102 resultados para Colônia Z-16

em Queensland University of Technology - ePrints Archive


Relevância:

80.00% 80.00%

Publicador:

Resumo:

The structure of the pseudo-merohedrally twinned crystal of the 1:1 proton-transfer compound of 5-sulfosalicylic acid (3-carboxy-4-hydroxybenzenesulfonic acid) with 4-aminopyridine: 4-aminopyridinium 3-carboxy-4-hydroxybenzenesulfonate sesquihydrate has been determined at 180 K and the hydrogen-bonding pattern is described. Crystals of the compound are monoclinic with space group P21/c, with unit cell dimensions a = 35.2589(8), b = 7.1948(1), c = 24.5851(5) Å, β = 110.373(2)o, and Z = 16. The monoclinic asymmetric unit comprises four cation-anion pairs and six water molecules of solvation with only the pyridinium cations having pseudo-symmetry as a result of inter-cation aromatic ring π-π stacking effects. Extensive hydrogen bonding gives a three-dimensional framework structure.

Relevância:

30.00% 30.00%

Publicador:

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Copy number variants (CNVs) account for a major proportion of human genetic polymorphism and have been predicted to have an important role in genetic susceptibility to common disease. To address this we undertook a large, direct genome-wide study of association between CNVs and eight common human diseases. Using a purpose-designed array we typed 19,000 individuals into distinct copy-number classes at 3,432 polymorphic CNVs, including an estimated 50% of all common CNVs larger than 500 base pairs. We identified several biological artefacts that lead to false-positive associations, including systematic CNV differences between DNAs derived from blood and cell lines. Association testing and follow-up replication analyses confirmed three loci where CNVs were associated with diseaseIRGM for Crohns disease, HLA for Crohns disease, rheumatoid arthritis and type 1 diabetes, and TSPAN8 for type 2 diabetesalthough in each case the locus had previously been identified in single nucleotide polymorphism (SNP)-based studies, reflecting our observation that most common CNVs that are well-typed on our array are well tagged by SNPs and so have been indirectly explored through SNP studies. We conclude that common CNVs that can be typed on existing platforms are unlikely to contribute greatly to the genetic basis of common human diseases. © 2010 Macmillan Publishers Limited. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

LEX is a stream cipher that progressed to Phase 3 of the eSTREAM stream cipher project. In this paper, we show that the security of LEX against algebraic attacks relies on a small equation system not being solvable faster than exhaustive search. We use the byte leakage in LEX to construct a system of 21 equa- tions in 17 variables. This is very close to the require- ment for an efficient attack, i.e. a system containing 16 variables. The system requires only 36 bytes of keystream, which is very low.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article examines the continued relevance of the 16-19 business education curriculum in the UK, stimulated by doubts expressed by Thomas (1996), over its continued relevance. We express a concern that business education needs, but is struggling, to respond to significant societal shifts in consumption and production strategies that do not sit easily within traditional theories of business practice currently underpinning 16-19 business education. We examine firstly, the extent to which a formal body of knowledge couched in a modernist discourse of facts and objectivity can cope with the changing and fluid developments in much current business practice that is rooted in the cultural and symbolic. Secondly, the extent to which both academic and vocational competences provide the means for students to develop a framework of critical understanding that can respond effectively to rapidly changing business environments.Findings are based on research conducted jointly by the University of Manchester and the Manchester Institute for Popular Culture at Manchester Metropolitan University. The growth of dynamism of the cultural industries sector - largely micro-businesses and small and medium sized enterprises (SMEs) -encapsulates forms of business knowledge, business language and business practice which may not immediately fit with the models provided within business education. Results suggest increasingly reflexive forms of consumption being met by similarly reflexive and flexible modes of production.Our evidence suggests that whilst modernist business knowledge is often the foundation for many 16-19 business education courses, these programmes of study/training do not usually reflect the activities of SME and micro-business practitioners in the cultural industries. Given the importance of cultural industries in terms of the production strategies required to meet increasingly reflexive markets, it is suggested that there may be a need to incorporate a postmodern approach to the current content and pedagogy; one that is contextual, cultural and discursive.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The crystal structures of the 1:1 proton-transfer compounds of 4,5-dichlorophthalic acid with the aliphatic Lewis bases diisopropylamine and hexamethylenetetramine, viz. diisopropylaminium 2-carboxy-4,5-dichlorobenzoate (1) and hexamethylenetetraminium 2-carboxy-4,5-dichlorobenzoate hemihydrate (2), have been determined. Crystals of both 1 and 2 are triclinic, space group P-1, with Z = 2 in cells with a = 7.0299(5), b = 9.4712(7), c = 12.790(1)Å, α = 99.476(6), β = 100.843(6), γ = 97.578(6)o (1) and a = 7.5624(8), b = 9.8918(8), c = 11.5881(16)Å, α = 65.660(6), β = 86.583(4), γ = 86.987(8)o (2). In each, one-dimensional hydrogen-bonded chain structures are found: in 1 formed through aminium N+-H...Ocarboxyl cation-anion interactions. In 2, the chains are formed through anion carboxyl O...H-Obridging water interactions with the cations peripherally bound. In both structures, the hydrogen phthalate anions are essentially planar with short intra-species carboxylic acid O-H...Ocarboxyl hydrogen bonds [O…O, 2.381(3) Å (1) and 2.381(8) Å (2)].

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The mineral reevesite and the cobalt substituted reevesite have been synthesised. The d(003) spacings of the minerals ranged from 7.54 to 7.95 Å. The maximum d(003) value occurred at around Ni:Co 0.4:0.6. This maximum in interlayer distance is proposed to be due to a greater number of carbonate anions and water molecules intercalated into the structure. The stability of the reevesite and cobalt doped reevesite was determined by thermogravimetric analysis. The maximum temperature of the reevesite occurs for the unsubstituted reevesite and is around 220°C. The effect of cobalt substitution results in a decrease in thermal stability of the reevesites. Four thermal decomposition steps are observed and are attributed to dehydration, dehydroxylation and decarbonation, decomposition of the formed carbonate and oxygen loss at ~807 °C. A mechanism for the thermal decomposition of the reevesite and the cobalt substituted reevesite is proposed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis is devoted to the study of linear relationships in symmetric block ciphers. A block cipher is designed so that the ciphertext is produced as a nonlinear function of the plaintext and secret master key. However, linear relationships within the cipher can still exist if the texts and components of the cipher are manipulated in a number of ways, as shown in this thesis. There are four main contributions of this thesis. The first contribution is the extension of the applicability of integral attacks from word-based to bitbased block ciphers. Integral attacks exploit the linear relationship between texts at intermediate stages of encryption. This relationship can be used to recover subkey bits in a key recovery attack. In principle, integral attacks can be applied to bit-based block ciphers. However, specific tools to define the attack on these ciphers are not available. This problem is addressed in this thesis by introducing a refined set of notations to describe the attack. The bit patternbased integral attack is successfully demonstrated on reduced-round variants of the block ciphers Noekeon, Present and Serpent. The second contribution is the discovery of a very small system of equations that describe the LEX-AES stream cipher. LEX-AES is based heavily on the 128-bit-key (16-byte) Advanced Encryption Standard (AES) block cipher. In one instance, the system contains 21 equations and 17 unknown bytes. This is very close to the upper limit for an exhaustive key search, which is 16 bytes. One only needs to acquire 36 bytes of keystream to generate the equations. Therefore, the security of this cipher depends on the difficulty of solving this small system of equations. The third contribution is the proposal of an alternative method to measure diffusion in the linear transformation of Substitution-Permutation-Network (SPN) block ciphers. Currently, the branch number is widely used for this purpose. It is useful for estimating the possible success of differential and linear attacks on a particular SPN cipher. However, the measure does not give information on the number of input bits that are left unchanged by the transformation when producing the output bits. The new measure introduced in this thesis is intended to complement the current branch number technique. The measure is based on fixed points and simple linear relationships between the input and output words of the linear transformation. The measure represents the average fraction of input words to a linear diffusion transformation that are not effectively changed by the transformation. This measure is applied to the block ciphers AES, ARIA, Serpent and Present. It is shown that except for Serpent, the linear transformations used in the block ciphers examined do not behave as expected for a random linear transformation. The fourth contribution is the identification of linear paths in the nonlinear round function of the SMS4 block cipher. The SMS4 block cipher is used as a standard in the Chinese Wireless LAN Wired Authentication and Privacy Infrastructure (WAPI) and hence, the round function should exhibit a high level of nonlinearity. However, the findings in this thesis on the existence of linear relationships show that this is not the case. It is shown that in some exceptional cases, the first four rounds of SMS4 are effectively linear. In these cases, the effective number of rounds for SMS4 is reduced by four, from 32 to 28. The findings raise questions about the security provided by SMS4, and might provide clues on the existence of a flaw in the design of the cipher.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Shelton, E.M. (p.548); Sherwood Arboretum (p.550); Soutter, William (pp.563-4); Styles (pp.575-6); Summer-House (579-580); Trapnell, W.G. (p.602); Tropical Gardens (pp.604-5);Verandah Gardening (p.614); Wickham Park (p.642); Wijaya, Made (p.642); Williams, George (p.644); Williams Keith A (p.644).