999 resultados para ACS
Resumo:
E-commerce technologies such as a website, email and the use of web browsers enables access to large amounts of information, facilitates communication and provides niche companies with an effective mechanism for competing with larger organisations world-wide. However recent literature has shown Australian SMEs have been slow in the uptake of these technologies. The aim of this research was to determine which factors were important in impacting on small firms' decision making in respect of information technology and e-commerce adoption. Findings indicate that generally the more a firm was concerned about its competitive position such a firm was likely to develop a web site. Moreover the 'Industry and Skill Demands' dimension suggested that as the formal education of the owner/manager increased, coupled with the likelihood that the firm was in the transport and storage or communication services industries, and realising the cost of IT adoption was in effect an investment, then such a firm would be inclined to develop a web site.
Resumo:
The technological environment in which Australian SMEs operate can be best described as dynamic and vital. The rate of technological change provides the SME owner/manager a complex and challenging operational context. Wireless applications are being developed that provide mobile devices with Internet content and e-business services. In Australia the adoption of e-commerce by large organisations has been relatively high, however the same cannot be said for SMEs where adoption has been slower than other developed countries. In contrast however mobile telephone adoption and diffusion is relatively high by SMEs. This exploratory study identifies attitudes, perceptions and issues for mobile data technologies by regional SME owner/managers across a range of industry sectors. The major issues include the sector the firm belongs to, the current adoption status of the firm, the level of mistrust of the IT industry, the cost of the technologies and the applications and attributes of the technologies.
Resumo:
The technological environment in which contemporary small and medium-sized enterprises (SMEs) operate can only be described as dynamic. The exponential rate of technological change, characterised by perceived increases in the benefits associated with various technologies, shortening product life cycles and changing standards, provides the SME a complex and challenging operational context. The primary aim of this research was to identify the needs of SMEs in regional areas for mobile data technologies (MDT). In this study a distinction was drawn between those respondents who were full-adopters of technology, those who were partial-adopters and those who were non-adopters and these three segments articulated different needs and requirements for MDT. Overall the needs of regional SMEs for MDT can be conceptualised into three areas where the technology will assist business practices, communication, e-commerce and security.
Resumo:
The aim of this paper is to contribute to the understanding of various models used in research for the adoption and diffusion of information technology in small and medium-sized enterprises (SMEs). Starting with Rogers' diffusion theory and behavioural models, technology adoption models used in IS research are discussed. Empirical research has shown that the reasons why firms choose to adopt or not adopt technology is dependent on a number of factors. These factors can be categorised as owner/manager characteristics, firm characteristics and other characteristics. The existing models explaining IS diffusion and adoption by SMEs overlap and complement each other. This paper reviews the existing literature and proposes a comprehensive model which includes the whole array of variables from earlier models.
Resumo:
The effects of simulated low earth orbit conditions on vinylidene-fluoride based thin-film piezoelectrics for use in lightweight, large surface area spacecraft such as telescope mirrors and antennae is presented. The environmental factors considered as having the greatest potential to cause damage are temperature, atomic oxygen and vacuum UV radiation. Using the piezoelectric strain coefficients and bimorph deflection measurements the piezoelectric performance over the temperature range -100 to +150°C was studied. The effects of simultaneous AO/VUV exposure were also examined and films characterized by their piezoelectric, surface, and thermal properties. Two fluorinated piezoelectric polymers, poly(vinylidene fluoride) and poly(vinylidene fluoride-co-trifluoroethylene), were adversely affected at elevated temperatures due to depoling caused by randomization of the dipole orientation, while AO/VUV contributed little to depoling but did cause significant surface erosion and, in the case of P(VDF-TrFE), bulk crosslinking. These results highlight the importance of materials selection for use in space environments.
Resumo:
BACKGROUND: Western studies have suggested that emotional stress and distress impacted on the morbidity and mortality in people following acute coronary events. Symptoms of anxiety and depression have been associated with re-infarction and death, prolonged recovery and disability and depression may precipitate the client's low self-esteem. This study examined perceived anxiety, depression and self-esteem of Hong Kong Chinese clients diagnosed with acute coronary syndrome (ACS) over a 6-month period following hospital admission. OBJECTIVES: To examine: DESIGN: A prospective, repeated measures design with measures taken on two occasions over a 6-month period; (1) within the 1st week of hospital admission following the onset of ACS and (2) at 6 months follow up. SETTING AND PARTICIPANTS: Convenient sample of 182 voluntary consented clients admitted with ACS to a major public hospital in Hong Kong who could communicate in Chinese, complete questionnaires, cognitive intact, and were haemodynamically stable and free from acute chest pain at the time of interview. METHODS: Baseline data were obtained within 1 week after hospital admission. The follow-up data was collected 6 months after hospital discharge. The Chinese version of the Hospital Anxiety and Depression Scale (HADS), State Self-esteem Scale (SSES), and Rosenberg's Self-Esteem Scale (RSES) were used to assess anxiety and depression, state self-esteem, and trait self-esteem, respectively. RESULTS: Findings suggested gender differences in clients' perception in anxiety, depression and self-esteem. Improvements in clients' perception of these variables were evident over the 6-month period following their acute coronary events. CONCLUSION: The study confirmed the western notion that psychosocial problems are common among coronary clients and this also applies to Hong Kong Chinese diagnosed with ACS. Further studies to explore effective interventions to address these psychosocial issues are recommended.
Resumo:
We show how to construct a certificateless key agreement protocol from the certificateless key encapsulation mechanism introduced by \cite{lippold-ICISC_2009} in ICISC 2009 using the \cite{DBLP:conf/acisp/BoydCNP08} protocol from ACISP 2008. We introduce the Canetti-Krawczyk (CK) model for certificateless cryptography, give security notions for Type I and Type II adversaries in the CK model, and highlight the differences to the existing e$^2$CK model discussed by \cite{DBLP:conf/pairing/LippoldBN09}. The resulting CK model is more relaxed thus giving more power to the adversary than the original CK model.
Resumo:
ASWEC is a joint conference of Engineers Australia and the Australian Computer Society reporting through the Engineers Australia/ACS Joint Board on Software Engineering.
Resumo:
In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least theoretically, join various types of IMSs to make them interoperable and give users the illusion that they are interacting with just one IMS. However, due to the complexity of an IMS, attempting to join various types of IMSs is a technically challenging task, let alone assessing how well an IMetS manages to integrate these IMSs. The first contribution of this thesis is the development of a generic IMS model called the Layered Identity Infrastructure Model (LIIM). Using this model, we develop a set of properties that an ideal IMetS should provide. This idealized form is then used as a benchmark to evaluate existing IMetSs. Different types of IMS provide varying levels of privacy protection support. Unfortunately, as observed by Jøsang et al (2007), there is insufficient privacy protection in many of the existing IMSs. In this thesis, we study and extend a type of privacy enhancing technology known as an Anonymous Credential System (ACS). In particular, we extend the ACS which is built on the cryptographic primitives proposed by Camenisch, Lysyanskaya, and Shoup. We call this system the Camenisch, Lysyanskaya, Shoup - Anonymous Credential System (CLS-ACS). The goal of CLS-ACS is to let users be as anonymous as possible. Unfortunately, CLS-ACS has problems, including (1) the concentration of power to a single entity - known as the Anonymity Revocation Manager (ARM) - who, if malicious, can trivially reveal a user’s PII (resulting in an illegal revocation of the user’s anonymity), and (2) poor performance due to the resource-intensive cryptographic operations required. The second and third contributions of this thesis are the proposal of two protocols that reduce the trust dependencies on the ARM during users’ anonymity revocation. Both protocols distribute trust from the ARM to a set of n referees (n > 1), resulting in a significant reduction of the probability of an anonymity revocation being performed illegally. The first protocol, called the User Centric Anonymity Revocation Protocol (UCARP), allows a user’s anonymity to be revoked in a user-centric manner (that is, the user is aware that his/her anonymity is about to be revoked). The second protocol, called the Anonymity Revocation Protocol with Re-encryption (ARPR), allows a user’s anonymity to be revoked by a service provider in an accountable manner (that is, there is a clear mechanism to determine which entity who can eventually learn - and possibly misuse - the identity of the user). The fourth contribution of this thesis is the proposal of a protocol called the Private Information Escrow bound to Multiple Conditions Protocol (PIEMCP). This protocol is designed to address the performance issue of CLS-ACS by applying the CLS-ACS in a federated single sign-on (FSSO) environment. Our analysis shows that PIEMCP can both reduce the amount of expensive modular exponentiation operations required and lower the risk of illegal revocation of users’ anonymity. Finally, the protocols proposed in this thesis are complex and need to be formally evaluated to ensure that their required security properties are satisfied. In this thesis, we use Coloured Petri nets (CPNs) and its corresponding state space analysis techniques. All of the protocols proposed in this thesis have been formally modeled and verified using these formal techniques. Therefore, the fifth contribution of this thesis is a demonstration of the applicability of CPN and its corresponding analysis techniques in modeling and verifying privacy enhancing protocols. To our knowledge, this is the first time that CPN has been comprehensively applied to model and verify privacy enhancing protocols. From our experience, we also propose several CPN modeling approaches, including complex cryptographic primitives (such as zero-knowledge proof protocol) modeling, attack parameterization, and others. The proposed approaches can be applied to other security protocols, not just privacy enhancing protocols.
Resumo:
A series of porphyrins substituted in one or two meso-positions by diphenylphosphine oxide groups has been prepared by the palladium catalysed reaction of diphenylphosphine or its oxide with the corresponding bromoporphyrins. Compounds {MDPP-[P(O)Ph2]n} (M = H2, Ni, Zn; H2DPP = 5,15-diphenylporphyrin; n = 1, 2) were isolated in yields of 60-95%. The reaction is believed to proceed via the conventional oxidative addition, phosphination and reductive elimination steps, as the stoichiometric reaction of η1-palladio(II) porphyrin [PdBr(H2DPP)(dppe)] (H2DPP = 5,15-diphenylporphyrin; dppe = 1,2-bis(diphenylphosphino)ethane) with diphenylphosphine oxide also results in the desired mono-porphyrinylphosphine oxide [H2DPP-P(O)Ph2]. Attempts to isolate the tertiary phosphines failed due to their extreme air-sensitivity. Variable temperature 1H NMR studies of [H2DPP-P(O)Ph2] revealed an intrinsic lack of symmetry, while fluorescence spectroscopy showed that the phosphine oxide group does not behave as a "heavy atom" quencher. The electron withdrawing effect of the phosphine oxide group was confirmed by voltammetry. The ligands were characterised by multinuclear NMR and UV-visible spectroscopy as well as mass spectrometry. Single crystal X-ray crystallography showed that the bis(phosphine oxide) nickel(II) complex {[NiDPP-[P(O)Ph2]2} is monomeric in the solid state, with a ruffled porphyrin core and the two P=O fragments on the same side of the average plane of the molecule. On the other hand, the corresponding zinc(II) complex formed infinite chains through coordination of one Ph2PO substituent to the neighbouring zinc porphyrin through an almost linear P=O---Zn unit, leaving the other Ph2PO group facing into a parallel channel filled with disordered water molecules. These new phosphine oxides are attractive ligands for supramolecular porphyrin chemistry.
Resumo:
The indoline dyes D102, D131, D149, and D205 have been characterized when adsorved on fluorine-doped tin oxide (FTO) and TiO2 electrode surfaces. Adsorption from 50:50 acetonitrile - tert-butanol onto flourine-doped tin oxide (FTO) allows approximate Langmuirian binding constants of 6.5 x 10(4), 2.01 x 10(3), 2.0 x 10(4), and 1.5 x 10(4) mol-1 dm3, respectively, to be determined. Voltammetric data obtained in acetonitrile/0.1 M NBu4PF6 indicate reversible on-electron oxidation at Emid = 0.94, 0.91, 0.88, and 0.88 V vs Ag/AgCI(3 M KCI), respectively, with dye aggregation (at high coverage) causing additional peak features at more positive potentials. Slow chemical degradation processes and electron transfer catalysis for iodine oxidation were observed for all four oxidezed indolinium cations. When adsorbed onto TiO2 nanoparticle films (ca. 9nm particle diameter and ca.3/um thickness of FTO0, reversible voltammetric responses with Emid = 1.08, 1.156, 0.92 and 0.95 V vs Ag/AgCI(3 M KCI), respectively, suggest exceptionally fast hole hopping diffusion (with Dapp > 5 x 10(-9) m2 s-1) for adsorbed layers of four indoline dyes, presumably due to pie-pie stacking in surface aggregates. Slow dye degradation is shown to affect charge transport via electron hopping. Spectrelectrochemical data for the adsorbed indoline dyes on FTO-TiO2 revealed a red-shift of absorption peaks after oxidation and the presence of a strong charge transfer band in the near-IR region. The implications of the indoline dye reactivity and fast hole mobility for solar cell devices are discussed.
Resumo:
The Comprehensive Australian Study of Entrepreneurial Emergence (CAUSEE) is a research programme that aims to uncover the factors that initiate, hinder and facilitate the process of emergence of new economic activities and organizations. It is widely acknowledged that entrepreneurship is one of the most important forces shaping changes in a country’s economic landscape (Baumol 1968; Birch 1987; Acs 1999). An understanding of the process by which new economic activity and business entities emerge is vital (Gartner 1993; Sarasvathy 2001). An important development in the study of ‘nascent entrepreneurs’ and ‘firms in gestation’ was the Panel Study of Entrepreneurial Dynamics (PSED) (Gartner et al. 2004) and its extensions in Argentina, Canada, Greece, the Netherlands, Norway and Sweden. Yet while PSED I is an important first step towards systematically studying new venture emergence, it represents just the beginning of a stream of nascent venture studies – most notably PSED II is currently being undertaken in the US (2005– 10) (Reynolds and Curtin 2008).
Resumo:
Poly (lactide-co-glycolide) (PLGA) microspheres have been used for regenerative medicine due to their ability for drug delivery and generally good biocompatibility, but they lack adequate bioactivity for bone repair application. CaSiO3 (CS) has been proposed as a new class of material suitable for bone tissue repair due to its excellent bioactivity. In this study, we set out to incorporate CS into PLGA microspheres to investigate how the phase structure (amorphous and crystal) of CS influences the in vitro and in vivo bioactivity of the composite microspheres, with a view to the application for bone regeneration. X-ray diffraction (XRD), N2 adsorption-desorption analysis and scanning electron microscopy (SEM) were used to analyze the phase structure, surface area/pore volume, and microstructure of amorphous CS (aCS) and crystal CS (cCS), as well as their composite microspheres. The in vitro bioactivity of aCS and cCS – PLGA microspheres was evaluated by investigating their apatite-mineralization ability in simulated body fluids (SBF) and the viability of human bone mesenchymal stem cells (BMSCs). The in vivo bioactivity was investigated by measuring their de novo bone-formation ability. The results showed that the incorporation of both aCS and cCS enhanced the in vitro and in vivo bioactivity of PLGA microspheres. cCS/PLGA microspheres improved better in vitro BMSC viability and de novo bone-formation ability in vivo, compared to aCS/PLGA microspheres. Our study indicates that controlling the phase structure of CS is a promising method to modulate the bioactivity of polymer microsphere system for potential bone tissue regeneration.
Resumo:
Computers are now being widely used in the making of music and the extent of computer use in the music that we hear is farlarger than most people realise. This paper will discuss how computer technology is used in music, with particular reference to music education.