232 resultados para name
Resumo:
This project was conducted at Lithgow Correctional Centre (LCC), NSW, Australia. Air quality field measurements were conducted on two occasions (23-27 May 2012, and 3-8 December 2012), just before and six months after the introduction of smoke free buildings policies (28 May 2012) at the LCC, respectively. The main aims of this project were to: (1) investigate the indoor air quality; (2) quantify the level of exposure to environmental tobacco smoke (ETS); (3) identify the main indoor particle sources; (4) distinguish between PM2.5 / particle number from ETS, as opposed to other sources; and (5) provide recommendations for improving indoor air quality and/or minimising exposure at the LCC. The measurements were conducted in Unit 5.2A, Unit 5.2B, Unit 1.1 and Unit 3.1, together with personal exposure measurements, based on the following parameters: -Indoor and outdoor particle number (PN) concentration in the size range 0.005-3 µm -Indoor and outdoor PM2.5 particle mass concentration -Indoor and outdoor VOC concentrations -Personal particle number exposure levels (in the size range 0.01-0.3 µm) -Indoor and outdoor CO and CO2 concentrations, temperature and relative humidity In order to enhance the outcomes of this project, the indoor and outdoor particle number (PN) concentrations were measured by two additional instruments (CPC 3787) which were not listed in the original proposal.
Resumo:
This volume stems from the 1st International Conference on Epithelial-Mesenchymal Transitions (EMT), which was convened by the editors on October 5–8, 2003 in the beautiful setting of Port Douglas, Queensland, Australia. EMT, the name given to the transformation of cells arranged in a coherent layer – epithelial cells – to more individualistic and potential motile cells – mesenchymal cells – was recognized decades ago by Prof. Elisabeth (Betty) Hay (Harvard Medical School, Boston, Mass., USA) as a primary mechanism in embryogenesis for remodelling tissues. More recently EMT has been seen as crucial to the spread and invasion of carcinoma, and more recently still, EMT-like changes have been detected in various pathologies marked by fi brosis. Despite the basic and clinical importance of EMT, this extremely rapidly growing fi eld had never previously had a conference devoted to it, and indeed the disciplines of developmental biology, cancer and pathology rarely interact although they have much to share. The chapters assembled for this volume encompass these three major themes of the meeting, development, pathology and cancer, and further highlight the commonality in terms of mechanisms and outcomes among them...
Resumo:
Thinking of cutting physical education? Think again. Even as we bemoan children's sedentary lifestyles, we often sacrifice school-based physical education in the name of providing more time for academics. In 2006, only 3.8 percent of elementary schools, 7.9 percent of middle schools, and 2.1 percent of high schools offered students daily physical education or its equivalent for the entire school year (Lee, Burgeson, Fulton, & Spain, 2007). We believe this marked reduction in school-based physical activity risks students' health and can't be justified on educational or ethical grounds. We'll get to the educational grounds in a moment. As to ethical reasons for keeping physical activity part of our young people's school days, consider the fact that childhood obesity is now one of the most serious health issues facing U.S. children (Ogden et al., 2006). School-based physical education programs engage students in regular physical activity and help them acquire skills and habits necessary to pursue an active lifestyle. Such programs are directly relevant to preventing obesity. Yet they are increasingly on the chopping block.
Resumo:
Digital signatures are often used by trusted authorities to make unique bindings between a subject and a digital object; for example, certificate authorities certify a public key belongs to a domain name, and time-stamping authorities certify that a certain piece of information existed at a certain time. Traditional digital signature schemes however impose no uniqueness conditions, so a trusted authority could make multiple certifications for the same subject but different objects, be it intentionally, by accident, or following a (legal or illegal) coercion. We propose the notion of a double-authentication-preventing signature, in which a value to be signed is split into two parts: a subject and a message. If a signer ever signs two different messages for the same subject, enough information is revealed to allow anyone to compute valid signatures on behalf of the signer. This double-signature forgeability property discourages signers from misbehaving---a form of self-enforcement---and would give binding authorities like CAs some cryptographic arguments to resist legal coercion. We give a generic construction using a new type of trapdoor functions with extractability properties, which we show can be instantiated using the group of sign-agnostic quadratic residues modulo a Blum integer.
Resumo:
The concept of ‘sustainability’ has been pushed to the forefront of policy-making and politics as the world wakes up to the impacts of climate change and the effects of the rapid urbanisation and modern urban lifestyles (Yigitcanlar and Teriman 2014). Climate change and fossil fuel-based energy policy have emerged as the biggest challenges for our planet, threatening both built and natural systems with long-term consequences. However, the threats are not limited to the impacts of climate change and unsustainable energy system only – e.g., impacts of rapid urbanisation, socioeconomic crises and governance hiccups are just to name a few (Yigitcanlar 2010a). Along with these challenges, successfully coping with the enormous transformations that our cities, societies and the environment have been going through during the last few decades, and their...
Resumo:
The Australasian Information Security Conference (AISC) 2011 was held on 18th-19th January 2011 in Perth, Australia, as a part of the Australasian Computer Science Week 2011. AISC grew out of the Australasian Information Security Workshop and officially changed the name to Australasian Information Security Conference in 2008. The main aim of the AISC is to provide a venue for Australasian and other researchers to present their work on all aspects of information security and promote collaboration between academic and industrial researchers working in this area.
Resumo:
The Australasian Information Security Conference (AISC) 2012 was held at RMIT University in Melbourne, Australia, as a part of the Australasian Computer Science Week, January 30 - February 3, 2012. AISC grew out of the Australasian Information Security Workshop and officially changed the name to Australasian Information Security Conference in 2008. The main aim of the AISC is to provide a venue for researchers to present their work on all aspects of information security and promote collaboration between academic and industrial researchers working in this area.
Resumo:
It is well established that the time to name target objects can be influenced by the presence of categorically related versus unrelated distractor items. A variety of paradigms have been developed to determine the level at which this semantic interference effect occurs in the speech production system. In this study, we investigated one of these tasks, the postcue naming paradigm, for the first time with fMRI. Previous behavioural studies using this paradigm have produced conflicting interpretations of the processing level at which the semantic interference effect takes place, ranging from pre- to post-lexical. Here we used fMRI with a sparse, event-related design to adjudicate between these competing explanations. We replicated the behavioural postcue naming effect for categorically related target/distractor pairs, and observed a corresponding increase in neuronal activation in the right lingual and fusiform gyri-regions previously associated with visual object processing and colour-form integration. We interpret these findings as being consistent with an account that places the semantic interference effect in the postcue paradigm at a processing level involving integration of object attributes in short-term memory.
Resumo:
The nonlinear effect of hf surface waves self-interaction in a magnetoactive planar plasma waveguide is studies. The waveguide structure under consideration can be formed by gaseous or semiconducting homogeneous plasma, which is limited by a perfectly conducting metal surface. The surface (localized near the surface) wave perturbations propagating on the plasma-metal boundary perpendicular to the constant external magnetic field, are investigated. The nonlinear frequency shift connected with interaction of the second harmonic and static surface perturbations with the main frequency wave, is determined using the approximation of weak nonlinearity. It is shown that the process of double-frequency signal generation is the dissipative one as a result of bulk wave excitation on the surface wave second harmonic.
Resumo:
In approximation of weak heating influence of electron heating in the high-frequency surface wave field on propagation of surface wave (heating nonlinearity) is considered. It is shown that high-frequency surface wave propagates in direction perpendicular to the external magnetic field at the semiconductor-metal interface. A nonlinear dispersion equation is obtained and studied that allows to make conclusions about the contribution of heating nonlinearity to nonlinear process of considered interaction.
Resumo:
Dispersion characteristics and topography of electromagnetic fields of axially symmetric surface waves (SW) and of azimuth surface waves (ASW) propagating in a structure composed of a cylindrical metal antenna and magnetoactive plasma are investigated. The antenna and plasma may be separated by a vacuum layer. The dispersion characteristics of SW and ASW are presented as functions of the antenna and the magnetoactive plasma parameters. Close agreement between theory and experimental results are shown. Surface impedances of the SW and ASW are calculated for various parameters of the problem.
Resumo:
The efficiency of the excitation of surface plasma waves in the presence of external, steady crossed magnetic and electric fields is studied analytically and numerically for a geometry in which the waves propagate along the interface between a plasma-like medium and a metal in the direction transverse to both fields. The magnetic and electric fields are assumed to be parallel and transverse to the interface, respectively. The condition for which the drift instability of the surface wave arises is found.
Resumo:
The Woods Bagot 2007 refurbishment of the Qantas and British Airways Bangkok Business lounge in the Survarnabhumi Airport features wall finishes designed by wallpaper designer, Florence Broadhurst (1899-1977) and Thai Silk trader, Jim Thompson (1906-1967). This distinctive selection, which is proclaimed on the airport’s website, of patterned wall surfaces side by side draws attention to their striking similarities and their defining differences . Thompson and Broadhurst would appear to be worlds apart, but here in the airport their work brings them together. Thompson, the son of a wealthy cotton family in America, worked as an architect before joining the army. He moved to Bangkok to start The Thai Silk Company in 1948. Broadhurst was born on a farm in Mt. Perry, Queensland. She began her career as a performance artist, as part of an Australian troupe in Shanghai, moving onto pursue a career in fashion design, catering to the middle and upper classes in London. Upon her return to Australia, Broadhurst started a print design company in 1959. Both Broadhurst and Thompson pursued multiple careers, lived many lives, and died under mysterious circumstances. Broadhurst was murdered in 1977 at her Sydney print warehouse, which remains an unsolved crime. Thompson disappeared in Malaysia in 1967 and his body has never been found. This chapter investigates the parallels between Thompson and Broadhurst and what lead them to design such popular patterns for wall surfaces towards the end of their careers. While neither designer was a household name, their work is familiar to most, seen in the costume and set design of films, on the walls of restaurants and cafes and even in family homes. The reason for the popularity of their patterns has not previously been analysed. However, this chapter suggests that the patterns are intriguing because they contain something of their designers’ identities. It suggests that the coloured surface provides a way of camouflaging and hiding its subjects’ histories, such that Broadhurst and Thompson, consciously or unconsciously, used the patterned surface as a plane in which their past lives could be buried. The revealing nature of the stark white wall, compared with the forgiveness provided by the pattern in which to hide, is elaborated by painter and advocate for polychromatic architecture, Fernand Léger in his essay, “The Wall, The Architect, The Painter (1965).” Léger writes that, “the modern architect has gone too far in his magnificent attempts to cleanse through emptiness,” and that the resultant white walls of modernity create ‘an impalpability of air, of slick, brilliant new surfaces where nothing can be hidden any longer …even shadows don’t dare to enter’. To counter the exposure produced by the white wall, Thompson and Broadhurst designed patterned surfaces that could harbour their personal histories. Broadhurst and Thompson’s works share a number of commonalities in their design production, even though their work in print design commenced a decade apart. Both designers opted to work more with traditional methods of pattern making. Broadhurst used hand-operated screens, and Thompson outsourced work to local weavers and refrained from operating out of a factory. Despite humble beginnings, Broadhurst and Thompson enjoyed international success with their wall patterns being featured in a number of renowned international hotels in Bahrain, Singapore, Sydney, and London in the 1970s and 1980s. Their patterns were also transferred to fabric for soft furnishings and clothing. Thompson’s patterns were used for costumes in films including the King and I and Ben Hur. Broadhurst’s patterns were also widely used by fashion designers and artists, such as Akira Isogowa‘s costume design for Salome, a 1998 production by the Sydney Dance Company. Most recently her print designs have been used by skin illustrator Emma Hack, in a series of works painting female bodies into Broadhurst’s patterns. Hack’s works camouflage the models’ bodies into the patterned surface, assimilating subject and surface, hinting at there being something living within the patterned wall. More than four decades after Broadhurst’s murder and five decades since Thompson’s disappearance, their print designs persist as more than just a legacy. They are applied as surface finishes with the same fervour as when the designs were first released. This chapter argues that the reason for the ongoing celebration of their work is that there is the impalpable presence of the creator in the patterns. It suggests that the patterns blur the boundary between subject and surface.
Resumo:
Abstract: Social network technologies, as we know them today have become a popular feature of everyday life for many people. As their name suggests, their underlying premise is to enable people to connect with each other for a variety of purposes. These purposes however, are generally thought of in a positive fashion. Based on a multi-method study of two online environments, Habbo Hotel and Second Life, which incorporate social networking functionality, we she light on forms of what can be conceptualized as antisocial behaviours and the rationales for these. Such behaviours included: scamming, racist/homophobic attacks, sim attacks, avatar attacks, non-conformance to contextual norms, counterfeiting and unneighbourly behaviour. The rationales for sub behaviours included: profit, fun, status building, network disruption, accidental acts and prejudice. Through our analysis we are able to comment upon the difficulties of defining antisocial behaviour in such environments, particularly when such environments are subject to interpretation vis their use and expected norms. We also point to the problems we face in conducting our public and private lives given the role ICTs are playing in the convergence of these two spaces and also the convergence of ICTs themselves.