980 resultados para Calloway, Chris


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Warburton-Cooper basins, central Australia, include a multitude of reactivated fracture-fault networks related to a complex, and poorly understood, tectonic evolution. We investigated authigenic illites from a granitic intrusion and sedimentary rocks associated with prominent structural features (Gidgealpa-Merrimelia-Innamincka Ridge and the Nappamerri Trough). These were analysed by 40Ar-39Ar, 87Rb-87Sr and 147Sm-143Nd geochronology to explore the thermal and tectonic histories of central Australian basins. The combined age data provide evidence for three major periods of fault reactivation throughout the Phanerozoic. While Carboniferous (323.3 ± 9.4 Ma) and Late Triassic ages (201.7 ± 9.3 Ma) derive from basin-wide hydrothermal circulation, Cretaceous ages (~128 to ~86 Ma) reflect episodic fluid flow events restricted to the synclinal Nappamerri Trough. Such events result from regional extensional tectonism derived from the transferral of far-field stresses to mechanically and thermally weakened regions of the Australian continent. Specifically, Cretaceous ages reflect continent-wide transmission of tensional stress from a > 2500 km long rifting event on the Eastern (and southern) Australian margin associated with break-up of Gondwana and opening of the Tasman Sea. By integrating 40Ar-39Ar, 87Rb-87Sr and 147Sm-143Nd dating, this study highlights the use of authigenic illite in temporally constraining the tectonic evolution of intracontinental basins that would otherwise remain unknown. Furthermore, combining Sr- and Ar-isotopic systems enables more accurate dating of authigenesis whilst significantly reducing geochemical pitfalls commonly associated with these radioisotopic dating methods.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper reports on a four year Australian Research Council funded Linkage Project titled Skilling Indigenous Queensland, conducted in regional areas of Queensland, Australia from 2009 to 2013. The project sought to investigate Vocational Education and Training (VET) and teaching, Indigenous learners’ needs, employer culture and expectations and community culture and expectations to identify best practice in numeracy teaching for Indigenous VET learners. Specifically it focused on ways to enhance the teaching and learning of courses and the associated mathematics in such courses to benefit learners and increase their future opportunities of employment. To date thirty - nine teachers/trainers/teacher aides and two hundred and thirty - one students consented to participate in the project. Nine VET courses offered in schools and Technical and Further Education Institutes (TAFE) were nominated to be the focus on the study. This paper focuses on student questionnaire responses and interview responses from teachers/trainers one high school principal and five students as a result of these processes, the findings indicated that VET course teachers work hard to adopt contextualising strategies to their teaching; however this process is not always straight forward because of the perceptions of how mathematics has been taught and learned by trainers and teachers. Further teachers, trainers and students have high expectations of one another with the view to successful outcomes from the courses.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this chapter, we discuss four related areas of cryptology, namely, authentication, hashing, message authentication codes (MACs), and digital signatures. These topics represent active and growing research topics in cryptology. Space limitations allow us to concentrate only on the essential aspects of each topic. The bibliography is intended to supplement our survey. We have selected those items which providean overview of the current state of knowledge in the above areas. Authentication deals with the problem of providing assurance to a receiver that a communicated message originates from a particular transmitter, and that the received message has the same content as the transmitted message. A typical authentication scenario occurs in computer networks, where the identity of two communicating entities is established by means of authentication. Hashing is concerned with the problem of providing a relatively short digest–fingerprint of a much longer message or electronic document. A hashing function must satisfy (at least) the critical requirement that the fingerprints of two distinct messages are distinct. Hashing functions have numerous applications in cryptology. They are often used as primitives to construct other cryptographic functions. MACs are symmetric key primitives that provide message integrity against active spoofing by appending a cryptographic checksum to a message that is verifiable only by the intended recipient of the message. Message authentication is one of the most important ways of ensuring the integrity of information that is transferred by electronic means. Digital signatures provide electronic equivalents of handwritten signatures. They preserve the essential features of handwritten signatures and can be used to sign electronic documents. Digital signatures can potentially be used in legal contexts.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this chapter we continue the exposition of crypto topics that was begun in the previous chapter. This chapter covers secret sharing, threshold cryptography, signature schemes, and finally quantum key distribution and quantum cryptography. As in the previous chapter, we have focused only on the essentials of each topic. We have selected in the bibliography a list of representative items, which can be consulted for further details. First we give a synopsis of the topics that are discussed in this chapter. Secret sharing is concerned with the problem of how to distribute a secret among a group of participating individuals, or entities, so that only predesignated collections of individuals are able to recreate the secret by collectively combining the parts of the secret that were allocated to them. There are numerous applications of secret-sharing schemes in practice. One example of secret sharing occurs in banking. For instance, the combination to a vault may be distributed in such a way that only specified collections of employees can open the vault by pooling their portions of the combination. In this way the authority to initiate an action, e.g., the opening of a bank vault, is divided for the purposes of providing security and for added functionality, such as auditing, if required. Threshold cryptography is a relatively recently studied area of cryptography. It deals with situations where the authority to initiate or perform cryptographic operations is distributed among a group of individuals. Many of the standard operations of single-user cryptography have counterparts in threshold cryptography. Signature schemes deal with the problem of generating and verifying electronic) signatures for documents.Asubclass of signature schemes is concerned with the shared-generation and the sharedverification of signatures, where a collaborating group of individuals are required to perform these actions. A new paradigm of security has recently been introduced into cryptography with the emergence of the ideas of quantum key distribution and quantum cryptography. While classical cryptography employs various mathematical techniques to restrict eavesdroppers from learning the contents of encrypted messages, in quantum cryptography the information is protected by the laws of physics.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Brain Research Institute (BRI) uses various types of indirect measurements, including EEG and fMRI, to understand and assess brain activity and function. As well as the recovery of generic information about brain function, research also focuses on the utilisation of such data and understanding to study the initiation, dynamics, spread and suppression of epileptic seizures. To assist with the future focussing of this aspect of their research, the BRI asked the MISG 2010 participants to examine how the available EEG and fMRI data and current knowledge about epilepsy should be analysed and interpreted to yield an enhanced understanding about brain activity occurring before, at commencement of, during, and after a seizure. Though the deliberations of the study group were wide ranging in terms of the related matters considered and discussed, considerable progress was made with the following three aspects. (1) The science behind brain activity investigations depends crucially on the quality of the analysis and interpretation of, as well as the recovery of information from, EEG and fMRI measurements. A number of specific methodologies were discussed and formalised, including independent component analysis, principal component analysis, profile monitoring and change point analysis (hidden Markov modelling, time series analysis, discontinuity identification). (2) Even though EEG measurements accurately and very sensitively record the onset of an epileptic event or seizure, they are, from the perspective of understanding the internal initiation and localisation, of limited utility. They only record neuronal activity in the cortical (surface layer) neurons of the brain, which is a direct reflection of the type of electrical activity they have been designed to record. Because fMRI records, through the monitoring of blood flow activity, the location of localised brain activity within the brain, the possibility of combining fMRI measurements with EEG, as a joint inversion activity, was discussed and examined in detail. (3) A major goal for the BRI is to improve understanding about ``when'' (at what time) an epileptic seizure actually commenced before it is identified on an eeg recording, ``where'' the source of this initiation is located in the brain, and ``what'' is the initiator. Because of the general agreement in the literature that, in one way or another, epileptic events and seizures represent abnormal synchronisations of localised and/or global brain activity the modelling of synchronisations was examined in some detail. References C. M. Michel, G. Thut, S. Morand, A. Khateb, A. J. Pegna, R. Grave de Peralta, S. Gonzalez, M. Seeck and T. Landis, Electric source imaging of human brain functions, Brain Res. Rev. , 36 (2--3), 2001, 108--118. doi:10.1016/S0165-0173(01)00086-8 S. Ogawa, R. S. Menon, S. G. Kim and K. Ugurbil, On the characteristics of functional magnetic resonance imaging of the brain, Annu. Rev. Bioph. Biom. , 27 , 1998, 447--474. doi:10.1146/annurev.biophys.27.1.447 C. D. Binnie and H. Stefan, Modern electroencephalography: its role in epilepsy management, Clin. Neurophysiol. , 110 (10), 1999, 1671--1697. doi:10.1016/S1388-2457(99)00125-X J. X. Tao, A. Ray, S. Hawes-Ebersole and J. S. Ebersole, Intracranial eeg substrates of scalp eeg interictal spikes, Epilepsia , 46 (5), 2005, 669--76. doi:10.1111/j.1528-1167.2005.11404.x S. Ogawa, D. W. Tank, R. Menon, J. M. Ellermann, S. G. Kim, H. Merkle and K. Ugurbil, Intrinsic signal changes accompanying sensory stimulation: Functional brain mapping with magnetic resonance imaging, P. Natl. Acad. Sci. USA , 89 (13), 1992, 5951--5955. doi:10.1073/pnas.89.13.5951 J. Engel Jr., Report of the ilae classification core group, Epilepsia , 47 (9), 2006, 1558--1568. doi:10.1111/j.1528-1167.2006.00215.x L. Lemieux, A. Salek-Haddadi, O. Josephs, P. Allen, N. Toms, C. Scott, K. Krakow, R. Turner and D. R. Fish, Event-related fmri with simultaneous and continuous eeg: description of the method and initial case r port, NeuroImage , 14 (3), 2001, 780--7. doi:10.1006/nimg.2001.0853 P. Federico, D. F. Abbott, R. S. Briellmann, A. S. Harvey and G. D. Jackson, Functional mri of the pre-ictal state, Brain , 128 (8), 2005, 1811-7. doi:10.1093/brain/awh533 C. S. Hawco, A. P. Bagshaw, Y. Lu, F. Dubeau and J. Gotman, bold changes occur prior to epileptic spikes seen on scalp eeg, NeuroImage , 35 (4), 2007, 1450--1458. doi:10.1016/j.neuroimage.2006.12.042 F. Moeller, H. R. Siebner, S. Wolff, H. Muhle, R. Boor, O. Granert, O. Jansen, U. Stephani and M. Siniatchkin, Changes in activity of striato-thalamo-cortical network precede generalized spike wave discharges, NeuroImage , 39 (4), 2008, 1839--1849. doi:10.1016/j.neuroimage.2007.10.058 V. Osharina, E. Ponchel, A. Aarabi, R. Grebe and F. Wallois, Local haemodynamic changes preceding interictal spikes: A simultaneous electrocorticography (ecog) and near-infrared spectroscopy (nirs) analysis in rats, NeuroImage , 50 (2), 2010, 600--607. doi:10.1016/j.neuroimage.2010.01.009 R. S. Fisher, W. Boas, W. Blume, C. Elger, P. Genton, P. Lee and J. Engel, Epileptic seizures and epilepsy: Definitions proposed by the international league against epilepsy (ilae) and the international bureau for epilepsy (ibe), Epilepsia , 46 (4), 2005, 470--472. doi:10.1111/j.0013-9580.2005.66104.x H. Berger, Electroencephalogram in humans, Arch. Psychiat. Nerven. , 87 , 1929, 527--570. C. M. Michel, M. M. Murray, G. Lantz, S. Gonzalez, L. Spinelli and R. G. de Peralta, eeg source imaging, Clin. Neurophysiol. , 115 (10), 2004, 2195--2222. doi:10.1016/j.clinph.2004.06.001 P. L. Nunez and R. B. Silberstein, On the relationship of synaptic activity to macroscopic measurements: Does co-registration of eeg with fmri make sense?, Brain Topogr. , 13 (2), 2000, 79--96. doi:10.1023/A:1026683200895 S. Ogawa, T. M. Lee, A. R. Kay and D. W. Tank, Brain magnetic resonance imaging with contrast dependent on blood oxygenation, P. Natl. Acad. Sci. USA , 87 (24), 1990, 9868--9872. doi:10.1073/pnas.87.24.9868 J. S. Gati, R. S. Menon, K. Ugurbil and B. K. Rutt, Experimental determination of the bold field strength dependence in vessels and tissue, Magn. Reson. Med. , 38 (2), 1997, 296--302. doi:10.1002/mrm.1910380220 P. A. Bandettini, E. C. Wong, R. S. Hinks, R. S. Tikofsky and J. S. Hyde, Time course EPI of human brain function during task activation, Magn. Reson. Med. , 25 (2), 1992, 390--397. K. K. Kwong, J. W. Belliveau, D. A. Chesler, I. E. Goldberg, R. M. Weisskoff, B. P. Poncelet, D. N. Kennedy, B. E. Hoppelm, M. S. Cohen and R. Turner, Dynamic magnetic resonance imaging of human brain activity during primary sensory stimulation, P. Natl. Acad. Sci. USA , 89 (12), 1992, 5675--5679. doi:10.1073/pnas.89.12.5675 J. Frahm, K. D. Merboldt and W. Hnicke, Functional mri of human brain activation at high spatial resolution, Magn. Reson. Med. , 29 (1), 1993, 139--144. P. A. Bandettini, A. Jesmanowicz, E. C. Wong and J. S. Hyde, Processing strategies for time-course data sets in functional MRI of the human brain, Magn. Reson. Med. , 30 (2), 1993, 161--173. K. J. Friston, P. Jezzard and R. Turner, Analysis of functional MRI time-series, Hum. Brain Mapp. , 1 (2), 1994, 153--171. B. Biswal, F. Z. Yetkin, V. M. Haughton and J. S. Hyde, Functional connectivity in the motor cortex of resting human brain using echo-planar mri, Mag. Reson. Med. , 34 (4), 1995, 537--541. doi:10.1002/mrm.1910340409 K. J. Friston, J. Ashburner, C. D. Frith, J. Poline, J. D. Heather and R. S. J. Frackowiak, Spatial registration and normalization of images, Hum. Brain Mapp. , 3 (3), 1995, 165--189. K. J. Friston, S. Williams, R. Howard, R. S. Frackowiak and R. Turner, Movement-related effects in fmri time-series, Magn. Reson. Med. , 35 (3), 1996, 346--355. G. H. Glover, T. Q. Li and D. Ress, Image-based method for retrospective correction of physiological motion effects in fmri: Retroicor, Magn. Reson. Med. , 44 (1), 2000, 162--167. doi:10.1002/1522-2594(200007)44:13.0.CO;2-E K. J. Friston, O. Josephs, G. Rees and R. Turner, Nonlinear event-related responses in fmri, Magn. Reson. Med. , 39 (1), 1998, 41--52. doi:10.1002/mrm.1910390109 K. Ugurbil, L. Toth and D. Kim, How accurate is magnetic resonance imaging of brain function?, Trends Neurosci. , 26 (2), 2003, 108--114. doi:10.1016/S0166-2236(02)00039-5 D. S. Kim, I. Ronen, C. Olman, S. G. Kim, K. Ugurbil and L. J. Toth, Spatial relationship between neuronal activity and bold functional mri, NeuroImage , 21 (3), 2004, 876--885. doi:10.1016/j.neuroimage.2003.10.018 A. Connelly, G. D. Jackson, R. S. Frackowiak, J. W. Belliveau, F. Vargha-Khadem and D. G. Gadian, Functional mapping of activated human primary cortex with a clinical mr imaging system, Radiology , 188 (1), 1993, 125--130. L. Allison, Hidden Markov Models, Technical Report , School of Computer and Software Engineering, Monash University, 2000. R. J. Elliott, L. Aggoun and J.B. Moore, Hidden Markov Models: Estimation and Control, Appl. Math.-Czech. , 2004. B. Bhavnagri, Discontinuities of plane functions projected from a surface with methods for finding these , Technical Report, 2009. B. Bhavnagri, Computer Vision using Shape Spaces , Technical Report,1996, University of Adelaide. B. Bhavnagri, A method for representing shape based on an equivalence relation on polygons, Pattern Recogn. , 27 (2), 1994, 247--260. doi:10.1016/0031-3203(94)90057-4 D. F. Abbott, A. B. Waites, A. S. Harvey and G. D. Jackson, Exploring epileptic seizure onset with fmri, NeuroImage , 36(S1) (344TH-PM), 2007. M. C. Mackey and L. Glass, Oscillation and chaos in physiological control systems, Science , 197 , 1977, 287--289. S. H. Strogatz, SYNC - The Emerging Science of Spontaneous Order , Theia, New York, 2003. J. W. Kim, J. A. Roberts and P. A. Robinson, Dynamics of epileptic seizures: Evolution, spreading, and suppression, J. Theor. Biol. , 257 (4), 2009, 527--532. doi:10.1016/j.jtbi.2008.12.009 Y. Kuramoto, T. Aoyagi, I. Nishikawa, T. Chawanya T and K. Okuda, Neural network model carrying phase information with application to collective dynamics, J. Theor. Phys. , 87 (5), 1992, 1119--1126. V. B. Mountcastle, The columnar organization of the neocortex, Brain , 120 (4), 1997, 701. doi:10.1093/brain/120.4.701 F. L. Silva, W. Blanes, S. N. Kalitzin, J. Parra, P. Suffczynski and D. N. Velis, Epilepsies as dynamical diseases of brain systems: Basic models of the transition between normal and epileptic activity, Epilepsia , 44 (12), 2003, 72--83. F. H. Lopes da Silva, W. Blanes, S. N. Kalitzin, J. Parra, P. Suffczynski and D. N. Velis, Dynamical diseases of brain systems: different routes to epileptic seizures, ieee T. Bio-Med. Eng. , 50 (5), 2003, 540. L.D. Iasemidis, Epileptic seizure prediction and control, ieee T. Bio-Med. Eng. , 50 (5), 2003, 549--558. L. D. Iasemidis, D. S. Shiau, W. Chaovalitwongse, J. C. Sackellares, P. M. Pardalos, J. C. Principe, P. R. Carney, A. Prasad, B. Veeramani, and K. Tsakalis, Adaptive epileptic seizure prediction system, ieee T. Bio-Med. Eng. , 50 (5), 2003, 616--627. K. Lehnertz, F. Mormann, T. Kreuz, R.G. Andrzejak, C. Rieke, P. David and C. E. Elger, Seizure prediction by nonlinear eeg analysis, ieee Eng. Med. Biol. , 22 (1), 2003, 57--63. doi:10.1109/MEMB.2003.1191451 K. Lehnertz, R. G. Andrzejak, J. Arnhold, T. Kreuz, F. Mormann, C. Rieke, G. Widman and C. E. Elger, Nonlinear eeg analysis in epilepsy: Its possible use for interictal focus localization, seizure anticipation, and prevention, J. Clin. Neurophysiol. , 18 (3), 2001, 209. B. Litt and K. Lehnertz, Seizure prediction and the preseizure period, Curr. Opin. Neurol. , 15 (2), 2002, 173. doi:10.1097/00019052-200204000-00008 B. Litt and J. Echauz, Prediction of epileptic seizures, Lancet Neurol. , 1 (1), 2002, 22--30. doi:10.1016/S1474-4422(02)00003-0 M. M{a}kiranta, J. Ruohonen, K Suominen, J. Niinim{a}ki, E. Sonkaj{a}rvi, V. Kiviniemi, T. Sepp{a}nen, S. Alahuhta, V. J{a}ntti and O. Tervonen, {bold} signal increase preceeds eeg spike activity--a dynamic penicillin induced focal epilepsy in deep anesthesia, NeuroImage , 27 (4), 2005, 715--724. doi:10.1016/j.neuroimage.2005.05.025 K. Lehnertz, F. Mormann, H. Osterhage, A. M{u}ller, J. Prusseit, A. Chernihovskyi, M. Staniek, D. Krug, S. Bialonski and C. E. Elger, State-of-the-art of seizure prediction, J. Clin. Neurophysiol. , 24 (2), 2007, 147. doi:10.1097/WNP.0b013e3180336f16 F. Mormann, T. Kreuz, C. Rieke, R. G. Andrzejak, A. Kraskov, P. David, C. E. Elger and K. Lehnertz, On the predictability of epileptic seizures, Clin. Neurophysiol. , 116 (3), 2005, 569--587. doi:10.1016/j.clinph.2004.08.025 F. Mormann, R. G. Andrzejak, C. E. Elger and K. Lehnertz, Seizure prediction: the long and winding road, Brain , 130 (2), 2007, 314--333. doi:10.1093/brain/awl241 Z. Rogowski, I. Gath and E. Bental, On the prediction of epileptic seizures, Biol. Cybern. , 42 (1), 1981, 9--15. Y. Salant, I. Gath, O. Henriksen, Prediction of epileptic seizures from two-channel eeg, Med. Biol. Eng. Comput. , 36 (5), 1998, 549--556. doi:10.1007/BF02524422 J. Gotman and D.J. Koffler, Interictal spiking increases after seizures but does not after decrease in medication, Evoked Potential , 72 (1), 1989, 7--15. J. Gotman and M. G. Marciani, Electroencephalographic spiking activity, drug levels, and seizure occurence in epileptic patients, Ann. Neurol. , 17 (6), 1985, 59--603. A. Katz, D. A. Marks, G. McCarthy and S. S. Spencer, Does interictal spiking change prior to seizures?, Electroen. Clin. Neuro. , 79 (2), 1991, 153--156. A. Granada, R. M. Hennig, B. Ronacher, A. Kramer and H. Herzel, Phase Response Curves: Elucidating the dynamics of couples oscillators, Method Enzymol. , 454 (A), 2009, 1--27. doi:10.1016/S0076-6879(08)03801-9 doi:10.1016/S0076-6879(08)03801-9 H. Kantz and T. Schreiber, Nonlinear time series analysis , 2004, Cambridge Univ Press. M. V. L. Bennett and R. S Zukin, Electrical coupling and neuronal synchronization in the mammalian brain, Neuron , 41 (4), 2004, 495 --511. doi:10.1016/S0896-6273(04)00043-1 L.D. Iasemidis, J. Chris Sackellares, H. P. Zaveri and W. J. Williams, Phase space topography and the Lyapunov exponent of electrocorticograms in partial seizures, Brain Topogr. , 2 (3), 1990, 187--201. doi:10.1007/BF01140588 M. Le Van Quyen, J. Martinerie, V. Navarro, M. Baulac and F. J. Varela, Characterizing neurodynamic changes before seizures, J. Clin. Neurophysiol. , 18 (3), 2001, 191. J. Martinerie, C. Adam, M. Le Van Quyen, M. Baulac, S. Clemenceau, B. Renault and F. J. Varela, Epileptic seizures can be anticipated by non-linear analysis, Nat. Med. , 4 (10), 1998, 1173--1176. doi:10.1038/2667 A. Pikovsky, M. Rosenblum, J. Kurths and R. C. Hilborn, Synchronization: A universal concept in nonlinear science, Amer. J. Phys. , 70 , 2002, 655. H. R. Wilson and J. D. Cowan, Excitatory and inhibitory interactions in localized populations of model neurons, Biophys. J. , 12 (1), 1972, 1--24. D. Cumin and C. P. Unsworth, Generalising the Kuramoto model for the study of neuronal synchronisation in the brain, Physica D , 226 (2), 2007, 181--196. doi:10.1016/j.physd.2006.12.004 F. K. Skinner, H. Bazzazi and S. A. Campbell, Two-cell to N-cell heterogeneous, inhibitory networks: Precise linking of multistable and coherent properties, J. Comput. Neurosci. , 18 (3), 2005, 343--352. doi:10.1007/s10827-005-0331-1 W. W. Lytton, Computer modelling of epilepsy, Nat. Rev. Neurosci. , 9 (8), 2008, 626--637. doi:10.1038/nrn2416 R. D. Traub, A. Bibbig, F. E. N. LeBeau, E. H. Buhl and M. A. Whittington, Cellular mechanisms of neuronal population oscillations in the hippocampus in vitro, Ann. Rev. , 2004. R. D. Traub, A. Draguhn, M. A. Whittington, T. Baldeweg, A. Bibbig, E. H. Buhl and D. Schmitz, Axonal gap junc ions between principal neurons: A novel source of network oscillations, and perhaps epileptogenesis., Rev. Neuroscience , 13 (1), 2002, 1. doi:10.1146/annurev.neuro.27.070203.144303 M. Scheffer, J. Bascompte, W. A. Brock, V. Brovkin, S. R. Carpenter, V. Dakos, H. Held, E. H. van Nes, M. Rietkerk and G. Sugihara, Early-warning signals for critical transitions, Nature , 461 (7260), 2009, 53--59. doi:10.1038/nature08227 K. Murphy, A Brief Introduction to Graphical Models and Bayesian Networks , 2008, http://www.cs.ubc.ca/murphyk/Bayes/bnintro.html . R. C. Bradley, An elementary

Relevância:

10.00% 10.00%

Publicador:

Resumo:

From journalism to social media, the practices of our professional storytellers continue to evolve and change along with our storytelling institutions and their functions. Comprehending these developments is a key problem of contemporary media and cultural studies. Are the politics of representation giving way to a new progressive politics of self-representation and direct participation? Or, instead, are these new genres of self-representation part of a more general demotic turn in the function of contemporary media? Do media merely mediate or amplify cultural identities, or is media functionality becoming, closer to that of a translator or even an author of identities? How can we know if the changing actor-networks of storytelling contribute to a wider democratisation, a reshaping of the hierarchies of voice and agency? This chapter considers the place of one specific critical participatory media production practice known as 'digital storytelling’ in addressing these larger questions of socio-cultural change.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We identify the 10 major terrestrial and marine ecosystems in Australia most vulnerable to tipping points, in which modest environmental changes can cause disproportionately large changes in ecosystem properties. To accomplish this we independently surveyed the coauthors of this paper to produce a list of candidate ecosystems, and then refined this list during a 2-day workshop. The list includes (1) elevationally restricted mountain ecosystems, (2) tropical savannas, (3) coastal floodplains and wetlands, (4) coral reefs, (5) drier rainforests, (6) wetlands and floodplains in the Murray-Darling Basin, (7) the Mediterranean ecosystems of southwestern Australia, (8) offshore islands, (9) temperate eucalypt forests, and (10) salt marshes and mangroves. Some of these ecosystems are vulnerable to widespread phase-changes that could fundamentally alter ecosystem properties such as habitat structure, species composition, fire regimes, or carbon storage. Others appear susceptible to major changes across only part of their geographic range, whereas yet others are susceptible to a large-scale decline of key biotic components, such as small mammals or stream-dwelling amphibians. For each ecosystem we consider the intrinsic features and external drivers that render it susceptible to tipping points, and identify subtypes of the ecosystem that we deem to be especially vulnerable. © 2011 Elsevier Ltd.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Trivium is a stream cipher candidate of the eStream project. It has successfully moved into phase three of the selection process under the hardware category. No attacks faster than the exhaustive search have so far been reported on Trivium. Bivium-A and Bivium-B are simplified versions of Trivium that are built on the same design principles but with two registers. The simplified design is useful in investigating Trivium type ciphers with a reduced complexity and provides insight into effective attacks which could be extended to Trivium. This paper focuses on an algebraic analysis which uses the boolean satisfiability problem in propositional logic. For reduced variants of the cipher, this analysis recovers the internal state with a minimal amount of keystream observations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cleaning of sugar mill evaporators is an expensive exercise. Identifying the scale components assists in determining which chemical cleaning agents would result in effective evaporator cleaning. The current methods (based on x-ray diffraction techniques, ion exchange/high performance liquid chromatography and thermogravimetry/differential thermal analysis) used for scale characterisation are difficult, time consuming and expensive, and cannot be performed in a conventional analytical laboratory or by mill staff. The present study has examined the use of simple descriptor tests for the characterisation of Australian sugar mill evaporator scales. Scale samples were obtained from seven Australian sugar mill evaporators by mechanical means. The appearance, texture and colour of the scale were noted before the samples were characterised using x-ray fluorescence and x-ray powder diffraction to determine the compounds present. A number of commercial analytical test kits were used to determine the phosphate and calcium contents of scale samples. Dissolution experiments were carried out on the scale samples with selected cleaning agents to provide relevant information about the effect the cleaning agents have on different evaporator scales. Results have shown that by simply identifying the colour and the appearance of the scale, the elemental composition and knowing from which effect the scale originates, a prediction of the scale composition can be made. These descriptors and dissolution experiments on scale samples can be used to provide factory staff with an on-site rapid process to predict the most effective chemicals for chemical cleaning of the evaporators.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Developments in evaporator cleaning have accelerated in the past 10 years as a result of an extended period of research into scale formation and scale composition. Chemical cleaning still provides the most cost effective method of cleaning the evaporators. The paper describes a system that was designed to obtain on-line samples of evaporator scale negating the need to open up hot evaporator vessels for scale collection. This system was successfully implemented in a number of evaporators at a sugar mill. This paper also describes a recent experience in a sugar factory in which the cleaning procedure was slightly modified, resulting in effective removal of intractable scale.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Developments in evaporator cleaning have accelerated in the past 10 years as a result of an extended period of research into scale formation and scale composition. Chemical cleaning still provides the most cost effective method of cleaning the evaporators. The paper describes a system that was designed to obtain on-line samples of evaporator scale negating the need to open up hot evaporator vessels for scale collection. This system was successfully implemented in a number of evaporators at a sugar mill. This paper also describes a recent experience in a sugar factory in which the cleaning procedure was slightly modified resulting in effective removal of intractable scale.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper discusses the Townsville City Council Dry Tropics Water Smart (DTWS) initiative, developed by TCC Integrated Sustainability Services (ISS) and Townsville Water, and informed by The University of Adelaide. The program draws on many years of experience by the TCC team to blend key community-based research approaches in order to develop this residential outdoor water conservation program. Several community pilots have been conducted to test different behaviour change strategies and messages. This paper outlines recent steps taken to develop the community trials, as guided by a combination of behaviour change theories including community-based social marketing and thematic communications methods. Some preliminary results are outlined focused on community uptake of different strategies, community perceptions of communication materials, and some insights into the effectiveness of outdoor water hardware.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Several analytical methods for Dynamic System Optimum (DSO) assignment have been proposed but they are basically classified into two kinds. This chapter attempts to establish DSO by equilbrating the path dynamic marginal time (DMT). The authors analyze the path DMT for a single path with tandem bottlenecks and showed that the path DMT is not the simple summation of DMT associated with each bottleneck along the path. Next, the authors examined the DMT of several paths passing through a common bottleneck. It is shown that the externality at the bottleneck is shared by the paths in proportion to their demand from the current time until the queue vanishes. This share of the externality is caused by the departure rate shift under first in first out (FIFO) and the externality propagates to the downstream bottlenecks. However, the externalities propagates to the downstream are calculated out if downstream bottlenecks exist. Therefore, the authors concluded that the path DMT can be evaluated without considering the propagation of the externalities, but just as in the evaluation of the path DMT for a single path passing through a series of bottlenecks between the origin and destination. Based on the DMT analysis, the authors finally proposed a heuristic solution algorithm and verified it by comparing the numerical solution with the analytical one.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The selection of cytochrome P450 enzymes from large variant libraries, and the subsequent use of these enzymes in preparative scale biotransformations, remains a formidable challenge due to the complexities of the associated electron transport systems. Here, a powerful approach for the generation and screening of P450cam libraries for new function is presented that is both flexible and robust. A targeted library was generated wherein only the P450cam active-site amino acids Y96 and F98 were fully randomized and biotransformations, using a novel P450cam whole-cell system, were screened by GC–MS for the hydroxylation of diphenylmethane. One in 50 of the reactions screened, including 16 different variants, produced 4-hydroxydiphenylmethane with up to 92% conversion observed in the case of the Y96A variant. These results demonstrate a primary example of the screening of P450cam libraries in a format that is compatible with extension to preparative scale reactions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background The majority of introns in gene transcripts are found within the coding sequences (CDSs). A small but significant fraction of introns are also found to reside within the untranslated regions (5′UTRs and 3′UTRs) of expressed sequences. Alignment of the whole genome and expressed sequence tags (ESTs) of the model plant Arabidopsis thaliana has identified introns residing in both coding and non-coding regions of the genome. Results A bioinformatic analysis revealed some interesting observations: (1) the density of introns in 5′UTRs is similar to that in CDSs but much higher than that in 3′UTRs; (2) the 5′UTR introns are preferentially located close to the initiating ATG codon; (3) introns in the 5′UTRs are, on average, longer than introns in the CDSs and 3′UTRs; and (4) 5′UTR introns have a different nucleotide composition to that of CDs and 3′UTR introns. Furthermore, we show that the 5′UTR intron of the A. thaliana EFIα-A3 gene affects the gene expression and the size of the 5′UTR intron influences the level of gene expression. Conclusion Introns within the 5′UTR show specific features that distinguish them from introns that reside within the coding sequence and the 3′UTR. In the EFIα-A3 gene, the presence of a long intron in the 5′UTR is sufficient to enhance gene expression in plants in a size dependent manner.