986 resultados para Rav, active 3rd century.
Resumo:
A new solid composite polymer electrolyte was reported by incorporating Azino-bis-(3-ethyl benzo thiazoline-6-sulphonate) ion [ABTS] as dopant in poly(vinylidene flouride) along with redox couple (1-/13-). Under certain conditions, the electrolyte composition forms brush like nano-rods while it is doped with Azino-bis-(3-ethly) benzo thiazoline-6-sulphonate) ion [ABTS], a pi-electron donor. The polymer electrolyte forms nanoscale interpenetrating network with the crystalline order of the polymer electrolyte that seems to be a desirable architecture for the active layer of the photoelectrochemical cell. With this new polymer electrolyte, dye-sensitized solar cell was fabricated using N3 dye absorbed over Ti02- nonoparticles (photoanode) and conducting carbon cement coated on the conducting press (FTO, photocathode). This polymer composite has been successfully used as a promising candidate as solid polymer electrolyte in nanocrystalline dye-sensitized solar cell.
Resumo:
Mathematical problem solving has been the subject of substantial and often controversial research for several decades. We use the term, problem solving, here in a broad sense to cover a range of activities that challenge and extend one’s thinking. In this chapter, we initially present a sketch of past decades of research on mathematical problem solving and its impact on the mathematics curriculum. We then consider some of the factors that have limited previous research on problem solving. In the remainder of the chapter we address some ways in which we might advance the fields of problem-solving research and curriculum development.
Resumo:
The performance of iris recognition systems is significantly affected by the segmentation accuracy, especially in non- ideal iris images. This paper proposes an improved method to localise non-circular iris images quickly and accurately. Shrinking and expanding active contour methods are consolidated when localising inner and outer iris boundaries. First, the pupil region is roughly estimated based on histogram thresholding and morphological operations. There- after, a shrinking active contour model is used to precisely locate the inner iris boundary. Finally, the estimated inner iris boundary is used as an initial contour for an expanding active contour scheme to find the outer iris boundary. The proposed scheme is robust in finding exact the iris boundaries of non-circular and off-angle irises. In addition, occlusions of the iris images from eyelids and eyelashes are automatically excluded from the detected iris region. Experimental results on CASIA v3.0 iris databases indicate the accuracy of proposed technique.
Resumo:
The revolution in legal research provides exciting challenges for those exploring and writing about the legal landscape. Cumbersome paper sources have largely been replaced by electronic files and a new range of skills and sources are required to successfully conduct legal research.--------- Researching and Writing in Law, 3rd Edition is an updated research guide, mapping the developments that have taken place and providing the keys to the fundamental electronic sources of legal research, especially those now available on the web, as well as exploring traditional doctrinal methodologies. Included in this edition are extensive checklists for locating and validating the law in Australia, England, Canada, the United States, New Zealand, India and the European Union.-------- This third edition includes expanded discussion of the process of formulating a research proposal, writing project abstracts and undertaking a literature review (Chapter 7). Research methodologies are also extensively examined, focusing on the process of doctrinal methodology as well as discussing other useful methodologies, such as Comparative Research and Content Analysis (Chapter 5). Further highlighted are issues surrounding research ethics, including plagiarism and originality, the importance of developing skills in critique, and the influence of current university research environments on postgraduate legal research.-------- Law students and members of the practising profession aiming to update their research, knowledge and skills will find Researching and Writing in Law, 3rd Edition invaluable.
Resumo:
Australia and New Zealand, as English-speaking nations with dominant white populations, present an ethnic anomaly not only in South East Asia, but also in the Southern Hemisphere. Colonised by predominantly workingclass British immigrants from the late eighteenth century, an ethnic and cultural connection grew between these two countries even though their indigenous populations and ecological environments were otherwise very different. Building a new life in Australia and New Zealand, the colonists shared similar historic perceptions of poverty – perceptions from their homelands that they did not want to see replicated in their new adopted countries. Dreams of a better life shaped their aspirations, self-identity and nationalistic outlook. By the twentieth century, national independence and self-government had replaced British colonial rule. The inveterate occurrence of poverty in Australia and New Zealand had created new local perspectives and different perceptions of, and about, poverty. This study analyses what relationship existed between the political directions adopted by the twentieth-century prime ministers of Australia and New Zealand and their perceptions of poverty. Using the existential phenomenological theory and methodology of Maurice Merleau-Ponty, the study adds to the body of knowledge about poverty in Australia and New Zealand by revealing the structure and origin of the poverty perceptions of the twentieth-century prime ministers.
Resumo:
During the resorbable-polymer-boom of the 1970s and 1980s, polycaprolactone (PCL) was used in the biomaterials field and a number of drug-delivery devices. Its popularity was soon superseded by faster resorbable polymers which had fewer perceived disadvantages associated with long term degradation (up to 3-4 years) and intracellular resorption pathways; consequently, PCL was almost forgotten for most of two decades. Recently, a resurgence of interest has propelled PCL back into the biomaterials-arena. The superior rheological and viscoelastic properties over many of its aliphatic polyester counterparts renders PCL easy to manufacture and manipulate into a large range of implants and devices. Coupled with relatively inexpensive production routes and FDA approval, this provides a promising platform for the production of longer-term degradable implants which may be manipulated physically, chemically and biologically to possess tailorable degradation kinetics to suit a specific anatomical site. This review will discuss the application of PCL as a biomaterial over the last two decades focusing on the advantages which have propagated its return into the spotlight with a particular focus on medical devices, drug delivery and tissue engineering.
Resumo:
This article examines the growing phenomenon of online dating and intimacy in the 21st century. The exponential rise of communications technologies, which is both reflective and constitutive of an increasingly networked and globalized society, has the potential to significantly influence the nature of intimacy in everyday life. Yet, to date, there has been a minimal response by sociologists to seek, describe and understand this influence. In this article, we present some of the key findings of our research on online dating in Australia, in order to foster a debate about the sociological impacts on intimacy in the postmodern world. Based on a web audit of more than 60 online dating sites and in-depth interviews with 23 users of online dating services, we argue that recent global trends are influencing the uptake of online technologies for the purposes of forming intimate relations. Further, some of the mediating effects of these technologies – in particular, the hypercommunication – may have specific implications for the nature of intimacy in the global era.
Resumo:
Non-Western practitioners across the globe instinctively attempt to implement Western-based public relations models and theories, often unsuccessfully, regardless of their surrounding environment. This paper reviews business practices and reveals that in Europe, company interests are a main priority, while in Asia, the line between business and personal relationships is extremely blurred. Cultural dimensions and topois were even more varied between the three regions. Implications for the adoption of Western models of public relations practice are discussed.
Resumo:
In this paper, the optimal allocation and sizing of distributed generators (DGs) in a distribution system is studied. To achieve this goal, an optimization problem should be solved in which the main objective is to minimize the DGs cost and to maximise the reliability simultaneously. The active power balance between loads and DGs during the isolation time is used as a constraint. Another point considered in this process is the load shedding. It means that if the summation of DGs active power in a zone, isolated by the sectionalizers because of a fault, is less than the total active power of loads located in that zone, the program start shedding the loads in one-by-one using the priority rule still the active power balance is satisfied. This assumption decreases the reliability index, SAIDI, compared with the case loads in a zone are shed when total DGs power is less than the total load power. To validate the proposed method, a 17-bus distribution system is employed and the results are analysed.
Resumo:
Libertine erotic novellas included a number of seductive descriptions of unfolding spaces often seen through the eyes of a narrator. Instructional volumes such as Point de lendermain by Vivant Denon (1777) aimed at the sexual education of young women and the titillation of men also followed suit. Similarly architectural theory such as Le Camus de Mézières’, The Genius of Architecture (1780) also promoted the sensuous and seductive aspects of surfaces and spatial arrangements. In the erotic settings of the cabinet, descriptions of curtains generate as much arousal as the outline of a naked body, and for some players it is the space that is desired above their lover.
Resumo:
Part I of this book covers the commercial and contractual background to technology licensing agreements. Part II discusses the European Community's new regime on the application and enforcement of Article 81 to technology licensing agreements. EC Council Regulation 1/2003 replaced the Council Regulation 17/1962 and repealed the system under which restrictive agreements and practices could be notified to the EC Commission. A new Commission regulation on technology transfer agreements, Regulation 772/2004. These two enactments required consequential amendments to the chapters in Part III where the usual terms of technology licensing agreements are analysed and exemplified by reference to decided cases.
Resumo:
This thesis is about the derivation of the addition law on an arbitrary elliptic curve and efficiently adding points on this elliptic curve using the derived addition law. The outcomes of this research guarantee practical speedups in higher level operations which depend on point additions. In particular, the contributions immediately find applications in cryptology. Mastered by the 19th century mathematicians, the study of the theory of elliptic curves has been active for decades. Elliptic curves over finite fields made their way into public key cryptography in late 1980’s with independent proposals by Miller [Mil86] and Koblitz [Kob87]. Elliptic Curve Cryptography (ECC), following Miller’s and Koblitz’s proposals, employs the group of rational points on an elliptic curve in building discrete logarithm based public key cryptosystems. Starting from late 1990’s, the emergence of the ECC market has boosted the research in computational aspects of elliptic curves. This thesis falls into this same area of research where the main aim is to speed up the additions of rational points on an arbitrary elliptic curve (over a field of large characteristic). The outcomes of this work can be used to speed up applications which are based on elliptic curves, including cryptographic applications in ECC. The aforementioned goals of this thesis are achieved in five main steps. As the first step, this thesis brings together several algebraic tools in order to derive the unique group law of an elliptic curve. This step also includes an investigation of recent computer algebra packages relating to their capabilities. Although the group law is unique, its evaluation can be performed using abundant (in fact infinitely many) formulae. As the second step, this thesis progresses the finding of the best formulae for efficient addition of points. In the third step, the group law is stated explicitly by handling all possible summands. The fourth step presents the algorithms to be used for efficient point additions. In the fifth and final step, optimized software implementations of the proposed algorithms are presented in order to show that theoretical speedups of step four can be practically obtained. In each of the five steps, this thesis focuses on five forms of elliptic curves over finite fields of large characteristic. A list of these forms and their defining equations are given as follows: (a) Short Weierstrass form, y2 = x3 + ax + b, (b) Extended Jacobi quartic form, y2 = dx4 + 2ax2 + 1, (c) Twisted Hessian form, ax3 + y3 + 1 = dxy, (d) Twisted Edwards form, ax2 + y2 = 1 + dx2y2, (e) Twisted Jacobi intersection form, bs2 + c2 = 1, as2 + d2 = 1, These forms are the most promising candidates for efficient computations and thus considered in this work. Nevertheless, the methods employed in this thesis are capable of handling arbitrary elliptic curves. From a high level point of view, the following outcomes are achieved in this thesis. - Related literature results are brought together and further revisited. For most of the cases several missed formulae, algorithms, and efficient point representations are discovered. - Analogies are made among all studied forms. For instance, it is shown that two sets of affine addition formulae are sufficient to cover all possible affine inputs as long as the output is also an affine point in any of these forms. In the literature, many special cases, especially interactions with points at infinity were omitted from discussion. This thesis handles all of the possibilities. - Several new point doubling/addition formulae and algorithms are introduced, which are more efficient than the existing alternatives in the literature. Most notably, the speed of extended Jacobi quartic, twisted Edwards, and Jacobi intersection forms are improved. New unified addition formulae are proposed for short Weierstrass form. New coordinate systems are studied for the first time. - An optimized implementation is developed using a combination of generic x86-64 assembly instructions and the plain C language. The practical advantages of the proposed algorithms are supported by computer experiments. - All formulae, presented in the body of this thesis, are checked for correctness using computer algebra scripts together with details on register allocations.