960 resultados para European copyright code


Relevância:

30.00% 30.00%

Publicador:

Resumo:

A fundamental step in understanding the effects of irradiation on metallic uranium and uranium dioxide ceramic fuels, or any material, must start with the nature of radiation damage on the atomic level. The atomic damage displacement results in a multitude of defects that influence the fuel performance. Nuclear reactions are coupled, in that changing one variable will alter others through feedback. In the field of fuel performance modeling, these difficulties are addressed through the use of empirical models rather than models based on first principles. Empirical models can be used as a predictive code through the careful manipulation of input variables for the limited circumstances that are closely tied to the data used to create the model. While empirical models are efficient and give acceptable results, these results are only applicable within the range of the existing data. This narrow window prevents modeling changes in operating conditions that would invalidate the model as the new operating conditions would not be within the calibration data set. This work is part of a larger effort to correct for this modeling deficiency. Uranium dioxide and metallic uranium fuels are analyzed through a kinetic Monte Carlo code (kMC) as part of an overall effort to generate a stochastic and predictive fuel code. The kMC investigations include sensitivity analysis of point defect concentrations, thermal gradients implemented through a temperature variation mesh-grid, and migration energy values. In this work, fission damage is primarily represented through defects on the oxygen anion sublattice. Results were also compared between the various models. Past studies of kMC point defect migration have not adequately addressed non-standard migration events such as clustering and dissociation of vacancies. As such, the General Utility Lattice Program (GULP) code was utilized to generate new migration energies so that additional non-migration events could be included into kMC code in the future for more comprehensive studies. Defect energies were calculated to generate barrier heights for single vacancy migration, clustering and dissociation of two vacancies, and vacancy migration while under the influence of both an additional oxygen and uranium vacancy.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Thèse réalisée en cotutelle avec l'université Paris1-Sorbonne

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Code patterns, including programming patterns and design patterns, are good references for programming language feature improvement and software re-engineering. However, to our knowledge, no existing research has attempted to detect code patterns based on code clone detection technology. In this study, we build upon the previous work and propose to detect and analyze code patterns from a collection of open source projects using NiPAT technology. Because design patterns are most closely associated with object-oriented languages, we choose Java and Python projects to conduct our study. The tool we use for detecting patterns is NiPAT, a pattern detecting tool originally developed for the TXL programming language based on the NiCad clone detector. We extend NiPAT for the Java and Python programming languages. Then, we try to identify all the patterns from the pattern report and classify them into several different categories. In the end of the study, we analyze all the patterns and compare the differences between Java and Python patterns.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Background: The role of common, low to intermediate risk alleles in breast cancer need to be examined due to their relatively high prevalence. Among many cellular pathways, replication has a pivotal role in cell division and frequently targeted during carcinogenesis. Replication is governed by a host of genes involved in a number of different pathways. This study investigates the effects of replication-gene variants in relation to breast cancer and how this relationship is affected by ethnicity, menopausal status and breast tumour subtype. Methods: Data from a case-control study with 997 incident breast cancer cases and 1,050 age frequency matched controls in Vancouver, British Columbia and Kingston, Ontario were used. Unconditional logistic regression was used to calculate odds ratios between 45 replication gene variants and breast cancer risk, assuming an additive genetic model adjusted for age and centre, presented for Europeans and East Asians separately. Polytomous logistic regression was used to assess odds ratios between each SNP and four breast cancer subtypes defined by hormone receptor status among Europeans. All analyses were stratified by menopausal status. The Benjamini–Hochberg false discovery rate (FDR) was used to address multiple comparisons. Results: Among Europeans, the SNPs in FGFR2, TOX3 and 11q13 loci were associated with breast cancer after controlling for multiple comparisons. Test of heterogeneity showed the SNPs rs1045185, rs4973768, rs672888, rs1219648, rs2420946 among Europeans and rs889312 among East Asians conferred differential risk across the tumour subtypes. Conclusions: Specific SNPs in replication genes were associated with breast cancer, and the risk level differed by tumour subtype defined by ER/PR/Her2 status and ethnicity.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Mature berries of Pinot Noir grapevines were sampled across a latitudinal gradient in Europe, from southern Spain to central Germany. Our aim was to study the influence of latitude-dependent environmental factors on the metabolite composition (mainly phenolic compounds) of berry skins. Solar radiation variables were positively correlated with flavonols and flavanonols and, to a lesser extent, with stilbenes and cinnamic acids. The daily means of global and erythematic UV solar radiation over long periods (bud break-veraison, bud break-harvest, and veraison-harvest), and the doses and daily means in shorter development periods (5–10 days before veraison and harvest) were the variables best correlated with the phenolic profile. The ratio between trihydroxylated and monohydroxylated flavonols, which was positively correlated with antioxidant capacity, was the berry skin variable best correlated with those radiation variables. Total flavanols and total anthocyanins did not show any correlation with radiation variables. Air temperature, degree days, rainfall, and aridity indices showed fewer correlations with metabolite contents than radiation. Moreover, the latter correlations were restricted to the period veraison-harvest, where radiation, temperature, and water availability variables were correlated, making it difficult to separate the possible individual effects of each type of variable. The data show that managing environmental factors, in particular global and UV radiation, through cultural practices during specific development periods, can be useful to promote the synthesis of valuable nutraceuticals and metabolites that influence wine quality.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Chaque année, le piratage mondial de la musique coûte plusieurs milliards de dollars en pertes économiques, pertes d’emplois et pertes de gains des travailleurs ainsi que la perte de millions de dollars en recettes fiscales. La plupart du piratage de la musique est dû à la croissance rapide et à la facilité des technologies actuelles pour la copie, le partage, la manipulation et la distribution de données musicales [Domingo, 2015], [Siwek, 2007]. Le tatouage des signaux sonores a été proposé pour protéger les droit des auteurs et pour permettre la localisation des instants où le signal sonore a été falsifié. Dans cette thèse, nous proposons d’utiliser la représentation parcimonieuse bio-inspirée par graphe de décharges (spikegramme), pour concevoir une nouvelle méthode permettant la localisation de la falsification dans les signaux sonores. Aussi, une nouvelle méthode de protection du droit d’auteur. Finalement, une nouvelle attaque perceptuelle, en utilisant le spikegramme, pour attaquer des systèmes de tatouage sonore. Nous proposons tout d’abord une technique de localisation des falsifications (‘tampering’) des signaux sonores. Pour cela nous combinons une méthode à spectre étendu modifié (‘modified spread spectrum’, MSS) avec une représentation parcimonieuse. Nous utilisons une technique de poursuite perceptive adaptée (perceptual marching pursuit, PMP [Hossein Najaf-Zadeh, 2008]) pour générer une représentation parcimonieuse (spikegramme) du signal sonore d’entrée qui est invariante au décalage temporel [E. C. Smith, 2006] et qui prend en compte les phénomènes de masquage tels qu’ils sont observés en audition. Un code d’authentification est inséré à l’intérieur des coefficients de la représentation en spikegramme. Puis ceux-ci sont combinés aux seuils de masquage. Le signal tatoué est resynthétisé à partir des coefficients modifiés, et le signal ainsi obtenu est transmis au décodeur. Au décodeur, pour identifier un segment falsifié du signal sonore, les codes d’authentification de tous les segments intacts sont analysés. Si les codes ne peuvent être détectés correctement, on sait qu’alors le segment aura été falsifié. Nous proposons de tatouer selon le principe à spectre étendu (appelé MSS) afin d’obtenir une grande capacité en nombre de bits de tatouage introduits. Dans les situations où il y a désynchronisation entre le codeur et le décodeur, notre méthode permet quand même de détecter des pièces falsifiées. Par rapport à l’état de l’art, notre approche a le taux d’erreur le plus bas pour ce qui est de détecter les pièces falsifiées. Nous avons utilisé le test de l’opinion moyenne (‘MOS’) pour mesurer la qualité des systèmes tatoués. Nous évaluons la méthode de tatouage semi-fragile par le taux d’erreur (nombre de bits erronés divisé par tous les bits soumis) suite à plusieurs attaques. Les résultats confirment la supériorité de notre approche pour la localisation des pièces falsifiées dans les signaux sonores tout en préservant la qualité des signaux. Ensuite nous proposons une nouvelle technique pour la protection des signaux sonores. Cette technique est basée sur la représentation par spikegrammes des signaux sonores et utilise deux dictionnaires (TDA pour Two-Dictionary Approach). Le spikegramme est utilisé pour coder le signal hôte en utilisant un dictionnaire de filtres gammatones. Pour le tatouage, nous utilisons deux dictionnaires différents qui sont sélectionnés en fonction du bit d’entrée à tatouer et du contenu du signal. Notre approche trouve les gammatones appropriés (appelés noyaux de tatouage) sur la base de la valeur du bit à tatouer, et incorpore les bits de tatouage dans la phase des gammatones du tatouage. De plus, il est montré que la TDA est libre d’erreur dans le cas d’aucune situation d’attaque. Il est démontré que la décorrélation des noyaux de tatouage permet la conception d’une méthode de tatouage sonore très robuste. Les expériences ont montré la meilleure robustesse pour la méthode proposée lorsque le signal tatoué est corrompu par une compression MP3 à 32 kbits par seconde avec une charge utile de 56.5 bps par rapport à plusieurs techniques récentes. De plus nous avons étudié la robustesse du tatouage lorsque les nouveaux codec USAC (Unified Audion and Speech Coding) à 24kbps sont utilisés. La charge utile est alors comprise entre 5 et 15 bps. Finalement, nous utilisons les spikegrammes pour proposer trois nouvelles méthodes d’attaques. Nous les comparons aux méthodes récentes d’attaques telles que 32 kbps MP3 et 24 kbps USAC. Ces attaques comprennent l’attaque par PMP, l’attaque par bruit inaudible et l’attaque de remplacement parcimonieuse. Dans le cas de l’attaque par PMP, le signal de tatouage est représenté et resynthétisé avec un spikegramme. Dans le cas de l’attaque par bruit inaudible, celui-ci est généré et ajouté aux coefficients du spikegramme. Dans le cas de l’attaque de remplacement parcimonieuse, dans chaque segment du signal, les caractéristiques spectro-temporelles du signal (les décharges temporelles ;‘time spikes’) se trouvent en utilisant le spikegramme et les spikes temporelles et similaires sont remplacés par une autre. Pour comparer l’efficacité des attaques proposées, nous les comparons au décodeur du tatouage à spectre étendu. Il est démontré que l’attaque par remplacement parcimonieux réduit la corrélation normalisée du décodeur de spectre étendu avec un plus grand facteur par rapport à la situation où le décodeur de spectre étendu est attaqué par la transformation MP3 (32 kbps) et 24 kbps USAC.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study of the veranda as seen through the eyes of Lady Maria Nugent and Michael Scott, alias Tom Cringle, clearly demonstrates the important role that the piazza, as it was then more commonly known, played in the life of early nineteenth century Caribbean colonial society. The popularity of the veranda throughout the region, in places influenced by different European as well as African cultures, and among all classes of people, suggests that the appeal of this typical feature was based on something more than architectural fashion. A place of relative comfort in hot weather, the veranda is also a space at the interface of indoors and outdoors which allows for a wide variety of uses, for solitary or small or large group activities, many of which were noted by Nugent and Scott. Quintessentially, the veranda is a place in which to relax and take pleasure, not least of which is the enjoyment of the prospect, be it a panoramic view, a peaceful garden or a lively street scene. Despite the great changes in the nature of society, in the Caribbean and in many other parts of the world, the veranda and related structures such as the balcony continue to play at least as important a role in daily life as they did two centuries ago. The veranda of today’s Californian or Australian bungalow, and the balcony of the apartment block in the residential area of the modern city are among the contemporary equivalents of the lower and upper piazzas of Lady Nugent’s and Tom Cringle’s day.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper investigates the effectiveness of virtual product placement as a marketing tool by examining the relationship between brand recall and recognition and virtual product placement. It also aims to address a gap in the existing academic literature by focusing on the impact of product placement on recall and recognition of new brands. The growing importance of product placement is discussed and a review of previous research on product placement and virtual product placement is provided. The research methodology used to study the recall and recognition effects of virtual product placement are described and key findings presented. Finally, implications are discussed and recommendations for future research provided.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A range of influences, technical and organizational, has encouraged the wide spread adaption of Enterprise Systems (ES). Nevertheless, there is a growing consensus that Enterprise Systems have in the many cases failed to provide the expected benefits to organizations. This paper presents ongoing research, which analyzes the benefits realization approach of the Queensland Government. This approach applies a modified Balance Scorecard. First, history and background of Queensland Government’s Enterprise Systems initiative is introduced. Second, the most common reasons for ES under performance are related. Third, relevant performance measurement models and the Balanced Scorecard in particular are discussed. Finally, the Queensland Government initiative is evaluated in light of this overview of current work in the area. In the current and future work, the authors aim to use their active involvement in Queensland Government’s benefits realization initiative for an Action Research based project investigating the appropriateness of the Balanced Scorecard for the purposes of Enterprise Systems benefits realization.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There have only been a small number of applications of consumer decision set theory to holiday destination choice, and these studies have tended to rely on a single cross sectional snapshot of research participants’ stated preferences. Very little has been reported on the relationship between stated destination preferences and actual travel, or changes in decision set composition over time. The paper presents a rare longitudinal examination of destination decision sets, in the context of short break holidays by car in Queensland, Australia. Two questionnaires were administered, three months apart. The first identified destination preferences while the second examined actual travel and revisited destination preferences. In relation to the conference theme, there was very little change in consumer preferences towards the competitive set of destinations over the three month period. A key implication for the destination of interest, which, in an attempt to change market perceptions, launched a new brand campaign during the period of the project, is that a long term investment in a consistent brand message will be required to change market perceptions. The results go some way to support the proposition that the positioning of a destination into a consumer’s decision set represents a source of competitive advantage.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The occurrence and levels of airborne polycyclic aromatic hydrocarbons and volatile organic compounds in selected non-industrial environments in Brisbane have been investigated as part of an integrated indoor air quality assessment program. The most abundant and most frequently encountered compounds include, nonanal, decanal, texanol, phenol, 2-ethyl-1-hexanol, ethanal, naphthalene, 2,6-tert-butyl-4-methyl-phenol (BHT), salicylaldehyde, toluene, hexanal, benzaldehyde, styrene, ethyl benzene, o-, m- and pxylenes, benzene, n-butanol, 1,2-propandiol, and n-butylacetate. Many of the 64 compounds usually included in the European Collaborative Action method of TVOC analysis were below detection limits in the samples analysed. In order to extract maximum amount of information from the data collected, multivariate data projection methods have been employed. The implications of the information extracted on source identification and exposure control are discussed.