738 resultados para Policy networks
Resumo:
Tailoring the density of random single-walled carbon nanotube (SWCNT) networks is of paramount importance for various applications, yet it remains a major challenge due to the insufficient catalyst activation in most growth processes. Here we report on a simple and effective method to maximise the number of active catalyst nanoparticles using catalytic chemical vapor deposition (CCVD). By modulating short pulses of acetylene into a methane-based CCVD growth process, the density of SWCNTs is dramatically increased by up to three orders of magnitude without increasing the catalyst density and degrading the nanotube quality. In the framework of a vapor-liquid-solid model, we attribute the enhanced growth to the high dissociation rate of acetylene at high temperatures at the nucleation stage, which can be effective in both supersaturating the larger catalyst nanoparticles and overcoming the nanotube nucleation energy barrier of the smaller catalyst nanoparticles. These results are highly relevant to numerous applications of random SWCNT networks in next-generation energy, sensing and biomedical devices. © 2011 The Royal Society of Chemistry.
Resumo:
Controlled synthesis of both single-walled carbon nanotube and carbon nanowire networks using the same CVD reactor and Fe/Al2O3 catalyst by slightly altering the hydrogenation and temperature conditions is demonstrated. Structural, bonding and electrical characterization using SEM, TEM, Raman spectroscopy, and temperature-dependent resistivity measurements suggest that the nanotubes are of a high quality and a large fraction (well above the common 33% and possibly up to 75%) of them are metallic. On the other hand, the carbon nanowires are amorphous and semiconducting and feature a controlled sp2/sp3 ratio. The growth mechanism which is based on the catalyst nanoisland analysis by AFM and takes into account the hydrogenation and temperature control effects explains the observed switch-over of the nanostructure growth modes. These results are important to achieve the ultimate control of chirality, structure, and conductivity of one-dimensional all-carbon networks.
Resumo:
The electronic transport in both intrinsic and acid-treated single-walled carbon nanotube networks containing more than 90% semiconducting nanotubes is investigated using temperature-dependent resistance measurements. The semiconducting behavior observed in the intrinsic network is attributed to the three-dimensional electron hopping mechanism. In contrast, the chemical doping mechanism in the acid-treated network is found to be responsible for the revealed metal-like linear resistivity dependence in a broad temperature range. This effective method to control the electrical conductivity of single-walled carbon nanotube networks is promising for future nanoscale electronics, thermometry, and bolometry. © 2010 American Institute of Physics.
Resumo:
Using advanced visualization techniques, a comprehensive visualization of all the stages of the self-organized growth of internetworked nanostructures on plasma-exposed surface has been made. Atomistic kinetic Monte Carlo simulation for the initial stage of deposition, with 3-D visualization of the whole system and half-tone visualization of the density field of the adsorbed atoms, makes it possible to implement a multiscale predictive modeling of the development of the nanoscale system.
Resumo:
The fields of molecular biology and cell biology are being flooded with complex genomic and proteomic datasets of large dimensions. We now recognize that each molecule in the cell and tissue can no longer be viewed as an isolated entity. Instead, each molecule must be considered as one member of an interacting network. Consequently, there is an urgent need for mathematical models to understand the behavior of cell signaling networks in health and in disease.
Resumo:
In various parts of the world, Indigenous and non-Indigenous peoples are actively working towards Reconciliation. In Australia, the context in which we each undertake our work as educationalists and researchers, the Reconciliation agenda has been pushed into schools and English teachers have been called on to share responsibility for facilitating the move towards a new national order. The recently introduced Australian Curriculum mandates that Aboriginal and Torres Strait Islander Histories and Cultures be embedded with “a strong” but “varying presence” into each learning area (Australian Curriculum, Assessment and Reporting Authority, 2013). In this paper we consider the tensions between policy and practice, when discourses external to education are recontextualised into the discipline of English. We do so by applying an analytical framework based on Bernstein’s (1990, 1996,2000) sociological theories about the structure of instructional and regulative discourses. Our findings suggest that the space to exert Reconciliatory agendas in the Australian Curriculum English is ambiguous and thus holds the potential to not only marginalise Indigenous knowledges but also to create tensions between policy and practice for non-Indigenous teachers of English.
Resumo:
Molecular interactions that underlie pathophysiological states are being elucidated using techniques that profile proteomicend points in cellular systems. Within the field of cancer research, protein interaction networks play pivotal roles in the establishment and maintenance of the hallmarks of malignancy, including cell division, invasion, and migration. Multiple complementary tools enable a multifaceted view of how signal protein pathway alterations contribute to pathophysiological states.One pivotal technique is signal pathway profiling of patient tissue specimens. This microanalysis technology provides a proteomic snapshot at one point in time of cells directly procured from the native context of a tumor micro environment. To study the adaptive patterns of signal pathway events over time, before and after experimental therapy, it is necessary to obtain biopsies from patients before, during, and after therapy. A complementary approach is the profiling of cultured cell lines with and without treatment. Cultured cell models provide the opportunity to study short-term signal changes occurring over minutes to hours. Through this type of system, the effects of particular pharmacological agents may be used to test the effects of signal pathway inhibition or activation on multiple endpoints within a pathway. The complexity of the data generated has necessitated the development of mathematical models for optimal interpretation of interrelated signaling pathways. In combination,clinical proteomic biopsy profiling, tissue culture proteomic profiling, and mathematical modeling synergistically enable a deeper understanding of how protein associations lead to disease states and present new insights into the design of therapeutic regimens.
Resumo:
We propose a reliable and ubiquitous group key distribution scheme that is suitable for ad hoc networks. The scheme has self-initialisation and self-securing features. The former feature allows a cooperation of an arbitrary number of nodes to initialise the system, and it also allows node admission to be performed in a decentralised fashion. The latter feature allows a group member to determine the group key remotely while maintaining the system security. We also consider a decentralised solution of establishing secure point-to-point communication. The solution allows a new node to establish a secure channel with every existing node if it has pre-existing secure channels with a threshold number of the existing nodes.
Resumo:
This article examines the politics and practice of urban cultural policy in Austin, Texas. I demonstrate how aspects of the local context frame how local government and cultural sector interests strive to initiate the direction of policy. While larger trends—such as Richard Florida's creative city thesis—influence cultural policy and planning, specific contextual factors including prior economic development and growth management policy, departmental organization, the forum for interaction between municipal actors and non-governmental coalitions, and the character of the city's cultural economy mediate such trends to produce policy outcomes. As this case shows, contemporary urban cultural policy is not simply due to the rise of the creative city discourse, but is an evolving product of past policy structures and shaped by local institutions and actors.
Resumo:
There is growing interest in the arts in community and economic development, yet little research examines the dynamics of community-based arts institutions to inform urban planning and policy. Drawing on interviews with participants and organizers of small and midsized art spaces, the study explores the factors that influence their involvement in neighborhood revitalization and outreach, support for artistic communities, and efforts to build bridges to commercial cultural sectors. Art spaces function as a conduit for building social networks that contribute to both community revitalization and artistic development. But issues pertaining to the location, organization, and management of art spaces may limit their community and economic development potential. The article concludes with proposals to craft stronger arts-based community and economic development programs.
Resumo:
Vehicular Ad-hoc Networks (VANETs) can make roads safer, cleaner, and smarter. It can offer a wide range of services, which can be safety and non-safety related. Many safety-related VANETs applications are real-time and mission critical, which would require strict guarantee of security and reliability. Even non-safety related multimedia applications, which will play an important role in the future, will require security support. Lack of such security and privacy in VANETs is one of the key hindrances to the wide spread implementations of it. An insecure and unreliable VANET can be more dangerous than the system without VANET support. So it is essential to make sure that “life-critical safety” information is secure enough to rely on. Securing the VANETs along with appropriate protection of the privacy drivers or vehicle owners is a very challenging task. In this work we summarize the attacks, corresponding security requirements and challenges in VANETs. We also present the most popular generic security policies which are based on prevention as well detection methods. Many VANETs applications require system-wide security support rather than individual layer from the VANETs’ protocol stack. In this work we will review the existing works in the perspective of holistic approach of security. Finally, we will provide some possible future directions to achieve system-wide security as well as privacy-friendly security in VANETs.
Resumo:
Generally wireless sensor networks rely of many-to-one communication approach for data gathering. This approach is extremely susceptible to sinkhole attack, where an intruder attracts surrounding nodes with unfaithful routing information, and subsequently presents selective forwarding or change the data that carry through it. A sinkhole attack causes an important threat to sensor networks and it should be considered that the sensor nodes are mostly spread out in open areas and of weak computation and battery power. In order to detect the intruder in a sinkhole attack this paper suggests an algorithm which firstly finds a group of suspected nodes by analyzing the consistency of data. Then, the intruder is recognized efficiently in the group by checking the network flow information. The proposed algorithm's performance has been evaluated by using numerical analysis and simulations. Therefore, accuracy and efficiency of algorithm would be verified.
Resumo:
Wireless Sensor Networks (WSNs) are employed in numerous applications in different areas including military, ecology, and health; for example, to control of important information like the personnel position in a building, as a result, WSNs need security. However, several restrictions such as low capability of computation, small memory, limited resources of energy, and the unreliable channels employ communication in using WSNs can cause difficulty in use of security and protection in WSNs. It is very essential to save WSNs from malevolent attacks in unfriendly situations. Such networks require security plan due to various limitations of resources and the prominent characteristics of a wireless sensor network which is a considerable challenge. This article is an extensive review about problems of WSNs security, which examined recently by researchers and a better understanding of future directions for WSN security.