84 resultados para Comparative historical analysis


Relevância:

40.00% 40.00%

Publicador:

Resumo:

Published research in the area of electronic commerce has increased several fold in recent years. Australian researchers have participated actively in this research field. An emphasis on quality has prompted us to review the publications in the area of electronic commerce. This paper reports on research, that used a framework developed by Scornavacca et al. (2005), to examine papers published in the leading, relevant journals and conferences over the period 2000 to 2005. Analyses of papers in the electronic commerce area, published during this period, reflects a number of trends in terms of research outlets, approaches, and methods used. The analyses presented here invite a comparative analysis by Scandinavian researchers in ecommerce. The Scandinavian research community represents an appropriate environment against which to benchmark the Australian research outputs. It is our hope that the analyses in this paper will lead to mutual learning and collaboration between researchers in both contexts.

Relevância:

40.00% 40.00%

Publicador:

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Phytoestrogens daidzein (4′,7-dihydroxy-isoflavone) and formononetin (4′-methoxy-7-hydroxy-isoflavone) have been studied by surface-enhanced Raman (SER) spectroscopy. Spectra were acquired in the presence of citratereduced silver colloids, over a range of pH and concentrations. Density functional theory calculations were used to assist assignment of the normal Raman spectra and help determine the mode of interaction of isoflavones with the silver nanoparticles. Formononetin does not show SER activity unless the 7-OH group is deprotonated, and accordingly, the interaction with the silver surface occurs via the deprotonated site. Daidzein, on the other hand, appears to contain multiple species at the surface, interacting via both the hydroxyl groups at 7-OH and 4′-OH, after deprotonation. This is an important result that points to potential future SERS applications in phytoestrogen analysis and provides a foundation for understanding the SER spectra of isoflavones.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This paper investigates the bending deformation of a cantilever biosensor based on a single-walled carbon nanotube (CNT) and single-walled boron nitride nanotube (BNNT) due to bioparticle detection. Through 3-D modeling and simulations, the performance of the CNT and BNNT cantilever biosensors is analyzed. It is found that the BNNT cantilever has better response and sensitivity compared to the CNT counterpart. Additionally, an algorithm for an electrostatic-mechanical coupled system is developed. The cantilever (both BNNT and CNT) is modelled by accounting that a conductive polymer is deposited onto the nanotube surfaces. Two main approaches are considered for the mechanical deformation of the nanotube beam. The first one is differential surface stress produced by the binding of biomolecules onto the surface. The second one is the charge released from the biomolecular interaction. Also, different ambient conditions are considered in the study of sensitivity. Sodium Dodisyl Sulphate (SDS) provides better bending deformation than the air medium. Other parameters including length of beam, variation of beam's location, and chiralities are considered in the design. The results are in excellent agreement with the electrostatic equations that govern the deformation of cantilever.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Australia has followed the course taken by other English-speaking countries in recent years of enacting legislation that requires convicted sexual offenders to register personal details with law enforcement agencies. These laws have been enacted to protect the public from the perceived threat posed by sex offenders, but have been written with little apparent reference to the available research literature about the nature and extent of this threat. In addition, there is no empirical evidence supporting the effectiveness of legislatively based sex offender registries to either reduce sexual offending or to enable the police to investigate sex crimes and apprehend offenders. This article compares and contrasts the current laws governing sex offender registration enacted by the various states and territories in Australia, and offers a critical analysis of their provisions in light of the research literature on sexual offending.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Risk analysis is one of the critical functions of the risk management process. It relies on a detailed understanding of risks and their possible implications. Construction projects, because of their large and complex nature, are plagued by a variety of risks which must be considered and responded to in order to ensure project success. This study conducts an extensive comparative analysis of major quantitative risk analysis techniques in the construction industry. The techniques discussed and comparatively analyzed in this report include: Programme Evaluation and Review Technique (PERT), Judgmental Risk Analysis Process (JRAP), Estimating Using Risk Analysis (ERA), Monte Carlo Simulation technique, Computer Aided Simulation for Project Appraisal and Review (CASPAR), Failure Modes and Effects Analysis technique (FMEA) and Advanced Programmatic Risk Analysis and Management model (APRAM). The findings highlight the fact that each risk analysis technique addresses risks in any or all of the following areas – schedule risks, budget risks or technical risks. Through comparative analysis, it has been revealed that a majority of risk analysis techniques focus on schedule or budget risks. Very little has been documented in terms of technical risk analysis techniques. In an era where clients are demanding and expecting higher quality projects and finishes, project managers must endeavor to invest time and resources to ensure that the few existing technical risk analysis techniques are developed and further refined, and that new technical risk analysis techniques are developed to suit the current construction industries requirements.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Gene Expression Comparative Analysis allows bioinformatics researchers to discover the conserved or specific functional regulation of genes. This is achieved through comparisons between quantitative gene expression measurements obtained in different species on different platforms to address a particular biological system. Comparisons are made more difficult due to the need to map orthologous genes between species, pre-processing of data (normalization) and post-analysis (statistical and correlation analysis). In this paper we introduce a web-based software package called EXP-PAC which provides on line interfaces for database construction and query of data, and makes use of a high performance computing platform of computer clusters to run gene sequence mapping and normalization methods in parallel. Thus, EXP-PAC facilitates the integration of gene expression data for comparative analysis and the online sharing, retrieval and visualization of complex multi-specific and multi-platform gene expression results.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Four new triphenyltin(IV) complexes of composition Ph3SnLH (where LH = 2-/4-[(E)-2-(aryl)-1-diazenyl]benzoate) (1–4) were synthesized and characterized by spectroscopic (1H, 13C and 119Sn NMR, IR, 119Sn Mössbauer) techniques in combination with elemental analysis. The 119Sn NMR spectroscopic data indicate a tetrahedral coordination geometry in non-coordinating solvents. The crystal structures of three complexes, Ph3SnL1H (1), Ph3SnL3H (3), Ph3SnL4H (4), were determined. All display an essentially tetrahedral geometry with angles ranging from 93.50(8) to 124.5(2)°; 119Sn Mössbauer spectral data support this assignment. The cytotoxicity studies were performed with complexes 1–4, along with a previously reported complex (5) in vitro across a panel of human tumor cell lines viz., A498, EVSA-T, H226, IGROV, M19 MEL, MCF-7 and WIDR. The screening results were compared with the results from other related triphenyltin(IV) complexes (6–7) and tributyltin(IV) complexes (8–11) having 2-/4-[(E)-2-(aryl)-1-diazenyl]benzoates framework. In general, the complexes exhibit stronger cytotoxic activity. The results obtained for 1–3 are also comparable to those of its o-analogs i.e. 4–7, except 5, but the advantage is the former set of complexes demonstrated two folds more cytotoxic activity for the cell line MCF-7 with ID50 values in the range 41–53 ng/ml. Undoubtedly, the cytotoxic results of complexes 1–3 are far superior to CDDP, 5-FU and ETO, and related tributyltin(IV) complexes 8–11. The quantitative structure-activity relationship (QSAR) studies for the cytotoxicity of triphenyltin(IV) complexes 1–7 and tributyltin(IV) complexes 8–11 is also discussed against a panel of human tumor cell lines.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The development and application of computational data mining techniques in financial fraud detection and business failure prediction has become a popular cross-disciplinary research area in recent times involving financial economists, forensic accountants and computational modellers. Some of the computational techniques popularly used in the context of - financial fraud detection and business failure prediction can also be effectively applied in the detection of fraudulent insurance claims and therefore, can be of immense practical value to the insurance industry. We provide a comparative analysis of prediction performance of a battery of data mining techniques using real-life automotive insurance fraud data. While the data we have used in our paper is US-based, the computational techniques we have tested can be adapted and generally applied to detect similar insurance frauds in other countries as well where an organized automotive insurance industry exists.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The Radio frequency identification (RFID) system is a new technology which uses the open air to transmit information. RFID technology is one of the most promising technologies in the field of ubiquitous computing which is revolutionizing the supply chain. It has already been applied by many major retail chains such as Target, Wal-Mart, etc. The networked RFID system such as supply chain has very unique and special business needs which lead to special sets of RFID security requirements and security models. However, very little work has been done to analyze RFID security parameters in relation to networked RFID systems business needs. This paper presents a critical analysis of the networked application's security requirements in relation to their business needs. It then presents a comparative study of existing literature and the ability of various models to protect the security of the supply chain in a RFID deployment.