65 resultados para Flowers in literature
Resumo:
Espionage, surveillance and clandestine operations by secret agencies and governments were something of an East–West obsession in the second half of the twentieth century, a fact reflected in literature and film. In the twenty-first century, concerns of the Cold War and the threat of Communism have been rearticulated in the wake of 9/11. Under the rubric of ‘terror’ attacks, the discourses of security and surveillance are now framed within an increasingly global context. As this article illustrates, surveillance fiction written for young people engages with the cultural and political tropes that reflect a new social order that is different from the Cold War era, with its emphasis on spies, counter espionage, brainwashing and psychological warfare. While these tropes are still evident in much recent literature, advances in technology have transformed the means of tracking, profiling and accumulating data on individuals’ daily activities. Little Brother, The Hunger Games and Article 5 reflect the complex relationship between the real and the imaginary in the world of surveillance and, as this paper discusses, raise moral and ethical issues that are important questions for young people in our age of security.
Resumo:
Background Flower development in kiwifruit (Actinidia spp.) is initiated in the first growing season, when undifferentiated primordia are established in latent shoot buds. These primordia can differentiate into flowers in the second growing season, after the winter dormancy period and upon accumulation of adequate winter chilling. Kiwifruit is an important horticultural crop, yet little is known about the molecular regulation of flower development. Results To study kiwifruit flower development, nine MADS-box genes were identified and functionally characterized. Protein sequence alignment, phenotypes obtained upon overexpression in Arabidopsis and expression patterns suggest that the identified genes are required for floral meristem and floral organ specification. Their role during budbreak and flower development was studied. A spontaneous kiwifruit mutant was utilized to correlate the extended expression domains of these flowering genes with abnormal floral development. Conclusions This study provides a description of flower development in kiwifruit at the molecular level. It has identified markers for flower development, and candidates for manipulation of kiwifruit growth, phase change and time of flowering. The expression in normal and aberrant flowers provided a model for kiwifruit flower development.
Resumo:
Sexual harassment remains a widespread workplace phenomenon, despite laws that proscribe it. Drawing initially on a typology from the violence prevention literature that conceptualizes prevention and response approaches according to when they occur, the paper synthesizes strategies identified in literature addressing workplace sexual harassment, as well as other workplace injustices or grievances. The paper utilizes this previous research to develop a framework of sexual harassment prevention strategies along two dimensions: functions and timing. The framework offers a research-informed set of organization-wide preventative and remedial approaches, a systemic approach to what is often seen as an individual problem, and a means to better focus interventions that are often disparate and unco-ordinated. The paper also highlights important areas for future research including a stronger focus on longer-term (tertiary) corrective actions.
Resumo:
With ever-increasing share of power electronic loads constant power instability is becoming a significant issue in microgrids, especially when they operate in the islanding mode. Transient conditions like resistive load-shedding or sudden increase of constant power loads (CPL) might destabilize the whole system. Modeling and stability analysis of AC microgrids with CPLs have already been discussed in literature. However, no effective solutions are provided to stabilize this kind of system. Therefore, this paper proposes a virtual resistance based active damping method to eliminate constant power instability in AC microgrids. Advantages and limitations of the proposed method are also discussed in detail. Simulation results are presented to validate the proposed active damping solution.
Resumo:
The data-oriented empirical research on the Chinese adverb “ke” has led to the conclusion that the semantics of the word as a modal adverb is always two-fold: it marks both “contrast” and “emphasis”. “Adversativity” as used in literature on “ke” is but one type of contrast marked by “ke”. Other types of contrast marked by “ke” in declarative sentences include: a) what is assumed by the hearer and what the truth of a matter is; b) what the sentence literally talks about and what it also implicitly conveys; and c) the original wishful nature of the stated action and its final realization. In all declarative sentences, what the adverb emphasizes is the “factuality” of what is stated. Chinese Abstract [提要] 对外汉语教学的实践表明,汉语副词“可”是教学中的难点,这跟我们对其语义内涵缺乏全面准确的认识有关。为了全面揭示副词“可”的核心语义,本作者以电视连续剧《渴望》前二十集为主要语料,并结合其他一些电视剧、电视节目以及文献里已有的语料,对出现在各种语境中的“可”进行了大量的考察和归纳性研究。研究结果表明,作为语气副词的“可”其核心语义不是单一的,它总是在标示“对比”(即“不同”)的同时表示强调。它所强调的是所述内容的“事实性”或“终然性”。由于篇幅所限,本文仅对陈述句中的语气副词“可”加以讨论
Resumo:
There is increasing acceptance that characterisation in the family sagas is complex enough to include the subtle incorporation of protagonists’ inner lives. Thus, despite saga authors’ apparent desire to pass on traditional stories, saga characterization brings with it the possibility of a connection between the medieval author and the early Icelandic community represented in the sagas, a break in the saga code of objective narration that adds further weight to recent arguments that saga authorship was conceived in broader terms than merely the preservation of oral tales. One such break in objectivity occurs in the range of responses to the fantastic, when characters are forced to interpret the supernatural or strange events in their lives. At such times, the author allows glimpses of the inner lives of characters, focussing our attention on the way in which characters perceived and dealt with extraordinary occurrences, but also highlighting and thematising the distinctive social context of the early Icelandic community.
Resumo:
This paper presents a discussion on the use of MIMO and SISO techniques for identification of the radiation force terms in models for surface vessels. We compare and discuss two techniques recently proposed in literature for this application: time domain identification and frequency domain identification. We compare the methods in terms of estimates model order, accuracy of the fit, use of the available information, and ease of use and implementation.
Resumo:
Complex behaviour of air flow in the buildings makes it difficult to predict. Consequently, architects use common strategies for designing buildings with adequate natural ventilation. However, each climate needs specific strategies and there are not many heuristics for subtropical climate in literature. Furthermore, most of these common strategies are based on low-rise buildings and their performance for high-rise buildings might be different due to the increase of the wind speed with increase in the height. This study uses Computational Fluid Dynamics (CFD) to evaluate these rules of thumb for natural ventilation for multi-residential buildings in subtropical climate. Four design proposals for multi-residential towers with natural ventilation which were produced in intensive two days charrette were evaluated using CFD. The results show that all the buildings reach acceptable level of wind speed in living areas and poor amount of air flow in sleeping areas.
Resumo:
Despite the extent of works done on modelling port water collisions, not much research effort has been devoted to modelling collisions at port anchorages. This paper aims to fill this important gap in literature by applying the Navigation Traffic Conflict Technique (NTCT) for measuring the collision potentials in anchorages and for examining the factors contributing to collisions. Grounding on the principles of the NTCT, a collision potential measurement model and a collision potential prediction model were developed. These models were illustrated by using vessel movement data of the anchorages in Singapore port waters. Results showed that the measured collision potentials are in close agreement with those perceived by harbour pilots. Higher collision potentials were found in anchorages attached to shoreline and international fairways, but not at those attached to confined water. Higher operating speeds, larger numbers of isolated danger marks and day conditions were associated with reduction in the collision potentials.
Resumo:
High efficiency organic photovoltaic cells discussed in literature are normally restricted to devices fabricated on glass substrates. This is a consequence of the extreme brittleness and inflexibility of the commonly used transparent conductive oxide electrode, indium tin oxide (ITO). This shortcoming of ITO along with other concerns such as increasing scarcity of indium, migration of indium to organic layer, etc. makes it imperative to move away from ITO. Here we demonstrate a highly flexible Ag electrode that possesses low sheet resistances even in ultra-thin layers. It retains its conductivity under severe bending stresses where ITO fails completely. A P3HT:PCBM blend organic solar cell fabricated on this highly flexible electrode gives an efficiency of 2.3%.
Resumo:
Some statistical procedures already available in literature are employed in developing the water quality index, WQI. The nature of complexity and interdependency that occur in physical and chemical processes of water could be easier explained if statistical approaches were applied to water quality indexing. The most popular statistical method used in developing WQI is the principal component analysis (PCA). In literature, the WQI development based on the classical PCA mostly used water quality data that have been transformed and normalized. Outliers may be considered in or eliminated from the analysis. However, the classical mean and sample covariance matrix used in classical PCA methodology is not reliable if the outliers exist in the data. Since the presence of outliers may affect the computation of the principal component, robust principal component analysis, RPCA should be used. Focusing in Langat River, the RPCA-WQI was introduced for the first time in this study to re-calculate the DOE-WQI. Results show that the RPCA-WQI is capable to capture similar distribution in the existing DOE-WQI.
Resumo:
Although the benefits of service orientation are prevalent in literature, a review, analysis, and evaluation of the 30 existing service analysis approaches presented in this paper have shown that a comprehensive approach to the identification and analysis of both business and supporting software services is missing. Based on this evaluation of existing approaches and additional sources, we close this gap by proposing an integrated, consolidated approach to business and software service analysis that combines and extends the strengths of the examined methodologies.
Resumo:
This report reviews the selection, design, and installation of fiber reinforced polymer systems for strengthening of reinforced concrete or pre-stressed concrete bridges and other structures. The report is prepared based on the knowledge gained from worldwide experimental research, analytical work, and field applications of FRP systems used to strengthen concrete structures. Information on material properties, design and installation methods of FRP systems used as external reinforcement are presented. This information can be used to select an FRP system for increasing the strength and stiffness of reinforced concrete beams or the ductility of columns, and other applications. Based on the available research, the design considerations and concepts are covered in this report. In the next stage of the project, these will be further developed as design tools. It is important to note, however, that the design concepts proposed in literature have not in many cases been thoroughly developed and proven. Therefore, a considerable amount of research work will be required prior to development of the design concepts into practical design tools, which is a major goal of the current research project. The durability and long-term performance of FRP materials has been the subject of much research, which still are on going. Long-term field data are not currently available, and it is still difficult to accurately predict the life of FRP strengthening systems. The report briefly addresses environmental degradation and long-term durability issues as well. A general overview of using FRP bars as primary reinforcement of concrete structures is presented in Chapter 8. In Chapter 9, a summary of strengthening techniques identified as part of this initial stage of the research project and the issues which require careful consideration prior to practical implementation of these identified techniques are presented.
Resumo:
Key topics: Since the birth of the Open Source movement in the mid-80's, open source software has become more and more widespread. Amongst others, the Linux operating system, the Apache web server and the Firefox internet explorer have taken substantial market shares to their proprietary competitors. Open source software is governed by particular types of licenses. As proprietary licenses only allow the software's use in exchange for a fee, open source licenses grant users more rights like the free use, free copy, free modification and free distribution of the software, as well as free access to the source code. This new phenomenon has raised many managerial questions: organizational issues related to the system of governance that underlie such open source communities (Raymond, 1999a; Lerner and Tirole, 2002; Lee and Cole 2003; Mockus et al. 2000; Tuomi, 2000; Demil and Lecocq, 2006; O'Mahony and Ferraro, 2007;Fleming and Waguespack, 2007), collaborative innovation issues (Von Hippel, 2003; Von Krogh et al., 2003; Von Hippel and Von Krogh, 2003; Dahlander, 2005; Osterloh, 2007; David, 2008), issues related to the nature as well as the motivations of developers (Lerner and Tirole, 2002; Hertel, 2003; Dahlander and McKelvey, 2005; Jeppesen and Frederiksen, 2006), public policy and innovation issues (Jullien and Zimmermann, 2005; Lee, 2006), technological competitions issues related to standard battles between proprietary and open source software (Bonaccorsi and Rossi, 2003; Bonaccorsi et al. 2004, Economides and Katsamakas, 2005; Chen, 2007), intellectual property rights and licensing issues (Laat 2005; Lerner and Tirole, 2005; Gambardella, 2006; Determann et al., 2007). A major unresolved issue concerns open source business models and revenue capture, given that open source licenses imply no fee for users. On this topic, articles show that a commercial activity based on open source software is possible, as they describe different possible ways of doing business around open source (Raymond, 1999; Dahlander, 2004; Daffara, 2007; Bonaccorsi and Merito, 2007). These studies usually look at open source-based companies. Open source-based companies encompass a wide range of firms with different categories of activities: providers of packaged open source solutions, IT Services&Software Engineering firms and open source software publishers. However, business models implications are different for each of these categories: providers of packaged solutions and IT Services&Software Engineering firms' activities are based on software developed outside their boundaries, whereas commercial software publishers sponsor the development of the open source software. This paper focuses on open source software publishers' business models as this issue is even more crucial for this category of firms which take the risk of investing in the development of the software. Literature at last identifies and depicts only two generic types of business models for open source software publishers: the business models of ''bundling'' (Pal and Madanmohan, 2002; Dahlander 2004) and the dual licensing business models (Välimäki, 2003; Comino and Manenti, 2007). Nevertheless, these business models are not applicable in all circumstances. Methodology: The objectives of this paper are: (1) to explore in which contexts the two generic business models described in literature can be implemented successfully and (2) to depict an additional business model for open source software publishers which can be used in a different context. To do so, this paper draws upon an explorative case study of IdealX, a French open source security software publisher. This case study consists in a series of 3 interviews conducted between February 2005 and April 2006 with the co-founder and the business manager. It aims at depicting the process of IdealX's search for the appropriate business model between its creation in 2000 and 2006. This software publisher has tried both generic types of open source software publishers' business models before designing its own. Consequently, through IdealX's trials and errors, I investigate the conditions under which such generic business models can be effective. Moreover, this study describes the business model finally designed and adopted by IdealX: an additional open source software publisher's business model based on the principle of ''mutualisation'', which is applicable in a different context. Results and implications: Finally, this article contributes to ongoing empirical work within entrepreneurship and strategic management on open source software publishers' business models: it provides the characteristics of three generic business models (the business model of bundling, the dual licensing business model and the business model of mutualisation) as well as conditions under which they can be successfully implemented (regarding the type of product developed and the competencies of the firm). This paper also goes further into the traditional concept of business model used by scholars in the open source related literature. In this article, a business model is not only considered as a way of generating incomes (''revenue model'' (Amit and Zott, 2001)), but rather as the necessary conjunction of value creation and value capture, according to the recent literature about business models (Amit and Zott, 2001; Chresbrough and Rosenblum, 2002; Teece, 2007). Consequently, this paper analyses the business models from these two components' point of view.