132 resultados para string breaking
Resumo:
BACKGROUND: Baltic amber-bead necklaces or bracelets are commonly used for managing teething symptoms in infants. The effectiveness of these beads is claimed to be from succinic acid release (a compound with analgesic and anti-inflammatory properties), which is then absorbed through the skin. AIM: To investigate whether Baltic amber teething necklaces purchased in Australia contained succinic acid, and to quantify succinic acid release from the beads. METHODS: Infrared spectroscopy was used to confirm that the teething necklaces were made of Baltic amber. The amount of succinic acid contained within the beads was quantified, and succinic acid release from intact beads was measured in phosphate buffered saline (PBS) pH 5.5 or octanol to simulate aqueous or oily skin environments. RESULTS: Each necklace (33 beads in length) contained 19.17±4.89 mg of succinic acid (mean±se). Over a 6-month period, no succinic acid was detected in PBS, while 0.13±0.09 mg of succinic acid per necklace was released in octanol. Only one replicate of amber beads in octanol released succinic acid, and they had fragmented, with shards free-floating in the solvent. DISCUSSION: It is likely succinic acid was only detected because the beads were breaking down in octanol, which does not occur when worn around the neck of a child. Furthermore, the hydrophilic properties of succinic acid would not favour its absorption across hydrophobic layers of the skin and into the bloodstream. CONCLUSION: While the teething necklaces do contain small quantities of succinic acid, it is highly unlikely to be released from intact beads.
Resumo:
William J. Chambliss (Bill) is well-known for his path-breaking theories of lawmaking and for his innovative research on state-organized crime. However, rarely discussed is the fact that his study of the original vagrancy laws marked the birth of rural critical criminology. The main objective of this article is twofold: (1) to show how Bill helped shape contemporary rural critical criminology and (2) to provide suggestions for further critical theoretical and empirical work on rural crime and social control.
Resumo:
The maximum height of a siphon is generally assumed to be dependent on barometric pressure—about 10 m at sea level. This limit arises because the pressure in a siphon above the upper reservoir level is below the ambient pressure, and when the height of a siphon approaches 10 m, the pressure at the crown of the siphon falls below the vapour pressure of water causing water to boil breaking the column. After breaking, the columns on either side are supported by differential pressure between ambient and the low-pressure region at the top of the siphon. Here we report an experiment of a siphon operating at sea level at a height of 15 m, well above 10 m. Prior degassing of the water prevented cavitation. This experiment provides conclusive evidence that siphons operate through gravity and molecular cohesion.
Resumo:
Although paying taxes is a key element of a well-functioning society, there is still limited understanding as to why people actually pay their taxes. Models emphasizing that taxpayers make strategic, financially motivated compliance decisions seemingly assume an overly restrictive view of human nature. Law abidance may be more accurately explained by social norms, a concept that has gained growing importance as research attempts to understand the tax compliance puzzle. This study analyzes the influence of psychic stress generated by the possibility of breaking social norms in the tax compliance context. We measure psychic stress using heart rate variability (HRV), which captures the psychobiological or neural equivalents of psychic stress that may arise from the contemplation of real or imagined actions, producing immediate physiologic discomfort. The results of our laboratory experiments provide empirical evidence of a positive correlation between psychic stress and tax compliance, thus underscoring the importance of moral sentiments for tax compliance. We also identify three distinct types of individuals who differ in their levels of psychic stress, tax morale, and tax compliance.
Resumo:
As Western Australian schools move to implement technology into the classroom, there appears to be prevalence in combining e-learning with face to face traditional classroom practice. This has been accompanied by a shift toward a digital curriculum that incorporates re-usable learning objects. Essential to any teacher contemplating the use of a digital curriculum resource is not only the knowledge of learning theories but models of best practice to create online curriculum for students to use in every day classrooms. This paper explores the e-learning practices in three case study schools (n=3) in Western Australia. Data were collected by observation and interviews (n=11) conducted with the teachers and the ICT co-ordinators, to ascertain their perceptions and experiences with regard to the e-learning environment. There were challenges associated with the implementation of e-learning by teachers into their classroom such as skill development, changes in their role and the pedagogies they employ. The case study schools were pilot schools breaking new ground in order to test a new portal technology. Findings indicated that successful implementation of the e-learning environment was dependent on the four key factors of ICT infrastructure, ICT leadership, support and training initiatives and the teachers’ ICT capacity.
Resumo:
This chapter explores inclusive education as a social imaginary; that is, a common understanding that has become a global perspective. We trace the roots of inclusive education in early movements for social justice and the development of special education and note that these two domains continue to be seen in the ongoing tensions within the practice of inclusive education. We conclude that although much has been achieved in opening up greater opportunities for all children and young people to participate in and engage with education, there is still much work to be done. Creative imagining, discursive dialogue, and courageous actions in breaking down barriers in schools and communities will strengthen the local and global social imaginary of inclusive education, thus affording even greater opportunities for all children and young people regardless of any categorisation that may have been applied to their differences.
Resumo:
Generating discriminative input features is a key requirement for achieving highly accurate classifiers. The process of generating features from raw data is known as feature engineering and it can take significant manual effort. In this paper we propose automated feature engineering to derive a suite of additional features from a given set of basic features with the aim of both improving classifier accuracy through discriminative features, and to assist data scientists through automation. Our implementation is specific to HTTP computer network traffic. To measure the effectiveness of our proposal, we compare the performance of a supervised machine learning classifier built with automated feature engineering versus one using human-guided features. The classifier addresses a problem in computer network security, namely the detection of HTTP tunnels. We use Bro to process network traffic into base features and then apply automated feature engineering to calculate a larger set of derived features. The derived features are calculated without favour to any base feature and include entropy, length and N-grams for all string features, and counts and averages over time for all numeric features. Feature selection is then used to find the most relevant subset of these features. Testing showed that both classifiers achieved a detection rate above 99.93% at a false positive rate below 0.01%. For our datasets, we conclude that automated feature engineering can provide the advantages of increasing classifier development speed and reducing development technical difficulties through the removal of manual feature engineering. These are achieved while also maintaining classification accuracy.
Resumo:
I wouldn’t necessarily consider myself a meme scholar outright; rather, the memes within my research have emerged from studying everyday practices and cultures of social media, within political and topical discussions, as well as popular culture and fandom contexts. This piece is an extension of ideas that have come out of my recent work around the “irreverent internet” (in the first and last of the blatant plugs, see this [sorry, paywall] and this). I’ve used this term as a descriptor for how play and silliness are popular strategies for the coverage and presentation of the topical and the mundane online. Here, I am especially focusing on playful and irreverent engagement with issues, events, and breaking news, where irony, sarcasm, parody, satire, snark, and more, are important framing devices on social media. While my work (and this post) generally falls on the side of “nice” irreverence, these approaches are also applicable for meaner, vindictive, hateful, offensive, and vitriolic comments. These include meme communities dealing in racist attitudes and content or various hashtags and related comments which promote racist, far-right views and/or denote contexts rife with abuse and harassment — and not just the Gamergate example. This is not positioning trolling as a single practice or intent, either— see Whitney Phillips’ work...
Resumo:
Y2SiO5 has potential applications as functional-structural ceramic and environmental/thermal barrier coating material. As an important grain-boundary phase in the sintered Si3N4, it also influences the mechanical and dielectric performances of the host material. In this paper, we present the mechanical properties of Y2SiO5 including elastic moduli, hardness, strength and fracture toughness, and try to understand the mechanical features from the viewpoint of crystal structure. Y2SiO5 has low shear modulus, low hardness, as well as high capacity for dispersing mechanical damage energy and for resisting crack penetration. Particularly, it can be machined by cemented carbides tools. The crystal structure characteristics of Y2SiO5 suggest the low-energy weakly bonded atomic planes crossed only by the easily breaking Y-O bonds as well as the rotatable rigid SiO4 tetrahedra are the origins of low shear deformation, good damage tolerance and good machinability of this material. TEM observations also demonstrate that the mechanical damage energy was dispersed in the form of the micro-cleavages, stacking faults and twins along these weakly bonded atomic planes, which allows the "microscale-plasticity" for Y2SiO5.
Resumo:
Television is a massive industry in China, yet fewer people are watching television screens. This ground-breaking study explores how television content is changing, how the Chinese government is responding to the challenges presented by digital media, and how businesses are brokering alliances in both traditional and new media sectors. Table of Contents Acknowledgments p. vi Introduction p. 1 1 Television in Transition p. 8 2 Nation Building p. 34 3 Soft Power p. 56 4 Formats p. 85 5 Channels and Content p. 111 6 Convergence p. 141 7 Rethinking Chinese Television Research p. 164 Bibliography p. 173 Index p. 184
Resumo:
Twitter’s hashtag functionality is now used for a very wide variety of purposes, from covering crises and other breaking news events through gathering an instant community around shared media texts (such as sporting events and TV broadcasts) to signalling emotive states from amusement to despair. These divergent uses of the hashtag are increasingly recognised in the literature, with attention paid especially to the ability for hashtags to facilitate the creation of ad hoc or hashtag publics. A more comprehensive understanding of these different uses of hashtags has yet to be developed, however. Previous research has explored the potential for a systematic analysis of the quantitative metrics that could be generated from processing a series of hashtag datasets. Such research found, for example, that crisis-related hashtags exhibited a significantly larger incidence of retweets and tweets containing URLs than hashtags relating to televised events, and on this basis hypothesised that the information-seeking and -sharing behaviours of Twitter users in such different contexts were substantially divergent. This article updates such study and their methodology by examining the communicative metrics of a considerably larger and more diverse number of hashtag datasets, compiled over the past five years. This provides an opportunity both to confirm earlier findings, as well as to explore whether hashtag use practices may have shifted subsequently as Twitter’s userbase has developed further; it also enables the identification of further hashtag types beyond the “crisis” and “mainstream media event” types outlined to date. The article also explores the presence of such patterns beyond recognised hashtags, by incorporating an analysis of a number of keyword-based datasets. This large-scale, comparative approach contributes towards the establishment of a more comprehensive typology of hashtags and their publics, and the metrics it describes will also be able to be used to classify new hashtags emerging in the future. In turn, this may enable researchers to develop systems for automatically distinguishing newly trending topics into a number of event types, which may be useful for example for the automatic detection of acute crises and other breaking news events.