610 resultados para Nano Technology
Resumo:
Technology has advanced in such a manner that the world can now communicate in means previously never thought possible. These new technologies have not been overlooked by transnational organized crime groups and networks of corruption, and have been exploited for criminal success. This text explores the use of communication interception technology (CIT), such as phone taps or email interception, and its potential to cause serious disruption to these criminal enterprises. Exploring the placement of communication interception technology within differing policing frameworks, and how they integrate in a practical manner, the authors demonstrate that CIT is best placed within a proactive, intelligence-led policing framework. They also indicate that if law enforcement agencies in Western countries are serious about fighting transnational organized crime and combating corruption, there is a need to re-evaluate the constraints of interception technology, and the sceptical culture that surrounds intelligence in policing. Policing Transnational Organized Crime and Corruption will appeal to scholars of Law, Criminal Justice and Police Science as well as intelligence analysts and police and security intelligence professionals.
Resumo:
Semiconductor nanowires (NWs) show tremendous applications in micro/nano-electro-mechanical systems. In order to fulfill their promising applications, an understanding of the mechanical properties of NWs becomes increasingly important. Based on the large-scale molecular dynamics simulations, this work investigated the tensile properties of Si NWs with different faulted stacking layers. Different faulted stacking layers were introduced around the centre of the NW by the insertion or removal of certain stacking layers, inducing twins, intrinsic stacking fault, extrinsic stacking fault, and 9R crystal structure. Stress–strain curves obtained from the tensile deformation tests reveal that the presence of faulted stacking layers has induced a considerable decrease to the yield strength while only a minor decrease to Young's modulus. The brittle fracture phenomenon is observed for all tested NWs. In particular, the formation of a monatomic chain is observed for the perfect NW, which exists for a relatively wide strain range. For the defected NW, the monatomic chain appears and lasts shorter. Additionally, all defected NWs show a fracture area near the two ends, in contrast to the perfect NW whose fracture area is adjacent to the middle. This study provides a better understanding of the mechanical properties of Si NWs with the presence of different faulted stacking layers.
Resumo:
A large proportion (over 12 per cent) of international and non-English speaking background (NESB) postgraduate research students enrol in engineering and information technology (IT) programs in Australian universities. They find themselves in an advanced research culture, and are technically and scientifically challenged early in their programs. This is in addition to cultural, social and religious isolation and linguistic barriers they have to contend with. The project team surveyed this cohort at QUT and UWA, on the hypothesis that they face challenges that are more discipline-specific. The results of the survey indicate that existing supervisory frameworks which are limited to linguistic contexts are not fully assisting these students and supervisors to achieve high quality research. The goal of this project is to extend these supervisory frameworks to a holistic model that will address the unique needs and supervisory issues these students face in engineering and IT disciplines. The model will be useable by all other Australian universities.
Resumo:
In recent times, technology has advanced in such a manner that the world can now communicate in means previously never thought possible. Transnational organised crime groups, who have exploited these new technologies as basis for their criminal success, however, have not overlooked this development, growth and globalisation. Law enforcement agencies have been confronted with an unremitting challenge as they endeavour to intercept, monitor and analyse these communications as a means of disrupting the activities of criminal enterprises. The challenge lies in the ability to recognise and change tactics to match an increasingly sophisticated adversary. The use of communication interception technology, such as phone taps or email interception, is a tactic that when used appropriately has the potential to cause serious disruption to criminal enterprises. Despite the research that exists on CIT and TOC, these two bodies of knowledge rarely intersect. This paper builds on current literature, drawing them together to provide a clearer picture of the use of CIT in an enforcement and intelligence capacity. It provides a review of the literature pertaining to TOC, the structure of criminal enterprises and the vulnerability of communication used by these crime groups. Identifying the current contemporary models of policing it reviews intelligence-led policing as the emerging framework for modern policing. Finally, it assesses the literature concerning CIT, its uses within Australia and the limitations and arguments that exist. In doing so, this paper provides practitioners with a clearer picture of the use, barriers and benefits of using CIT in the fight against TOC. It helps to bridge the current gaps in modern policing theory and offers a perspective that can help drive future research.
Resumo:
Mesothelioma is a rare malignancy arising from mesothelial cells lining the pleura and peritoneum. Advances in modern technology have allowed the development of array based approaches to the study of disease allowing researchers the opportunity to study many genes or proteins in a high-throughput fashion. This review describes the current knowledge surrounding array based approaches with respect to mesothelioma research. © 2009 by the International Association for the Study of Lung Cancer.
Resumo:
This study uses the well-known social networking site, Facebook (FB), for a study of differences in perceptions on the use of technologies in the classroom around the world. This study is part of a larger project exploring telecollaboration and the use of online discussions between graduate students in an online masters program based in Australia and students in the graduate education program at a regional university in Greece. Postings reveal more similarities between the situations and perceptions of the participants from the different countries than differences. Most participants indicated that while they and their students had access in general to computers and the internet, they did not necessarily have this access in the classroom. Even when technologies were available in schools, participants identified a critical need for professional development to increase teachers’ use of ICT. These findings are relevant to educators and policy development in terms of implementation of ICT or social networking in the language classroom.
Resumo:
We examine the role of politico-economic influences on macroeconomic performance within the framework of an endogenous growth model with costly technology adoption and uncertainty. The model is aimed at understanding the diversity in growth and inequality experiences across countries. Agents adopt either of two risky technologies, one of which is only available through financial intermediaries, who are able to alleviate some of this risk. The entry cost of financial intermediation depends on the proportion of government revenue that is allocated towards cost-reducing financial development expenditure, and agents vote on this proportion. The results show that agents at the top and bottom ends of the distribution prefer alternative means of re-distribution, thereby effectively blocking the allocation of resources towards cost-reducing financial development expenditure. Thus political factors have a role in delaying financial and capital deepening and economic development. Furthermore, the model provides a political-economy perspective on the Kuznets curve; uncertainty interacts with the political economy mechanism to produce transitional inequality patterns that, depending on initial conditions, can unearth the Kuznets-curve experience. Finally, the political outcomes are inefficient relative to policies aimed at maximizing the collective welfare of agents in the economy.
Resumo:
This thesis examined the influence of mobile digital technology on the brand identity of luxury brands. Specifically it focused on the use of mobile applications by automobile, hotel and beauty brands and compared the perceptions of marketing managers with consumers on how mobile applications influenced luxury brand identity and image. Outcomes of this research included a model to depict the ongoing process between mobile-mediated luxury brand identity and image, and a typology of luxury brand mobile applications listing key features of mobile-mediated luxemosphere. Overall findings suggest that the influence of mobile applications on luxury brand identity has been negative, as their brand image appeared to be degraded, resulting in diminishing the brand identity.
Resumo:
Synthesis of MgC2O4⋅2H2O nano particles was carried out by thermal double decomposition of solutions of oxalic acid dihydrate (C2H2O4⋅2H2O) and Mg(OAc)2⋅4H2O employing CATA-2R microwave reactor. Structural elucidation was carried out by employing X-ray diffraction (XRD), particle size and shape were studied by transmission electron microscopy (TEM) and nature of bonding was investigated by optical absorption and near-infrared (NIR) spectral studies. The powder resulting from this method is pure and possesses distorted rhombic octahedral structure. The synthesized nano rod is 80 nm in diameter and 549 nm in length.
Resumo:
This research was a step towards the comprehension of the nano-particles interaction with bubbles created during boiling. It was aimed at solving the controversies of whether the heat transfer is enhanced or deteriorated during the boiling of the nanofluid. Experiments were conducted in normal gravity and reduced gravity environments on-board the European Space Agency Parabolic Flight Program. The local modification of the thermo-physical properties of the fluid and moreover the modification experienced in the liquid microlayer under the growing vapour bubble were the dominant factors in explaining the mechanisms of the boiling behaviour of the nanofluid.
Resumo:
In plants, double-stranded RNA (dsRNA) is an effective trigger of RNA silencing, and several classes of endogenous small RNA (sRNA), processed from dsRNA substrates by DICER-like (DCL) endonucleases, are essential in controlling gene expression. One such sRNA class, the microRNAs (miRNAs) control the expression of closely related genes to regulate all aspects of plant development, including the determination of leaf shape, leaf polarity, flowering time, and floral identity. A single miRNA sRNA silencing signal is processed from a long precursor transcript of nonprotein-coding RNA, termed the primary miRNA (pri-miRNA). A region of the pri-miRNA is partially self-complementary allowing the transcript to fold back onto itself to form a stem-loop structure of imperfectly dsRNA. Artificial miRNA (amiRNA) technology uses endogenous pri-miRNAs, in which the miRNA and miRNA*(passenger strand of the miRNA duplex) sequences have been replaced with corresponding amiRNA/ amiRNA*sequences that direct highly efficient RNA silencing of the targeted gene. Here, we describe the rules for amiRNA design, as well as outline the PCR and bacterial cloning procedures involved in the construction of an amiRNA plant expression vector to control target gene expression in Arabidopsis thaliana. © 2014 Springer Science+Business Media New York.
Australian Research to Encourage School Students’ Positive Use of Technology to Reduce Cyberbullying
Resumo:
Information and Communications Technology (ICT) has spread rapidly in Australia. Mobile phones, which increasingly have advanced capabilities including Internet access, mobile television and multimedia storage, are owned by 22% of Australian children aged 9-11 years and 73% of those aged 12-14 years (Australian Bureau of Statistics, 2012b), as well as by over 90% of Australians aged 15 years and over(Australian Communications and Media Authority (ACMA), 2010). Nearly 80% of Australian households have access to the Internet and 73% have a broadband Internet connection, ensuring that Internet access is typically reliable and high-speed (Australian Bureau of Statistics, 2012a). Ninety percent of Australian children aged 5-14 years (comprising 79% of 5-8 year olds; 96% of 9-11 year olds; and 98% of 12-14 year olds) reported having accessed the Internet during 2011-2012, a significant increase from 79% in 2008-2009 (Australian Bureau of Statistics, 2012b). Approximately 90% of 5-14 year olds have accessed the Internet both from home and from school, with close to 49% accessing the Internet from other places (Australian Bureau of Statistics, 2012b). Young people often make use of borrowed Internet access (e.g. in friends’ homes), commercial access (e.g. cybercafés), public access (e.g. libraries), and mobile device access in areas offering free Wi-Fi (Lim, 2009).
Resumo:
Increasingly, organizations are looking to employ Social Technology (ST) to enhance their capability with Business Process Improvement (BPI). However, little is known about how the characteristics or qualities of ST actually influence an organizations' capability at Business Process Improvement (BPI). This paper discusses the potential role of ST in process improvement by presenting an a-priory model derived by an investigation of extant research. First, the qualities of social technology that potentially support high level action possibilities related to BPI are presented (we refer to these as affordances), next these affordances are mapped to the De Bruin (2009) BPM Maturity model as a first step to understanding how ST influences BPI. This work is expected to contribute to our knowledge and understanding of the relationship between ST and BPI, and will extend existing theory on Business Process Management capability and maturity.
Resumo:
BACKGROUND Inconsistencies in research findings on the impact of the built environment on walking across the life course may be methodologically driven. Commonly used methods to define 'neighbourhood', from which built environment variables are measured, may not accurately represent the spatial extent to which the behaviour in question occurs. This paper aims to provide new methods for spatially defining 'neighbourhood' based on how people use their surrounding environment. RESULTS Informed by Global Positioning Systems (GPS) tracking data, several alternative neighbourhood delineation techniques were examined (i.e., variable width, convex hull and standard deviation buffers). Compared with traditionally used buffers (i.e., circular and polygon network), differences were found in built environment characteristics within the newly created 'neighbourhoods'. Model fit statistics indicated that exposure measures derived from alternative buffering techniques provided a better fit when examining the relationship between land-use and walking for transport or leisure. CONCLUSIONS This research identifies how changes in the spatial extent from which built environment measures are derived may influence walking behaviour. Buffer size and orientation influences the relationship between built environment measures and walking for leisure in older adults. The use of GPS data proved suitable for re-examining operational definitions of neighbourhood.