975 resultados para Smaller Kidneys
Resumo:
Shale is an increasingly important source of natural gas in the United States. The gas is held in fine pores that need to be accessed by horizontal drilling and hydrofracturing techniques. Understanding the nature of the pores may provide clues to making gas extraction more efficient. We have investigated two Mississippian Barnett Shale samples, combining small-angle neutron scattering (SANS) and ultrasmall-angle neutron scattering (USANS) to determine the pore size distribution of the shale over the size range 10 nm to 10 μm. By adding deuterated methane (CD4) and, separately, deuterated water (D2O) to the shale, we have identified the fraction of pores that are accessible to these compounds over this size range. The total pore size distribution is essentially identical for the two samples. At pore sizes >250 nm, >85% of the pores in both samples are accessible to both CD4 and D2O. However, differences in accessibility to CD4 are observed in the smaller pore sizes (∼25 nm). In one sample, CD4 penetrated the smallest pores as effectively as it did the larger ones. In the other sample, less than 70% of the smallest pores (<25 nm) were accessible to CD4, but they were still largely penetrable by water, suggesting that small-scale heterogeneities in methane accessibility occur in the shale samples even though the total porosity does not differ. An additional study investigating the dependence of scattered intensity with pressure of CD4 allows for an accurate estimation of the pressure at which the scattered intensity is at a minimum. This study provides information about the composition of the material immediately surrounding the pores. Most of the accessible (open) pores in the 25 nm size range can be associated with either mineral matter or high reflectance organic material. However, a complementary scanning electron microscopy investigation shows that most of the pores in these shale samples are contained in the organic components. The neutron scattering results indicate that the pores are not equally proportioned in the different constituents within the shale. There is some indication from the SANS results that the composition of the pore-containing material varies with pore size; the pore size distribution associated with mineral matter is different from that associated with organic phases.
Resumo:
Automated process discovery techniques aim at extracting models from information system logs in order to shed light into the business processes supported by these systems. Existing techniques in this space are effective when applied to relatively small or regular logs, but otherwise generate large and spaghetti-like models. In previous work, trace clustering has been applied in an attempt to reduce the size and complexity of automatically discovered process models. The idea is to split the log into clusters and to discover one model per cluster. The result is a collection of process models -- each one representing a variant of the business process -- as opposed to an all-encompassing model. Still, models produced in this way may exhibit unacceptably high complexity. In this setting, this paper presents a two-way divide-and-conquer process discovery technique, wherein the discovered process models are split on the one hand by variants and on the other hand hierarchically by means of subprocess extraction. The proposed technique allows users to set a desired bound for the complexity of the produced models. Experiments on real-life logs show that the technique produces collections of models that are up to 64% smaller than those extracted under the same complexity bounds by applying existing trace clustering techniques.
Resumo:
Despite the presence of many regulations governing the operation of heavy vehicles and supply chains in Australia, the truck driving sector continues to have the highest incidence of fatal injuries compared to all other industries. The working environment has been the focus of attention by safety researchers during the past few decades, with particular consideration been given to the concept ‘safety culture’ and how to maintain, modify and advance responses to occupational risk. One important aspect of the heavy industry which sets it apart is the existence of cultural or sub-cultural influences at an industry wide and occupation-specific level rather than organisational level. This paper reports on the findings of stakeholder’s perceptions of the influences of power and control, and culture on industry safety. In-depth structured interviews were conducted during 2011 with Australian industry stakeholders (n=31). The questioning surrounded decision-making processes with regards to identifying risks, self-monitoring and reducing risky activities; as well as how power-affected relationships may influence the operational performance of supply chains and impacts on driver safety. One of the most significant findings from these interviews relates to the notion of power. The perception that the ‘Customer is King’ was widely viewed, with the majority of stakeholders believing that there exists a ‘master slave mentality’ in the industry. There appears to be great frustration in the industry as to the apparent immunity of customers (particularly retail supply chains) to their responsibilities. There was also a strong perception that the customer holds the balance of power by covertly employing remuneration-related incentives and pressures. Smaller trucking companies are perceived as being more vulnerable to the pressure of customer expectations.
Resumo:
Trivium is a bit-based stream cipher in the final portfolio of the eSTREAM project. In this paper, we apply the approach of Berbain et al. to Trivium-like ciphers and perform new algebraic analyses on them, namely Trivium and its reduced versions: Trivium-N, Bivium-A and Bivium-B. In doing so, we answer an open question in the literature. We demonstrate a new algebraic attack on Bivium-A. This attack requires less time and memory than previous techniques which use the F4 algorithm to recover Bivium-A's initial state. Though our attacks on Bivium-B, Trivium and Trivium-N are worse than exhaustive keysearch, the systems of equations which are constructed are smaller and less complex compared to previous algebraic analysis. Factors which can affect the complexity of our attack on Trivium-like ciphers are discussed in detail.
Resumo:
Executive Summary Child sexual abuse (CSA) in Christian Institutions continues to be of serious concern in public, criminal justice and institutional discourse. This study was conducted in conjunction with Project Kidsafe Foundation and sought the perspectives of Australian survivors of CSA by Personnel in Christian Institutions (PICIs). In total, 81 individual survivors responded to an online survey which asked them a range of questions about their current and childhood life circumstance; the nature, extent and location of abuse; grooming strategies utilised by perpetrators; their experiences of disclosure; and outcomes of official reporting to both criminal justice agencies and also official processes Christian institutions. Survey participants were given the option to further participate in a qualitative interview with the principal researcher. These interviews are not considered within this report. In summary, survey data examined here indicate that: • Instances of abuse included a range of offences from touching outside of clothing to serious penetrative offences. • The onset of abuse occurred at a young age: between 6 and 10 years for most female participants, and 11 and 13 years for male participants. • In the majority of cases the abuse ceased because of actions by survivors, not by adults within families or the Christian institution. • Participants waited significant time before disclosing their abuse, with many waiting 20 years or more. • Where survivors disclosed to family members or PICIs, they were often met with disbelief and unhelpful responses aimed at minimising the harm. • Where an official report was made, it was most often made to police. In these cases 53% resulted in an official investigations. • The primary reasons for reporting were to protect others from the perpetrator and make the Christian institution accountable to an external agency. • Where reports to Christian institutions were made, most survivors were dissatisfied with outcomes, and a smaller majority was extremely dissatisfied. This report reflects the long-held understanding that responding to CSA is a complex and difficult task. If effective and meaningful responses are not made, however, trauma to the survivor is most often compounded and recovery delayed. This report demonstrates the need for further independent analysis and oversight of responses made to CSA by both criminal justice, religious and social institutions. Meaningful change will only be accessible, however, if family, community and institutional environments are safe places for survivors to disclose their experiences of abuse and begin to seek ways of healing. There is much to be learnt from survivors that have already made this journey.
Resumo:
This study was undertaken in an effort to contribute to the limited knowledge of women who commit murder. Women account for approximately 10% of the total Australian homicides and according to Mouzos (2000), 20% of these female perpetrated homicides result in murder convictions. In her extensive study of female homicide offending in England, Brookman (2005) asserts that nearly two thirds of the victims of women who kill are intimates, to include violent partners and their own children. The other third of the victims consist largely of acquaintances and to lesser degree strangers (Brookman, 2005). This study strives to introduce further knowledge regarding women convicted of murder; the smaller subgroup of female homicide offenders of which less is known. It is comprised of women who killed intimates and non-intimates to include acquaintances. The study engages the narratives of seven women, all of whom were convicted of murder and serving lengthy sentences at the Dame Phyllis Frost Centre, a medium and maximum security prison that is located on the outskirts of Melbourne, Australia. The seven women fall largely outside of the characteristics of female homicide offenders as revealed in the studies from Australia’s National Homicide Monitoring Program (NHMP, 2007), from Canada by Hoffmann, Lavigne, and Dickie (1998) and research from the United States by Scott and Davies (2002). In this study there were no Indigenous women represented. Only one of the women had a previous criminal charge. The women were older on average than the prevailing demographics from western nations. Two of the women had substance abuse and co-occurring mental illness, which reflects a significant lower rate than the literature suggests. This study expands the current understanding of the phenomenon of women who murder. It communicates the narratives of seven women charged and convicted of murder as they attempt to understand their lives and identities. It moves the dialogue beyond the preponderance of feminist criminological research that examines motive and the relationship the woman has with her victim to the social discourses which dominate in her identity formation. This research found that in their attempt to create a favourable identity the women needed to engage with the master script of normative femininity through the feminisation of victimisation, motherhood and domesticity.
Resumo:
Speaker diarization is the process of annotating an input audio with information that attributes temporal regions of the audio signal to their respective sources, which may include both speech and non-speech events. For speech regions, the diarization system also specifies the locations of speaker boundaries and assign relative speaker labels to each homogeneous segment of speech. In short, speaker diarization systems effectively answer the question of ‘who spoke when’. There are several important applications for speaker diarization technology, such as facilitating speaker indexing systems to allow users to directly access the relevant segments of interest within a given audio, and assisting with other downstream processes such as summarizing and parsing. When combined with automatic speech recognition (ASR) systems, the metadata extracted from a speaker diarization system can provide complementary information for ASR transcripts including the location of speaker turns and relative speaker segment labels, making the transcripts more readable. Speaker diarization output can also be used to localize the instances of specific speakers to pool data for model adaptation, which in turn boosts transcription accuracies. Speaker diarization therefore plays an important role as a preliminary step in automatic transcription of audio data. The aim of this work is to improve the usefulness and practicality of speaker diarization technology, through the reduction of diarization error rates. In particular, this research is focused on the segmentation and clustering stages within a diarization system. Although particular emphasis is placed on the broadcast news audio domain and systems developed throughout this work are also trained and tested on broadcast news data, the techniques proposed in this dissertation are also applicable to other domains including telephone conversations and meetings audio. Three main research themes were pursued: heuristic rules for speaker segmentation, modelling uncertainty in speaker model estimates, and modelling uncertainty in eigenvoice speaker modelling. The use of heuristic approaches for the speaker segmentation task was first investigated, with emphasis placed on minimizing missed boundary detections. A set of heuristic rules was proposed, to govern the detection and heuristic selection of candidate speaker segment boundaries. A second pass, using the same heuristic algorithm with a smaller window, was also proposed with the aim of improving detection of boundaries around short speaker segments. Compared to single threshold based methods, the proposed heuristic approach was shown to provide improved segmentation performance, leading to a reduction in the overall diarization error rate. Methods to model the uncertainty in speaker model estimates were developed, to address the difficulties associated with making segmentation and clustering decisions with limited data in the speaker segments. The Bayes factor, derived specifically for multivariate Gaussian speaker modelling, was introduced to account for the uncertainty of the speaker model estimates. The use of the Bayes factor also enabled the incorporation of prior information regarding the audio to aid segmentation and clustering decisions. The idea of modelling uncertainty in speaker model estimates was also extended to the eigenvoice speaker modelling framework for the speaker clustering task. Building on the application of Bayesian approaches to the speaker diarization problem, the proposed approach takes into account the uncertainty associated with the explicit estimation of the speaker factors. The proposed decision criteria, based on Bayesian theory, was shown to generally outperform their non- Bayesian counterparts.
Resumo:
Three porous amorphous silica minerals, including diatomite, opal and porous precipitated SiO2wereadopted to prepare supported TiO2catalysts by hydrolysis–deposition method. The prepared compoundmaterials were characterized by X-ray diffraction (XRD), scanning electron microscopy (SEM), Fouriertransform infrared spectroscopy (FT-IR), transmission electron microscopy (TEM) and X-ray photo-electron spectroscopy (XPS). Through morphology and physical chemistry properties of the resultingTiO2/amorphous SiO2catalysts, it was proposed that the nature of silica supports could affect the particlesize and the crystal form of TiO2and then further influence the photocatalytic property of TiO2/amorphousSiO2catalysts. The catalytic properties of these porous amorphous silica supported photocatalysts(TiO2/SiO2) were investigated by UV-assisted degradation of Rhodamine B (RhB). Compared with pureTiO2(P25) and the other two TiO2/amorphous SiO2catalysts, TiO2/diatomite photocatalyst exhibits bet-ter catalytic performance at different calcined temperatures, the decoloration rate of which can be upto over 85% even at a relatively low calcined temperature. The TiO2/diatomite photocatalyst possessesmixed-phase TiO2with relatively smaller particles size, which might be responsible for higher photo-catalytic activity. Moreover, the stable and much inerter porous microstructure of diatomite could beanother key factor in improving its activity.
Resumo:
The marsupial genus Macropus includes three subgenera, the familiar large grazing kangaroos and wallaroos of M. (Macropus) and M. (Osphranter), as well as the smaller mixed grazing/browsing wallabies of M. (Notamacropus). A recent study of five concatenated nuclear genes recommended subsuming the predominantly browsing Wallabia bicolor (swamp wallaby) into Macropus. To further examine this proposal we sequenced partial mitochondrial genomes for kangaroos and wallabies. These sequences strongly favour the morphological placement of W. bicolor as sister to Macropus, although place M. irma (black-gloved wallaby) within M. (Osphranter) rather than as expected, with M. (Notamacropus). Species tree estimation from separately analysed mitochondrial and nuclear genes favours retaining Macropus and Wallabia as separate genera. A simulation study finds that incomplete lineage sorting among nuclear genes is a plausible explanation for incongruence with the mitochondrial placement of W. bicolor, while mitochondrial introgression from a wallaroo into M. irma is the deepest such event identified in marsupials. Similar such coalescent simulations for interpreting gene tree conflicts will increase in both relevance and statistical power as species-level phylogenetics enters the genomic age. Ecological considerations in turn, hint at a role for selection in accelerating the fixation of introgressed or incompletely sorted loci. More generally the inclusion of the mitochondrial sequences substantially enhanced phylogenetic resolution. However, we caution that the evolutionary dynamics that enhance mitochondria as speciation indicators in the presence of incomplete lineage sorting may also render them especially susceptible to introgression.
Resumo:
Eccentric exercise commonly results in muscle damage. The primary sequence of events leading to exercise-induced muscle damage is believed to involve initial mechanical disruption of sarcomeres, followed by impaired excitation-contraction coupling and calcium signaling, and finally, activation of calcium-sensitive degradation pathways. Muscle damage is characterized by ultrastructural changes to muscle architecture, increased muscle proteins and enzymes in the bloodstream, loss of muscular strength and range of motion and muscle soreness. The inflammatory response to exercise-induced muscle damage is characterized by leukocyte infiltration and production of pro-inflammatory cytokines within damaged muscle tissue, systemic release of leukocytes and cytokines, in addition to alterations in leukocyte receptor expression and functional activity. Current evidence suggests that inflammatory responses to muscle damage are dependent on the type of eccentric exercise, previous eccentric loading (repeated bouts), age and gender. Circulating neutrophil counts and systemic cytokine responses are greater after eccentric exercise using a large muscle mass (e.g. downhill running, eccentric cycling) than after other types of eccentric exercise involving a smaller muscle mass. After an initial bout of eccentric exercise, circulating leukocyte counts and cell surface receptor expression are attenuated. Leukocyte and cytokine responses to eccentric exercise are impaired in elderly individuals, while cellular infiltration into skeletal muscle is greater in human females than males after eccentric exercise. Whether alterations in intracellular calcium homeostasis influence inflammatory responses to muscle damage is uncertain. Furthermore, the effects of antioxidant supplements are variable, and the limited data available indicates that anti-inflammatory drugs largely have no influence on inflammatory responses to eccentric exercise. In this review, we compare local versus systemic inflammatory responses, and discuss some of the possible mechanisms regulating the inflammatory responses to exercise-induced muscle damage in humans.
Resumo:
The aims of this study were to examine the plasma concentrations of inflammatory mediators including cytokines induced by a single bout of eccentric exercise and again 4 weeks later by a second bout of eccentric exercise of the same muscle group. Ten untrained male subjects performed two bouts of the eccentric exercise involving the elbow flexors (6 sets of 5 repetitions) separated by four weeks. Changes in muscle soreness, swelling, and function following exercise were compared between the bouts. Blood was sampled before, immediately after, 1 h, 3 h, 6 h, 24 h (1 d), 48 h (2 d), 72 h (3 d), 96 h (4 d) following exercise bout to measure plasma creatine kinase (CK) activity, plasma concentrations of myoglobin (Mb), interleukin (IL)-1beta, IL-1 receptor antagonist (IL-1ra), IL-4, IL-6, IL-8, IL-10, IL-12p40, tumor necrosis factor (TNF)-alpha, granulocyte colony-stimulating factor (G-CSF), myeloperoxidase (MPO), prostaglandin E2 (PGE2), heat shock protein (HSP) 60 and 70. After the first bout, muscle soreness increased significantly, and there was also significant increase in upper arm circumference; muscle function decreased and plasma CK activity and Mb concentration increased significantly. These changes were significantly smaller after the second bout compared to the first bout, indicating muscle adaptation to the repeated bouts of the eccentric exercise. Despite the evidence of greater muscle damage after the first bout, the changes in cytokines and other inflammatory mediators were quite minor, and considerably smaller than that following endurance exercise. These results suggest that eccentric exercise-induced muscle damage is not associated with the significant release of cytokines into the systemic circulation. After the first bout, plasma G-CSF concentration showed a small but significant increase, whereas TNF-alpha and IL-8 showed significant decreases compared to the pre-exercise values. After the second bout, there was a significant increase in IL-10, and a significant decrease in IL-8. In conclusion, although there was evidence of severe muscle damage after the eccentric exercise, this muscle damage was not accompanied by any large changes in plasma cytokine concentrations. The minor changes in systemic cytokine concentration found in this study might reflect more rapid clearance from the circulation, or a lack of any significant metabolic or oxidative demands during this particular mode of exercise. In relation to the adaptation to the muscle damage, the anti-inflammatory cytokine IL-10 might work as one of the underlying mechanisms of action.
Resumo:
Current older adult capability data-sets fail to account for the effects of everyday environmental conditions on capability. This article details a study that investigates the effects of everyday ambient illumination conditions (overcast, 6000 lx; in-house lighting, 150 lx and street lighting, 7.5 lx) and contrast (90%, 70%, 50% and 30%) on the near visual acuity (VA) of older adults (n= 38, 65-87 years). VA was measured at a 1-m viewing distance using logarithm of minimum angle of resolution (LogMAR) acuity charts. Results from the study showed that for all contrast levels tested, VA decreased by 0.2 log units between the overcast and street lighting conditions. On average, in overcast conditions, participants could detect detail around 1.6 times smaller on the LogMAR charts compared with street lighting. VA also significantly decreased when contrast was reduced from 70% to 50%, and from 50% to 30% in each of the ambient illumination conditions. Practitioner summary: This article presents an experimental study that investigates the impact of everyday ambient illumination levels and contrast on older adults' VA. Results show that both factors have a significant effect on their VA. Findings suggest that environmental conditions need to be accounted for in older adult capability data-sets/designs.
Resumo:
Recent advances in computational geodynamics are applied to explore the link between Earth’s heat, its chemistry and its mechanical behavior. Computational thermal-mechanical solutions are now allowing us to understand Earth patterns by solving the basic physics of heat transfer. This approach is currently used to solve basic convection patterns of terrestrial planets. Applying the same methodology to smaller scales delivers promising similarities between observed and predicted structures which are often the site of mineral deposits. The new approach involves a fully coupled solution to the energy, momentum and continuity equations of the system at all scales, allowing the prediction of fractures, shear zones and other typical geological patterns out of a randomly perturbed initial state. The results of this approach are linking a global geodynamic mechanical framework over regional-scale mineral deposits down to the underlying micro-scale processes. Ongoing work includes the challenge of incorporating chemistry into the formulation.
Resumo:
The texture of agricultural crops changes during harvesting, post harvesting and processing stages due to different loading processes. There are different source of loading that deform agricultural crop tissues and these include impact, compression, and tension. Scanning Electron Microscope (SEM) method is a common way of analysing cellular changes of materials before and after these loading operations. This paper examines the structural changes of pumpkin peel and flesh tissues under mechanical loading. Compression and indentation tests were performed on peel and flesh samples. Samples structure were then fixed and dehydrated in order to capture the cellular changes under SEM. The results were compared with the images of normal peel and flesh tissues. The findings suggest that normal flesh tissue had bigger size cells, while the cellular arrangement of peel was smaller. Structural damage was clearly observed in tissue structure after compression and indentation. However, the damages that resulted from the flat end indenter was much more severe than that from the spherical end indenter and compression test. An integrated deformed tissue layer was observed in compressed tissue, while the indentation tests shaped a deformed area under the indenter and left the rest of the tissue unharmed. There was an obvious broken layer of cells on the walls of the hole after the flat end indentations, whereas the spherical indenter created a squashed layer all around the hole. Furthermore, the influence of loading was lower on peel samples in comparison with the flesh samples. The experiments have shown that the rate of damage on tissue under constant rate of loading is highly dependent on the shape of equipment. This fact and observed structural changes after loading underline the significance of deigning post harvesting equipments to reduce the rate of damage on agricultural crop tissues.
Resumo:
A nanocomposite of Mn3O4 wrapped in graphene sheets (GSs) was successfully synthesized via a facile, effective, energy-saving, and scalable microwave hydrothermal technique. The morphology and microstructures of the fabricated GS–Mn3O4 nanocomposite were characterized using various techniques. The results indicate that the particle size of the Mn3O4 particles in the nanocomposite markedly decreased to nearly 20 nm, significantly smaller than that for the bare Mn3O4. Electrochemical measurements demonstrated a high specific capacity of more than 900 mA h g−1 at 40 mA g−1, and excellent cycling stability with no capacity decay can be observed up to 50 cycles. All of these properties are also interpreted by experimental studies and theoretical calculations.