994 resultados para library architecture
Molecular architecture of the human sinus node: insights into the function of the cardiac pacemaker.
Resumo:
BACKGROUND: Although we know much about the molecular makeup of the sinus node (SN) in small mammals, little is known about it in humans. The aims of the present study were to investigate the expression of ion channels in the human SN and to use the data to predict electrical activity. METHODS AND RESULTS: Quantitative polymerase chain reaction, in situ hybridization, and immunofluorescence were used to analyze 6 human tissue samples. Messenger RNA (mRNA) for 120 ion channels (and some related proteins) was measured in the SN, a novel paranodal area, and the right atrium (RA). The results showed, for example, that in the SN compared with the RA, there was a lower expression of Na(v)1.5, K(v)4.3, K(v)1.5, ERG, K(ir)2.1, K(ir)6.2, RyR2, SERCA2a, Cx40, and Cx43 mRNAs but a higher expression of Ca(v)1.3, Ca(v)3.1, HCN1, and HCN4 mRNAs. The expression pattern of many ion channels in the paranodal area was intermediate between that of the SN and RA; however, compared with the SN and RA, the paranodal area showed greater expression of K(v)4.2, K(ir)6.1, TASK1, SK2, and MiRP2. Expression of ion channel proteins was in agreement with expression of the corresponding mRNAs. The levels of mRNA in the SN, as a percentage of those in the RA, were used to estimate conductances of key ionic currents as a percentage of those in a mathematical model of human atrial action potential. The resulting SN model successfully produced pacemaking. CONCLUSIONS: Ion channels show a complex and heterogeneous pattern of expression in the SN, paranodal area, and RA in humans, and the expression pattern is appropriate to explain pacemaking.
Resumo:
The article reviews the book "The Media City: Media, Architecture and Urban Space," by Scott McQuire.
Resumo:
SoundCipher is a software library written in the Java language that adds important music and sound features to the Processing environment that is widely used by media artists and otherwise has an orientation toward computational graphics. This article introduces the SoundCipher library and its features, describes its influences and design intentions, and positions it within the field of computer music programming tools. SoundCipher enables the rich history of algorithmic music techniques to be accessible within one of today’s most popular media art platforms. It also provides an accessible means for learning to create algorithmic music and sound programs.
Resumo:
This paper argues a model of complex system design for sustainable architecture within a framework of entropy evolution. The spectrum of sustainable architecture consists of the efficient use of energy and material resource in life-cycle of buildings, the active involvement of the occupants in micro-climate control within buildings, and the natural environmental context. The interactions of the parameters compose a complex system of sustainable architectural design, of which the conventional linear and fragmented design technologies are insufficient to indicate holistic and ongoing environmental performance. The complexity theory of dissipative structure states a microscopic formulation of open system evolution, which provides a system design framework for the evolution of building environmental performance towards an optimization of sustainability in architecture.
Resumo:
My perspective on the problems associated with building in bushfire prone landscapes comes from 12 years of study of the biophysical and cultural landscapes in the Great Southern Region of WA which resulted in the design and construction of the ‘Hhouse’ at Bremer Bay. The house was developed using a ‘ground up’ approach whereby I conducted a topographical survey and worked with a local botanist and a bushfire risk consultant to ascertain the level of threat that fire presented to this particular site. My intention from the outset however, was not to design a bushfire resistant house per se, but to develop a design which would place the owners in close proximity to the highly biodiverse heath vegetation of the site. I was also seeking a means—through architectural design—of linking the patterns of usage of the house with other site specific conditions related to the prevailing winds, solar orientation and seasonal change.
Resumo:
Lightsite is a room-sized pinhole camera which has been transported to a number of locations throughout the south of Western Australia. Lightsite was conceived as a way to celebrate a variety of individuals and their families, who have a very strong sense of connection to the landscapes in this region. The project documented herein was completed for “Hotspot” a cultural project initiated by Mix Artists Incorporated for the 2006 Perth International Arts Festival. The photographic works illustrated within were exhibited in regional centres throughout Western Australia during 2006, and continuing into 2007.
Resumo:
South Africa's modern architecture is not confined to the cities, but the ideas of the movement were mostly disseminated by architects and academics in Johannesburg, Pretoria, Durban and Cape Town, its four major urban centres. The lay out of significant areas of each city was also influenced by international modernist plans. In outlining the achievements and innovative designs of architects in these cities between the 1930s and 1970s, this article draws a picture of the importance of modernism in South African urban space, and of its diversity. It also draws attention to the political nature of the South African landscape and space, where modernist design was used for racial purposes, and to past and present conservation ideologies. The second part of the article concerns the conservation of modern buildings in these centres; it quotes bibliographies and lists the registers, those existing or under construction. It concludes with an overview of the conservation legislation in place and the challenges of conservation in a context of changing cultural values.
Resumo:
The rhetoric of the pedagogic discourses of landscape architectural students and interior design students is described as part of a doctoral study undertaken to document practices and orientations prior to cross-disciplinary collaboration. We draw on the theoretical framework of Basil Bernstein, an educational sociologist, and the rhetorical method of Kenneth Burke, a literary dramatist, to study the grammars of ‘landscape’ representation employed within these disciplinary examples. We investigate how prepared final year students are for working in a cross-disciplinary manner. The discursive interactions of their work, as illustrated by four examples of drawn images and written text, are described. Our findings suggest that we need to concern ourselves aspects of our pedagogic discourse that brings uniqueness and value to our disciplines ,as well as that shared discourses between disciplines.
Resumo:
This paper will explore the relationship between the giant South American waterlily, the Victoria regia (today named Victoria amazonica), and the 1914 Glashaus exposition building by the German architect, Bruno Taut. Starting with a general botanical introduction of Victoria regia, the paper exposes the first European cultivation of the lily by Joseph Paxton at Chatsworth,England, in 1849. Following this initial cultivation, Paxton subsequently develops a specialist greenhouse for the plant, that later becomes the prototype for all Victoria regia greenhouses. However, from about 1860 as Victoria regia cultivation spreads to continental Europe, a greenhouse that differs from Paxton’s prototype subsequently evolves. An investigation of these later continental European greenhouses, coupled with an exposure of Taut’s own writings concerning Victoria regia, reveals startling similarities to the Glashaus, which ultimately reveals the Glashaus as directly inspired by Victoria regia.
Resumo:
A graduate destination survey can provide a snap shot in time of a graduate’s career progression and outcome. This paper will present the results of a Queensland University of Technology study exploring the employment outcomes of students who had completed a library and information science course from the Faculty of Information Technology between 2000 and 2008. Seventy-four graduates completed an online questionnaire administered in July 2009. The study found that 90% of the graduates surveyed were working and living in Queensland, with over three quarters living and working in Brisbane. Nearly 70% were working full-time, while only 1.4% indicating that they were unemployed and looking for work. Over 80% of the graduates identified themselves as working in “librarianship”. This study is the first step in understanding the progression and destination of QUT’s library and information science graduates. It is recommended that this survey becomes an ongoing initiative so that the results can be analysed and compared over time.
Resumo:
The ad hoc networks are vulnerable to attacks due to distributed nature and lack of infrastructure. Intrusion detection systems (IDS) provide audit and monitoring capabilities that offer the local security to a node and help to perceive the specific trust level of other nodes. The clustering protocols can be taken as an additional advantage in these processing constrained networks to collaboratively detect intrusions with less power usage and minimal overhead. Existing clustering protocols are not suitable for intrusion detection purposes, because they are linked with the routes. The route establishment and route renewal affects the clusters and as a consequence, the processing and traffic overhead increases due to instability of clusters. The ad hoc networks are battery and power constraint, and therefore a trusted monitoring node should be available to detect and respond against intrusions in time. This can be achieved only if the clusters are stable for a long period of time. If the clusters are regularly changed due to routes, the intrusion detection will not prove to be effective. Therefore, a generalized clustering algorithm has been proposed that can run on top of any routing protocol and can monitor the intrusions constantly irrespective of the routes. The proposed simplified clustering scheme has been used to detect intrusions, resulting in high detection rates and low processing and memory overhead irrespective of the routes, connections, traffic types and mobility of nodes in the network. Clustering is also useful to detect intrusions collaboratively since an individual node can neither detect the malicious node alone nor it can take action against that node on its own.
Resumo:
The Dynamic Data eXchange (DDX) is our third generation platform for building distributed robot controllers. DDX allows a coalition of programs to share data at run-time through an efficient shared memory mechanism managed by a store. Further, stores on multiple machines can be linked by means of a global catalog and data is moved between the stores on an as needed basis by multi-casting. Heterogeneous computer systems are handled. We describe the architecture of DDX and the standard clients we have developed that let us rapidly build complex control systems with minimal coding.
Resumo:
This paper proposes a security architecture for the basic cross indexing systems emerging as foundational structures in current health information systems. In these systems unique identifiers are issued to healthcare providers and consumers. In most cases, such numbering schemes are national in scope and must therefore necessarily be used via an indexing system to identify records contained in pre-existing local, regional or national health information systems. Most large scale electronic health record systems envisage that such correlation between national healthcare identifiers and pre-existing identifiers will be performed by some centrally administered cross referencing, or index system. This paper is concerned with the security architecture for such indexing servers and the manner in which they interface with pre-existing health systems (including both workstations and servers). The paper proposes two required structures to achieve the goal of a national scale, and secure exchange of electronic health information, including: (a) the employment of high trust computer systems to perform an indexing function, and (b) the development and deployment of an appropriate high trust interface module, a Healthcare Interface Processor (HIP), to be integrated into the connected workstations or servers of healthcare service providers. This proposed architecture is specifically oriented toward requirements identified in the Connectivity Architecture for Australia’s e-health scheme as outlined by NEHTA and the national e-health strategy released by the Australian Health Ministers.
Resumo:
Over many centuries of settlement, Vietnamese inhabitants have developed a vernacular architecture that is well adapted to the region’s climatic and topographical conditions. Vernacular Vietnamese housing uses natural systems to create a built environment that integrates well with nature. The vernacular combines site-sensitive, passive solar design, natural materials and appropriate structure to achieve harmony among nature, humans and the built environment. Unfortunately, these unique features have not been applied in contemporary Vietnamese architecture, which displays energy-intensive materials and built forms. This research is analysing how environmentally-responsive elements of vernacular architecture could be applied to modern sustainable housing in Vietnam. Elements of many types of vernacular architecture throughout the country are reviewed as precedents for future building planning and design. The paper also looks at culturally and ecologically appropriate legislative and voluntary options for encouraging more sustainable housing.