483 resultados para Indefinite extensibility


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cellulose was extracted from lignocellulosic fibers and nanocrystalline cellulose (NC) prepared by alkali treatment of the fiber, steam explosion of the mercerized fiber, bleaching of the steam exploded fiber and finally acid treatment by 5% oxalic acid followed again by steam explosion. The average length and diameter of the NC were between 200-250 nm and 4-5 nm, respectively, in a monodisperse distribution. Different concentrations of the NC (0.1, 0.5, 1.0, 1.5, 2.0 and 2.5% by weight) were dispersed non-covalently into a completely bio-based thermoplastic polyurethane (TPU) derived entirely from oleic acid. The physical properties of the TPU nanocomposites were assessed by Fourier Transform Infra-Red spectroscopy (FTIR), Thermo-Gravimetric Analysis (TGA), Differential Scanning Calorimetry (DSC), X-Ray Diffraction (XRD), Dynamic Mechanical Analysis (DMA) and Mechanical Properties Analysis. The nanocomposites demonstrated enhanced stress and elongation at break and improved thermal stability compared to the neat TPU. The best results were obtained with 0.5% of NC in the TPU. The elongation at break of this sample was improved from 178% to 269% and its stress at break from 29.3 to 40.5 MPa. In this and all other samples the glass transition temperature, melting temperature and crystallization behavior were essentially unaffected. This finding suggests a potential method of increasing the strength and the elongation at break of typically brittle and weak lipid-based TPUs without alteration of the other physico-chemical properties of the polymer. (C) 2012 Elsevier Ltd. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

With the purpose of shedding light on some doubts in veterinary oncology, the present article intends to compare the results of histopathological and immunohistochemical examinations of unspecific round cell neoplasia, to realize immunophenotyping of canine lymphoma cases, to establish the T or B origin of neoplastic cells, and to determine the degree of proliferation and apoptosis of lymphomas by immunohistochemistry. Of 11 animals presenting immunohistochemical diagnosis of lymphoma, five had been diagnosed as Lymphoma by HE staining of histopathological slides and six had been classified as unspecific round cell neoplasia. All cases submitted to immunohistochemical examination were T-cell lymphomas. There was a positive correlation between cell proliferation and apoptosis. The comparison among histopathological and immunohistochemical results obtained in the cases examined in the present study suggested that immunohistochemistry is essential for the differentiation of round cell neoplasia.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Diese Arbeit widmet sich den Darstellungssätzen für symmetrische indefinite (das heißt nicht-halbbeschränkte) Sesquilinearformen und deren Anwendungen. Insbesondere betrachten wir den Fall, dass der zur Form assoziierte Operator keine Spektrallücke um Null besitzt. Desweiteren untersuchen wir die Beziehung zwischen reduzierenden Graphräumen, Lösungen von Operator-Riccati-Gleichungen und der Block-Diagonalisierung für diagonaldominante Block-Operator-Matrizen. Mit Hilfe der Darstellungssätze wird eine entsprechende Beziehung zwischen Operatoren, die zu indefiniten Formen assoziiert sind, und Form-Riccati-Gleichungen erreicht. In diesem Rahmen wird eine explizite Block-Diagonalisierung und eine Spektralzerlegung für den Stokes Operator sowie eine Darstellung für dessen Kern erreicht. Wir wenden die Darstellungssätze auf durch (grad u, h() grad v) gegebene Formen an, wobei Vorzeichen-indefinite Koeffzienten-Matrizen h() zugelassen sind. Als ein Resultat werden selbstadjungierte indefinite Differentialoperatoren div h() grad mit homogenen Dirichlet oder Neumann Randbedingungen konstruiert. Beispiele solcher Art sind Operatoren die in der Modellierung von optischen Metamaterialien auftauchen und links-indefinite Sturm-Liouville Operatoren.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Transgenic tomato hypocotyls with altered levels of an XTH gene were used to study how XET activity could affect the hypocotyl growth and cell wall extensibility. Transgenic hypocotyls showed significant over-expression (line 13) or co-suppression (line 33) of the SlXTH1 in comparison with the wild type, with these results being correlated with the results on specific soluble XET activity, suggesting that SlXTH1 translates mainly for a soluble XET isoenzyme. A relationship between XET activity and cell wall extensibility was found, and the highest total extensibility was located in the apical hypocotyl segment of the over-expressing SlXTH1 line, where the XET-specific activity and hypocotyl growth were also highest compared with the wild line.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The development of mixed-criticality virtualized multicore systems poses new challenges that are being subject of active research work. There is an additional complexity: it is now required to identify a set of partitions, and allocate applications to partitions. In this job, a number of issues have to be considered, such as the criticality level of the application, security and dependability requirements, operating system used by the application, time requirements granularity, specific hardware needs, etc. MultiPARTES [6] toolset relies on Model Driven Engineering (MDE) [12], which is a suitable approach in this setting. In this paper, it is described the support provided for automatic system partitioning generation and toolset extensibility.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recent measurements of sedimentation equilibrium and sedimentation velocity have shown that the bacterial cell division protein FtsZ self-associates to form indefinitely long rod-like linear aggregates in the presence of GDP and Mg2+. In the present study, the newly developed technique of non-ideal tracer sedimentation equilibrium was used to measure the effect of high concentrations—up to 150 g/liter—of each of two inert “crowder” proteins, cyanmethemoglobin or BSA, on the thermodynamic activity and state of association of dilute FtsZ under conditions inhibiting (−Mg2+) and promoting (+Mg2+) FtsZ self-association. Analysis of equilibrium gradients of both FtsZ and crowder proteins indicates that, under the conditions of the present experiment, FtsZ interacts with each of the two crowder proteins essentially entirely via steric repulsion, which may be accounted for quantitatively by a simple model in which hemoglobin, albumin, and monomeric FtsZ are modeled as effective spherical hard particles, and each oligomeric species of FtsZ is modeled as an effective hard spherocylinder. The functional dependence of the sedimentation of FtsZ on the concentrations of FtsZ and either crowder indicates that, in the presence of high concentrations of crowder, both the weight-average degree of FtsZ self-association and the range of FtsZ oligomer sizes present in significant abundance are increased substantially.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mode of access: Internet.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The indefinite determiner yi 'one'+ classifier' is the most approximate to an indefinite article, like the English a, in Chinese. It serves all the functions characteristic of representative stages of grammaticalization from a numeral to a generalized indefinite determiner as elaborated in the literature. It is established in this paper that the Chinese indefinite determiner has developed a special use with definite expressions, serving as a backgrounding device marking entities as of low thematic importance and unlikely to receive subsequent mentions in ensuing discourse. 'yi+ classifier' in the special use with definite expressions displays striking similarities in terms of semantic bleaching and phonological reduction with the same determiner at the advanced stage of grammaticalization characterized by uses with generics, nonspecifics and nonreferentials. An explanation is offered in terms of an implicational relation between nonreferentiality and low thematic importance which characterize the two uses of the indefinite determiner. While providing another piece of evidence in support of the claim that semantically nonreferentials and entities of low thematic importance tend to be encoded in terms of same linguistic devices in language, findings in this paper have shown how an indefinite determiner can undergo a higher degree of grammaticalization than has been reported in the literature-it expands its scope to mark not only indefinite but also definite expressions as semantically nonreferential and/or thematically unimportant. (C) 2003 Elsevier B.V. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents novel data that challenge the traditional categorial understanding of the nominal phrase. The established use of an indefinite pronoun with a determiner in French (ce quelqu'un, du n'importe quoi, un je ne sais quoi) contravenes assumptions both about pronouns, which should not be embedded, and nominal phrases, which should be headed by a noun. Analysed here for the first time, the embedding of a pronoun under a determiner is shown to find its justification in the semantic import of the construction. The anaphoric role guaranteeing referential continuity is promoted by a strong determiner; weak determiners typically contribute to constructing a designative use of the pronoun when a more precise characterisation cannot or will not be provided. How this construction would be analysed in the Minimalist Programme is presented to suggest that the phrase satisfies semantic requirements, which resolves the paradoxes of its traditional definition

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study investigates the Spanish indefinite pronoun uno (“one”). After a detailed analysis of its occurrences in authentic language, we find that its interpretation varies depending on the linguistic context. Therefore, we examine which elements of the context - we focus on the broader context, beyond the sentence – have an impact on its interpretation and develop a typology of the indefinite pronoun as to its interpretation. The pronoun may be interpreted as completely generic or specific (referring to the speaker, the listener or a third person). Its interpretation can also be located in an intermediate position between these interpretive extremes.In addition, we compare its use in various discursive genres - spontaneous conversations, academic essays and web forum - which are distinguished by the presence or absence of interactivity and of more or less subjectivity / intersubjectivity. The comparison shows that pronoun use depends on these characteristics.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider a parametric semilinear Dirichlet problem driven by the Laplacian plus an indefinite unbounded potential and with a reaction of superdifissive type. Using variational and truncation techniques, we show that there exists a critical parameter value λ_{∗}>0 such that for all λ> λ_{∗} the problem has least two positive solutions, for λ= λ_{∗} the problem has at least one positive solutions, and no positive solutions exist when λ∈(0,λ_{∗}). Also, we show that for λ≥ λ_{∗} the problem has a smallest positive solution.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The aim of this paper is to exhibit a necessary and sufficient condition of optimality for functionals depending on fractional integrals and derivatives, on indefinite integrals and on presence of time delay. We exemplify with one example, where we nd analytically the minimizer.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Several studies have developed metrics for software quality attributes of object-oriented designs such as reusability and functionality. However, metrics which measure the quality attribute of information security have received little attention. Moreover, existing security metrics measure either the system from a high level (i.e. the whole system’s level) or from a low level (i.e. the program code’s level). These approaches make it hard and expensive to discover and fix vulnerabilities caused by software design errors. In this work, we focus on the design of an object-oriented application and define a number of information security metrics derivable from a program’s design artifacts. These metrics allow software designers to discover and fix security vulnerabilities at an early stage, and help compare the potential security of various alternative designs. In particular, we present security metrics based on composition, coupling, extensibility, inheritance, and the design size of a given object-oriented, multi-class program from the point of view of potential information flow.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

It is important to promote a sustainable development approach to ensure that economic, environmental and social developments are maintained in balance. Sustainable development and its implications are not just a global concern, it also affects Australia. In particular, rural Australian communities are facing various economic, environmental and social challenges. Thus, the need for sustainable development in rural regions is becoming increasingly important. To promote sustainable development, proper frameworks along with the associated tools optimised for the specific regions, need to be developed. This will ensure that the decisions made for sustainable development are evidence based, instead of subjective opinions. To address these issues, Queensland University of Technology (QUT), through an Australian Research Council (ARC) linkage grant, has initiated research into the development of a Rural Statistical Sustainability Framework (RSSF) to aid sustainable decision making in rural Queensland. This particular branch of the research developed a decision support tool that will become the integrating component of the RSSF. This tool is developed on the web-based platform to allow easy dissemination, quick maintenance and to minimise compatibility issues. The tool is developed based on MapGuide Open Source and it follows the three-tier architecture: Client tier, Web tier and the Server tier. The developed tool is interactive and behaves similar to a familiar desktop-based application. It has the capability to handle and display vector-based spatial data and can give further visual outputs using charts and tables. The data used in this tool is obtained from the QUT research team. Overall the tool implements four tasks to help in the decision-making process. These are the Locality Classification, Trend Display, Impact Assessment and Data Entry and Update. The developed tool utilises open source and freely available software and accounts for easy extensibility and long-term sustainability.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Existing secure software development principles tend to focus on coding vulnerabilities, such as buffer or integer overflows, that apply to individual program statements, or issues associated with the run-time environment, such as component isolation. Here we instead consider software security from the perspective of potential information flow through a program’s object-oriented module structure. In particular, we define a set of quantifiable "security metrics" which allow programmers to quickly and easily assess the overall security of a given source code program or object-oriented design. Although measuring quality attributes of object-oriented programs for properties such as maintainability and performance has been well-covered in the literature, metrics which measure the quality of information security have received little attention. Moreover, existing securityrelevant metrics assess a system either at a very high level, i.e., the whole system, or at a fine level of granularity, i.e., with respect to individual statements. These approaches make it hard and expensive to recognise a secure system from an early stage of development. Instead, our security metrics are based on well-established compositional properties of object-oriented programs (i.e., data encapsulation, cohesion, coupling, composition, extensibility, inheritance and design size), combined with data flow analysis principles that trace potential information flow between high- and low-security system variables. We first define a set of metrics to assess the security quality of a given object-oriented system based on its design artifacts, allowing defects to be detected at an early stage of development. We then extend these metrics to produce a second set applicable to object-oriented program source code. The resulting metrics make it easy to compare the relative security of functionallyequivalent system designs or source code programs so that, for instance, the security of two different revisions of the same system can be compared directly. This capability is further used to study the impact of specific refactoring rules on system security more generally, at both the design and code levels. By measuring the relative security of various programs refactored using different rules, we thus provide guidelines for the safe application of refactoring steps to security-critical programs. Finally, to make it easy and efficient to measure a system design or program’s security, we have also developed a stand-alone software tool which automatically analyses and measures the security of UML designs and Java program code. The tool’s capabilities are demonstrated by applying it to a number of security-critical system designs and Java programs. Notably, the validity of the metrics is demonstrated empirically through measurements that confirm our expectation that program security typically improves as bugs are fixed, but worsens as new functionality is added.