283 resultados para single-electron logic
Resumo:
This thesis employs the theoretical fusion of disciplinary knowledge, interlacing an analysis from both functional and interpretive frameworks and applies these paradigms to three concepts—organisational identity, the balanced scorecard performance measurement system, and control. As an applied thesis, this study highlights how particular public sector organisations are using a range of multi-disciplinary forms of knowledge constructed for their needs to achieve practical outcomes. Practical evidence of this study is not bound by a single disciplinary field or the concerns raised by academics about the rigorous application of academic knowledge. The study’s value lies in its ability to explore how current communication and accounting knowledge is being used for practical purposes in organisational life. The main focus of this thesis is on identities in an organisational communication context. In exploring the theoretical and practical challenges, the research questions for this thesis were formulated as: 1. Is it possible to effectively control identities in organisations by the use of an integrated performance measurement system—the balanced scorecard—and if so, how? 2. What is the relationship between identities and an integrated performance measurement system—the balanced scorecard—in the identity construction process? Identities in the organisational context have been extensively discussed in graphic design, corporate communication and marketing, strategic management, organisational behaviour, and social psychology literatures. Corporate identity is the self-presentation of the personality of an organisation (Van Riel, 1995; Van Riel & Balmer, 1997), and organisational identity is the statement of central characteristics described by members (Albert & Whetten, 2003). In this study, identity management is positioned as a strategically complex task, embracing not only logo and name, but also multiple dimensions, levels and facets of organisational life. Responding to the collaborative efforts of researchers and practitioners in identity conceptualisation and methodological approaches, this dissertation argues that analysis can be achieved through the use of an integrated framework of identity products, patternings and processes (Cornelissen, Haslam, & Balmer, 2007), transforming conceptualisations of corporate identity, organisational identity and identification studies. Likewise, the performance measurement literature from the accounting field now emphasises the importance of ‘soft’ non-financial measures in gauging performance—potentially allowing the monitoring and regulation of ‘collective’ identities (Cornelissen et al., 2007). The balanced scorecard (BSC) (Kaplan & Norton, 1996a), as the selected integrated performance measurement system, quantifies organisational performance under the four perspectives of finance, customer, internal process, and learning and growth. Broadening the traditional performance measurement boundary, the BSC transforms how organisations perceived themselves (Vaivio, 2007). The rhetorical and communicative value of the BSC has also been emphasised in organisational self-understanding (Malina, Nørreklit, & Selto, 2007; Malmi, 2001; Norreklit, 2000, 2003). Thus, this study establishes a theoretical connection between the controlling effects of the BSC and organisational identity construction. Common to both literatures, the aspects of control became the focus of this dissertation, as ‘the exercise or act of achieving a goal’ (Tompkins & Cheney, 1985, p. 180). This study explores not only traditional technical and bureaucratic control (Edwards, 1981), but also concertive control (Tompkins & Cheney, 1985), shifting the locus of control to employees who make their own decisions towards desired organisational premises (Simon, 1976). The controlling effects on collective identities are explored through the lens of the rhetorical frames mobilised through the power of organisational enthymemes (Tompkins & Cheney, 1985) and identification processes (Ashforth, Harrison, & Corley, 2008). In operationalising the concept of control, two guiding questions were developed to support the research questions: 1.1 How does the use of the balanced scorecard monitor identities in public sector organisations? 1.2 How does the use of the balanced scorecard regulate identities in public sector organisations? This study adopts qualitative multiple case studies using ethnographic techniques. Data were gathered from interviews of 41 managers, organisational documents, and participant observation from 2003 to 2008, to inform an understanding of organisational practices and members’ perceptions in the five cases of two public sector organisations in Australia. Drawing on the functional and interpretive paradigms, the effective design and use of the systems, as well as the understanding of shared meanings of identities and identifications are simultaneously recognised. The analytical structure guided by the ‘bracketing’ (Lewis & Grimes, 1999) and ‘interplay’ strategies (Schultz & Hatch, 1996) preserved, connected and contrasted the unique findings from the multi-paradigms. The ‘temporal bracketing’ strategy (Langley, 1999) from the process view supports the comparative exploration of the analysis over the periods under study. The findings suggest that the effective use of the BSC can monitor and regulate identity products, patternings and processes. In monitoring identities, the flexible BSC framework allowed the case study organisations to monitor various aspects of finance, customer, improvement and organisational capability that included identity dimensions. Such inclusion legitimises identity management as organisational performance. In regulating identities, the use of the BSC created a mechanism to form collective identities by articulating various perspectives and causal linkages, and through the cascading and alignment of multiple scorecards. The BSC—directly reflecting organisationally valued premises and legitimised symbols—acted as an identity product of communication, visual symbols and behavioural guidance. The selective promotion of the BSC measures filtered organisational focus to shape unique identity multiplicity and characteristics within the cases. Further, the use of the BSC facilitated the assimilation of multiple identities by controlling the direction and strength of identifications, engaging different groups of members. More specifically, the tight authority of the BSC framework and systems are explained both by technical and bureaucratic controls, while subtle communication of organisational premises and information filtering is achieved through concertive control. This study confirms that these macro top-down controls mediated the sensebreaking and sensegiving process of organisational identification, supporting research by Ashforth, Harrison and Corley (2008). This study pays attention to members’ power of self-regulation, filling minor premises of the derived logic of their organisation through the playing out of organisational enthymemes (Tompkins & Cheney, 1985). Members are then encouraged to make their own decisions towards the organisational premises embedded in the BSC, through the micro bottom-up identification processes including: enacting organisationally valued identities; sensemaking; and the construction of identity narratives aligned with those organisationally valued premises. Within the process, the self-referential effect of communication encouraged members to believe the organisational messages embedded in the BSC in transforming collective and individual identities. Therefore, communication through the use of the BSC continued the self-producing of normative performance mechanisms, established meanings of identities, and enabled members’ self-regulation in identity construction. Further, this research establishes the relationship between identity and the use of the BSC in terms of identity multiplicity and attributes. The BSC framework constrained and enabled case study organisations and members to monitor and regulate identity multiplicity across a number of dimensions, levels and facets. The use of the BSC constantly heightened the identity attributes of distinctiveness, relativity, visibility, fluidity and manageability in identity construction over time. Overall, this research explains the reciprocal controlling relationships of multiple structures in organisations to achieve a goal. It bridges the gap among corporate and organisational identity theories by adopting Cornelissen, Haslam and Balmer’s (2007) integrated identity framework, and reduces the gap in understanding between identity and performance measurement studies. Parallel review of the process of monitoring and regulating identities from both literatures synthesised the theoretical strengths of both to conceptualise and operationalise identities. This study extends the discussion on positioning identity, culture, commitment, and image and reputation measures in integrated performance measurement systems as organisational capital. Further, this study applies understanding of the multiple forms of control (Edwards, 1979; Tompkins & Cheney, 1985), emphasising the power of organisational members in identification processes, using the notion of rhetorical organisational enthymemes. This highlights the value of the collaborative theoretical power of identity, communication and performance measurement frameworks. These case studies provide practical insights about the public sector where existing bureaucracy and desired organisational identity directions are competing within a large organisational setting. Further research on personal identity and simple control in organisations that fully cascade the BSC down to individual members would provide enriched data. The extended application of the conceptual framework to other public and private sector organisations with a longitudinal view will also contribute to further theory building.
Resumo:
In computational linguistics, information retrieval and applied cognition, words and concepts are often represented as vectors in high dimensional spaces computed from a corpus of text. These high dimensional spaces are often referred to as Semantic Spaces. We describe a novel and efficient approach to computing these semantic spaces via the use of complex valued vector representations. We report on the practical implementation of the proposed method and some associated experiments. We also briefly discuss how the proposed system relates to previous theoretical work in Information Retrieval and Quantum Mechanics and how the notions of probability, logic and geometry are integrated within a single Hilbert space representation. In this sense the proposed system has more general application and gives rise to a variety of opportunities for future research.
Resumo:
In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least theoretically, join various types of IMSs to make them interoperable and give users the illusion that they are interacting with just one IMS. However, due to the complexity of an IMS, attempting to join various types of IMSs is a technically challenging task, let alone assessing how well an IMetS manages to integrate these IMSs. The first contribution of this thesis is the development of a generic IMS model called the Layered Identity Infrastructure Model (LIIM). Using this model, we develop a set of properties that an ideal IMetS should provide. This idealized form is then used as a benchmark to evaluate existing IMetSs. Different types of IMS provide varying levels of privacy protection support. Unfortunately, as observed by Jøsang et al (2007), there is insufficient privacy protection in many of the existing IMSs. In this thesis, we study and extend a type of privacy enhancing technology known as an Anonymous Credential System (ACS). In particular, we extend the ACS which is built on the cryptographic primitives proposed by Camenisch, Lysyanskaya, and Shoup. We call this system the Camenisch, Lysyanskaya, Shoup - Anonymous Credential System (CLS-ACS). The goal of CLS-ACS is to let users be as anonymous as possible. Unfortunately, CLS-ACS has problems, including (1) the concentration of power to a single entity - known as the Anonymity Revocation Manager (ARM) - who, if malicious, can trivially reveal a user’s PII (resulting in an illegal revocation of the user’s anonymity), and (2) poor performance due to the resource-intensive cryptographic operations required. The second and third contributions of this thesis are the proposal of two protocols that reduce the trust dependencies on the ARM during users’ anonymity revocation. Both protocols distribute trust from the ARM to a set of n referees (n > 1), resulting in a significant reduction of the probability of an anonymity revocation being performed illegally. The first protocol, called the User Centric Anonymity Revocation Protocol (UCARP), allows a user’s anonymity to be revoked in a user-centric manner (that is, the user is aware that his/her anonymity is about to be revoked). The second protocol, called the Anonymity Revocation Protocol with Re-encryption (ARPR), allows a user’s anonymity to be revoked by a service provider in an accountable manner (that is, there is a clear mechanism to determine which entity who can eventually learn - and possibly misuse - the identity of the user). The fourth contribution of this thesis is the proposal of a protocol called the Private Information Escrow bound to Multiple Conditions Protocol (PIEMCP). This protocol is designed to address the performance issue of CLS-ACS by applying the CLS-ACS in a federated single sign-on (FSSO) environment. Our analysis shows that PIEMCP can both reduce the amount of expensive modular exponentiation operations required and lower the risk of illegal revocation of users’ anonymity. Finally, the protocols proposed in this thesis are complex and need to be formally evaluated to ensure that their required security properties are satisfied. In this thesis, we use Coloured Petri nets (CPNs) and its corresponding state space analysis techniques. All of the protocols proposed in this thesis have been formally modeled and verified using these formal techniques. Therefore, the fifth contribution of this thesis is a demonstration of the applicability of CPN and its corresponding analysis techniques in modeling and verifying privacy enhancing protocols. To our knowledge, this is the first time that CPN has been comprehensively applied to model and verify privacy enhancing protocols. From our experience, we also propose several CPN modeling approaches, including complex cryptographic primitives (such as zero-knowledge proof protocol) modeling, attack parameterization, and others. The proposed approaches can be applied to other security protocols, not just privacy enhancing protocols.
Resumo:
Double-stranded RNA species ranging in molecular weight from 0.95 to 6.3 × 106 were detected in grapevines in New York. We recently showed that two of the species (Mr = 5.3 and 4.4 × 106) are associated with rupestris stem pitting disease. In this report, we show that the other eight detectable dsRNA species are associated with the powdery mildew fungus, Uncinula necator. These dsRNAs associated with the powdery mildew fungus were previously detected in leaves and epidermal stem tissue of grapevines infected with powdery mildew. The same dsRNA species were also detected from extracts of isolated cleistothecia and conidia of U. necator devoid of plant tissue. Isometric and rigid rodlike particles were observed in single cleistothecia preparations when examined under transmission electron microscopy.
Resumo:
Based on the embedded atom method (EAM), a molecular dynamics (MD) simulation is performed to study the single-crystal copper nanowire with surface defects through tension. The tension simulations for nanowire without defect are first carried out under different temperatures, strain rates and time steps and then surface defect effects for nanowire are investigated. The stress-strain curves obtained by the MD simulations of various strain rates show a rate below 1 x 10(9) s-1 will exert less effect on the yield strength and yield point, and the Young's modulus is independent of strain rate. a time step below 5 fs is recommend for the atomic model during the MD simulation. It is observed that high temperature leads to low Young's modulus, as well as the yield strength. The surface defects on nanowires are systematically studied in considering different defect orientations. It is found that the surface defect serves as a dislocation source, and the yield strength shows 34.20% decresse with 45 degree surface defect. Both yield strength and yield point are significantly influenced by the surface defects, except the Young's modulus.
Resumo:
A zoisite group of mineral samples from different localities are used in the present study. An EPR study on powdered samples confirms the presence of Mn(II), Fe(III) and Cr(III) in the minerals. NIR studies confirm the presence of these ions in the minerals.
Resumo:
The rural two-lane highway in the southeastern United States is frequently associated with a disproportionate number of serious and fatal crashes and as such remains a focus of considerable safety research. The Georgia Department of Transportation spearheaded a regional fatal crash analysis to identify various safety performances of two-lane rural highways and to offer guidance for identifying suitable countermeasures with which to mitigate fatal crashes. The fatal crash data used in this study were compiled from Alabama, Georgia, Mississippi, and South Carolina. The database, developed for an earlier study, included 557 randomly selected fatal crashes from 1997 or 1998 or both (this varied by state). Each participating state identified the candidate crashes and performed physical or video site visits to construct crash databases with enhance site-specific information. Motivated by the hypothesis that single- and multiple-vehicle crashes arise from fundamentally different circumstances, the research team applied binary logit models to predict the probability that a fatal crash is a single-vehicle run-off-road fatal crash given roadway design characteristics, roadside environment features, and traffic conditions proximal to the crash site. A wide variety of factors appears to influence or be associated with single-vehicle fatal crashes. In a model transferability assessment, the authors determined that lane width, horizontal curvature, and ambient lighting are the only three significant variables that are consistent for single-vehicle run-off-road crashes for all study locations.
Resumo:
DNA exists predominantly in a duplex form that is preserved via specific base pairing. This base pairing affords a considerable degree of protection against chemical or physical damage and preserves coding potential. However, there are many situations, e.g. during DNA damage and programmed cellular processes such as DNA replication and transcription, in which the DNA duplex is separated into two singlestranded DNA (ssDNA) strands. This ssDNA is vulnerable to attack by nucleases, binding by inappropriate proteins and chemical attack. It is very important to control the generation of ssDNA and protect it when it forms, and for this reason all cellular organisms and many viruses encode a ssDNA binding protein (SSB). All known SSBs use an oligosaccharide/oligonucleotide binding (OB)-fold domain for DNA binding. SSBs have multiple roles in binding and sequestering ssDNA, detecting DNA damage, stimulating strand-exchange proteins and helicases, and mediation of protein–protein interactions. Recently two additional human SSBs have been identified that are more closely related to bacterial and archaeal SSBs. Prior to this it was believed that replication protein A, RPA, was the only human equivalent of bacterial SSB. RPA is thought to be required for most aspects of DNA metabolism including DNA replication, recombination and repair. This review will discuss in further detail the biological pathways in which human SSBs function.
Resumo:
Archaeal transcription utilizes a complex multisubunit RNA polymerase and the basal transcription factors TBP and TF(II)B, closely resembling its eukaryal counterpart. We have uncovered a tight physical and functional interaction between RNA polymerase and the single-stranded DNA-binding protein SSB in Sulfolobus solfataricus. SSB stimulates transcription from promoters in vitro under TBP-limiting conditions and supports transcription in the absence of TBP. SSB also rescues transcription from repression by reconstituted chromatin. We demonstrate the potential for promoter melting by SSB, suggesting a plausible basis for the stimulation of transcription. This stimulation requires both the single-stranded DNA-binding domain and the acidic C-terminal tail of the SSB. The tail forms a stable interaction with RNA polymerase. These data reveal an unexpected role for single-stranded DNA-binding proteins in transcription in archaea.
Resumo:
A series of porphyrins substituted in one or two meso-positions by diphenylphosphine oxide groups has been prepared by the palladium catalysed reaction of diphenylphosphine or its oxide with the corresponding bromoporphyrins. Compounds {MDPP-[P(O)Ph2]n} (M = H2, Ni, Zn; H2DPP = 5,15-diphenylporphyrin; n = 1, 2) were isolated in yields of 60-95%. The reaction is believed to proceed via the conventional oxidative addition, phosphination and reductive elimination steps, as the stoichiometric reaction of η1-palladio(II) porphyrin [PdBr(H2DPP)(dppe)] (H2DPP = 5,15-diphenylporphyrin; dppe = 1,2-bis(diphenylphosphino)ethane) with diphenylphosphine oxide also results in the desired mono-porphyrinylphosphine oxide [H2DPP-P(O)Ph2]. Attempts to isolate the tertiary phosphines failed due to their extreme air-sensitivity. Variable temperature 1H NMR studies of [H2DPP-P(O)Ph2] revealed an intrinsic lack of symmetry, while fluorescence spectroscopy showed that the phosphine oxide group does not behave as a "heavy atom" quencher. The electron withdrawing effect of the phosphine oxide group was confirmed by voltammetry. The ligands were characterised by multinuclear NMR and UV-visible spectroscopy as well as mass spectrometry. Single crystal X-ray crystallography showed that the bis(phosphine oxide) nickel(II) complex {[NiDPP-[P(O)Ph2]2} is monomeric in the solid state, with a ruffled porphyrin core and the two P=O fragments on the same side of the average plane of the molecule. On the other hand, the corresponding zinc(II) complex formed infinite chains through coordination of one Ph2PO substituent to the neighbouring zinc porphyrin through an almost linear P=O---Zn unit, leaving the other Ph2PO group facing into a parallel channel filled with disordered water molecules. These new phosphine oxides are attractive ligands for supramolecular porphyrin chemistry.
Resumo:
Single-strand DNA (ssDNA)-binding proteins (SSBs) are ubiquitous and essential for a wide variety of DNA metabolic processes, including DNA replication, recombination, DNA damage detection and repair1. SSBs have multiple roles in binding and sequestering ssDNA, detecting DNA damage, stimulating nucleases, helicases and strand-exchange proteins, activating transcription and mediating protein–protein interactions. In eukaryotes, the major SSB, replication protein A (RPA), is a heterotrimer1. Here we describe a second human SSB (hSSB1), with a domain organization closer to the archaeal SSB than to RPA. Ataxia telangiectasia mutated (ATM) kinase phosphorylates hSSB1 in response to DNA double-strand breaks (DSBs). This phosphorylation event is required for DNA damage-induced stabilization of hSSB1. Upon induction of DNA damage, hSSB1 accumulates in the nucleus and forms distinct foci independent of cell-cycle phase. These foci co-localize with other known repair proteins. In contrast to RPA, hSSB1 does not localize to replication foci in S-phase cells and hSSB1 deficiency does not influence S-phase progression. Depletion of hSSB1 abrogates the cellular response to DSBs, including activation of ATM and phosphorylation of ATM targets after ionizing radiation. Cells deficient in hSSB1 exhibit increased radiosensitivity, defective checkpoint activation and enhanced genomic instability coupled with a diminished capacity for DNA repair. These findings establish that hSSB1 influences diverse endpoints in the cellular DNA damage response.
Resumo:
In total, 782 Escherichia coli strains originating from various host sources have been analyzed in this study by using a highly discriminatory single-nucleotide polymorphism (SNP) approach. A set of eight SNPs, with a discrimination value (Simpson's index of diversity [D]) of 0.96, was determined using the Minimum SNPs software, based on sequences of housekeeping genes from the E. coli multilocus sequence typing (MLST) database. Allele-specific real-time PCR was used to screen 114 E. coli isolates from various fecal sources in Southeast Queensland (SEQ). The combined analysis of both the MLST database and SEQ E. coli isolates using eight high-D SNPs resolved the isolates into 74 SNP profiles. The data obtained suggest that SNP typing is a promising approach for the discrimination of host-specific groups and allows for the identification of human-specific E. coli in environmental samples. However, a more diverse E. coli collection is required to determine animal- and environment-specific E. coli SNP profiles due to the abundance of human E. coli strains (56%) in the MLST database.
Resumo:
The electron collection efficiency in dye-sensitized solar cells (DSCs) is usually related to the electron diffusion length, L = (Dτ)1/2, where D is the diffusion coefficient of mobile electrons and τ is their lifetime, which is determined by electron transfer to the redox electrolyte. Analysis of incident photon-to-current efficiency (IPCE) spectra for front and rear illumination consistently gives smaller values of L than those derived from small amplitude methods. We show that the IPCE analysis is incorrect if recombination is not first-order in free electron concentration, and we demonstrate that the intensity dependence of the apparent L derived by first-order analysis of IPCE measurements and the voltage dependence of L derived from perturbation experiments can be fitted using the same reaction order, γ ≈ 0.8. The new analysis presented in this letter resolves the controversy over why L values derived from small amplitude methods are larger than those obtained from IPCE data.
Resumo:
The oriented single crystal Raman spectrum of leiteite has been obtained and the spectra related to the structure of the mineral. The intensities of the observed bands vary according to orientation allowing them to be assigned to either Ag or Bg modes. Ag bands are generally the most intense in the CAAC spectrum, followed by ACCA, CBBC, and ABBA whereas Bg bands are generally the most intense in the CBAC followed by ABCA. The CAAC and ACCA spectra are identical, as are those obtained in the CBBC and ABBA orientations. Both cross-polarised spectra are identical. Band assignments were made with respect to bridging and non-bridging As-O bonds.
Resumo:
Multilevel converters are used in high power and high voltage applications due to their attractive benefits in generating high quality output voltage. Increasing the number of voltage levels can lead to a reduction in lower order harmonics. Various modulation and control techniques are introduced for multilevel converters like Space Vector Modulation (SVM), Sinusoidal Pulse Width Modulation (SPWM) and Harmonic Elimination (HE) methods. Multilevel converters may have a DC link with equal or unequal DC voltages. In this paper a new modulation technique based on harmonic elimination method is proposed for those multilevel converters that have unequal DC link voltages. This new technique has better effect on output voltage quality and less Total Harmonic Distortion (THD) than other modulation techniques. In order to verify the proposed modulation technique, MATLAB simulations are carried out for a single-phase diode-clamped inverter.