948 resultados para State-contingent Technology
Resumo:
"Serial no. 95-77."
Resumo:
Title varies slightly: some issues have title: Journal of the Franklin Institute; or: Journal of the Franklin Institute devoted to science and the mechanic arts.
Resumo:
"Serial CCC."
Resumo:
Mode of access: Internet.
Resumo:
Item 1070-M (v. 1)
Resumo:
Mode of access: Internet.
Resumo:
"Printed for the use of the Committee on Science and Technology."
Resumo:
"July 1996."
Resumo:
Advances in molecular biology have given us a wide range of protein and peptide-based drugs that are unsuitable for oral delivery because of their high degree of first-pass metabolism. Though parenteral delivery is the obvious answer, for the successful development of commercial chronic and self-administration usage formulations it is not the ideal choice. Transdermal delivery is emerging as the biggest application target for these agents, however, the skin is extremely efficient at keeping out such large molecular weight compounds and therapeutic levels are never going to be realistically achieved by passive absorption. Physical enhancement mechanisms including: iontophoresis, electroporation, ultrasound, photomechanical waves, microneedles and jet-propelled particles are emerging as solutions to this topical delivery dilemma. Adding proteins and peptides to the list of other large molecular weight drugs with insufficient passive transdermal fluxes to be therapeutically useful, we have a collection of pharmacological agents waiting for efficient delivery methods to be introduced. This article reviews the current state of physical transdermal delivery technology, assesses the pros and cons of each technique and summarises the evidence-base of their drug delivery capabilities.
Resumo:
The rheology of 10 Australian honeys was investigated at temperatures -15C to 0C by a strain-controlled rheometer. The honeys exhibited Newtonian behavior irrespective of the temperature, and follow the Cox-Merz rule. G/G' and omega are quadratically related, and the crossover frequencies for liquid to solid transformation and relaxation times were obtained. The composition of the honeys correlates well (r(2) > 0.83) with the viscosity, and with 24 7 data sets (Australian and Greek honeys), the following equation was obtained: mu = 1.41 x 10(-17) exp [-1.20M + 0.01F - 0.0G + (18.6 X 10(3)/T)] The viscosity of the honeys showed a strong dependence on temperature, and four models were examined to describe this. The models gave good fits (r(2) > 0.95), but better fits were obtained for the WLF model using T-g of the honeys and mu(g) = 10(11) Pa.s. The WLF model with its universal values poorly predicted the viscosity, and the implications of the measured rheological behaviors of the honeys in their processing and handling are discussed.
Resumo:
Although computer technology is central to the operation of the modern welfare state, there has been little analysis of its role or of the factors shaping the way in which it is used. Using data generated by expert informants from 13 OECD countries, this paper provides an indicative comparison of the aims of computerization in national social security systems over a 15-year period from 1985 to 2000. The paper seeks to identify and explain patterns in the data and outlines and examines four hypotheses. Building on social constructivist accounts of technology, the first three hypotheses attribute variations in the aims of computerization to different welfare state regimes, forms of capitalism, and structures of public administration. The fourth hypothesis, which plays down the importance of social factors, assumes that computerization is adopted as a means of improving operational efficiency and generating expenditure savings. The findings suggest that, in all 13 countries, computerization was adopted in the expectation that it would lead to increased productivity and higher standards of performance, thus providing most support for the fourth hypothesis. However, variations between countries suggest that the sociopolitical values associated with different welfare state regimes have also had some effect in shaping the ways in which computer technology has been used in national social security systems.
Resumo:
Research in verification and validation (V&V) for concurrent programs can be guided by practitioner information. A survey was therefore run to gain state-of-practice information in this context. The survey presented in this paper collected state-of-practice information on V&V technology in concurrency from 35 respondents. The results of the survey can help refine existing V&V technology by providing a better understanding of the context of V&V technology usage. Responses to questions regarding the motivation for selecting V&V technologies can help refine a systematic approach to V&V technology selection.
Resumo:
This paper examines the question of technology transfer from the perspective of techno-economic security and how companies respond to the possibility of losing competitive advantage through misappropriation or leakage. It explores transfers from Europe to China and addresses in particular the operations of Scandinavian companies within the context of the general picture for other European firms. Its point of departure is the authors' earlier research that looked at the motivations for transfer and the awareness of companies of techno-economic security issues. This has been supplemented by new data gathered by the authors from a number of Scandinavian companies in China. Specific actions have been identified and the ownership issue is introduced together with consideration of the role of the companies against the 'Ferdows' model. The analysis shows that the nature of the security question has changed together with the evolving context in which the companies are operating. In turn, the response of companies is contingent on a number of factors including the time horizon of the strategy for a unit in China and the nature of the strategy. It is also influenced by the form of ownership and management style in a particular organisation. © 2002 Elsevier Science Ltd. All rights reserved.
Resumo:
Purpose - To consider the role of technology in knowledge management in organizations, both actual and desired. Design/methodology/approach - Facilitated, computer-supported group workshops were conducted with 78 people from ten different organizations. The objective of each workshop was to review the current state of knowledge management in that organization and develop an action plan for the future. Findings - Only three organizations had adopted a strongly technology-based "solution" to knowledge management problems, and these followed three substantially different routes. There was a clear emphasis on the use of general information technology tools to support knowledge management activities, rather than the use of tools specific to knowledge management. Research limitations/implications - Further research is needed to help organizations make best use of generally available software such as intranets and e-mail for knowledge management. Many issues, especially human, relate to the implementation of any technology. Participation was restricted to organizations that wished to produce an action plan for knowledge management. The findings may therefore represent only "average" organizations, not the very best practice. Practical implications - Each organization must resolve four tensions: Between the quantity and quality of information/knowledge, between centralized and decentralized organization, between head office and organizational knowledge, and between "push" and "pull" processes. Originality/value - Although it is the group rather than an individual that determines what counts as knowledge, hardly any previous studies of knowledge management have collected data in a group context.