991 resultados para Core Sets
Resumo:
A series of solid strong acid catalysts were synthesised from fibrous ZrO2/Al2O3 core and shell nanocomposites. In this series, the zirconium molar percentage was varied from 2 % to 50 %. The ZrO2/Al2O3 nanocomposites and their solid strong acid counterparts were characterised by a variety of techniques including 27Al magic angle spinning nuclear magnetic resonance (MAS-NMR), scanned electronic microscopy (SEM), transmission electron microscope (TEM), X-ray photoelectron spectroscopy (XPS), Nitrogen adsorption and infrared emission spectroscopy (IES). NMR results show that the interaction between zirconia species and alumina strongly correlates with pentacoordinated aluminium sites. This can also be detected by the change in binding energy of the 3d electrons of the zirconium. The acidity of the obtained solid acids was tested by using them as catalysts for the benzolyation of toluene. It was found that a sample with a 50 % zirconium molar percentage possessed the highest surface acidity equalling that of pristine sulfated zirconia despite the reduced mass of zirconia.
Resumo:
Unstructured text data, such as emails, blogs, contracts, academic publications, organizational documents, transcribed interviews, and even tweets, are important sources of data in Information Systems research. Various forms of qualitative analysis of the content of these data exist and have revealed important insights. Yet, to date, these analyses have been hampered by limitations of human coding of large data sets, and by bias due to human interpretation. In this paper, we compare and combine two quantitative analysis techniques to demonstrate the capabilities of computational analysis for content analysis of unstructured text. Specifically, we seek to demonstrate how two quantitative analytic methods, viz., Latent Semantic Analysis and data mining, can aid researchers in revealing core content topic areas in large (or small) data sets, and in visualizing how these concepts evolve, migrate, converge or diverge over time. We exemplify the complementary application of these techniques through an examination of a 25-year sample of abstracts from selected journals in Information Systems, Management, and Accounting disciplines. Through this work, we explore the capabilities of two computational techniques, and show how these techniques can be used to gather insights from a large corpus of unstructured text.
Resumo:
The primary objective of the experiments reported here was to demonstrate the effects of opening up the design envelope for auditory alarms on the ability of people to learn the meanings of a set of alarms. Two sets of alarms were tested, one already extant and one newly-designed set for the same set of functions, designed according to a rationale set out by the authors aimed at increasing the heterogeneity of the alarm set and incorporating some well-established principles of alarm design. For both sets of alarms, a similarity-rating experiment was followed by a learning experiment. The results showed that the newly-designed set was judged to be more internally dissimilar, and easier to learn, than the extant set. The design rationale outlined in the paper is useful for design purposes in a variety of practical domains and shows how alarm designers, even at a relatively late stage in the design process, can improve the efficacy of an alarm set.
Resumo:
This paper is concerned with investigating existing and potential scope of Dublin Core metadata in Knowledge Management contexts. Modelling knowledge is identified as a conceptual prerequisite in this investigation, principally for the purpose of clarifying scope prior to identifying the range of tasks associated with organising knowledge. A variety of models is presented and relationships between data, information, and knowledge discussed. It is argued that the two most common modes of organisation, hierarchies and networks, influence the effectiveness and flow of knowledge. Practical perspective is provided by reference to implementations and projects providing evidence of how DC metadata is applied in such contexts. A sense-making model is introduced that can be used as a shorthand reference for identifying useful facets of knowledge that might be described using metadata. Discussion is aimed at presenting this model in a way that both validates current applications and points to potential novel applications.
Resumo:
Core(polyvinyl neodecanoate-ethylene glycol dimethacrylate)-shell(polyvinyl alcohol) (core (P(VND-EGDMA))-shell(PVA)) microspheres were developed by seeded polymerization with the use of conventional free radical and RAFT/MADIX mediated polymerization. Poly(vinyl pivalate) PVPi was grafted onto microspheres prepared via suspension polymerization of vinylneodecanoate and ethylene glycol dimethacrylate. The amount of grafted polymer was found to be independent from the technique used with conventional free radical polymerization and MADIX polymerization resulting into similar shell thicknesses. Both systems—grafting via free radical polymerization or the MADIX process—were found to follow slightly different kinetics. While the free radical polymerization resulted in a weight gain linear with the monomer consumption in solution the growth in the MADIX controlled system experienced a delay. The core-shell microspheres were obtained by hydrolysis of the poly(vinyl pivalate) surface grafted brushes to form poly(vinyl alcohol). During hydrolysis the microspheres lost a significant amount of weight, consistent with the hydrolysis of 40–70% of all VPi units. Drug loading was found to be independent of the shell layer thickness, suggesting that the drug loading is governed by the amount of bulk material. The shell layer does not appear to represent an obstacle to the drug ingress. Cell testing using colorectal cancer cell lines HT 29 confirm the biocompatibility of the empty microspheres whereas the clofazimine loaded particles lead to 50% cell death, confirming the release of the drug.
Resumo:
This paper presents a three-dimensional numerical analysis of the electromagnetic forces within a high voltage superconducting Fault Current Limiter (FCL) with a saturated core under short-circuit conditions. The effects of electrodynamics forces in power transformer coils under short-circuit conditions have been reported widely. However, the coil arrangement in an FCL with saturated core differs significantly from existing reactive devices. The boundary element method is employed to perform an electromagnetic force analysis on an FCL. The analysis focuses on axial and radial forces of the AC coil. The results are compared to those of a power transformer and important design considerations are highlighted.
Resumo:
We address the problem of face recognition on video by employing the recently proposed probabilistic linear discrimi-nant analysis (PLDA). The PLDA has been shown to be robust against pose and expression in image-based face recognition. In this research, the method is extended and applied to video where image set to image set matching is performed. We investigate two approaches of computing similarities between image sets using the PLDA: the closest pair approach and the holistic sets approach. To better model face appearances in video, we also propose the heteroscedastic version of the PLDA which learns the within-class covariance of each individual separately. Our experi-ments on the VidTIMIT and Honda datasets show that the combination of the heteroscedastic PLDA and the closest pair approach achieves the best performance.
Resumo:
This chapter proposes a conceptual model for optimal development of needed capabilities for the contemporary knowledge economy. We commence by outlining key capability requirements of the 21st century knowledge economy, distinguishing these from those suited to the earlier stages of the knowledge economy. We then discuss the extent to which higher education currently caters to these requirements and then put forward a new model for effective knowledge economy capability learning. The core of this model is the development of an adaptive and adaptable career identity, which is created through a reflective process of career self-management, drawing upon data from the self and the world of work. In turn, career identity drives the individual’s process of skill and knowledge acquisition, including deep disciplinary knowledge. The professional capability learning thus acquired includes disciplinary skill and knowledge sets, generic skills, and also skills for the knowledge economy, including disciplinary agility, social network capability, and enterprise skills. In the final part of this chapter, we envision higher education systems that embrace the model, and suggest steps that could be taken toward making the development of knowledge economy capabilities an integral part of the university experience.
Resumo:
Design Science Research (DSR) has emerged as an important approach in Information Systems (IS) research, evidenced by the plethora of recent related articles in recognized IS outlets. Nonetheless, discussion continues on the value of DSR for IS and how to conduct strong DSR, with further discussion necessary to better position DSR as a mature and stable research paradigm appropriate for IS. This paper contributes to address this need, by providing a comprehensive conceptual and argumentative positioning of DSR relative to the core of IS. This paper seeks to argue the relevance of DSR as a paradigm that addresses the core of IS discipline well. Here we use the framework defined by Wand and Weber, to position what the core of IS is.
Resumo:
Information security has been recognized as a core requirement for corporate governance that is expected to facilitate not only the management of risks, but also as a corporate enabler that supports and contributes to the sustainability of organizational operations. In implementing information security, the enterprise information security policy is the set of principles and strategies that guide the course of action for the security activities and may be represented as a brief statement that defines program goals and sets information security and risk requirements. The enterprise information security policy (alternatively referred to as security policy in this paper) that represents the meta-policy of information security is an element of corporate ICT governance and is derived from the strategic requirements for risk management and corporate governance. Consistent alignment between the security policy and the other corporate business policies and strategies has to be maintained if information security is to be implemented according to evolving business objectives. This alignment may be facilitated by managing security policy alongside other corporate business policies within the strategic management cycle. There are however limitations in current approaches for developing and managing the security policy to facilitate consistent strategic alignment. This paper proposes a conceptual framework for security policy management by presenting propositions to positively affect security policy alignment with business policies and prescribing a security policy management approach that expounds on the propositions.
Resumo:
Purpose: There is a lack of theory relating to destination brand performance measurement in the destination branding literature, which emerged in the late 1990s (see for example Dosen, Vransevic, & Prebezac, 1998). Additionally, there is a lack of research about the importance of travel context in consumers’ destination decision making (Hu & Ritchie, 1993). This study develops a structural model to measure destination brand performance across different travel situations. The theory of planned behaviour (TpB) was utilised as a framework to underpin the consumer-based brand equity (CBBE) hierarchy to develop a model of destination brand performance. Research approach: A proposed model of destination brand performance was developed through a review of the literature. The first study was used to identify destination image attributes (the core construct) using an analysis of the literature, a document analysis, and personal interviews using the Repertory Test qualitative technique. Underpinned by Personal Construct Theory (PCT), the Repertory Test enables the elicitation of attributes consumers use to evaluate destinations when considering travel. Data was examined in the first study to i) identify any attribute differences in travel contexts and ii) create a scale for use in a questionnaire. A second study was conducted to test the proposed model using a questionnaire with eight groups of participants to assess four destinations across two travel contexts. The model was tested utilising structural equation modelling. Findings: The first study resulted in a list of 29 destination image attributes for use in a scale index. Attributes were assessed across travel contexts and few differences were identified. The second study assessed the congruence of destination brand identity (the destination marketing organisation’s desired image) and destination brand image (the actual perceptions held by consumers) using importance-performance analyses. Finally, the proposed model of destination brand performance was tested. Overall the data supported the model of destination brand performance across travel contexts and destinations. Additionally, this was compared to consumers’ decision sets, further supporting the model. Value: This research provides a contribution to the destination marketing literature through the development of a measurement of destination brand performance underpinned by TpB. Practically; it will provide destination marketing organisations with a tool to track destination brand performance, relative to key competing places, over time. This is important given the development of a destination brand is a long term endeavour.
Resumo:
Jacques Rancière's work on aesthetics has received a great deal of attention in recent years. Given his work has enormous range – covering art and literature, political theory, historiography, pedagogy and worker's history – Andrew McNamara and Toni Ross (UNSW) explore his wider critical ambitions in this interview, while showing how it leads to alternative insights into aesthetics. Rancière sets aside the core suppositions linking the medium to aesthetic judgment, which has informed many definitions of modernism. Rancière is emphatic in freeing aesthetic judgment from issues of medium-specificity. He argues that the idea of autonomy associated with medium-specificity – or 'truth to the medium' – was 'a very late one' in modernism, and that post-medium trends were already evident in early modernism. While not stressing a simple continuity between early modernism and contemporary art, Ranciere nonetheless emphasizes the on-going ethical and political ramifications of maintaining an a-disciplinary stance.
Resumo:
The aim of this investigation was to elucidate the reductions in muscle, skin and core temperature following exposure to −110°C whole body cryotherapy (WBC), and compare these to 8°C cold water immersion (CWI). Twenty active male subjects were randomly assigned to a 4-min exposure of WBC or CWI. A minimum of 7 days later subjects were exposed to the other treatment. Muscle temperature in the right vastus lateralis (n = 10); thigh skin (average, maximum and minimum) and rectal temperature (n = 10) were recorded before and 60 min after treatment. The greatest reduction (P<0.05) in muscle (mean ± SD; 1 cm: WBC, 1.6±1.2°C; CWI, 2.0±1.0°C; 2 cm: WBC, 1.2±0.7°C; CWI, 1.7±0.9°C; 3 cm: WBC, 1.6±0.6°C; CWI, 1.7±0.5°C) and rectal temperature (WBC, 0.3±0.2°C; CWI, 0.4±0.2°C) were observed 60 min after treatment. The largest reductions in average (WBC, 12.1±1.0°C; CWI, 8.4±0.7°C), minimum (WBC, 13.2±1.4°C; CWI, 8.7±0.7°C) and maximum (WBC, 8.8±2.0°C; CWI, 7.2±1.9°C) skin temperature occurred immediately after both CWI and WBC (P<0.05). Skin temperature was significantly lower (P<0.05) immediately after WBC compared to CWI. The present study demonstrates that a single WBC exposure decreases muscle and core temperature to a similar level of those experienced after CWI. Although both treatments significantly reduced skin temperature, WBC elicited a greater decrease compared to CWI. These data may provide information to clinicians and researchers attempting to optimise WBC and CWI protocols in a clinical or sporting setting.
Resumo:
To provide valuable industry information with human resource applications, this study aimed to identify the minimum level of competency required within organisations to manage occupational road risk. Senior managers from four Australian organisations participated in individual semi-structured interviews. These senior managers were responsible for a combined workforce of approximately 46,000 and a combined fleet of approximately 20,000. The managers assessed a list of 39 safety management tasks that had previously been identified as critical to the management of Occupational Health and Safety (OHS) performance within the construction industry. From this list the managers perceived that organisational personnel required competency in at least 14 of the safety tasks to meet a minimum standard of road risk management. Managers perceived that a full understanding of at least six of these tasks was critical. These six tasks comprised: hazard identification and control; providing OHS information and instruction; incident investigations; inspections of workplace and work tasks; researching and reporting on OHS issues and strategies; and applying legislative OHS requirements. It is hoped that the core competencies identified in this study may assist in the development of an internationally accepted competency framework for managing occupational road risks. This proposed competency framework could have many applications including guiding the design of job descriptions, training curriculums, and employee performance assessments. To build upon this study, the authors recommend future research be conducted to identify the key competencies required to manage occupational road safety across a broad range of organisational contexts.