341 resultados para HIERARCHY GOVERNING VITELLOGENESIS


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Production of nanofibrous polyacrylonitrile/calcium carbonate (PAN/CaCO3) nanocomposite web was carried out through solution electrospinning process. Pore generating nanoparticles were leached from the PAN matrices in hydrochloric acid bath with the purpose of producing an ultimate nanoporous structure. The possible interaction between CaCO3 nanoparticles and PAN functional groups was investigated. Atomic absorption method was used to measure the amount of extracted CaCO3 nanoparticles. Morphological observation showed nanofibers of 270–720 nm in diameter containing nanopores of 50–130 nm. Monitoring the governing parameters statistically, it was found that the amount of extraction (ε) of CaCO3was increased when the web surface area (a) was broadened according to a simple scaling law (ε = 3.18 a0.4). The leaching process was maximized in the presence of 5% v/v of acid in the extraction bath and 5 wt % of CaCO3 in the polymer solution. Collateral effects of the extraction time and temperature showed exponential growth within a favorable extremum at 50°C for 72 h. Concentration of dimethylformamide as the solvent had no significant impact on the extraction level.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Despite the presence of many regulations governing the operation of heavy vehicles and supply chains in Australia, the truck driving sector continues to have the highest incidence of fatal injuries compared to all other industries. The working environment has been the focus of attention by safety researchers during the past few decades, with particular consideration been given to the concept ‘safety culture’ and how to maintain, modify and advance responses to occupational risk. One important aspect of the heavy industry which sets it apart is the existence of cultural or sub-cultural influences at an industry wide and occupation-specific level rather than organisational level. This paper reports on the findings of stakeholder’s perceptions of the influences of power and control, and culture on industry safety. In-depth structured interviews were conducted during 2011 with Australian industry stakeholders (n=31). The questioning surrounded decision-making processes with regards to identifying risks, self-monitoring and reducing risky activities; as well as how power-affected relationships may influence the operational performance of supply chains and impacts on driver safety. One of the most significant findings from these interviews relates to the notion of power. The perception that the ‘Customer is King’ was widely viewed, with the majority of stakeholders believing that there exists a ‘master slave mentality’ in the industry. There appears to be great frustration in the industry as to the apparent immunity of customers (particularly retail supply chains) to their responsibilities. There was also a strong perception that the customer holds the balance of power by covertly employing remuneration-related incentives and pressures. Smaller trucking companies are perceived as being more vulnerable to the pressure of customer expectations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In an increasingly business technology (BT) dependent world, the impact of the extraordinary changes brought about by the nexus of mobile and cloud technologies, social media and big data is increasingly being felt in the board room. As leaders of enterprises of every type and size, board directors can no longer afford to ignore, delegate or avoid BT-related decisions. Competitive, financial and reputational risk is increased if boards fail to recognize their role in governing technology as an asset and in removing barriers to improving enterprise business technology governance (EBTG). Directors’ awareness of the need for EBTG is increasing. However, industry research shows that board level willingness to rectify the gap between awareness and action is very low or non-existent. This literature review-based research identifies barriers to EBTG effectiveness. It provides a practical starting point for board analysis. We offer four outcomes that boards might focus on to ensure the organizations they govern are not left behind by those led by the upcoming new breed of technology-savvy leaders. Most extant research looks backward for examples, examining data pre-2010, the time when a tipping point in the personal and business use of multimedia and mobile-internet devices significantly deepened the impacts of the identified nexus technology forces, and began rapidly changing the way many businesses engage with their customers, employees and stakeholders. We situate our work amidst these nexus forces, discuss the board’s role in EBTG in this context, and modernize current definitions of enterprise technology governance. The primary limitation faced is the lack of scholarly research relating to EBTG in the rapidly changing digital economy. Although we have used recent (2011 - 2013) industry surveys, the volume of these surveys and congruence across them is significant in terms of levels of increased awareness and calls for increased board attention and competency in EBTG and strategic information use. Where possible we have used scholarly research to illustrate or discuss industry findings.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Road trauma is a leading cause of child injury worldwide and in highly motorised countries, injury as a passenger represents a major proportion of all child road deaths and hospitalisations. Australia is no exception, particularly since motorised transport to school is at high levels in most Australian states. Recently the legislation governing the type of car restraints required for children aged under 7 years has changed in most Australian states aligning requirements better with accepted best practice. However, it is unclear what effect these changes have had on children’s seating positions or the types of restraints used. A mixed methods evaluation of the impact of the new legislation on compliance was conducted at three times: baseline (Time 1); after announcement that changes were going to be implemented but before enforcement began (Time 2); and after enforcement commenced (Time 3). Measures of compliance were obtained using two methods: road-side observations of vehicles with child passengers; and parental self-report (intercept interviews conducted at Time 2 and Time 3 only). Results from the observations suggested an overall positive effect. Proportions of children occupying front seats decreased overall and use of dedicated child seas increased to almost 40% of the observed children by Time 3. However, almost a quarter of the children observed were still occupying the front seat. These results were very different from those of the interview study where almost no children were reported as usually travelling in the front seat, and the reported use of dedicated restraints with children was almost 90%, more than twice that in the observations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper explores notions of harm in sex work discourse, highlighting the extent to which essentialist ideas of ‘good’ versus ‘bad’ sex have pervaded trafficking policy. In a comparative examination of Australian Parliamentary Inquiries and United States Congressional Hearings leading to the establishment of anti-trafficking policy, we identify the stories that have influenced legislators, and established a narrative of trafficking heavily dependent upon assumptions of the inherent harm of sex work. This narrative constructs a hierarchy of victimisation, which denies alternative discourses of why women migrate for sex work. We argue that it is not sexual commerce that is harmful, but pathological, systemic inequalities and entrenched disadvantage that are harmful. A narrow narrative of trafficking fails to adequately depict this complexity of the trafficked experience.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: Adolescent idiopathic scoliosis (AIS) is a deformity of the spine, which may 34 require surgical correction by attaching a rod to the patient’s spine using screws 35 implanted in the vertebral bodies. Surgeons achieve an intra-operative reduction in the 36 deformity by applying compressive forces across the intervertebral disc spaces while 37 they secure the rod to the vertebra. We were interested to understand how the 38 deformity correction is influenced by increasing magnitudes of surgical corrective forces 39 and what tissue level stresses are predicted at the vertebral endplates due to the 40 surgical correction. 41 Methods: Patient-specific finite element models of the osseoligamentous spine and 42 ribcage of eight AIS patients who underwent single rod anterior scoliosis surgery were 43 created using pre-operative computed tomography (CT) scans. The surgically altered 44 spine, including titanium rod and vertebral screws, was simulated. The models were 45 analysed using data for intra-operatively measured compressive forces – three load 46 profiles representing the mean and upper and lower standard deviation of this data 47 were analysed. Data for the clinically observed deformity correction (Cobb angle) were 48 compared with the model-predicted correction and the model results investigated to 49 better understand the influence of increased compressive forces on the biomechanics of 50 the instrumented joints. 51 Results: The predicted corrected Cobb angle for seven of the eight FE models were 52 within the 5° clinical Cobb measurement variability for at least one of the force profiles. 53 The largest portion of overall correction was predicted at or near the apical 54 intervertebral disc for all load profiles. Model predictions for four of the eight patients 55 showed endplate-to-endplate contact was occurring on adjacent endplates of one or 56 more intervertebral disc spaces in the instrumented curve following the surgical loading 57 steps. 58 Conclusion: This study demonstrated there is a direct relationship between intra-59 operative joint compressive forces and the degree of deformity correction achieved. The 60 majority of the deformity correction will occur at or in adjacent spinal levels to the apex 61 of the deformity. This study highlighted the importance of the intervertebral disc space 62 anatomy in governing the coronal plane deformity correction and the limit of this 63 correction will be when bone-to-bone contact of the opposing vertebral endplates 64 occurs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper focuses on very young students' ability to engage in repeating pattern tasks and identifying strategies that assist them to ascertain the structure of the pattern. It describes results of a study which is part of the Early Years Generalising Project (EYGP) and involves Australian students in Years 1 to 4 (ages 5-10). This paper reports on the results from the early years' cohort (Year 1 and 2 students). Clinical interviews were used to collect data concerning students' ability to determine elements in different positions when two units of a repeating pattern were shown. This meant that students were required to identify the multiplicative structure of the pattern. Results indicate there are particular strategies that assist students to predict these elements, and there appears to be a hierarchy of pattern activities that help students to understand the structure of repeating patterns.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Video presented as part of ACIS 2009 conference in Melbourne Australia. Movie showing the execution of a small prototype Hypbolic projection of a process model. Useful for the traversal of large process models, as the entire hierarchy can be visualised as a whole, maintaining a sense of context while moving through such complex topologies. Related ACIS Conference paper is at: http://eprints.qut.edu.au/29296/

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Predicate encryption (PE) is a new primitive which supports exible control over access to encrypted data. In PE schemes, users' decryption keys are associated with predicates f and ciphertexts encode attributes a that are specified during the encryption procedure. A user can successfully decrypt if and only if f(a) = 1. In this thesis, we will investigate several properties that are crucial to PE. We focus on expressiveness of PE, Revocable PE and Hierarchical PE (HPE) with forward security. For all proposed systems, we provide a security model and analysis using the widely accepted computational complexity approach. Our first contribution is to explore the expressiveness of PE. Existing PE supports a wide class of predicates such as conjunctions of equality, comparison and subset queries, disjunctions of equality queries, and more generally, arbitrary combinations of conjunctive and disjunctive equality queries. We advance PE to evaluate more expressive predicates, e.g., disjunctive comparison or disjunctive subset queries. Such expressiveness is achieved at the cost of computational and space overhead. To improve the performance, we appropriately revise the PE to reduce the computational and space cost. Furthermore, we propose a heuristic method to reduce disjunctions in the predicates. Our schemes are proved in the standard model. We then introduce the concept of Revocable Predicate Encryption (RPE), which extends the previous PE setting with revocation support: private keys can be used to decrypt an RPE ciphertext only if they match the decryption policy (defined via attributes encoded into the ciphertext and predicates associated with private keys) and were not revoked by the time the ciphertext was created. We propose two RPE schemes. Our first scheme, termed Attribute- Hiding RPE (AH-RPE), offers attribute-hiding, which is the standard PE property. Our second scheme, termed Full-Hiding RPE (FH-RPE), offers even stronger privacy guarantees, i.e., apart from possessing the Attribute-Hiding property, the scheme also ensures that no information about revoked users is leaked from a given ciphertext. The proposed schemes are also proved to be secure under well established assumptions in the standard model. Secrecy of decryption keys is an important pre-requisite for security of (H)PE and compromised private keys must be immediately replaced. The notion of Forward Security (FS) reduces damage from compromised keys by guaranteeing confidentiality of messages that were encrypted prior to the compromise event. We present the first Forward-Secure Hierarchical Predicate Encryption (FS-HPE) that is proved secure in the standard model. Our FS-HPE scheme offers some desirable properties: time-independent delegation of predicates (to support dynamic behavior for delegation of decrypting rights to new users), local update for users' private keys (i.e., no master authority needs to be contacted), forward security, and the scheme's encryption process does not require knowledge of predicates at any level including when those predicates join the hierarchy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Understanding network traffic behaviour is crucial for managing and securing computer networks. One important technique is to mine frequent patterns or association rules from analysed traffic data. On the one hand, association rule mining usually generates a huge number of patterns and rules, many of them meaningless or user-unwanted; on the other hand, association rule mining can miss some necessary knowledge if it does not consider the hierarchy relationships in the network traffic data. Aiming to address such issues, this paper proposes a hybrid association rule mining method for characterizing network traffic behaviour. Rather than frequent patterns, the proposed method generates non-similar closed frequent patterns from network traffic data, which can significantly reduce the number of patterns. This method also proposes to derive new attributes from the original data to discover novel knowledge according to hierarchy relationships in network traffic data and user interests. Experiments performed on real network traffic data show that the proposed method is promising and can be used in real applications. Copyright2013 John Wiley & Sons, Ltd.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This research develops a new framework to be used as a tool for analysing and designing walkable communities. The literature review recognises the work of other researchers combining their findings with the theory of activity nodes and considers how a framework may be used on a more global basis. The methodology develops a set of criteria through the analysis of noted successful case studies and this is then tested against an area with very low walking rates in Brisbane, Australia. Results of the study suggest that as well as the accepted criteria of connectivity, accessibility, safety, security, and path quality further criteria in the form or planning hierarchy, activity nodes and climate mitigation could be added to allow the framework to cover a broader context. Of particular note is the development of the nodal approach, which allows simple and effective analysis of existing conditions, and may also prove effective as a tool for planning and design of walkable communities.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Plant and machinery valuation is important to every company.s annual financial reporting. It is reported under the non-current assets section, and the valuers are generally employed to provide the up to date valuation of the non-current assets valuation such as property, plant and equipment that can make up to 80% of the total assets of a company. The valuation of plant and machinery is also important for other purposes such as securing loan facilities, sales, takeover, insurance and auction. The application of 2005 International Financial Reporting Standard (IFRS) has a subsequent impact on the financial sector, as a whole. The accountants have to choose between the Historical Cost approach and Market Value approach in determining the value of the client.s assets. In Malaysia, the implementation of IFRS has a domino effect on the financial system, especially for plant and machinery valuation for financial reporting. The comparison data for plant and machinery valuation is limited unlike land and building valuation. The question of Malaysian valuer.s ability to comply with the IFRS standard keeps rising every day, not just to the accountants, but also other related parties such as financial institutions, government agencies and the clients. This is happening because of different interpretations of premise of value for plant and machinery, as well as methods been used and differences in standards of reporting among the valuers conducting plant and machinery valuation. The root of the problem lies in the lack of practical guidelines governing plant and machinery valuation practices and different schools of thought among the valuers. Some follow the United Kingdom.s RICS guidelines, whilst some valuers are more comfortable with the United State.s USPAP rules, especially on the premise of value. This research is to investigate the international best practices of plant and machinery valuation and to establish the common valuation concept, awareness and application of valuation methodology and valuation process for plant and machinery valuation in Malaysia. This research uses a combination of the qualitative and quantitative research approach. In the qualitative approach, the content analyses were conducted from the international practices and current Malaysian implementation of plant and machinery valuation. A survey (quantitative approach) via questionnaire was implemented among the registered and probationary valuers in Malaysia to investigate their understanding and opinion relating to plant and machinery valuation based on the current practices. The significance of this research is the identification of international plant and machinery practices and the understanding of current practices of plant and machinery valuation in Malaysia. It is found that issues embedding plant and machinery valuation practices are limited numbers of resources available either from scholars or practitioner. This is supported by the general finding from the research survey that indicates that there are immediate needs for practical notes or guidelines to be developed and implemented to support the Malaysian valuers practising plant and machinery valuation. This move will lead to a better understanding of plant and machinery valuation, reducing discrepancies in valuation of plant and machinery and increased accuracy among practising valuers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cell migration is a behaviour critical to many key biological effects, including wound healing, cancerous cell invasion and morphogenesis, the development of an organism from an embryo. However, given that each of these situations is distinctly different and cells are extremely complicated biological objects, interest lies in more basic experiments which seek to remove conflating factors and present a less complex environment within which cell migration can be experimentally examined. These include in vitro studies like the scratch assay or circle migration assay, and ex vivo studies like the colonisation of the hindgut by neural crest cells. The reduced complexity of these experiments also makes them much more enticing as problems to mathematically model, like done here. The primary goal of the mathematical models used in this thesis is to shed light on which cellular behaviours work to generate the travelling waves of invasion observed in these experiments, and to explore how variations in these behaviours can potentially predict differences in this invasive pattern which are experimentally observed when cell types or chemical environment are changed. Relevant literature has already identified the difficulty of distinguishing between these behaviours when using traditional mathematical biology techniques operating on a macroscopic scale, and so here a sophisticated individual-cell-level model, an extension of the Cellular Potts Model (CPM), is been constructed and used to model a scratch assay experiment. This model includes a novel mechanism for dealing with cell proliferations that allowed for the differing properties of quiescent and proliferative cells to be implemented into their behaviour. This model is considered both for its predictive power and used to make comparisons with the travelling waves which result in more traditional macroscopic simulations. These comparisons demonstrate a surprising amount of agreement between the two modelling frameworks, and suggest further novel modifications to the CPM that would allow it to better model cell migration. Considerations of the model’s behaviour are used to argue that the dominant effect governing cell migration (random motility or signal-driven taxis) likely depends on the sort of invasion demonstrated by cells, as easily seen by microscopic photography. Additionally, a scratch assay simulated on a non-homogeneous domain consisting of a ’fast’ and ’slow’ region is also used to further differentiate between these different potential cell motility behaviours. A heterogeneous domain is a novel situation which has not been considered mathematically in this context, nor has it been constructed experimentally to the best of the candidate’s knowledge. Thus this problem serves as a thought experiment used to test the conclusions arising from the simulations on homogeneous domains, and to suggest what might be observed should this non-homogeneous assay situation be experimentally realised. Non-intuitive cell invasion patterns are predicted for diffusely-invading cells which respond to a cell-consumed signal or nutrient, contrasted with rather expected behaviour in the case of random-motility-driven invasion. The potential experimental observation of these behaviours is demonstrated by the individual-cell-level model used in this thesis, which does agree with the PDE model in predicting these unexpected invasion patterns. In the interest of examining such a case of a non-homogeneous domain experimentally, some brief suggestion is made as to how this could be achieved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We consider a model for thin film flow down the outside and inside of a vertical cylinder. Our focus is to study the effect that the curvature of the cylinder has on the gravity-driven instability of the advancing contact line and to simulate the resulting fingering patterns that form due to this instability. The governing partial differential equation is fourth order with a nonlinear degenerate diffusion term that represents the stabilising effect of surface tension. We present numerical solutions obtained by implementing an efficient alternating direction implicit scheme. When compared to the problem of flow down a vertical plane, we find that increasing substrate curvature tends to increase the fingering instability for flow down the outside of the cylinder, whereas flow down the inside of the cylinder substrate curvature has the opposite effect. Further, we demonstrate the existence of nontrivial travelling wave solutions which describe fingering patterns that propagate down the inside of a cylinder at constant speed without changing form. These solutions are perfectly analogous to those found previously for thin film flow down an inclined plane.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Using a sociological approach, this study examines China’s reform of open educational resources (OER), which has prompted significant changes to the nation’s higher education sector. Through an analysis of the policy processes that have driven the reform, this study demonstrates that the reform has involved and brought significant changes to its participants as resource administrators, providers, and receivers. By using governmentality as a poststructuralist analytical framework, this study shows the particular ways in which the reform process has been governed and the ways in which the governing practices have changed the conduct of higher education. The study reveals the power relations exercised through the reform and offers a critique of China’s higher education sector.