243 resultados para song syntax
Resumo:
It is known that boehmite (AlOOH) nanofibers formed in the presence of nonionic poly(ethylene oxide) (PEO) surfactant at 373 K. A novel approach is proposed in this study for the growth of the boehmite nanofibers: when fresh aluminum hydrate precipitate was added at regular interval to initial mixture of boehmite and PEO surfactant at 373 K, the nanofibers grow from 40 to 50 nm long to over 100 nm. It is believed that the surfactant micelles play an important role in the nanofiber growth: directing the assembly of aluminum hydrate particles through hydrogen bonding with the hydroxyls on the surface of aluminum hydrate particles. Meanwhile a gradual improvement in the crystallinity of the fibers during growth is observed and attributed to the Ostwald ripening process. This approach allows us to precisely control the size and morphology of boehmite nanofibers using soft chemical methods and could be useful for low temperature, aqueous syntheses of other oxide nanomaterials with tailorable structural specificity such as size, dimension and morphology.
Resumo:
The design of a building is a complicated process, having to formulate diverse components through unique tasks involving different personalities and organisations in order to satisfy multi-faceted client requirements. To do this successfully, the project team must encapsulate an integrated design that accommodates various social, economic and legislative factors. Therefore, in this era of increasing global competition integrated design has been increasingly recognised as a solution to deliver value to clients.----- The ‘From 3D to nD modelling’ project at the University of Salford aims to support integrated design; to enable and equip the design and construction industry with a tool that allows users to create, share, contemplate and apply knowledge from multiple perspectives of user requirements (accessibility, maintainability, sustainability, acoustics, crime, energy simulation, scheduling, costing etc.). Thus taking the concept of 3-dimensional computer modelling of the built environment to an almost infinite number of dimensions, to cope with whole-life construction and asset management issues in the design of modern buildings. This paper reports on the development of a vision for how integrated environments that will allow nD-enabled construction and asset management to be undertaken. The project is funded by a four-year platform grant from the Engineering and Physical Sciences Research Council (EPSRC) in the UK; thus awarded to a multi-disciplinary research team, to enable flexibility in the research strategy and to produce leading innovation. This paper reports on the development of a business process and IT vision for how integrated environments will allow nD-enabled construction and asset management to be undertaken. It further develops many of the key issues of a future vision arising from previous CIB W78 conferences.
Resumo:
This paper outlines results from the long-term deployment of a system for mobile group socialization which utilizes a variety of mundane technologies to support cross-media notifications and messaging. We focus here on the results as they pertain to usage of mundane technologies, particularly the use of such technologies within the context of a cross-media system. We introduce “Rhub”, our prototype, which was designed to support coordination, communication and sharing amongst informal social groups. We also describe and discuss the usage of the “console,” a text-based syntax to enable consistent use across text messaging, instant messaging, email and the web. The prototype has been in active use for over 18 months by over 170 participants, who have used it on an everyday basis for their own socializing requirements.
Resumo:
The research presented in this thesis addresses inherent problems in signaturebased intrusion detection systems (IDSs) operating in heterogeneous environments. The research proposes a solution to address the difficulties associated with multistep attack scenario specification and detection for such environments. The research has focused on two distinct problems: the representation of events derived from heterogeneous sources and multi-step attack specification and detection. The first part of the research investigates the application of an event abstraction model to event logs collected from a heterogeneous environment. The event abstraction model comprises a hierarchy of events derived from different log sources such as system audit data, application logs, captured network traffic, and intrusion detection system alerts. Unlike existing event abstraction models where low-level information may be discarded during the abstraction process, the event abstraction model presented in this work preserves all low-level information as well as providing high-level information in the form of abstract events. The event abstraction model presented in this work was designed independently of any particular IDS and thus may be used by any IDS, intrusion forensic tools, or monitoring tools. The second part of the research investigates the use of unification for multi-step attack scenario specification and detection. Multi-step attack scenarios are hard to specify and detect as they often involve the correlation of events from multiple sources which may be affected by time uncertainty. The unification algorithm provides a simple and straightforward scenario matching mechanism by using variable instantiation where variables represent events as defined in the event abstraction model. The third part of the research looks into the solution to address time uncertainty. Clock synchronisation is crucial for detecting multi-step attack scenarios which involve logs from multiple hosts. Issues involving time uncertainty have been largely neglected by intrusion detection research. The system presented in this research introduces two techniques for addressing time uncertainty issues: clock skew compensation and clock drift modelling using linear regression. An off-line IDS prototype for detecting multi-step attacks has been implemented. The prototype comprises two modules: implementation of the abstract event system architecture (AESA) and of the scenario detection module. The scenario detection module implements our signature language developed based on the Python programming language syntax and the unification-based scenario detection engine. The prototype has been evaluated using a publicly available dataset of real attack traffic and event logs and a synthetic dataset. The distinct features of the public dataset are the fact that it contains multi-step attacks which involve multiple hosts with clock skew and clock drift. These features allow us to demonstrate the application and the advantages of the contributions of this research. All instances of multi-step attacks in the dataset have been correctly identified even though there exists a significant clock skew and drift in the dataset. Future work identified by this research would be to develop a refined unification algorithm suitable for processing streams of events to enable an on-line detection. In terms of time uncertainty, identified future work would be to develop mechanisms which allows automatic clock skew and clock drift identification and correction. The immediate application of the research presented in this thesis is the framework of an off-line IDS which processes events from heterogeneous sources using abstraction and which can detect multi-step attack scenarios which may involve time uncertainty.
Resumo:
Think back to your teaching experiences over the past four years. Were there a number of children or adolescents in your classes who seemed to have learning difficulties? What area of their learning seemed to be of greatest concern for these students? Did most of these struggling learners have difficulty with reading? Was expressing their thoughts in writing also a challenge? Did some of these students also have difficulty in listening to and following directions? And did some of these students seem hesitant when asked to speak to the class?
Resumo:
Bone morphogenetic proteins (BMPs) have been widely investigated for their clinical use in bone repair and it is known that a suitable carrier matrix to deliver them is essential for optimal bone regeneration within a specific defect site. Fused deposited modeling (FDM) allows for the fabrication of medical grade poly 3-caprolactone/tricalcium phosphate (mPCL–TCP) scaffolds with high reproducibility and tailor designed dimensions. Here we loaded FDM fabricated mPCL–TCP/collagen scaffolds with 5 mg recombinant human (rh)BMP-2 and evaluated bone healing within a rat calvarial critical-sized defect. Using a comprehensive approach, this study assessed the newly regenerated bone employing microcomputed tomography (mCT), histology/histomorphometry, and mechanical assessments. By 15 weeks, mPCL–TCP/collagen/rhBMP-2 defects exhibited complete healing of the calvarium whereas the non- BMP-2-loaded scaffolds showed significant less bone ingrowth, as confirmed by mCT. Histomorphometry revealed significantly increased bone healing amongst the rhBMP-2 groups compared to non-treated scaffolds at 4 and 15 weeks, although the % BV/TV did not indicate complete mineralisation of the entire defect site. Hence, our study confirms that it is important to combine microCt and histomorphometry to be able to study bone regeneration comprehensively in 3D. A significant up-regulation of the osteogenic proteins, type I collagen and osteocalcin, was evident at both time points in rhBMP-2 groups. Although mineral apposition rates at 15 weeks were statistically equivalent amongst treatment groups, microcompression and push-out strengths indicated superior bone quality at 15 weeks for defects treated with mPCL–TCP/collagen/rhBMP-2. Consistently over all modalities, the progression of healing was from empty defect < mPCL–TCP/collagen < mPCL–TCP/collagen/rhBMP-2, providing substantiating data to support the hypothesis that the release of rhBMP-2 from FDM-created mPCL–TCP/collagen scaffolds is a clinically relevant approach to repair and regenerate critically-sized craniofacial bone defects. Crown Copyright 2008 Published by Elsevier Ltd. All rights reserved.
Resumo:
Poor student engagement and high failure rates in first year units were addressed at the Queensland University of Technology (QUT) with a course restructure involving a fresh approach to introducing programming. Students’ first taste of programming in the new course focused less on the language and syntax, and more on problem solving and design, and the role of programming in relation to other technologies they are likely to encounter in their studies. In effect, several technologies that have historically been compartmentalised and taught in isolation have been brought together as a breadth-first introduction to IT. Incorporating databases and Web development technologies into what used to be a purely programming unit gave students a very short introduction to each technology, with programming acting as the glue between each of them. As a result, students not only had a clearer understanding of the application of programming in the real world, but were able to determine their preference or otherwise for each of the technologies introduced, which will help them when the time comes for choosing a course major. Students engaged well in an intensely collaborative learning environment for this unit which was designed to both support the needs of students and meet industry expectations. Attrition from the unit was low, with computer laboratory practical attendance rates for the first time remaining high throughout semester, and the failure rate falling to a single figure percentage.