999 resultados para peer reactions
Resumo:
Barrierless chemical reactions have often been modeled as a Brownian motion on a one-dimensional harmonic potential energy surface with a position-dependent reaction sink or window located near the minimum of the surface. This simple (but highly successful) description leads to a nonexponential survival probability only at small to intermediate times but exponential decay in the long-time limit. However, in several reactive events involving proteins and glasses, the reactions are found to exhibit a strongly nonexponential (power law) decay kinetics even in the long time. In order to address such reactions, here, we introduce a model of barrierless chemical reaction where the motion along the reaction coordinate sustains dispersive diffusion. A complete analytical solution of the model can be obtained only in the frequency domain, but an asymptotic solution is obtained in the limit of long time. In this case, the asymptotic long-time decay of the survival probability is a power law of the Mittag−Leffler functional form. When the barrier height is increased, the decay of the survival probability still remains nonexponential, in contrast to the ordinary Brownian motion case where the rate is given by the Smoluchowski limit of the well-known Kramers' expression. Interestingly, the reaction under dispersive diffusion is shown to exhibit strong dependence on the initial state of the system, thus predicting a strong dependence on the excitation wavelength for photoisomerization reactions in a dispersive medium. The theory also predicts a fractional viscosity dependence of the rate, which is often observed in the reactions occurring in complex environments.
Resumo:
The half-sandwhich ruthenium chloro complexes bearing chelated diphosphazane ligands, [(eta(5)-Cp)RuCl{kappa(2)-P,P-(RO)(2)PN(Me)P(OR)(2)}] [R = C6H3Me2-2,6] (1) and [(eta(5)-Cp*)RuCl{kappa(2)-P, P-X2PN(R)PYY'}] [R = Me, X = Y = Y' = OC6H5 (2); R = CHMe2, X-2 = C20H12O2, Y = Y' = OC6H5 (3) or OC6H4'Bu-4 (4)] have been prepared by the reaction of CpRu(PPh3)(2)Cl with (RO)(2)PN(Me)P(OR)(2) [R = C6H3Me2-2,6 (L-1)] or by the reaction of [Cp*RuCl2](n) with X2PN(R)PYY' in the presence of zinc dust. Among the four diastereomers (two enantiomeric pairs) possible for the "chiral at metal" complexes 3 and 4, only two diastereomers (one enantiomeric pair) are formed in these reactions. The complexes 1, 2, 4 and [(eta(5)-Cp)RuCl {kappa(2)-P,P-Ph2PN((S)-*CHMePh)PPhY)] [Y = Ph (5) or N2C3HMe2-3,5 (SCSPRRu)-(6)] react with NaOMe to give the corresponding hydride complexes [(eta(5) -Cp)RuH {kappa(2)-P,P-(RO)(2)PN(Me)P(OR)(2)}] (7), [(eta(5)-Cp*)RuH {kappa(2)-P,P'-X2PN(R)PY2)] [R = Me, X = Y = OC6H5 (8); R = CHMe2, X-2 = C20H12O2, Y = OC6H4'Bu-4 (9)] and [(eta(5) -Cp)RuH(kappa(2)-P, P-Ph2PN((S)-*CHMePh)PPhY)][Y =Ph (10) or N2C3HMe2-3,5 (SCSPRRu)(11a) and (SCSPSRu)-(11b)]. Only one enantiomeric pair of the hydride 9 is obtained from the chloro precursor 4 that bears sterically bulky substituents at the phosphorus centers. On the other hand, the optically pure trichiral complex 6 that bears sterically less bulky substituents at the phosphorus gives a mixture of two diastereomers (11a and 11b). Protonation of complex 7 using different acids (HX) gives a mixture of [(eta(5)- Cp)Ru(eta(2)-H-2){kappa(2)-P, P-(RO)(2)PN(Me)P(OR)(2))]X (12a) and [(eta(5)-Cp)Ru(H)(2){kappa(2)-P, P-(RO)(2)PN(Me)P(OR)(2)}]X (12b) of which 12a is the major product independent of the acid used; the dihydrogen nature of 12a is established by T, measurements and also by synthesizing the deuteride analogue 7-D followed by protonation to obtain the D-H isotopomer. Preliminary investigations on asymmetric transfer hydrogenation of 2-acetonaphthone in the presence of a series of chiral diphosphazane ligands show that diphosphazanes in which the phosphorus centers are strong pi-acceptor in character and bear sterically bulky substituents impart moderate levels of enantioselectivity. Attempts to identify the hydride intermediate involved in the asymmetric transfer hydrogenation by a model reaction suggests that a complex of the type, [Ru(H)(Cl){kappa(2)-P,P-X2PN(R)PY2)(solvent)(2)] could be the active species in this transformation. (c) 2007 Elsevier B.V. All rights reserved.
Resumo:
This magazine article examines the challenges of digital disruption and the way the struggle for legitimacy is playing out in mainstream and social media. Using ride-sharing as a case study, our team at the QUT Digital media research centre seeks to develop the tools policy-makers need to make evidence-based policy decisions in response to digital disruption.
Resumo:
This paper describes the types of support that teachers are accessing through the Social Network Site (SNS) 'Facebook'. It describes six ways in which teachers support one another within online groups. It presents evidence from a study of a large, open group of teachers online over a twelve week period, repeated with multiple groups a year later over a one week period. The findings suggest that large open groups in SNSs can be a useful source of pragmatic advice for teachers but that these groups are rarely a place for reflection on or feedback about teaching practice.
Resumo:
Some transformation reactions of α-pinene to give 4- and 3-membered ring compounds, not hitherto obtained from this source, are described. The study furnished a convenient method of preparation of the optically active cyclobutanone IVa, the title compound which served as the key substrate for all the transformations reported.
Resumo:
When the products of reaction between elemental sulphur and copper oxide at elevated temperature in vacuum are bubbled through chilled inert organic solvents like carbontetrachloride, orange-yellow solutions were obtained indicating the presence of lower oxide of sulphur. This lower oxide has been found to be disulphur monoxide as shown by three different types of reactions; (1) Mercury decomposition, (2) Reaction with hydrogen iodide and hydrolytic reaction in an alkaline homogeneous medium.
Resumo:
With a view to understanding the mechanism of the formation of 6-methoxy-2,2-(tetrachloro--phenylenedioxy)-naphthalen-1 (2H)-one (IIIa) in the reaction of 6-methoxy-1-tetralone (Ia) with tetrachloro-1,2-benzoquinone (II), the reaction of (II) with various tetralones and naphthols has been studied. Reaction with either α-tetralone or α-naphthol gives 2,2-(tetrachloro-o-phenylenedioxy)naphthalen-1 (2H)-one (IIIb), whereas reaction with either β-tetralone or β-naphthol gives a mixture of (IIIb) and ,1-(tetrachloro-o-phenylenedioxy)-naphthalen-2 (1H)-one (IX), with the former predominating. Further, reactions of (II) with 7-methoxy-3,4-dihydrophenanthren- 1 (2H)-one and m-methoxyphenol gave respectively 7-methoxy- ,2-(tetrachloro-o- phenylenedioxy)phenanthren-1 (2H)-one (VII) and 3-methoxy-6,6-(tetrachloro-o- phenylenedioxy)cyclohexa-2,4-dien-1-one (VIII). Structures of all these compounds have been proved on the basis of i.r. and n.m.r. data. The pathway to the formation of the condensates (III) is discussed.
Resumo:
The hydrolytic reactions of tetrasulphur tetranitride are studied in a homogeneous medium. Alkaline hydrolysis gives sulphite, thiosulphate, sulphate and sulphide whereas the products in acid hydrolysis are mainly sulphur dioxide, elemental sulphur and hydrogen sulphide, with traces of polythionates. Under optimum conditions, tetrasulphur tetranitride reacts with sulphite consuming 2 moles of sulphite per mole of sulphur nitride to give 2 moles of trithionate. The reaction of sulphur nitride with thiosulphuric acid gives pentathionate and tetrathionate.
Resumo:
Reactions of fourteen nucleophiles with the pseudo-acid chloride of o-benzoylbenzoic acid in two solvents have been studied. The nucleophiles that react primarily at the tetrahedral carbon atom to give pseudo derivatives, are weaker than those that react at the carbonyl carbon atom causing opening of the lactone ring. An explanation for this phenomenon is advanced.
Resumo:
The hydrolytic reactions of esters and amides of thiosulphurous acid are investigated in a homogeneous medium. The esters are hydrolysed by alkali to give sulphide, sulphite and thiosulphate whereas the amides are resistant towards alkali. Both the esters and amides are hydrolysed by acids giving hydrogen sulphide, sulphur dioxide, polythionates and elemental sulphur. The hydrolysis of these esters and amides in presence of sulphurous acid and thiosulphuric acid gives tetrathionate and hexathionate, respectively.
Resumo:
As the virtual world grows more complex, finding a standard way for storing data becomes increasingly important. Ideally, each data item would be brought into the computer system only once. References for data items need to be cryptographically verifiable, so the data can maintain its identity while being passed around. This way there will be only one copy of the users family photo album, while the user can use multiple tools to show or manipulate the album. Copies of users data could be stored on some of his family members computer, some of his computers, but also at some online services which he uses. When all actors operate over one replicated copy of the data, the system automatically avoids a single point of failure. Thus the data will not disappear with one computer breaking, or one service provider going out of business. One shared copy also makes it possible to delete a piece of data from all systems at once, on users request. In our research we tried to find a model that would make data manageable to users, and make it possible to have the same data stored at various locations. We studied three systems, Persona, Freenet, and GNUnet, that suggest different models for protecting user data. The main application areas of the systems studied include securing online social networks, providing anonymous web, and preventing censorship in file-sharing. Each of the systems studied store user data on machines belonging to third parties. The systems differ in measures they take to protect their users from data loss, forged information, censorship, and being monitored. All of the systems use cryptography to secure names used for the content, and to protect the data from outsiders. Based on the gained knowledge, we built a prototype platform called Peerscape, which stores user data in a synchronized, protected database. Data items themselves are protected with cryptography against forgery, but not encrypted as the focus has been disseminating the data directly among family and friends instead of letting third parties store the information. We turned the synchronizing database into peer-to-peer web by revealing its contents through an integrated http server. The REST-like http API supports development of applications in javascript. To evaluate the platform’s suitability for application development we wrote some simple applications, including a public chat room, bittorrent site, and a flower growing game. During our early tests we came to the conclusion that using the platform for simple applications works well. As web standards develop further, writing applications for the platform should become easier. Any system this complex will have its problems, and we are not expecting our platform to replace the existing web, but are fairly impressed with the results and consider our work important from the perspective of managing user data.
Resumo:
As the virtual world grows more complex, finding a standard way for storing data becomes increasingly important. Ideally, each data item would be brought into the computer system only once. References for data items need to be cryptographically verifiable, so the data can maintain its identity while being passed around. This way there will be only one copy of the users family photo album, while the user can use multiple tools to show or manipulate the album. Copies of users data could be stored on some of his family members computer, some of his computers, but also at some online services which he uses. When all actors operate over one replicated copy of the data, the system automatically avoids a single point of failure. Thus the data will not disappear with one computer breaking, or one service provider going out of business. One shared copy also makes it possible to delete a piece of data from all systems at once, on users request. In our research we tried to find a model that would make data manageable to users, and make it possible to have the same data stored at various locations. We studied three systems, Persona, Freenet, and GNUnet, that suggest different models for protecting user data. The main application areas of the systems studied include securing online social networks, providing anonymous web, and preventing censorship in file-sharing. Each of the systems studied store user data on machines belonging to third parties. The systems differ in measures they take to protect their users from data loss, forged information, censorship, and being monitored. All of the systems use cryptography to secure names used for the content, and to protect the data from outsiders. Based on the gained knowledge, we built a prototype platform called Peerscape, which stores user data in a synchronized, protected database. Data items themselves are protected with cryptography against forgery, but not encrypted as the focus has been disseminating the data directly among family and friends instead of letting third parties store the information. We turned the synchronizing database into peer-to-peer web by revealing its contents through an integrated http server. The REST-like http API supports development of applications in javascript. To evaluate the platform s suitability for application development we wrote some simple applications, including a public chat room, bittorrent site, and a flower growing game. During our early tests we came to the conclusion that using the platform for simple applications works well. As web standards develop further, writing applications for the platform should become easier. Any system this complex will have its problems, and we are not expecting our platform to replace the existing web, but are fairly impressed with the results and consider our work important from the perspective of managing user data.
Resumo:
A functioning stock market is an essential component of a competitive economy, since it provides a mechanism for allocating the economy’s capital stock. In an ideal situation, the stock market will steer capital in a manner that maximizes the total utility of the economy. As prices of traded stocks depend on and vary with information available to investors, it is apparent that information plays a crucial role in a functioning stock market. However, even though information indisputably matters, several issues regarding how stock markets process and react to new information still remain unanswered. The purpose of this thesis is to explore the link between new information and stock market reactions. The first essay utilizes new methodological tools in order to investigate the average reaction of investors to new financial statement information. The second essay explores the behavior of different types of investors when new financial statement information is disclosed to the market. The third essay looks into the interrelation between investor size, behavior and overconfidence. The fourth essay approaches the puzzle of negative skewness in stock returns from an altogether different angle than previous studies. The first essay presents evidence of the second derivatives of some financial statement signals containing more information than the first derivatives. Further, empirical evidence also indicates that some of the investigated signals proxy risk while others contain information priced with a delay. The second essay documents different categories of investors demonstrating systematical differences in their behavior when new financial statement information arrives to the market. In addition, a theoretical model building on differences in investor overconfidence is put forward in order to explain the observed behavior. The third essay shows that investor size describes investor behavior very well. This finding is predicted by the model proposed in the second essay, and hence strengthens the model. The behavioral differences between investors of different size furthermore have significant economic implications. Finally, the fourth essay finds strong evidence of management news disclosure practices causing negative skewness in stock returns.