923 resultados para Extensions
Resumo:
Historic house museums form a significant component of the built heritage and social history of a country. They vary from the elaborate mansions of the wealthy to modest dwellings of the working class. Regardless of the original owner's status in society these house museums are vital to an understanding of architecture, culture and society from a bygone era. The Newstead House, the oldest surviving residence, in Brisbane, is the first house to be designated a 'Historic House Museum' in Queensland. It is a representative example of a house that demonstrates the British colonial heritage of 19th century Australia. Originally a modest cottage, on 34 acres of land, the Newstead house was built by a Scottish migrant. The ownership of the house and land changed many times, during the period from 1847 to 1939. During this period a series of prominent residents of Brisbane either owned or rented this residence. They included, an officer of the Royal Navy, politicians, magistrates, merchant ship owners, and a Consul General of the United States of America. As a result, the house went through a series of renovations and extensions to accommodate the needs of its owners and their position in society. This paper aims to investigate the significance of historic museum houses in educating the community on aspects of social history, culture and architecture of 19th century Australia. It will focus on the heritage listed Newstead House as a case study to demonstrate the significance of the house as an artefact and an educational tool.
Resumo:
We advocate for the use of predictive techniques in interactive computer music systems. We suggest that the inclusion of prediction can assist in the design of proactive rather than reactive computational performance partners. We summarize the significant role prediction plays in human musical decisions, and the only modest use of prediction in interactive music systems to date. After describing how we are working toward employing predictive processes in our own metacreation software we reflect on future extensions to these approaches.
Resumo:
Schweitzer et al. previously published a paper in the Australian and New Zealand Journal of Psychiatry which provided prevalence rates on suicidal ideation and behaviour among university students [1]. We wish to provide an update on extensions of our previously published work. In our previous publication we indicated the relatively high percentage of students who reported suicide-related behaviour over the past 12 months (6.6%). This figure is very similar to a more recent study undertaken in the UK where 6% of student respondents reported suicide attempts [2]. As a follow up, we investigated this finding further in studies undertaken in 1994 and 1997 by asking fresh samples of University of Queensland first-year undergraduates who responded positively to the question ‘I have made attempts to kill myself’ (in the past year), to provide additional data relating to the methods employed in their suicide attempts and the consequences following their suicide attempt in terms of level of injury and medical care received...
Resumo:
Numerous crops grow in sugar regions that have the potential to increase the amount of biomass available to a small bagasse-based pulp factory. Arundo donax and Sorghum offer unique advantages to farmers compared to other agricultural crops. Sorghum bicolour requires only 1/3 of the water of sugarcane. Arundo donax is a very high yield crop, it can also grow with little water but it has the further advantage in that it is also highly stress tolerant, making it suitable for land which is unsuited to other crops. Pulps produced from these crops were benchmarked against sugarcane bagasse pulp. Arundo, sorghum and bagasse were pulped using KOH and anthraquinone to 20 Kappa number so as to produce a bleachable pulp which is suitable for making photocopier paper and tissue products. The unbleached sorghum pulp has better tensile strength properties than the unbleached Arundo pulp (43.8 Nm/g compared to 21.4 Nm/g) and the bleached sorghum pulp tensile strength was similar to bagasse (28.4 Nm/g). At 20 Kappa number, sorghum pulp had acceptable yield for a non-wood fibre (45% c.f. 55% for bagasse), Arundo donax pulp had low tensile strength, and relatively low yield (38.7%), even for an agricultural fibre and required severe cooking conditions to achieve similar delignification to sugarcane bagasse or sorghum. Sorghum and Arundo donax produced thicker handsheets than bagasse (>160 µm c.f. 122 µm for bagasse). In preliminary experiments sorghum and bagasse responded slightly better to Totally Chlorine Free peroxide bleaching (QPP), although none achieved a satisfactory brightness level and further improvement would be required to produce a bleached pulp.
Resumo:
We offer an exposition of Boneh, Boyen, and Goh’s “uber-assumption” family for analyzing the validity and strength of pairing assumptions in the generic-group model, and augment the original BBG framework with a few simple but useful extensions.
Resumo:
The purpose of this chapter is to provide an abstraction for the class of Exponent-Inversion IBE exemplified by the [Bscr ][Bscr ]2 and [Sscr ][Kscr ] schemes, and, on the basis of that abstraction, to show that those schemes do support interesting and useful extensions such as HIBE and ABE. Our results narrow, if not entirely close, the “flexibility gap” between the Exponent-Inversion and Commutative-Blinding IBE concepts.
Resumo:
At NDSS 2012, Yan et al. analyzed the security of several challenge-response type user authentication protocols against passive observers, and proposed a generic counting based statistical attack to recover the secret of some counting based protocols given a number of observed authentication sessions. Roughly speaking, the attack is based on the fact that secret (pass) objects appear in challenges with a different probability from non-secret (decoy) objects when the responses are taken into account. Although they mentioned that a protocol susceptible to this attack should minimize this difference, they did not give details as to how this can be achieved barring a few suggestions. In this paper, we attempt to fill this gap by generalizing the attack with a much more comprehensive theoretical analysis. Our treatment is more quantitative which enables us to describe a method to theoretically estimate a lower bound on the number of sessions a protocol can be safely used against the attack. Our results include 1) two proposed fixes to make counting protocols practically safe against the attack at the cost of usability, 2) the observation that the attack can be used on non-counting based protocols too as long as challenge generation is contrived, 3) and two main design principles for user authentication protocols which can be considered as extensions of the principles from Yan et al. This detailed theoretical treatment can be used as a guideline during the design of counting based protocols to determine their susceptibility to this attack. The Foxtail protocol, one of the protocols analyzed by Yan et al., is used as a representative to illustrate our theoretical and experimental results.
Resumo:
Process choreographies describe interactions between different business partners and the dependencies between these interactions. While different proposals were made for capturing choreographies at an implementation level, it remains unclear how choreographies should be described on a conceptual level.While the Business Process Modeling Notation (BPMN) is already in use for describing choreographies in terms of interconnected interface behavior models, this paper will introduce interaction modeling using BPMN. Such interaction models do not suffer from incompatibility issues and are better suited for human modelers. BPMN extensions are proposed and a mapping from interaction models to interface behavior models is presented.
Resumo:
We have previously isolated a series of MCF-7 human breast cancer cell variants which no longer require estrogen-supplementation for tumor growth in nude mice (Clarke et al. Proc Natl Acad Sci USA 86: 3649-3653, 1989). We now report that these hormone-independent and hormone-responsive variants (MIII, MCF7/LCC1) can invade locally from solid mammary fat pad tumors, and produce primary extensions on the surface of intraperitoneal structures including liver, pancreas, and diaphragm. Both lymphatic and hematogenous dissemination are observed, resulting in the establishing of pulmonary, bone, and renal metastases. The pattern of metastasis by MIII and MCF7/LCC1 cells closely resembles that frequently observed in breast cancer patients, and provides the first evidence of metastasis from MCF-7 cells growing in vivo without supplementary estrogen. The interexperimental incidence of metastases, and the time from cell inoculation to the appearance of metastatic disease are variable. The increased metastatic potential is not associated with an increase in either the level of laminin attachment, laminin receptor mRNA expression, or secreted type IV collagenolytic activity. We also did not detect a significant decrease in the steady-state mRNA levels of the metastasis inhibitor nm23 gene. However, when growing without estrogen in vitro, MCF7/LCC1 cells produce elevated levels of the estrogen-inducible cathepsin D enzyme.
Resumo:
The peritubular zone of the rat testis has an extensive extracellular matrix (ECM). Fibronectin (FN) is distributed primarily in the basal lamina of the seminiferous tubule boundary tissue and is synthesized by peritubular myoid cells. Several extracellular changes are mediated by growth factors and these changes occur at the time of hormone mediated testicular development, particularly in the peritubular zone. The effects of serum or dibutyryl cyclic AMP (cAMP) on FN production by the mesenchymal peritubular myoid cells were evaluated. Rats of various ages (10, 15, 20, 40 and 80 days) were employed for immunofluorescent localization of rat testicular FN in frozen sections. In all age groups tested, FN was primarily present in a broad layer around each seminiferous tubule, and blood vessel, and in variable distribution throughout the interstitial stroma. By day 20 there was no clear distinction in FN staining between the peritubular zone and the interstitial tissue. This indicates an involvement of FN in the ECM developments which occur in the peritubular zone of the testis at this time. The peritubular myoid cells were isolated from 20-22 day old rat testis and cultured on glass coverslips. These cells were grown to confluence with 10% fetal calf serum (FCS) in medium until day 4 and then subcultured to have secondary monocultures maintained with or without serum. By means of immunofluorescence and cytochemistry using avidin-biotin peroxidase complex it was observed that peritubular myoid cells were positive for FN and most of the FN was localized in the perinuclear region. Subcultured peritubular myoid cells maintained for 4 days in medium containing FCS developed an extensive interconnecting FN matrix. In the presence of 0.5 mM cAMP in culture, FN became localized along the filamentous process of peritubular myoid cells and more prominently in the areas of triangulated multi-cell aggregates as well as on the surface of the contracted small spherical cells. The addition of cAMP in the presence of FCS, also caused a noticeable change in the staining pattern; FN was detected along the filamentous process developing into a complex network of cells encased in an extensive matrix. It would appear that the translocation of FN in the cytoplasmic extensions of peritubular myoid cells may be a direct consequence of morphological changes associated with metabolic regulation of cAMP. This may also be related to the puberty associated development of in vivo changes in the ECM produced by peritubular myoid cells.
Resumo:
Globalization, financial deregulation, economic turmoil, and technology breakthroughs are profoundly exposing organizations to business networks. Engaging these networks requires explicit planning from the strategic level down to the operational level of an organization, which significantly affects organizational artefacts such as business services, processes, and resources. Although enterprise architecture (EA) aligns business and IT aspects of organizational systems, previous applications of EA have not comprehensively addressed a methodological framework for planning. In the context of business networks, this study seeks to explore the application of EA for business network planning where it builds upon relevant and well-established prescriptive and descriptive aspects of EA. Prescriptive aspects include integrated models of services, business processes, and resources among other organizational artefacts, at both business and IT levels. Descriptive aspects include ontological classifications of business functionality, which allow EA models to be aligned semantically to organizational artefacts and, ultimately higher-level business strategy. A prominent approach for capturing descriptive aspects of EA is business capability modelling. In order to explore and develop the illustrative extensions of EA through capability modelling, a list of requirements (capability dimensions) for business network planning will be identified and validated through a revelatory case study encompassing different business network manifestations, or situations. These include virtual organization, liquid workforce, business network orchestration, and headquarters-subsidiary. The use of artefacts, conventionally, modelled through EA will be considered in these network situations. Two general considerations for EA extensions are explored for the identified requirements at the level of the network: extension of artefacts through the network and alignment of network level artefacts with individual organization artefacts. The list of requirements provides the basis for a constructivist extension of EA in the following ways. Firstly, for descriptive aspects, it offers constructivist insights to guide extensions for particular EA techniques and concepts. Secondly, for prescriptive aspects it defines a set of capability dimensions, which improve the analysis and assessment of organization capabilities for business network situations.
Resumo:
A set system (X, F ) with X= {x 1,...,x m}) and F = {B1...,B n }, where B i ⊆ X, is called an (n, m) cover-free set system (or CF set system) if for any 1 ≤ i, j, k ≤ n and j ≠ k, |B i >2 |B j ∩ B k | +1. In this paper, we show that CF set systems can be used to construct anonymous membership broadcast schemes (or AMB schemes), allowing a center to broadcast a secret identity among a set of users in a such way that the users can verify whether or not the broadcast message contains their valid identity. Our goal is to construct (n, m) CF set systems in which for given m the value n is as large as possible. We give two constructions for CF set systems, the first one from error-correcting codes and the other from combinatorial designs. We link CF set systems to the concept of cover-free family studied by Erdös et al in early 80’s to derive bounds on parameters of CF set systems. We also discuss some possible extensions of the current work, motivated by different application.
Resumo:
A well-known attack on RSA with low secret-exponent d was given by Wiener about 15 years ago. Wiener showed that using continued fractions, one can efficiently recover the secret-exponent d from the public key (N,e) as long as d < N 1/4. Interestingly, Wiener stated that his attack may sometimes also work when d is slightly larger than N 1/4. This raises the question of how much larger d can be: could the attack work with non-negligible probability for d=N 1/4 + ρ for some constant ρ > 0? We answer this question in the negative by proving a converse to Wiener’s result. Our result shows that, for any fixed ε > 0 and all sufficiently large modulus lengths, Wiener’s attack succeeds with negligible probability over a random choice of d < N δ (in an interval of size Ω(N δ )) as soon as δ > 1/4 + ε. Thus Wiener’s success bound d
Resumo:
Cumulative arrays have played an important role in the early development of the secret sharing theory. They have not been subject to extensive study so far, as the secret sharing schemes built on them generally result in much larger sizes of shares, when compared with other conventional approaches. Recent works in threshold cryptography show that cumulative arrays may be the appropriate building blocks in non-homomorphic threshold cryptosystems where the conventional secret sharing methods are generally of no use. In this paper we study several extensions of cumulative arrays and show that some of these extensions significantly improve the performance of conventional cumulative arrays. In particular, we derive bounds on generalised cumulative arrays and show that the constructions based on perfect hash families are asymptotically optimal. We also introduce the concept of ramp perfect hash families as a generalisation of perfect hash families for the study of ramp secret sharing schemes and ramp cumulative arrays.
Resumo:
To date, designed topologies for DC-AC inversion with both voltage-buck and boost capabilities are mainly focused on two-level circuitries with extensions to three-level possibilities left nearly unexplored. Contributing to this area of research, this paper presents the design of a number of viable buck-boost three-level inverters that can also support bidirectional power conversion. The proposed front-end circuitry is developed from the Cuk-derived buck-boost two-level inverter, and by using the "alternative phase opposition disposition" (APOD) modulation scheme, the buck-boost three-level inverters can perform distinct five-level line voltage and three-level phase voltage switching by simply controlling the active switches located in the designed voltage boost section of the circuits. As a cost saving option, one active switch can further be removed from the voltage-boost section of the circuits by simply re-routing the gating commands of the remaining switches without influencing the ac output voltage amplitude. To verify the validity of the proposed inverters, Matlab/PLECS simulations were performed before a laboratory prototype was implemented for experimental testing.