimming pool and two from domestic taps. Seventy-four clinical isolates referred during the same time period were available for comparison using rep-PCR strain typing (Diversilab). Results The drinking water isolates formed two clusters with ≥97% genetic similarity (Water patterns 1 and 2). The tankwater isolate (WP4), one municipal water isolate (WP3) and the pool isolate (WP5) were distinctly different. Patient isolates formed clusters with all of the water isolates except for WP3. Further patient isolates were unrelated to the water isolates. Conclusion The high degree of similarity between strains of M. abscessus from potable water and strains causing infection in humans from the same geographical area, strengthens the possibility that drinking water may be the source of infection in these patients.
Resumo:
Social networking sites (SNSs), with their large numbers of users and large information base, seem to be perfect breeding grounds for exploiting the vulnerabilities of people, the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as “social engineering.” While technology-based security has been addressed by research and may be well understood, social engineering is more challenging to understand and manage, especially in new environments such as SNSs, owing to some factors of SNSs that reduce the ability of users to detect the attack and increase the ability of attackers to launch it. This work will contribute to the knowledge of social engineering by presenting the first two conceptual models of social engineering attacks in SNSs. Phase-based and source-based models are presented, along with an intensive and comprehensive overview of different aspects of social engineering threats in SNSs.
Resumo:
This project involved writing Turrwan (great man), a novel set in Queensland in the nineteenth century, and an investigation into the way historical novels portray the past. Turrwan tells the story of Tom Petrie, who was six when he arrived with his family at the notorious Moreton Bay Penal Colony in 1837. The thesis examines historical fiction as a genre with particular focus on notions of historical authenticity. It analyses the complexities involved in a non-Indigenous person writing about the Australian Aboriginal people, and reflects on the process of researching, planning and writing a historical novel.
Resumo:
The terrorist attacks in the United States on September 11, 2001 appeared to be a harbinger of increased terrorism and violence in the 21st century, bringing terrorism and political violence to the forefront of public discussion. Questions about these events abound, and “Estimating the Historical and Future Probabilities of Large Scale Terrorist Event” [Clauset and Woodard (2013)] asks specifically, “how rare are large scale terrorist events?” and, in general, encourages discussion on the role of quantitative methods in terrorism research and policy and decision-making. Answering the primary question raises two challenges. The first is identify- ing terrorist events. The second is finding a simple yet robust model for rare events that has good explanatory and predictive capabilities. The challenges of identifying terrorist events is acknowledged and addressed by reviewing and using data from two well-known and reputable sources: the Memorial Institute for the Prevention of Terrorism-RAND database (MIPT-RAND) [Memorial Institute for the Prevention of Terrorism] and the Global Terror- ism Database (GTD) [National Consortium for the Study of Terrorism and Responses to Terrorism (START) (2012), LaFree and Dugan (2007)]. Clauset and Woodard (2013) provide a detailed discussion of the limitations of the data and the models used, in the context of the larger issues surrounding terrorism and policy.
Resumo:
To obtain accurate Monte Carlo simulations of small radiation fields, it is important model the initial source parameters (electron energy and spot size) accurately. However recent studies have shown that small field dosimetry correction factors are insensitive to these parameters. The aim of this work is to extend this concept to test if these parameters affect dose perturbations in general, which is important for detector design and calculating perturbation correction factors. The EGSnrc C++ user code cavity was used for all simulations. Varying amounts of air between 0 and 2 mm were deliberately introduced upstream to a diode and the dose perturbation caused by the air was quantified. These simulations were then repeated using a range of initial electron energies (5.5 to 7.0 MeV) and electron spot sizes (0.7 to 2.2 FWHM). The resultant dose perturbations were large. For example 2 mm of air caused a dose reduction of up to 31% when simulated with a 6 mm field size. However these values did not vary by more than 2 % when simulated across the full range of source parameters tested. If a detector is modified by the introduction of air, one can be confident that the response of the detector will be the same across all similar linear accelerators and the Monte Carlo modelling of each machine is not required.
Resumo:
Sugar cane is a major source of food and fuel worldwide. Biotechnology has the potential to improve economically-important traits in sugar cane as well as diversify sugar cane beyond traditional applications such as sucrose production. High levels of transgene expression are key to the success of improving crops through biotechnology. Here we describe new molecular tools that both expand and improve gene expression capabilities in sugar cane. We have identified promoters that can be used to drive high levels of gene expression in the leaf and stem of transgenic sugar cane. One of these promoters, derived from the Cestrum yellow leaf curling virus, drives levels of constitutive transgene expression that are significantly higher than those achieved by the historical benchmark maize polyubiquitin-1 (Zm-Ubi1) promoter. A second promoter, the maize phosphonenolpyruvate carboxylate promoter, was found to be a strong, leaf-preferred promoter that enables levels of expression comparable to Zm-Ubi1 in this organ. Transgene expression was increased approximately 50-fold by gene modification, which included optimising the codon usage of the coding sequence to better suit sugar cane. We also describe a novel dual transcriptional enhancer that increased gene expression from different promoters, boosting expression from Zm-Ubi1 over eightfold. These molecular tools will be extremely valuable for the improvement of sugar cane through biotechnology.
Resumo:
Network coding is a method for achieving channel capacity in networks. The key idea is to allow network routers to linearly mix packets as they traverse the network so that recipients receive linear combinations of packets. Network coded systems are vulnerable to pollution attacks where a single malicious node floods the network with bad packets and prevents the receiver from decoding correctly. Cryptographic defenses to these problems are based on homomorphic signatures and MACs. These proposals, however, cannot handle mixing of packets from multiple sources, which is needed to achieve the full benefits of network coding. In this paper we address integrity of multi-source mixing. We propose a security model for this setting and provide a generic construction.
Resumo:
Arguing for the importance of understanding the conditions under which certain forms of the social subject become visible and viable, this chapter conceptualises the current educational focus on ‘creativity’ as a technology of governmentality that has arisen from the perceived need for governing authorities to manage and responsibilise populations for the pervasive uncertainties of the global economy. With reference to the document, Tough Choices or Tough Times, a publication of the National Center on Education and the Economy in the United States, we show how creativity has been reframed as a programmable capacity of the modern student, citizen and worker primarily because it is considered an indispensible source of enterprise and innovation. Education and family life are an integral part of this bio-politics and the ongoing ‘economisation’ of social life. Our concern is that this reductionist understanding of creativity precludes other transgressive and culturally enriching creativities that represent the infinite range of subjectivities associated with imaginative human capacity and activity. It is vital therefore that educational research renders this historical process transparent and opens spaces for more socially inclusive, sustainable and productive ways of being such as those indicated by the three respondees.
Resumo:
M. fortuitum is a rapidly growing mycobacterium associated with community-acquired and nosocomial wound, soft tissue, and pulmonary infections. It has been postulated that water has been the source of infection especially in the hospital setting. The aim of this study was to determine if municipal water may be the source of community-acquired or nosocomial infections in the Brisbane area. Between 2007 and 2009, 20 strains of M. fortuitum were recovered from municipal water and 53 patients’ isolates were submitted to the reference laboratory. A wide variation in strain types was identified using repetitive element sequence-based PCR, with 13 clusters of ≥2 indistinguishable isolates, and 28 patterns consisting of individual isolates. The clusters could be grouped into seven similar groups (>95% similarity). Municipal water and clinical isolates collected during the same time period and from the same geographical area consisted of different strain types, making municipal water an unlikely source of sporadic human infection.
Resumo:
In the current market, extensive software development is taking place and the software industry is thriving. Major software giants have stated source code theft as a major threat to revenues. By inserting an identity-establishing watermark in the source code, a company can prove it's ownership over the source code. In this paper, we propose a watermarking scheme for C/C++ source codes by exploiting the language restrictions. If a function calls another function, the latter needs to be defined in the code before the former, unless one uses function pre-declarations. We embed the watermark in the code by imposing an ordering on the mutually independent functions by introducing bogus dependency. Removal of dependency by the attacker to erase the watermark requires extensive manual intervention thereby making the attack infeasible. The scheme is also secure against subtractive and additive attacks. Using our watermarking scheme, an n-bit watermark can be embedded in a program having n independent functions. The scheme is implemented on several sample codes and performance changes are analyzed.
Resumo:
In this Article, Petia Wohed, Arthur H. M. ter Hofstede, Nick Russell, Birger Andersson, and Wil M. P. van der Aalst present the results of their examination of existing open source BPM systems. Their conclusions are illuminating for both Open Source developers as well as the user community. Read their Article for the details of their study.