8 resultados para Smart destination


Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Smart inks as a redox indicators of photocatalytic activity were applied on several paints with acrylic and silicate binder exposed to accelerated weathering test. The results show, that self-cleaning paints need some weathering to develop full photocatalytic activity. On the other side weathering may negatively influence the durability of the paint as shown for a silicate based exterior paint, which was significantly degraded after 350 h of weathering test. Smart inks proved to be suitable and rapid indicators of paint photoactivity. Resazurin ink is convenient only for unexposed paint with low photocatalytic activity while an Acid Violet 7 ink was appropriate for most of the paints, especially those that were weathered

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A novel method to fabricate chemically linked conducting polymer–biopolymer composites that are intrinsically flexible and conducting for functional electrode applications is presented. Polypyrrole was synthesised in situ during the cellulose regeneration process using the 1-butyl-3-methylimidazolium chloride ionic liquid as a solvent medium. The obtained polypyrrole–cellulose composite was chemically blended and showed flexible polymer properties while retaining the electronic properties of a conducting polymer. Addition of an ionic liquid such as trihexyl(tetradecyl)phosphonium bis(trifluoromethylsulfonyl)imide, enhanced the flexibility of the composite. The functional application of these materials in the electrochemically controlled release of a model drug has been demonstrated. This strategy opens up a new design for a wide spectrum of materials for smart electronic device applications wherein the functionality of doping and de-doping of conducting polymers is retained and their processability issue is addressed by exploiting an ionic liquid route.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This Open Access (OA) Poster - ‘Destination Open Access: Getting Researchers on Board’, was devised by the Queen’s University Belfast’s OA Team. It outlines the advocacy strategy undertaken to strengthen researchers’ uptake of OA at the University. Research funders, such as the Higher Education Funding Council of England (HEFCE), are increasingly mandating that researchers make their work publically available via an institutional repository. It is therefore imperative that researchers and departments fully engage with open access to ensure future funding.

The team’s advocacy strategy centres around collaboration with the Heads of Schools, Subject Librarians, the Research and Enterprise Office and, most importantly, the researchers themselves. The team regularly organises training sessions and events, on understanding OA, funder compliance and using the institutional repository. We also run outreach activities, such as practical drop-in sessions, promotional give-aways, OA updates to library staff and direct communications to schools. Finally, the team maintain a strong online presence via LibGuides, LibAnswers, the Library Blog and Twitter. We utilise these platforms to highlight topical OA issues, to advertise events, to provide support materials and to interact with researchers.

Statistics indicate that researchers are increasingly engaging with the OA training, communications and outreach events. Since August 2014 over 1200 researchers have attended advocacy sessions. Additionally, the numbers of papers uploaded to the repository each year has steadily increased and there are now over 3, 000 full-text OA research outputs in the Queen’s Research Portal.

This reflects positively on the team’s established approach of working with researchers to develop an OA culture within the University. Whilst it is clear that an open access strategy is essential, support for the open access ethos must come from individual researchers and Schools in order for the University to reach its desired destination of maximum uptake of open access.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Migrant labour has transformed local economies in many places, often helping to reverse long-term decline. The emergence of new immigrant destinations (NID) globally brings mixed opportunities for the individuals involved. This article uses empirical evidence, focusing on the workplace, to show the performance, construction and significance of migrant identity. By using social identity theory to examine what it means to be a ‘migrant’, it follows from Goffman’s overarching concern with social interactions and his promotion of microanalysis as analytical lenses.
The article reveals the ambiguity of the label ‘migrant’. It shows how the external application or internal enactment of migrant identities bestow particular status that represents an asset or an obstacle to integration. It can mean ‘hard working’, ‘less deserving’ and ‘exploitable’ and it also denotes ‘lazy’ and individuals. While some individuals assume the hard working migrant and ‘exploitable’ identity in certain circumstances because of the benefits that it brings, this status can also cause high levels of dissatisfaction and distress among migrants. The research shows how the creation of a migrant identity limits the structures and networks from which migrants may draw resources and in so doing curtails the possibilities for social change due to migration.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The BlackEnergy malware targeting critical infrastructures has a long history. It evolved over time from a simple DDoS platform to a quite sophisticated plug-in based malware. The plug-in architecture has a persistent malware core with easily installable attack specific modules for DDoS, spamming, info-stealing, remote access, boot-sector formatting etc. BlackEnergy has been involved in several high profile cyber physical attacks including the recent Ukraine power grid attack in December 2015. This paper investigates the evolution of BlackEnergy and its cyber attack capabilities. It presents a basic cyber attack model used by BlackEnergy for targeting industrial control systems. In particular, the paper analyzes cyber threats of BlackEnergy for synchrophasor based systems which are used for real-time control and monitoring functionalities in smart grid. Several BlackEnergy based attack scenarios have been investigated by exploiting the vulnerabilities in two widely used synchrophasor communication standards: (i) IEEE C37.118 and (ii) IEC 61850-90-5. Specifically, the paper addresses reconnaissance, DDoS, man-in-the-middle and replay/reflection attacks on IEEE C37.118 and IEC 61850-90-5. Further, the paper also investigates protection strategies for detection and prevention of BlackEnergy based cyber physical attacks.