971 resultados para Transmission electronic microscopies
Resumo:
Travel in passenger cars is a ubiquitous aspect of the daily activities of many people. During the 2009 influenza A (H1N1) pandemic a case of probable transmission during car travel was reported in Australia, to which spread via the airborne route may have contributed. However, there are no data to indicate the likely risks of such events, and how they may vary and be mitigated. To address this knowledge gap, we estimated the risk of airborne influenza transmission in two cars (1989 model and 2005 model) by employing ventilation measurements and a variation of the Wells-Riley model. Results suggested that infection risk can be reduced by not recirculating air; however, estimated risk ranged from 59 to 99.9% for a 90 min trip when air was recirculated in the newer vehicle. These results have implications for interrupting in-car transmission of other illnesses spread by the airborne route.
Resumo:
For more than a decade research in the field of context aware computing has aimed to find ways to exploit situational information that can be detected by mobile computing and sensor technologies. The goal is to provide people with new and improved applications, enhanced functionality and better use experience (Dey, 2001). Early applications focused on representing or computing on physical parameters, such as showing your location and the location of people or things around you. Such applications might show where the next bus is, which of your friends is in the vicinity and so on. With the advent of social networking software and microblogging sites such as Facebook and Twitter, recommender systems and so on context-aware computing is moving towards mining the social web in order to provide better representations and understanding of context, including social context. In this paper we begin by recapping different theoretical framings of context. We then discuss the problem of context- aware computing from a design perspective.
Resumo:
Deterministic transit capacity analysis applies to planning, design and operational management of urban transit systems. The Transit Capacity and Quality of Service Manual (1) and Vuchic (2, 3) enable transit performance to be quantified and assessed using transit capacity and productive capacity. This paper further defines important productive performance measures of an individual transit service and transit line. Transit work (p-km) captures the transit task performed over distance. Passenger transmission (p-km/h) captures the passenger task delivered by service at speed. Transit productiveness (p-km/h) captures transit work performed over time. These measures are useful to operators in understanding their services’ or systems’ capabilities and passenger quality of service. This paper accounts for variability in utilized demand by passengers along a line and high passenger load conditions where passenger pass-up delay occurs. A hypothetical case study of an individual bus service’s operation demonstrates the usefulness of passenger transmission in comparing existing and growth scenarios. A hypothetical case study of a bus line’s operation during a peak hour window demonstrates the theory’s usefulness in examining the contribution of individual services to line productive performance. Scenarios may be assessed using this theory to benchmark or compare lines and segments, conditions, or consider improvements.
Resumo:
Current research in secure messaging for Vehicular Ad hoc Networks (VANETs) appears to focus on employing a digital certificate-based Public Key Cryptosystem (PKC) to support security. The security overhead of such a scheme, however, creates a transmission delay and introduces a time-consuming verification process to VANET communications. This paper proposes a non-certificate-based public key management for VANETs. A comprehensive evaluation of performance and scalability of the proposed public key management regime is presented, which is compared to a certificate-based PKC by employing a number of quantified analyses and simulations. Not only does this paper demonstrate that the proposal can maintain security, but it also asserts that it can improve overall performance and scalability at a lower cost, compared to the certificate-based PKC. It is believed that the proposed scheme will add a new dimension to the key management and verification services for VANETs.
Resumo:
Transit Capacity Analysis critical to urban system Planning Design, Operation Productive Performance Analysis not so well detailed This study extends TRB’s & Vuchic’s work in this area
Resumo:
Security and privacy in electronic health record systems have been hindering the growth of e-health systems since their emergence. The development of policies that satisfy the security and privacy requirements of different stakeholders in healthcare has proven to be difficult. But, these requirements have to be met if the systems developed are to succeed in achieving their intended goals. Access control is a fundamental security barrier for securing data in healthcare information systems. In this paper we present an access control model for electronic health records. We address patient privacy requirements, confidentiality of private information and the need for flexible access for health professionals for electronic health records. We carefully combine three existing access control models and present a novel access control model for EHRs which satisfies requirements of electronic health records.
Resumo:
A multi-billion dollar industry, electronic games have been experiencing strong and rapid growth in recent times. The world of games is not only exciting due to the magnificent growth of the industry however, but due to a host of other factors. This chapter explores electronic games, providing an analysis of the industry, key motivators for game play, the game medium and academic research concerning the effects of play. It also reviews the emerging relationship games share with sport, recognizing that they can replicate sports, facilitate sports participation and be played as a sport. These are complex relationships that have not yet been comprehensively studied. The current chapter serves to draw academic attention to the area and presents ideas for future research.
Resumo:
Carbon nanotubes (CNTs), experimentally observed for the first time twenty years ago, have triggered an unprecedented research effort, on the account of their astonishing structural, mechanical and electronic properties. Unfortunately, the current inability in predicting the CNTs’ properties and the difficulty in controlling their position on a substrate are often limiting factors for the application of this material in actual devices. This research aims at the creation of specific methodologies for controlled synthesis of CNTs, leading to effectively employ them in various fields of electronics, e.g. photovoltaics. Focused Ion Beam (FIB) patterning of Si surfaces is here proposed as a means for ordering the assembly of vertical-aligned CNTs. With this technique, substrates with specific nano-structured morphologies have been prepared, enabling a high degree of control over CNTs’ position and size. On these nano-structured substrates, the growth of CNTs has been realized by chemical vapor deposition (CVD), i.e. thermal decomposition of hydrocarbon gases over a heated catalyst. The most common materials used as catalysts in CVD are transition metals like Fe and Ni; however, their presence in the CNT products often results in shortcomings for electronic applications, especially for those based on silicon, being the metallic impurities incompatible with very-large-scale integration (VLSI) technology. In the present work the role of Ge dots as an alternative catalysts for CNTs synthesis on Si substrates has been thoroughly assessed, finding a close connection between the catalytic activity of such material and the CVD conditions, which can affect both size and morphology of the dots. Successful CNT growths from Ge dots have been obtained by CVD at temperatures ranging from 750 to 1000°C, with mixtures of acetylene and hydrogen in an argon carrier gas. The morphology of the Si surface is observed to play a crucial role for the outcome of the CNT synthesis: natural (i.e. chemical etching) and artificial (i.e. FIB patterning, nanoindentation) means of altering this morphology in a controlled way have been then explored to optimize the CNTs yield. All the knowledge acquired in this study has been finally applied to synthesize CNTs on transparent conductive electrodes (indium-tin oxide, ITO, coated glasses), for the creation of a new class of anodes for organic photovoltaics. An accurate procedure has been established which guarantees a controlled inclusion of CNTs on ITO films, preserving their optical and electrical properties. By using this set of conditions, a CNTenhanced electrode has been built, contributing to improve the power conversion efficiency of polymeric solar cells.
Resumo:
Homo-and heteronuclear meso,meso-(E)-ethene-1,2-diyl-linked diporphyrins have been prepared by the Suzuki coupling of porphyrinylboronates and iodovinylporphyrins. Combinations comprising 5,10,15-triphenylporphyrin (TriPP) on both ends of the ethene-1,2-diyl bridge M 210 (M 2=H 2/Ni, Ni 2, Ni/Zn, H 4, H 2Zn, Zn 2) and 5,15-bis(3,5-di-tert-butylphenyl)porphyrinato-nickel(II) on one end and H 2, Ni, and ZnTriPP on the other (M 211), enable the first studies of this class of compounds possessing intrinsic polarity. The compounds were characterized by electronic absorption and steady state emission spectra, 1H NMR spectra, and for the Ni 2 bis(TriPP) complex Ni 210, single crystal X-ray structure determination. The crystal structure shows ruffled distortions of the porphyrin rings, typical of Ni II porphyrins, and the (E)-C 2H 2 bridge makes a dihedral angle of 50° with the mean planes of the macrocycles. The result is a stepped parallel arrangement of the porphyrin rings. The dihedral angles in the solid state reflect the interplay of steric and electronic effects of the bridge on interporphyrin communication. The emission spectra in particular, suggest energy transfer across the bridge is fast in conformations in which the bridge is nearly coplanar with the rings. Comparisons of the fluorescence behaviour of H 410 and H 2Ni10 show strong quenching of the free base fluorescence when the complex is excited at the lower energy component of the Soret band, a feature associated in the literature with more planar conformations. TDDFT calculations on the gas-phase optimized geometry of Ni 210 reproduce the features of the experimental electronic absorption spectrum within 0.1 eV. © 2012 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
Resumo:
In this paper, we apply a simulation based approach for estimating transmission rates of nosocomial pathogens. In particular, the objective is to infer the transmission rate between colonised health-care practitioners and uncolonised patients (and vice versa) solely from routinely collected incidence data. The method, using approximate Bayesian computation, is substantially less computer intensive and easier to implement than likelihood-based approaches we refer to here. We find through replacing the likelihood with a comparison of an efficient summary statistic between observed and simulated data that little is lost in the precision of estimated transmission rates. Furthermore, we investigate the impact of incorporating uncertainty in previously fixed parameters on the precision of the estimated transmission rates.
Resumo:
Electronic Health Record (EHR) retrieval processes are complex demanding Information Technology (IT) resources exponentially in particular memory usage. Database-as-a-service (DAS) model approach is proposed to meet the scalability factor of EHR retrieval processes. A simulation study using ranged of EHR records with DAS model was presented. The bucket-indexing model incorporated partitioning fields and bloom filters in a Singleton design pattern were used to implement custom database encryption system. It effectively provided faster responses in the range query compared to different types of queries used such as aggregation queries among the DAS, built-in encryption and the plain-text DBMS. The study also presented with constraints around the approach should consider for other practical applications.
Resumo:
The thesis presented in this paper is that the land fraud committed by Matthew Perrin in Queensland and inflicted upon Roger Mildenhall in Western Australia demonstrates the need for urgent procedural reform to the conveyancing process. Should this not occur, then calls to reform the substantive principles of the Torrens system will be heard throughout the jurisdictions that adopt title by registration, particularly in those places where immediate indefeasibility is still the norm. This paper closely examines the factual matrix behind both of these frauds, and asks what steps should have been taken to prevent them occurring. With 2012 bringing us Australian legislation embedding a national e-conveyancing system and a new Land Transfer Act for New Zealand we ask what legislative measures should be introduced to minimise the potential for such fraud. In undertaking this study, we reflect on whether the activities of Perrin and the criminals responsible for stealing Mildenhall's land would have succeeded under the present system for automated registration utilised in New Zealand.
Resumo:
Determining the optimal of black-start strategies is very important for speeding the restoration speed of a power system after a global blackout. Most existing black-start decision-making methods are based on the assumption that all indexes are independent of each other, and little attention has been paid to the group decision-making method which is more reliable. Given this background, the intuitionistic fuzzy set and further intuitionistic fuzzy Choquet integral operator are presented, and a black-start decision-making method based on this integral operator is presented. Compared to existing methods, the proposed algorithm cannot only deal with the relevance among the indexes, but also overcome some shortcomings of the existing methods. Finally, an example is used to demonstrate the proposed method. © 2012 The Institution of Engineering and Technology.
Resumo:
Background This paper presents a novel approach to searching electronic medical records that is based on concept matching rather than keyword matching. Aim The concept-based approach is intended to overcome specific challenges we identified in searching medical records. Method Queries and documents were transformed from their term-based originals into medical concepts as defined by the SNOMED-CT ontology. Results Evaluation on a real-world collection of medical records showed our concept-based approach outperformed a keyword baseline by 25% in Mean Average Precision. Conclusion The concept-based approach provides a framework for further development of inference based search systems for dealing with medical data.
Resumo:
The authors present a Cause-Effect fault diagnosis model, which utilises the Root Cause Analysis approach and takes into account the technical features of a digital substation. The Dempster/Shafer evidence theory is used to integrate different types of fault information in the diagnosis model so as to implement a hierarchical, systematic and comprehensive diagnosis based on the logic relationship between the parent and child nodes such as transformer/circuit-breaker/transmission-line, and between the root and child causes. A real fault scenario is investigated in the case study to demonstrate the developed approach in diagnosing malfunction of protective relays and/or circuit breakers, miss or false alarms, and other commonly encountered faults at a modern digital substation.