975 resultados para Smaller Kidneys
Resumo:
Prostrate Cancer(PCa)is the most common cause of cancer death amongst Western males. PCa occurs in two distinct stages. In its early stage, growth and development is dependent primarily on male sex hormones (androgens) such as testosterone, although other growth factors have roles maintaining PCa cell survival in this stage. In the later stage of PCa development, growth and.maintenance is independent of androgen stimulation and growth factors including Insulin-like Growth Factor -1 (IGf.:·l) and Epidermal Growth Factor (EGF) are thought to have more crucial roles in cell survival and PCa progression. PCa, in its late stages, is highly aggressive and metastatic, that is, tumorigenic cells migrate from the primary site of the body (prostate) and travel via the systemic and lymphatic circulation, residing and colonising in the bone, lymph node, lung, and in more rare cases, the brain. Metastasis involves both cell migration and tissue degradation activities. The degradation of the extracellular matrix (ECM), the tissue surrounding the organ, is mediated in part by members of a family of 26 proteins called the Matrix Metalloproteases (MMPs), whilst ceil adhesion molecules, of which proteins known as Integrins are included, mediate ce11 migration. A family of proteins known as the ADAMs (A Disintegrin . And Metalloprotease domain) were a recently characterised family at the commencement of this study and now comprise 34 members. Because of their dual nature, possessing an active metaiioprotease domain, homologous to that of the MMPs, and an integrin-binding domain capable of regulating cell-cell and cell-ECM contacts, it was thought likely that members of the ADAMs family may have implications for the progression of aggressive cancers such as those ofthe prostate. This study focussed on two particular ADAMs -9 and -10. ADAM-9 has an active metalloprotease domain, which has been shown to degrade constituents of the ECM, including fibronectin, in vitro. It also has an integrin-binding capacity through association with key integrins involved in PCa progression, such as a6~1. ADAM-10 has no such integrin binding activities, but its bovine orthologue, MADM, is able to degrade coHagen type IV, a major component of basement membranes. It is likely human ADAM-10 has the same activity. It is also known to cleave Ll -a protein involved in cell anchorage activities - and collagen type XVII - which is a principal component of the hemidesmosomes of cellular tight junctions. The cleavage of these proteins enables the cell to be released from the surrounding environment and commence migratory activities, as required in metastasis. Previous studies in this laboratory showed the mRNA expression of the five ADAMs -9,- 10, -11, -15 and -17 in PCa cell lines, characteristic of androgen-dependent and androgen independent disease. These studies were furthered by the characterisation of AD AM-9, -10 and -17 mRNA regulation by Dihydrotestosterone (DHT) in the androgen-responsive cell line (LNCaP). ADAM-9 and -10 mRNA levels were elevated in response to DHT stimulation. Further to these observations, the expression of ADAM-9 and -10 was shown in primary prostate biopsies from patients with PCa. ADAM-1 0 was expressed in the cytoplasm and on the ceH membrane in epithelial and basal cells ofbenign prostate glands, but in high-grade PCa glands, ADAM-I 0 expression was localised to the nucleus and its expression levels appeared to be elevated when compared to low-grade PCa glands. These studies provided a strong background for the hypothesis that ADAM-9 and -10 have key roles in the development ofPCa and provided a basis for further studies.The aims of this study were to: 1) characterise the expression, localisation and levels, of ADAM-9 and -10 mRNA and protein in cell models representing characteristics of normal through androgen-dependent to androgen-independent PCa, as well as to expand the primary PCa biopsy data for ADAM-9 and ADAM-10 to encompass PCa bone metastases 2) establish an in vitro cell system, which could express elevated levels of ADAM-1 0 so that functional cell-based assays such as cell migration, invasion and attachment could be carried out, and 3) to extend the previous hormonal regulation data, to fully characterise the response of ADAM-9 and -10 mRNA and protein levels to DHT, IGF-1, DHT plus IGF-1 and EGF in the hormonal/growth factor responsive cell line LNCaP. For aim 1 (expression of ADAM-9 and -10 mRNA and protein), ADAM-9 and -10 mRNA were characterised by R T -PCR, while their protein products were analysed by Western blot. Both ADAM-9 and -10 mRNA and protein were expressed at readily detectable levels across progressively metastatic PCa cell lines model that represent characteristics of low-grade,. androgen-dependent (LNCaP and C4) to high-grade, androgen-independent (C4-2 and C4-2B) PCa. When the non-tumorigenic prostate cell line RWPE-1 was compared with the metastatic PCa cell line PC-3, differential expression patterns were seen by Western blot analysis. For ADAM-9, the active form was expressed at higher levels in RWPE-1, whilst subcellular fractionation showed that the active form of ADAM-9 was predominantly located in the cell nucleus. For ADAM-I 0, in both of the cell Jines, a nuclear specific isoform of the mature, catalytically active ADAM-I 0 was found. This isoforrn differed by -2 kDa in Mr (smaller) than the cytoplasmic specific isoform. Unprocessed ADAM-I 0 was readily detected in R WPE-1 cell lines but only occasionally detected in PC-3 cell lines. Immunocytochemistry using ADAM-9 and -10 specific antibodies confirmed nuclear, cytoplasmic and membrane expression of both ADAMs in these two cell lines. To examine the possibility of ADAM-9 and -10 being shed into the extracellular environment, membrane vesicles that are constitutively shed from the cell surface and contain membrane-associated proteins were collected from the media of the prostate cell lines RWPE-1, LNCaP and PC-3. ADAM-9 was readily detectable in RWPE- 1 and LNCaP cell membrane vesicles by Western blot analysis, but not in PC-3 cells, whilst the expression of ADAM-I 0 was detected in shed vesicles from each of these prostate cell lines. By Laser Capture Microdissection (LCM), secretory epithelial cells of primary prostate gland biopsies were isolated from benign and malignant glands. These secretory cells, by Western blot analysis, expressed similar Mr bands for ADAM-9 and -10 that were found in PCa cell lines in vitro, indicating that the nuclear specific isoforrn of ADAM-I 0 was present in PCa primary tumours and may represent the predominantly nuclear form of ADAM-I 0 expression, previously shown in high-grade PCa by immunohistochemistry (IHC). ADAM-9 and -10 were also examined by IHC in bone metastases taken from PCa patients at biopsy. Both ADAMs could be detected at levels similar to those shown for Prostate Specific Antigen (PSA) in these biopsies. Furthermore, both ADAM-9 and -10 were predominantly membrane- bound with occasional nuclear expression. For aim 2, to establish a cell system that over-expressed levels of ADAM-10, two fulllength ADAM-I 0 mammalian expression vectors were constructed; ADAM-I 0 was cloned into pcDNA3.1, which contains a CMV promoter, and into pMEP4, containing an inducible metallothionine promoter, whose activity is stimulated by the addition of CdC}z. The efficiency of these two constructs was tested by way of transient transfection in the PCa cell line PC-3, whilst the pcDNA3.1 construct was also tested in the RWPE-1 prostate cell line. Resultant Western blot analysis for all transient transfection assays showed that levels of ADAM-I 0 were not significantly elevated in any case, when compared to levels of the housekeeping gene ~-Tubulin, despite testing various levels of vector DNA, and, for pMEP4, the induction of the transfected cell system with different degrees of stimulation with CdCh to activate the metallothionine promoter post-transfection. Another study in this laboratory found similar results when the same full length ADAM-10 sequence was cloned into a Green Fluorescent Protein (GFP) expressing vector, as no fluorescence was observed by means of transient tran sfection in the same, and other, PCa cell lines. It was hypothesised that the Kozak sequence included in the full-length construct (human ADAMI 0 naturally occurring sequence) is not strong enough to initiate translation in an artificial system, in cells, which, as described in Aim 1, are already expressing readily detectable levels of endogenous ADAM-10. As a result, time constraints prevented any further progress with Aim 2 and functional studies including cell attachment, invasion and migration were unable to be explored. For Aim 3, to characterise the response of ADAM-9 and -10 mRNA and protein levels to DHT, IGF-1, DHT plus IGF-1 and EGF in LNCaP cells, the levels of ADAM-9 and -10 mRNA were not stimulated by DHT or IGF-I alone, despite our previous observations that initially characterised ADAM-9 and -10 mRNA as being responsive to DHT. However, IGF-1 in synergy with DHT did significantly elevate mRNA levels ofboth ADAMs. In the case of ADAM-9 and -10 protein, the same trends of stimulation as found at the rnRNA level were shown by Western blot analysis when ADAM-9 and -10 signal intensity was normalised with the housekeeping protein ~-Tubulin. For EGF treatment, both ADAM-9 and -10 mRNA and protein levels were significantly elevated, and further investigation vm found this to be the case for each of these ADAMs proteins in the nuclear fractions of LNCaP cells. These studies are the first to describe extensively, the expression and hormonal/growth factor regulation of two members of the ADAMs family ( -9 and -1 0) in PCa. These observations imply that the expression of ADAM-9 and -10 have varied roles in PCa whilst it develops from androgen-sensitive (early stage disease), through to an androgeninsensitive (late-stage), metastatic disease. Further studies are now required to investigate the several key areas of focus that this research has revealed, including: • Investigation of the cellular mechanisms that are involved in actively transporting the ADAMs to the cell's nuclear compartment and the ADAMs functional roles in the cell nucleus. • The construction of a full-length human ADAM-10 mammalian expression construct with the introduction of a new Kozak sequence, that elevates ADAM-I 0 expression in an in vitro cell system are required, so that functional assays such as cell invasion, migration and attachment may be carried out to fmd the functional consequences of ADAM expression on cellular behaviour. • The regulation studies also need to be extended by confirming the preliminary observations that the nuclear levels of ADAMs may also be elevated by hormones and growth factors such as DHT, IGF-1 and EGF, as well as the regulation of levels of plasma membrany vesicle associated ADAM expression. Given the data presented in this study, it is likely the ADAMs have differential roles throughout the development of PCa due to their differential cellular localisation and synergistic growth-factor regulation. These observations, along with those further studies outlined above, are necessary in identifying these specific components ofPCa metastasis to which the ADAMs may contribute.
Resumo:
Stream ciphers are encryption algorithms used for ensuring the privacy of digital telecommunications. They have been widely used for encrypting military communications, satellite communications, pay TV encryption and for voice encryption of both fixed lined and wireless networks. The current multi year European project eSTREAM, which aims to select stream ciphers suitable for widespread adoptation, reflects the importance of this area of research. Stream ciphers consist of a keystream generator and an output function. Keystream generators produce a sequence that appears to be random, which is combined with the plaintext message using the output function. Most commonly, the output function is binary addition modulo two. Cryptanalysis of these ciphers focuses largely on analysis of the keystream generators and of relationships between the generator and the keystream it produces. Linear feedback shift registers are widely used components in building keystream generators, as the sequences they produce are well understood. Many types of attack have been proposed for breaking various LFSR based stream ciphers. A recent attack type is known as an algebraic attack. Algebraic attacks transform the problem of recovering the key into a problem of solving multivariate system of equations, which eventually recover the internal state bits or the key bits. This type of attack has been shown to be effective on a number of regularly clocked LFSR based stream ciphers. In this thesis, algebraic attacks are extended to a number of well known stream ciphers where at least one LFSR in the system is irregularly clocked. Applying algebriac attacks to these ciphers has only been discussed previously in the open literature for LILI-128. In this thesis, algebraic attacks are first applied to keystream generators using stop-and go clocking. Four ciphers belonging to this group are investigated: the Beth-Piper stop-and-go generator, the alternating step generator, the Gollmann cascade generator and the eSTREAM candidate: the Pomaranch cipher. It is shown that algebraic attacks are very effective on the first three of these ciphers. Although no effective algebraic attack was found for Pomaranch, the algebraic analysis lead to some interesting findings including weaknesses that may be exploited in future attacks. Algebraic attacks are then applied to keystream generators using (p; q) clocking. Two well known examples of such ciphers, the step1/step2 generator and the self decimated generator are investigated. Algebraic attacks are shown to be very powerful attack in recovering the internal state of these generators. A more complex clocking mechanism than either stop-and-go or the (p; q) clocking keystream generators is known as mutual clock control. In mutual clock control generators, the LFSRs control the clocking of each other. Four well known stream ciphers belonging to this group are investigated with respect to algebraic attacks: the Bilateral-stop-and-go generator, A5/1 stream cipher, Alpha 1 stream cipher, and the more recent eSTREAM proposal, the MICKEY stream ciphers. Some theoretical results with regards to the complexity of algebraic attacks on these ciphers are presented. The algebraic analysis of these ciphers showed that generally, it is hard to generate the system of equations required for an algebraic attack on these ciphers. As the algebraic attack could not be applied directly on these ciphers, a different approach was used, namely guessing some bits of the internal state, in order to reduce the degree of the equations. Finally, an algebraic attack on Alpha 1 that requires only 128 bits of keystream to recover the 128 internal state bits is presented. An essential process associated with stream cipher proposals is key initialization. Many recently proposed stream ciphers use an algorithm to initialize the large internal state with a smaller key and possibly publicly known initialization vectors. The effect of key initialization on the performance of algebraic attacks is also investigated in this thesis. The relationships between the two have not been investigated before in the open literature. The investigation is conducted on Trivium and Grain-128, two eSTREAM ciphers. It is shown that the key initialization process has an effect on the success of algebraic attacks, unlike other conventional attacks. In particular, the key initialization process allows an attacker to firstly generate a small number of equations of low degree and then perform an algebraic attack using multiple keystreams. The effect of the number of iterations performed during key initialization is investigated. It is shown that both the number of iterations and the maximum number of initialization vectors to be used with one key should be carefully chosen. Some experimental results on Trivium and Grain-128 are then presented. Finally, the security with respect to algebraic attacks of the well known LILI family of stream ciphers, including the unbroken LILI-II, is investigated. These are irregularly clock- controlled nonlinear filtered generators. While the structure is defined for the LILI family, a particular paramater choice defines a specific instance. Two well known such instances are LILI-128 and LILI-II. The security of these and other instances is investigated to identify which instances are vulnerable to algebraic attacks. The feasibility of recovering the key bits using algebraic attacks is then investigated for both LILI- 128 and LILI-II. Algebraic attacks which recover the internal state with less effort than exhaustive key search are possible for LILI-128 but not for LILI-II. Given the internal state at some point in time, the feasibility of recovering the key bits is also investigated, showing that the parameters used in the key initialization process, if poorly chosen, can lead to a key recovery using algebraic attacks.
Resumo:
This paper uses a multivariate analysis to examine how countries‘ tax morale and institutional quality affect the shadow economy. The literature strongly emphasizes the quantitative importance of these factors in understanding the level of and changes in the shadow economy. Newly available data sources offer the unique opportunity to further illuminate a topic that has received increased attention. After controlling for a variety of potential factors, we find strong support that a higher tax morale and a higher institutional quality lead to a smaller shadow economy.
Resumo:
My research investigates why nouns are learned disproportionately more frequently than other kinds of words during early language acquisition (Gentner, 1982; Gleitman, et al., 2004). This question must be considered in the context of cognitive development in general. Infants have two major streams of environmental information to make meaningful: perceptual and linguistic. Perceptual information flows in from the senses and is processed into symbolic representations by the primitive language of thought (Fodor, 1975). These symbolic representations are then linked to linguistic input to enable language comprehension and ultimately production. Yet, how exactly does perceptual information become conceptualized? Although this question is difficult, there has been progress. One way that children might have an easier job is if they have structures that simplify the data. Thus, if particular sorts of perceptual information could be separated from the mass of input, then it would be easier for children to refer to those specific things when learning words (Spelke, 1990; Pylyshyn, 2003). It would be easier still, if linguistic input was segmented in predictable ways (Gentner, 1982; Gleitman, et al., 2004) Unfortunately the frequency of patterns in lexical or grammatical input cannot explain the cross-cultural and cross-linguistic tendency to favor nouns over verbs and predicates. There are three examples of this failure: 1) a wide variety of nouns are uttered less frequently than a smaller number of verbs and yet are learnt far more easily (Gentner, 1982); 2) word order and morphological transparency offer no insight when you contrast the sentence structures and word inflections of different languages (Slobin, 1973) and 3) particular language teaching behaviors (e.g. pointing at objects and repeating names for them) have little impact on children's tendency to prefer concrete nouns in their first fifty words (Newport, et al., 1977). Although the linguistic solution appears problematic, there has been increasing evidence that the early visual system does indeed segment perceptual information in specific ways before the conscious mind begins to intervene (Pylyshyn, 2003). I argue that nouns are easier to learn because their referents directly connect with innate features of the perceptual faculty. This hypothesis stems from work done on visual indexes by Zenon Pylyshyn (2001, 2003). Pylyshyn argues that the early visual system (the architecture of the "vision module") segments perceptual data into pre-conceptual proto-objects called FINSTs. FINSTs typically correspond to physical things such as Spelke objects (Spelke, 1990). Hence, before conceptualization, visual objects are picked out by the perceptual system demonstratively, like a finger pointing indicating ‘this’ or ‘that’. I suggest that this primitive system of demonstration elaborates on Gareth Evan's (1982) theory of nonconceptual content. Nouns are learnt first because their referents attract demonstrative visual indexes. This theory also explains why infants less often name stationary objects such as plate or table, but do name things that attract the focal attention of the early visual system, i.e., small objects that move, such as ‘dog’ or ‘ball’. This view leaves open the question how blind children learn words for visible objects and why children learn category nouns (e.g. 'dog'), rather than proper nouns (e.g. 'Fido') or higher taxonomic distinctions (e.g. 'animal').
Resumo:
Traffic control at road junctions is one of the major concerns in most metropolitan cities. Controllers of various approaches are available and the required control action is the effective green-time assigned to each traffic stream within a traffic-light cycle. The application of fuzzy logic provides the controller with the capability to handle uncertain natures of the system, such as drivers’ behaviour and random arrivals of vehicles. When turning traffic is allowed at the junction, the number of phases in the traffic-light cycle increases. The additional input variables inevitably complicate the controller and hence slow down the decision-making process, which is critical in this real-time control problem. In this paper, a hierarchical fuzzy logic controller is proposed to tackle this traffic control problem at a 2-way road junction with turning traffic. The two levels of fuzzy logic controllers devise the minimum effective green-time and fine-tune it respectively at each phase of a traffic-light cycle. The complexity of the controller at each level is reduced with smaller rule-set. The performance of this hierarchical controller is examined by comparison with a fixed-time controller under various traffic conditions. Substantial delay reduction has been achieved as a result and the performance and limitation of the controller will be discussed.
Resumo:
Many infrastructure and necessity systems such as electricity and telecommunication in Europe and the Northern America were used to be operated as monopolies, if not state-owned. However, they have now been disintegrated into a group of smaller companies managed by different stakeholders. Railways are no exceptions. Since the early 1980s, there have been reforms in the shape of restructuring of the national railways in different parts of the world. Continuous refinements are still conducted to allow better utilisation of railway resources and quality of service. There has been a growing interest for the industry to understand the impacts of these reforms on the operation efficiency and constraints. A number of post-evaluations have been conducted by analysing the performance of the stakeholders on their profits (Crompton and Jupe 2003), quality of train service (Shaw 2001) and engineering operations (Watson 2001). Results from these studies are valuable for future improvement in the system, followed by a new cycle of post-evaluations. However, direct implementation of these changes is often costly and the consequences take a long period of time (e.g. years) to surface. With the advance of fast computing technologies, computer simulation is a cost-effective means to evaluate a hypothetical change in a system prior to actual implementation. For example, simulation suites have been developed to study a variety of traffic control strategies according to sophisticated models of train dynamics, traction and power systems (Goodman, Siu and Ho 1998, Ho and Yeung 2001). Unfortunately, under the restructured railway environment, it is by no means easy to model the complex behaviour of the stakeholders and the interactions between them. Multi-agent system (MAS) is a recently developed modelling technique which may be useful in assisting the railway industry to conduct simulations on the restructured railway system. In MAS, a real-world entity is modelled as a software agent that is autonomous, reactive to changes, able to initiate proactive actions and social communicative acts. It has been applied in the areas of supply-chain management processes (García-Flores, Wang and Goltz 2000, Jennings et al. 2000a, b) and e-commerce activities (Au, Ngai and Parameswaran 2003, Liu and You 2003), in which the objectives and behaviour of the buyers and sellers are captured by software agents. It is therefore beneficial to investigate the suitability or feasibility of applying agent modelling in railways and the extent to which it might help in developing better resource management strategies. This paper sets out to examine the benefits of using MAS to model the resource management process in railways. Section 2 first describes the business environment after the railway 2 Modelling issues on the railway resource management process using MAS reforms. Then the problems emerge from the restructuring process are identified in section 3. Section 4 describes the realisation of a MAS for railway resource management under the restructured scheme and the feasible studies expected from the model.
Resumo:
Purpose: To compare subjective blur limits for cylinder and defocus. ---------- Method: Blur was induced with a deformable, adaptive-optics mirror when either the subjects’ own astigmatisms were corrected or when both astigmatisms and higher-order aberrations were corrected. Subjects were cyclopleged and had 5 mm artificial pupils. Black letter targets (0.1, 0.35 and 0.6 logMAR) were presented on white backgrounds. Results: For ten subjects, blur limits were approximately 50% greater for cylinder than for defocus (in diopters). While there were considerable effects of axis for individuals, overall this was not strong, with the 0° (or 180°) axis having about 20% greater limits than oblique axes. In a second experiment with text (equivalent in angle to N10 print at 40 cm distance), cylinder blur limits for 6 subjects were approximately 30% greater than those for defocus; this percentage was slightly smaller than for the three letters. Blur limits of the text were intermediate between those of 0.35 logMAR and 0.6 logMAR letters. Extensive blur limit measurements for one subject with single letters did not show expected interactions between target detail orientation and cylinder axis. ---------- Conclusion: Subjective blur limits for cylinder are 30%-50% greater than those for defocus, with the overall influence of cylinder axis being 20%.
Resumo:
Purpose: We compared subjective blur limits for defocus and the higher-order aberrations of coma, trefoil, and spherical aberration. ---------- Methods: Spherical aberration was presented in both Zernike and Seidel forms. Black letter targets (0.1, 0.35, and 0.6 logMAR) on white backgrounds were blurred using an adaptive optics system for six subjects under cycloplegia with 5 mm artificial pupils. Three blur criteria of just noticeable, just troublesome, and just objectionable were used.---------- Results: When expressed as wave aberration coefficients, the just noticeable blur limits for coma and trefoil were similar to those for defocus, whereas the just noticeable limits for Zernike spherical aberration and Seidel spherical aberration (the latter given as an “rms equivalent”) were considerably smaller and larger, respectively, than defocus limits.---------- Conclusions: Blur limits increased more quickly for the higher order aberrations than for defocus as the criterion changed from just noticeable to just troublesome and then to just objectionable.
Resumo:
International research has found that domestic violence is a significant barrier to accessing and sustaining work (Lloyd and Taluc 1999, 385; Browne et al. 1999, 398). In the Australian context, the Bureau of Crime Statistics and Research reports that between 6 and 9 per cent of Australian women aged 18 and over are physically assaulted each year and that more than half of all women in Australia experience sexual or physical violence across their adult lifetime. Such behaviour has been estimated to cost $8.1 billion, of which $4.4 billion is estimated to be borne by the victims themselves, $1.2 billion by the general community and smaller amounts by friends and family and various levels of government (Access Economics 2004). This assessment underestimates the costs of domestic violence in terms of the inability of those who have experienced domestic violence to move into and secure sustainable employment options. Despite these statistics there is a dearth of Australian research focussing on the link between domestic violence and its impact on long-term sustainable employment for those who have been subjected to such violence. This paper explores the issue of domestic violence and access to work opportunities. In so doing, it links the work of Gianakos (1999) and her Career Development theory with that of Bandura‘s (1989) Social Cognitive Career Theory to develop a framework which would provide a pathway to enable those who have suffered domestic violence to achieve sustainable employment and economic independence.
Resumo:
The present rate of technological advance continues to place significant demands on data storage devices. The sheer amount of digital data being generated each year along with consumer expectations, fuels these demands. At present, most digital data is stored magnetically, in the form of hard disk drives or on magnetic tape. The increase in areal density (AD) of magnetic hard disk drives over the past 50 years has been of the order of 100 million times, and current devices are storing data at ADs of the order of hundreds of gigabits per square inch. However, it has been known for some time that the progress in this form of data storage is approaching fundamental limits. The main limitation relates to the lower size limit that an individual bit can have for stable storage. Various techniques for overcoming these fundamental limits are currently the focus of considerable research effort. Most attempt to improve current data storage methods, or modify these slightly for higher density storage. Alternatively, three dimensional optical data storage is a promising field for the information storage needs of the future, offering very high density, high speed memory. There are two ways in which data may be recorded in a three dimensional optical medium; either bit-by-bit (similar in principle to an optical disc medium such as CD or DVD) or by using pages of bit data. Bit-by-bit techniques for three dimensional storage offer high density but are inherently slow due to the serial nature of data access. Page-based techniques, where a two-dimensional page of data bits is written in one write operation, can offer significantly higher data rates, due to their parallel nature. Holographic Data Storage (HDS) is one such page-oriented optical memory technique. This field of research has been active for several decades, but with few commercial products presently available. Another page-oriented optical memory technique involves recording pages of data as phase masks in a photorefractive medium. A photorefractive material is one by which the refractive index can be modified by light of the appropriate wavelength and intensity, and this property can be used to store information in these materials. In phase mask storage, two dimensional pages of data are recorded into a photorefractive crystal, as refractive index changes in the medium. A low-intensity readout beam propagating through the medium will have its intensity profile modified by these refractive index changes and a CCD camera can be used to monitor the readout beam, and thus read the stored data. The main aim of this research was to investigate data storage using phase masks in the photorefractive crystal, lithium niobate (LiNbO3). Firstly the experimental methods for storing the two dimensional pages of data (a set of vertical stripes of varying lengths) in the medium are presented. The laser beam used for writing, whose intensity profile is modified by an amplitudemask which contains a pattern of the information to be stored, illuminates the lithium niobate crystal and the photorefractive effect causes the patterns to be stored as refractive index changes in the medium. These patterns are read out non-destructively using a low intensity probe beam and a CCD camera. A common complication of information storage in photorefractive crystals is the issue of destructive readout. This is a problem particularly for holographic data storage, where the readout beam should be at the same wavelength as the beam used for writing. Since the charge carriers in the medium are still sensitive to the read light field, the readout beam erases the stored information. A method to avoid this is by using thermal fixing. Here the photorefractive medium is heated to temperatures above 150�C; this process forms an ionic grating in the medium. This ionic grating is insensitive to the readout beam and therefore the information is not erased during readout. A non-contact method for determining temperature change in a lithium niobate crystal is presented in this thesis. The temperature-dependent birefringent properties of the medium cause intensity oscillations to be observed for a beam propagating through the medium during a change in temperature. It is shown that each oscillation corresponds to a particular temperature change, and by counting the number of oscillations observed, the temperature change of the medium can be deduced. The presented technique for measuring temperature change could easily be applied to a situation where thermal fixing of data in a photorefractive medium is required. Furthermore, by using an expanded beam and monitoring the intensity oscillations over a wide region, it is shown that the temperature in various locations of the crystal can be monitored simultaneously. This technique could be used to deduce temperature gradients in the medium. It is shown that the three dimensional nature of the recording medium causes interesting degradation effects to occur when the patterns are written for a longer-than-optimal time. This degradation results in the splitting of the vertical stripes in the data pattern, and for long writing exposure times this process can result in the complete deterioration of the information in the medium. It is shown in that simply by using incoherent illumination, the original pattern can be recovered from the degraded state. The reason for the recovery is that the refractive index changes causing the degradation are of a smaller magnitude since they are induced by the write field components scattered from the written structures. During incoherent erasure, the lower magnitude refractive index changes are neutralised first, allowing the original pattern to be recovered. The degradation process is shown to be reversed during the recovery process, and a simple relationship is found relating the time at which particular features appear during degradation and recovery. A further outcome of this work is that the minimum stripe width of 30 ìm is required for accurate storage and recovery of the information in the medium, any size smaller than this results in incomplete recovery. The degradation and recovery process could be applied to an application in image scrambling or cryptography for optical information storage. A two dimensional numerical model based on the finite-difference beam propagation method (FD-BPM) is presented and used to gain insight into the pattern storage process. The model shows that the degradation of the patterns is due to the complicated path taken by the write beam as it propagates through the crystal, and in particular the scattering of this beam from the induced refractive index structures in the medium. The model indicates that the highest quality pattern storage would be achieved with a thin 0.5 mm medium; however this type of medium would also remove the degradation property of the patterns and the subsequent recovery process. To overcome the simplistic treatment of the refractive index change in the FD-BPM model, a fully three dimensional photorefractive model developed by Devaux is presented. This model shows significant insight into the pattern storage, particularly for the degradation and recovery process, and confirms the theory that the recovery of the degraded patterns is possible since the refractive index changes responsible for the degradation are of a smaller magnitude. Finally, detailed analysis of the pattern formation and degradation dynamics for periodic patterns of various periodicities is presented. It is shown that stripe widths in the write beam of greater than 150 ìm result in the formation of different types of refractive index changes, compared with the stripes of smaller widths. As a result, it is shown that the pattern storage method discussed in this thesis has an upper feature size limit of 150 ìm, for accurate and reliable pattern storage.
Resumo:
Since its initial proposal in 1998, alkaline hydrothermal processing has rapidly become an established technology for the production of titanate nanostructures. This simple, highly reproducible process has gained a strong research following since its conception. However, complete understanding and elucidation of nanostructure phase and formation have not yet been achieved. Without fully understanding phase, formation, and other important competing effects of the synthesis parameters on the final structure, the maximum potential of these nanostructures cannot be obtained. Therefore this study examined the influence of synthesis parameters on the formation of titanate nanostructures produced by alkaline hydrothermal treatment. The parameters included alkaline concentration, hydrothermal temperature, the precursor material‘s crystallite size and also the phase of the titanium dioxide precursor (TiO2, or titania). The nanostructure‘s phase and morphology was analysed using X-ray diffraction (XRD), Raman spectroscopy and transmission electron microscopy. X-ray photoelectron spectroscopy (XPS), dynamic light scattering (non-invasive backscattering), nitrogen sorption, and Rietveld analysis were used to determine phase, for particle sizing, surface area determinations, and establishing phase concentrations, respectively. This project rigorously examined the effect of alkaline concentration and hydrothermal temperature on three commercially sourced and two self-prepared TiO2 powders. These precursors consisted of both pure- or mixed-phase anatase and rutile polymorphs, and were selected to cover a range of phase concentrations and crystallite sizes. Typically, these precursors were treated with 5–10 M sodium hydroxide (NaOH) solutions at temperatures between 100–220 °C. Both nanotube and nanoribbon morphologies could be produced depending on the combination of these hydrothermal conditions. Both titania and titanate phases are comprised of TiO6 units which are assembled in different combinations. The arrangement of these atoms affects the binding energy between the Ti–O bonds. Raman spectroscopy and XPS were therefore employed in a preliminary study of phase determination for these materials. The change in binding energy from a titania to a titanate binding energy was investigated in this study, and the transformation of titania precursor into nanotubes and titanate nanoribbons was directly observed by these methods. Evaluation of the Raman and XPS results indicated a strengthening in the binding energies of both the Ti (2p3/2) and O (1s) bands which correlated to an increase in strength and decrease in resolution of the characteristic nanotube doublet observed between 320 and 220 cm.1 in the Raman spectra of these products. The effect of phase and crystallite size on nanotube formation was examined over a series of temperatures (100.200 �‹C in 20 �‹C increments) at a set alkaline concentration (7.5 M NaOH). These parameters were investigated by employing both pure- and mixed- phase precursors of anatase and rutile. This study indicated that both the crystallite size and phase affect nanotube formation, with rutile requiring a greater driving force (essentially �\harsher. hydrothermal conditions) than anatase to form nanotubes, where larger crystallites forms of the precursor also appeared to impede nanotube formation slightly. These parameters were further examined in later studies. The influence of alkaline concentration and hydrothermal temperature were systematically examined for the transformation of Degussa P25 into nanotubes and nanoribbons, and exact conditions for nanostructure synthesis were determined. Correlation of these data sets resulted in the construction of a morphological phase diagram, which is an effective reference for nanostructure formation. This morphological phase diagram effectively provides a .recipe book�e for the formation of titanate nanostructures. Morphological phase diagrams were also constructed for larger, near phase-pure anatase and rutile precursors, to further investigate the influence of hydrothermal reaction parameters on the formation of titanate nanotubes and nanoribbons. The effects of alkaline concentration, hydrothermal temperature, crystallite phase and size are observed when the three morphological phase diagrams are compared. Through the analysis of these results it was determined that alkaline concentration and hydrothermal temperature affect nanotube and nanoribbon formation independently through a complex relationship, where nanotubes are primarily affected by temperature, whilst nanoribbons are strongly influenced by alkaline concentration. Crystallite size and phase also affected the nanostructure formation. Smaller precursor crystallites formed nanostructures at reduced hydrothermal temperature, and rutile displayed a slower rate of precursor consumption compared to anatase, with incomplete conversion observed for most hydrothermal conditions. The incomplete conversion of rutile into nanotubes was examined in detail in the final study. This study selectively examined the kinetics of precursor dissolution in order to understand why rutile incompletely converted. This was achieved by selecting a single hydrothermal condition (9 M NaOH, 160 °C) where nanotubes are known to form from both anatase and rutile, where the synthesis was quenched after 2, 4, 8, 16 and 32 hours. The influence of precursor phase on nanostructure formation was explicitly determined to be due to different dissolution kinetics; where anatase exhibited zero-order dissolution and rutile second-order. This difference in kinetic order cannot be simply explained by the variation in crystallite size, as the inherent surface areas of the two precursors were determined to have first-order relationships with time. Therefore, the crystallite size (and inherent surface area) does not affect the overall kinetic order of dissolution; rather, it determines the rate of reaction. Finally, nanostructure formation was found to be controlled by the availability of dissolved titanium (Ti4+) species in solution, which is mediated by the dissolution kinetics of the precursor.
Resumo:
While in many travel situations consumers have an almost limitless range of destinations to choose from, their actual decision set will usually only comprise between two and six destinations. One of the greatest challenges facing destination marketers is positioning their destination, against the myriad of competing places that offer similar features, into consumer decision sets. Since positioning requires a narrow focus, marketing communications must present a succinct and meaningful proposition, the selection of which is often problematic for destination marketing organisations (DMO), which deal with a diverse and often eclectic range of attributes in addition to numerous self-interested and demanding stakeholders. This paper reports the application of two qualitative techniques used to explore the range of cognitive attributes, consequences and personal values that represent potential positioning opportunities in the context of short break holidays. The Repertory Test is an effective technique for understanding the salient attributes used by a traveller to differentiate destinations, while Laddering Analysis enables the researcher to explore the smaller set of personal values guiding such decision making. A key finding of the research was that while individuals might vary in their repertoire of salient attributes, there was a commonality of shared consequences and values.
Resumo:
We aim to demonstrate unaided visual 3D pose estimation and map reconstruction using both monocular and stereo vision techniques. To date, our work has focused on collecting data from Unmanned Aerial Vehicles, which generates a number of significant issues specific to the application. Such issues include scene reconstruction degeneracy from planar data, poor structure initialisation for monocular schemes and difficult 3D reconstruction due to high feature covariance. Most modern Visual Odometry (VO) and related SLAM systems make use of a number of sensors to inform pose and map generation, including laser range-finders, radar, inertial units and vision [1]. By fusing sensor inputs, the advantages and deficiencies of each sensor type can be handled in an efficient manner. However, many of these sensors are costly and each adds to the complexity of such robotic systems. With continual advances in the abilities, small size, passivity and low cost of visual sensors along with the dense, information rich data that they provide our research focuses on the use of unaided vision to generate pose estimates and maps from robotic platforms. We propose that highly accurate (�5cm) dense 3D reconstructions of large scale environments can be obtained in addition to the localisation of the platform described in other work [2]. Using images taken from cameras, our algorithm simultaneously generates an initial visual odometry estimate and scene reconstruction from visible features, then passes this estimate to a bundle-adjustment routine to optimise the solution. From this optimised scene structure and the original images, we aim to create a detailed, textured reconstruction of the scene. By applying such techniques to a unique airborne scenario, we hope to expose new robotic applications of SLAM techniques. The ability to obtain highly accurate 3D measurements of an environment at a low cost is critical in a number of agricultural and urban monitoring situations. We focus on cameras as such sensors are small, cheap and light-weight and can therefore be deployed in smaller aerial vehicles. This, coupled with the ability of small aerial vehicles to fly near to the ground in a controlled fashion, will assist in increasing the effective resolution of the reconstructed maps.
Resumo:
An experimental set-up was used to visually observe the characteristics of bubbles as they moved up a column holding xanthan gum crystal suspensions. The bubble rise characteristics in xanthan gum solutions with crystal suspension are presented in this paper. The suspensions were made by using different concentrations of xanthan gum solutions with 0.23 mm mean diameter polystyrene crystal particles. The influence of the dimensionless quantities; namely the Reynolds number, Re, the Weber number, We, and the drag co-efficient, cd, are identified for the determination of the bubble rise velocity. The effect of these dimensionless groups together with the Eötvös number, Eo, the Froude number, Fr, and the bubble deformation parameter, D, on the bubble rise velocity and bubble trajectory are analysed. The experimental results show that the average bubble velocity increases with the increase in bubble volume for xanthan gum crystal suspensions. At high We, Eo and Re, bubbles are spherical-capped and their velocities are found to be very high. At low We and Eo, the surface tension force is significant compared to the inertia force. The viscous forces were shown to have no substantial effect on the bubble rise velocity for 45 < Re < 299. The results show that the drag co-efficient decreases with the increase in bubble velocity and Re. The trajectory analysis showed that small bubbles followed a zigzag motion while larger bubbles followed a spiral motion. The smaller bubbles experienced less horizontal motion in crystal suspended xanthan gum solutions while larger bubbles exhibited a greater degree of spiral motion than those seen in the previous studies on the bubble rise in xanthan gum solutions without crystal.
Resumo:
Purpose: Graduated driver licensing (GDL) has been introduced in numerous jurisdictions in Australia and internationally in an attempt to ameliorate the significantly greater risk of death and injury for young novice drivers arising from road crashes. The GDL program in Queensland, Australia, was extensively modified in July 2007. This paper reports the driving and licensing experiences of Learner drivers progressing through the current-GDL program, and compares them to the experiences of Learners who progressed through the former-GDL program. ----- ----- Method: Young drivers (n = 1032, 609 females, 423 males) aged 17 to 19 years (M = 17.43, SD = 0.67) were recruited as they progressed from a Learner to a Provisional driver’s licence. They completed a survey exploring their sociodemographic characteristics, driving and licensing experiences as a Learner. Key measures for a subsample (n = 183) of the current-GDL drivers were compared with the former-GDL drivers (n = 149) via t-tests and chi-square analyses. ----- ----- Results: As expected, Learner drivers progressing through the current-GDL program gained significantly more driving practice than those in the former program, which was more likely to be provided by mothers than in the past. Female learners in the current-GDL program reported less difficulty obtaining supervision than those in the former program. The number of attempts needed to pass the practical driving assessment did not change, nor did the amount of professional supervision. The current-GDL Learners held their licence for a significantly longer duration than those in the former program, with the majority reporting that their Logbook entries were accurate on the whole. Compared to those in the former program, a significantly smaller proportion of male current-GDL Learners reported being detected for a driving offence while the females reported significantly lower crash involvement. Most current-GDL drivers reported undertaking their supervised practice at the end of the Learner period. ----- ----- Conclusions: The enhancements to the GDL program in Queensland appear to have achieved many of their intended results. The current-GDL learners participating in the study reported obtaining a significantly greater amount of supervised driving experience compared to former-GDL learners. Encouragingly, the current-GDL Learners did not report any greater difficulty in obtaining supervised driving practice, and there was a decline in the proportion of current-GDL Learners engaging in unsupervised driving. In addition, the majority of Learners do not appear to be attempting to subvert logbook recording requirements, as evidenced by high rates of self-reported logbook accuracy. The results have implications for the development and the evaluation of GDL programs in Australia and around the world.