991 resultados para valence state manipulation
Resumo:
New composite doped poly (ethylene oxide) polymer electrolyte was developed using 2-mercapto benzimidazole as plasticizer and iodide/triiodide as redox couple. The fabrication of the cell involves Poly(ethylene oxide)/ 2-mercapto benzimidazole / iodide/triiodide as polymer electrolyte in dye-sensitized solar cell fabricated with N3 dye and TiO2 nanoparticles as the photoanode and Platinum coated FTO (fluorine doped SnO2) as counter electrode. The current-volatage characteristics under simulated sunlight AM1.5 shows a short circuit current Isc of 8.7mA and open circuit photovoltage 508 mV. The conductivity measurements for the new polymer electrolyte and the photoelectrochemical measurments were carried out systematically. In 2-mercapto benzimidazole the electron rich sulphur and nitrogen atoms, act as pi-electron donors that form good interaction with iodine which plays a vital role in the performance of the fabricated dye-sensitized solar cells. The resonance effect increases the stability of the cell to a considerable extent. These results suggest that the new composite polymer electrolyte performs as a promising new doped polymer-electrolyte.
Resumo:
Parliamentary questions are the most popular and visible tool for making the executive accountable to the legislature. However, their use, purpose and effectiveness vary in different countries. In this study, 4023 parliamentary questions asked in the Uttar Pradesh State Legislative Assembly were analysed. The results show that half of the total members of the Assembly used this device. Contrary to findings in the Australian parliamentary system, there was no evidence of ‘Dorothy Dix’ and party influence on parliamentary questions. Furthermore, 30% of the questions were aimed at seeking information and 70% pressed for action. The government provided the required information in 95% of the questions in the former category but only took action in 37% in the latter category. The study concludes that parliamentary questions serve as an effective legislative tool in the Uttar Pradesh Legislature
Resumo:
When communicating emotion in music, composers and performers encode their expressive intentions through the control of basic musical features such as: pitch, loudness, timbre, mode, and articulation. The extent to which emotion can be controlled through the systematic manipulation of these features has not been fully examined. In this paper we present CMERS, a Computational Music Emotion Rule System for the control of perceived musical emotion that modifies features at the levels of score and performance in real-time. CMERS performance was evaluated in two rounds of perceptual testing. In experiment I, 20 participants continuously rated the perceived emotion of 15 music samples generated by CMERS. Three music works, each with five emotional variations were used (normal, happy, sad, angry, and tender). The intended emotion by CMERS was correctly identified 78% of the time, with significant shifts in valence and arousal also recorded, regardless of the works’ original emotion.
Resumo:
Industrial applications of the simulated-moving-bed (SMB) chromatographic technology have brought an emergent demand to improve the SMB process operation for higher efficiency and better robustness. Improved process modelling and more-efficient model computation will pave a path to meet this demand. However, the SMB unit operation exhibits complex dynamics, leading to challenges in SMB process modelling and model computation. One of the significant problems is how to quickly obtain the steady state of an SMB process model, as process metrics at the steady state are critical for process design and real-time control. The conventional computation method, which solves the process model cycle by cycle and takes the solution only when a cyclic steady state is reached after a certain number of switching, is computationally expensive. Adopting the concept of quasi-envelope (QE), this work treats the SMB operation as a pseudo-oscillatory process because of its large number of continuous switching. Then, an innovative QE computation scheme is developed to quickly obtain the steady state solution of an SMB model for any arbitrary initial condition. The QE computation scheme allows larger steps to be taken for predicting the slow change of the starting state within each switching. Incorporating with the wavelet-based technique, this scheme is demonstrated to be effective and efficient for an SMB sugar separation process. Moreover, investigations are also carried out on when the computation scheme should be activated and how the convergence of the scheme is affected by a variable stepsize.
Resumo:
This research examined for the first time the relationship between emotional manipulation, emotional intelligence, and primary and secondary psychopathy. As predicted, in Study 1 (N = 73), emotional manipulation was related to both primary and secondary psychopathy. Only secondary psychopathy was related to perceived poor emotional skills. Secondary psychopathy was also related to emotional concealment. Emotional intelligence was negatively related to perceived poor emotional skills, emotional concealment, and primary and secondary psychopathy. In Study 2 (N = 275), two additional variables were included: alexithymia and ethical position. It was found that for males, primary psychopathy and emotional intelligence predicted emotional manipulation, while for females emotional intelligence acted as a suppressor, and ethical idealism and secondary psychopathy were additional predictors. For males, emotional intelligence and alexithymia were related to perceived poor emotional skills, while for females emotional intelligence, but not alexithymia, predicted perceived poor emotional skills, with ethical idealism acting as a suppressor. For both males and females, alexithymia predicted emotional concealment. These findings suggest that the mechanisms behind the emotional manipulation–psychopathy relationship differ as a function of gender. Examining the different aspects of emotional manipulation as separate but related constructs may enhance understanding of the construct of emotional manipulation.
Resumo:
This paper examines accountability in the context of New Zealand's state-owned enterprises (SOEs), and considers an accountability framework which extends beyond traditional (upward and outward) dimensions. While traditional accountability dimensions are clearly detailed in the legislation, less clear are the dilemmas and contradictions faced by SOEs, balancing multiple interests, and at times, conflicting objectives. These issues are explored through interviews conducted in two phases over a two year period with senior executives from 12 of the then 17 SOEs operating in New Zealand. Findings reveal a number of dimensions of accountability that extend beyond current conceptualisations of accountability in the public sector, often including multiple directions of accountability. Implications suggest the need for a more explicit framework of accountability relevant to the SOE context, which may serve useful in identifying potential pathways to conflict mitigation.
Resumo:
Examines the political and ideological influences on China's economic reforms since the early 1980s. Discusses the influence of the Chinese Communist Party and Confucianism on economic progress and assesses the effect of reforms. Outlines the requirement for new corporate governance laws to meet the needs of expanding private businesses and considers China's use and adaptation of some Western models of corporate governance. Comments on whether these fit easily with China's business culture. Criticises the shortcomings of China's corporate laws. Looks in particular at the telecommunications industry and at the Company Law 2006.
Resumo:
On the surface the subjects of Corporate Social Responsibility (CSR) and Critical Management Studies (CMS) seem to be closely related. Both are concerned with reflecting on the impact of management and organisation on employees, the wider community and the environment. Both suggest that there may be a need for organisations to take responsibility for and account of people other than shareholders and both have used the concept of accountability to suggest that organisations may need to do more than just comply with the legal framework.
Resumo:
This article examines the relationship between the arts and national innovation policy in Australia, pivoting around the Venturous Australia report released in September 2008 as part of the Review of the National Innovation System (RNIS). This came at a time of optimism that the arts sector would be included in Australia’s federal innovation policy. However, despite the report’s broad vision for innovation and specific commentary on the arts, the more ambitious hopes of arts sector advocates remained unfulfilled. This article examines the entwining discourses of creativity and innovation which emerged globally and in Australia prior to the RNIS, before analysing Venturous Australia in terms of the arts and the ongoing science-and-technology bias to innovation policy. It ends by considering why sector-led policy research and lobbying has to date proved unsuccessful and then suggests what public policy development is now needed.
Resumo:
US state-based data breach notification laws have unveiled serious corporate and government failures regarding the security of personal information. These laws require organisations to notify persons who may be affected by an unauthorized acquisition of their personal information. Safe harbours to notification exist if personal information is encrypted. Three types of safe harbour have been identified in the literature: exemptions, rebuttable presumptions and factors. The underlying assumption of exemptions is that encrypted personal information is secure and therefore unauthorized access does not pose a risk. However, the viability of this assumption is questionable when examined against data breaches involving encrypted information and the demanding practical requirements of effective encryption management. Recent recommendations by the Australian Law Reform Commission (ALRC) would amend the Privacy Act 1988 (Cth) to implement a data breach scheme that includes a different type of safe harbour, factor based analysis. The authors examine the potential capability of the ALRC’s proposed encryption safe harbour in relation to the US experience at the state legislature level.
Resumo:
In a recent decision by Mr Justice Laddie, a patent was held anticipated by, inter alia, prior use of a device which fell within the claims of the patent in suit, even though its circuitry was enclosed in resin. The anticipating invention had been "made available to the public" within the terms of section 2 (2) of the Patents Act 1977 because its essential integers would have been revealed by an interesting character, the "skilled forensic engineer".
Resumo:
The paper compares three different methods of inclusion of current phasor measurements by phasor measurement units (PMUs) in the conventional power system state estimator. For each of the three methods, comprehensive formulation of the hybrid state estimator in the presence of conventional and PMU measurements is presented. The performance of the state estimator in the presence of conventional measurements and optimally placed PMUs is evaluated in terms of convergence characteristics and estimator accuracy. Test results on the IEEE 14-bus and IEEE 300-bus systems are analyzed to determine the best possible method of inclusion of PMU current phasor measurements.
Resumo:
In this chapter, we are particularly concerned with making visible the general principles underlying the transmission of Social Studies curriculum knowledge, and considering it in light of a high-stakes mandated national assessment task. Specifically, we draw on Bernstein’s theoretical concept of pedagogic models as a tool for analysing orientations to teaching and learning. We introduce a case in point from the Australian context: one state Social Studies curriculum vis-a-vis one part of the Year Three national assessment measure for reading. We use our findings to consider the implications for the disciplinary knowledge of Social Studies in the communities in which we are undertaking our respective Australian Research Council Linkage project work (Glasswell et al.; Woods et al.). We propose that Social Studies disciplinary knowledge is being constituted, in part, through power struggles between different agencies responsible for the production and relay of official forms of state curriculum and national literacy assessment. This is particularly the case when assessment instruments are used to compare and contrast school results in highly visible web based league tables (see, for example, http://myschoolaustralia.ning.com/).
Resumo:
Aims: To develop clinical protocols for acquiring PET images, performing CT-PET registration and tumour volume definition based on the PET image data, for radiotherapy for lung cancer patients and then to test these protocols with respect to levels of accuracy and reproducibility. Method: A phantom-based quality assurance study of the processes associated with using registered CT and PET scans for tumour volume definition was conducted to: (1) investigate image acquisition and manipulation techniques for registering and contouring CT and PET images in a radiotherapy treatment planning system, and (2) determine technology-based errors in the registration and contouring processes. The outcomes of the phantom image based quality assurance study were used to determine clinical protocols. Protocols were developed for (1) acquiring patient PET image data for incorporation into the 3DCRT process, particularly for ensuring that the patient is positioned in their treatment position; (2) CT-PET image registration techniques and (3) GTV definition using the PET image data. The developed clinical protocols were tested using retrospective clinical trials to assess levels of inter-user variability which may be attributed to the use of these protocols. A Siemens Somatom Open Sensation 20 slice CT scanner and a Philips Allegro stand-alone PET scanner were used to acquire the images for this research. The Philips Pinnacle3 treatment planning system was used to perform the image registration and contouring of the CT and PET images. Results: Both the attenuation-corrected and transmission images obtained from standard whole-body PET staging clinical scanning protocols were acquired and imported into the treatment planning system for the phantom-based quality assurance study. Protocols for manipulating the PET images in the treatment planning system, particularly for quantifying uptake in volumes of interest and window levels for accurate geometric visualisation were determined. The automatic registration algorithms were found to have sub-voxel levels of accuracy, with transmission scan-based CT-PET registration more accurate than emission scan-based registration of the phantom images. Respiration induced image artifacts were not found to influence registration accuracy while inadequate pre-registration over-lap of the CT and PET images was found to result in large registration errors. A threshold value based on a percentage of the maximum uptake within a volume of interest was found to accurately contour the different features of the phantom despite the lower spatial resolution of the PET images. Appropriate selection of the threshold value is dependant on target-to-background ratios and the presence of respiratory motion. The results from the phantom-based study were used to design, implement and test clinical CT-PET fusion protocols. The patient PET image acquisition protocols enabled patients to be successfully identified and positioned in their radiotherapy treatment position during the acquisition of their whole-body PET staging scan. While automatic registration techniques were found to reduce inter-user variation compared to manual techniques, there was no significant difference in the registration outcomes for transmission or emission scan-based registration of the patient images, using the protocol. Tumour volumes contoured on registered patient CT-PET images using the tested threshold values and viewing windows determined from the phantom study, demonstrated less inter-user variation for the primary tumour volume contours than those contoured using only the patient’s planning CT scans. Conclusions: The developed clinical protocols allow a patient’s whole-body PET staging scan to be incorporated, manipulated and quantified in the treatment planning process to improve the accuracy of gross tumour volume localisation in 3D conformal radiotherapy for lung cancer. Image registration protocols which factor in potential software-based errors combined with adequate user training are recommended to increase the accuracy and reproducibility of registration outcomes. A semi-automated adaptive threshold contouring technique incorporating a PET windowing protocol, accurately defines the geometric edge of a tumour volume using PET image data from a stand alone PET scanner, including 4D target volumes.