123 resultados para Architecture of Iran
Resumo:
This article describes the architecture of a monitoring component for the YAWL system. The architecture proposed is based on sensors and it is realized as a YAWL service to have perfect integration with the YAWL systems. The architecture proposed is generic and applicable in different contexts of business process monitoring. Finally, it was tested and evaluated in the context of risk monitoring for business processes.
Resumo:
This paper focuses on Australian texts with Asian representations, which will be discussed in terms of Ethical Intelligence (Weinstein, 2011) explored through drama. This approach aligns with the architecture of the Australian Curriculum: English (AC:E, v5, 2013); in particular the general capabilities of 'ethical understanding' and 'intercultural understandings.' It also addresses one aspect of the Cross Curriculum Priorities which is to include texts about peoples from Asia. The selected texts not only show the struggles undergone by the authors and protagonists, but also the positive contributions that diverse writers from Asian and Middle Eastern countries have made to Australia.
Resumo:
Sodium and cesium mordenite (denoted NaM and CsM, respectively) were investigated as potential catalysts for the synthesis of polyacetylene ((CH) x). Both were successful in initiating polymerization of purified gaseous acetylene at room temperature as evidenced by Raman spectroscopic studies. The polyacetylene synthesised in this way exhibited resonance enhancement of the polyene skeletal vibrations. trans-Polyacetylene, but no cis-(CH) x, was detected. As no apparent coloration of the NaM and CsM substrates accompanied the formation of trans-(CH) x it was concluded that only small quantities of the polymer were present. The number of conjugated double bonds was estimated from the frequencies of the Raman active C-C and C=C stretching vibrations, and it was shown that the trans-(CH) x formed on CsM has a distribution of conjugation lengths ranging from less than 6 to at least 30 double bonds. The polyacetylene formed on NaM was significantly shorter and was produced in lower yields than that synthesized on CsM. "Sliced" resonance excitation profiles of polyacetylene formed on CsM were obtained using nearly 40 different excitation wavelengths and these confirmed that the adsorbed trans-(CH) x was composed of segments having a distribution of conjugated lengths. The architecture of the mordenite pore system permitted only a single polymer molecule per channel, thereby preventing cross-linking. Raman spectroscopic studies of the effects of exposure to air revealed that progressive oxidative degradation occurred with a reduction in the number of conjugated double bond
Resumo:
Objective: To perform a 1-stage meta-analysis of genome-wide association studies (GWAS) of multiple sclerosis (MS) susceptibility and to explore functional consequences of new susceptibility loci. Methods: We synthesized 7 MS GWAS. Each data set was imputed using HapMap phase II, and a per single nucleotide polymorphism (SNP) meta-analysis was performed across the 7 data sets. We explored RNA expression data using a quantitative trait analysis in peripheral blood mononuclear cells (PBMCs) of 228 subjects with demyelinating disease. Results: We meta-analyzed 2,529,394 unique SNPs in 5,545 cases and 12,153 controls. We identified 3 novel susceptibility alleles: rs170934T at 3p24.1 (odds ratio [OR], 1.17; p ¼ 1.6 � 10�8) near EOMES, rs2150702G in the second intron of MLANA on chromosome 9p24.1 (OR, 1.16; p ¼ 3.3 � 10�8), and rs6718520A in an intergenic region on chromosome 2p21, with THADA as the nearest flanking gene (OR, 1.17; p ¼ 3.4 � 10�8). The 3 new loci do not have a strong cis effect on RNA expression in PBMCs. Ten other susceptibility loci had a suggestive p < 1 � 10�6, some of these loci have evidence of association in other inflammatory diseases (ie, IL12B, TAGAP, PLEK, and ZMIZ1). Interpretation: We have performed a meta-analysis of GWAS in MS that more than doubles the size of previous gene discovery efforts and highlights 3 novel MS susceptibility loci. These and additional loci with suggestive evidence of association are excellent candidates for further investigations to refine and validate their role in the genetic architecture of MS.
Resumo:
The Australian Curriculum: English 5.2 states, across all year level descriptions, that “students engage with a variety of texts for enjoyment”, with the level types of texts and levels of understanding developing over time (ACARA, 2014a). Problems arise when students are unable or unwilling to enjoy texts, and are reluctant to read, view, interpret, and evaluate written texts. This in turn impedes their ability to perform these texts for assessment purposes. The literacy abilities of students can vary widely within a single classroom, and it is a challenge for teachers to source and present texts which are accessible across the spectrum of reading abilities, as well as reflecting themes that are relevant and engaging for students, in addition to being consistent with the General Capabilities and Cross-Curriculum Priorities of the AC:E. In senior English also, the mainstream Qld Senior Syllabus (QSA, 2010, p. 6) requires that students have learning experiences developed through 15-20 literary texts, including the in-depth study of a complete novel. In the leisure context of English Communications, students may also “write stories, poems, or song lyrics” (QSA, 2004, p. 14). Since students’ responses to literature often take the form of other imaginative text creation we address this in this paper. We start by offering synopses of some accessible texts and strategies for teachers with these students who are unwilling or low literacy readers in junior secondary and senior level English. This paper canvases some easily read novels and some films with companion text suggestions which may serve as models for students responses. For the junior secondary texts, we identify how these align with the architecture of the Australian Curriculum’s General Capabilities and Cross Curriculum Priorities. Then, we will outline some suitable imaginative responses as possible assessment outcomes, such as short stories and digital stories.
Resumo:
Synaptic changes at sensory inputs to the dorsal nucleus of the lateral amygdala (LAd) play a key role in the acquisition and storage of associative fear memory. However, neither the temporal nor spatial architecture of the LAd network response to sensory signals is understood. We developed a method for the elucidation of network behavior. Using this approach, temporally patterned polysynaptic recurrent network responses were found in LAd (intra-LA), both in vitro and in vivo, in response to activation of thalamic sensory afferents. Potentiation of thalamic afferents resulted in a depression of intra-LA synaptic activity, indicating a homeostatic response to changes in synaptic strength within the LAd network. Additionally, the latencies of thalamic afferent triggered recurrent network activity within the LAd overlap with known later occurring cortical afferent latencies. Thus, this recurrent network may facilitate temporal coincidence of sensory afferents within LAd during associative learning.
Resumo:
A modular, graphic-oriented Internet browser has been developed to enable non-technical client access to a literal spinning world of information and remotely sensed. The Earth Portal (www.earthportal.net) uses the ManyOne browser (www.manyone.net) to provide engaging point and click views of the Earth fully tessellated with remotely sensed imagery and geospatial data. The ManyOne browser technology use Mozilla with embedded plugins to apply multiple 3-D graphics engines, e.g. ArcGlobe or GeoFusion, that directly link with the open-systems architecture of the geo-spatial infrastructure. This innovation allows for rendering of satellite imagery directly over the Earth's surface and requires no technical training by the web user. Effective use of this global distribution system for the remote sensing community requires a minimal compliance with protocols and standards that have been promoted by NSDI and other open-systems standards organizations.
Resumo:
In January 2011 a swollen Brisbane River broke its banks flooding riverside houses and buildings. The river’s water spread and rose up through storm water drains inundating some 20 000 houses in low-lying land. As the water receded those residents affected by the floods returned to their homes to assess the damage. While some people breathed a sigh of relief others were devastated by the overwhelming damage to their homes and personal belongings. Over the next few weeks the landscape of Brisbane was altered not merely by the mud and debris left by the torrent of water, but by the piles of domestic contents occupying Brisbane streets. Beds, toys, cabinets, plasterboard, tiles and household furniture lined curbsides waiting for collection. Later they would accumulate in public parks and sports centres to await disposal, momentarily creating an unsettling landscape of discarded domestic interiors. While most houses remained standing the heart breaking repercussions were evident in their interiority. Thousands of volunteers flocked to help those affected by the floods to purge the damage left by the water – removing wall and floor linings, discarding furniture and spoilt belongings. In her paper on Hurricane Katrina, Julieanna Preston wrote, ‘What anthropological evidence would we find as we followed their migration – heaps left by the side of the road, the physical weight overcoming the personal value…’ For many of the post flood restored homes and buildings entire interiors have been replaced, eradicating any trace of the significant event that disturbed them only months earlier. There were artifacts that would have survived the floods - furniture of solid timber – these were discarded and with them the patina that marked an important event in history. The patina is beyond technological reproducibility, and as Walter Benjamin writes, this being the whole premise of genuineness. It is the role of the French Polisher to maintain the true wear of the artefact for it is the patina that is most valuable in its ability to narrate the history of a piece. In 2012 two separate exhibitions in Brisbane will take place to display a selected collection of flood-damaged artefacts. This orchestrated way to commemorate the damage left by floods may be a method to compensate for the haste in which the damage was purged from the city. This need for exhibiting damaged artifacts illustrates Andreas Huyssen’s point that "…today memory is understood as a mode of re-presentation and as belonging to the present." This research looks at the dying trade of the French Polisher through conversations and a visual study of flood damaged furniture. The research also investigates the personal loss of artifacts through intimate stories shared by flood victims. This paper seeks to understand why so much was discarded and celebrate what remains.
Resumo:
This study extends previous research into social networking sites (SNSs) as environments that often reduce spatial, temporal, and social boundaries, which can result in collapsed contexts for social situations. Context collapse was investigated through interviews and Facebook walkthroughs with 27 LGBTQ young people in the United Kingdom. Since diverse sexualities are often stigmatized, participants’ sexual identity disclosure decisions were shaped by both the social conditions of their online networks and the technological architecture of SNSs. Context collapse was experienced as an event through which individuals intentionally redefined their sexual identity across audiences or managed unintentional disclosure. To prevent unintentional context collapse, participants frequently reinstated contexts through tailored performances and audience separation. These findings provide insight into stigmatized identity performances in networked publics while situating context collapse within a broader understanding of impression management, which paves the way for future research exploring the identity implications of everyday SNS use.
Resumo:
This paper reports on an empirically based study of occupational safety and health prosecutions in the Magistrates' courts in the State of Victoria, Australia. It examines the way in which the courts construct occupational safety and health issues during prosecutions against alleged offenders, and then theorises the role of the criminal law in health and safety regulation. The paper argues that courts, inspectors, prosecutors and defence counsel are involved in filtering or reshaping occupational safety and health issues during the prosecution process, both pre-trial and in court. An analysis of the pattern of investigation of health and safety offences shows that they are constructed by focusing on 'events', in most cases incidents resulting in injury or death. This 'event focus' ensures that the attention of the parties is drawn to the details of the incident and away from the broader context of the event. This broader context includes the way in which work is organised at the workplace and the quality of occupational safety and health management (the micro context), and the pressures within capitalist production systems for occupational safety and health to be subordinated to production imperatives (the macro context). In particular, during the court-based sentencing process, defence counsel is able to adopt a range of 'isolation' techniques that isolate the incident from its micro and macro contexts, thereby individualising and decontextualising the incident. The paper concludes that the legal system plays a key role in decontextualising and individualising health and safety issues, and that this process is part of the 'architecture' of the legal system, and a direct consequence of the 'form of law'.
Resumo:
This paper introduces our dedicated authenticated encryption scheme ICEPOLE. ICEPOLE is a high-speed hardware-oriented scheme, suitable for high-throughput network nodes or generally any environment where specialized hardware (such as FPGAs or ASICs) can be used to provide high data processing rates. ICEPOLE-128 (the primary ICEPOLE variant) is very fast. On the modern FPGA device Virtex 6, a basic iterative architecture of ICEPOLE reaches 41 Gbits/s, which is over 10 times faster than the equivalent implementation of AES-128-GCM. The throughput-to-area ratio is also substantially better when compared to AES-128-GCM. We have carefully examined the security of the algorithm through a range of cryptanalytic techniques and our findings indicate that ICEPOLE offers high security level.
Resumo:
The Commission has released a Draft Report on Business Set-Up, Transfer and Closure for public consultation and input. It is pleasing to note that three chapters of the Draft Report address aspects of personal and corporate insolvency. Nevertheless, we continue to make the submission to national policy inquiries and discussions that a comprehensive review should be undertaken of the regulation of insolvency and restructuring in Australia. The last comprehensive review of the insolvency system was by the Australian Law Reform Commission (the Harmer Report) and was handed down in 1988. Whilst there have been aspects of our insolvency laws that have been reviewed since that time, none has been able to provide the clear and comprehensive analysis that is able to come from a more considered review. Such a review ought to be conducted by the Australian Law Reform Commission or similar independent panel set up for the task. We also suggest that there is a lack of data available to assist with addressing questions raised by the Draft Report. There is a need to invest in finding out, in a rigorous and informed way, how the current law operates. Until there is a willingness to make a public investment in such research with less reliance upon the anecdotal (often from well-meaning but ultimately inadequately informed participants and others) the government cannot be sure that the insolvency regime we have provides the most effective regime to underpin Australia’s commercial and financial dealings, nor that any change is justified. We also make the submission that there are benefits in a serious investigation into a merged regulatory architecture of personal and corporate insolvency and a combined personal and corporate insolvency regulator.
Resumo:
Brain-derived neurotrophic factor (BDNF) plays a key role in learning and memory, but its effects on the fiber architecture of the living brain are unknown. We genotyped 455 healthy adult twins and their non-twin siblings (188 males/267 females; age: 23.7 ± 2.1. years, mean ± SD) and scanned them with high angular resolution diffusion tensor imaging (DTI), to assess how the BDNF Val66Met polymorphism affects white matter microstructure. By applying genetic association analysis to every 3D point in the brain images, we found that the Val-BDNF genetic variant was associated with lower white matter integrity in the splenium of the corpus callosum, left optic radiation, inferior fronto-occipital fasciculus, and superior corona radiata. Normal BDNF variation influenced the association between subjects' performance intellectual ability (as measured by Object Assembly subtest) and fiber integrity (as measured by fractional anisotropy; FA) in the callosal splenium, and pons. BDNF gene may affect the intellectual performance by modulating the white matter development. This combination of genetic association analysis and large-scale diffusion imaging directly relates a specific gene to the fiber microstructure of the living brain and to human intelligence.
Resumo:
Pattern recognition is a promising approach for the identification of structural damage using measured dynamic data. Much of the research on pattern recognition has employed artificial neural networks (ANNs) and genetic algorithms as systematic ways of matching pattern features. The selection of a damage-sensitive and noise-insensitive pattern feature is important for all structural damage identification methods. Accordingly, a neural networks-based damage detection method using frequency response function (FRF) data is presented in this paper. This method can effectively consider uncertainties of measured data from which training patterns are generated. The proposed method reduces the dimension of the initial FRF data and transforms it into new damage indices and employs an ANN method for the actual damage localization and quantification using recognized damage patterns from the algorithm. In civil engineering applications, the measurement of dynamic response under field conditions always contains noise components from environmental factors. In order to evaluate the performance of the proposed strategy with noise polluted data, noise contaminated measurements are also introduced to the proposed algorithm. ANNs with optimal architecture give minimum training and testing errors and provide precise damage detection results. In order to maximize damage detection results, the optimal architecture of ANN is identified by defining the number of hidden layers and the number of neurons per hidden layer by a trial and error method. In real testing, the number of measurement points and the measurement locations to obtain the structure response are critical for damage detection. Therefore, optimal sensor placement to improve damage identification is also investigated herein. A finite element model of a two storey framed structure is used to train the neural network. It shows accurate performance and gives low error with simulated and noise-contaminated data for single and multiple damage cases. As a result, the proposed method can be used for structural health monitoring and damage detection, particularly for cases where the measurement data is very large. Furthermore, it is suggested that an optimal ANN architecture can detect damage occurrence with good accuracy and can provide damage quantification with reasonable accuracy under varying levels of damage.
Resumo:
BACKGROUND Correlations between Educational Attainment (EA) and measures of cognitive performance are as high as 0.8. This makes EA an attractive alternative phenotype for studies wishing to map genes affecting cognition due to the ease of collecting EA data compared to other cognitive phenotypes such as IQ. METHODOLOGY In an Australian family sample of 9538 individuals we performed a genome-wide association scan (GWAS) using the imputed genotypes of approximately 2.4 million single nucleotide polymorphisms (SNP) for a 6-point scale measure of EA. Top hits were checked for replication in an independent sample of 968 individuals. A gene-based test of association was then applied to the GWAS results. Additionally we performed prediction analyses using the GWAS results from our discovery sample to assess the percentage of EA and full scale IQ variance explained by the predicted scores. RESULTS The best SNP fell short of having a genome-wide significant p-value (p = 9.77x10(-7)). In our independent replication sample six SNPs among the top 50 hits pruned for linkage disequilibrium (r(2)<0.8) had a p-value<0.05 but only one of these SNPs survived correction for multiple testing--rs7106258 (p = 9.7*10(-4)) located in an intergenic region of chromosome 11q14.1. The gene based test results were non-significant and our prediction analyses show that the predicted scores explained little variance in EA in our replication sample. CONCLUSION While we have identified a polymorphism chromosome 11q14.1 associated with EA, further replication is warranted. Overall, the absence of genome-wide significant p-values in our large discovery sample confirmed the high polygenic architecture of EA. Only the assembly of large samples or meta-analytic efforts will be able to assess the implication of common DNA polymorphisms in the etiology of EA.