888 resultados para Technology-based incubators
Resumo:
Poly(L-lactide-co-succinic anhydride) networks were synthesised via the carbodiimide-mediated coupling of poly(L-lactide) (PLLA) star polymers. When 4-(dimethylamino)pyridine (DMAP) alone was used as the catalyst gelation did not occur. However, when 4-(dimethylamino)pyridinium p-toluenesulfonate (DPTS), the salt of DMAP and p-toluenesulfonic acid (PTSA), was the catalyst, the networks obtained had gel fractions comparable to those which were reported for networks synthesised by conventional methods. Greater gel fractions and conversion of the prepolymer terminal hydroxyl groups were observed when the hydroxyl-terminated star prepolymers reacted with succinic anhydride in a one-pot procedure than when the hydroxyl-terminated star prepolymers reacted with presynthesised succinic-terminated star prepolymers. The thermal properties of the networks, glass transition temperature (Tg), melting temperature (Tm) and crystallinity (Xc) were all strongly influenced by the average molecular weights between the crosslinks ((M_c). The network with the smallest (M_c )(1400 g/mol) was amorphous and had a Tg of 59 °C while the network with the largest (M_c ) (7800 g/mol) was 15 % crystalline and had a Tg of 56 °C.
Resumo:
US state-based data breach notification laws have unveiled serious corporate and government failures regarding the security of personal information. These laws require organisations to notify persons who may be affected by an unauthorized acquisition of their personal information. Safe harbours to notification exist if personal information is encrypted. Three types of safe harbour have been identified in the literature: exemptions, rebuttable presumptions and factors. The underlying assumption of exemptions is that encrypted personal information is secure and therefore unauthorized access does not pose a risk. However, the viability of this assumption is questionable when examined against data breaches involving encrypted information and the demanding practical requirements of effective encryption management. Recent recommendations by the Australian Law Reform Commission (ALRC) would amend the Privacy Act 1988 (Cth) to implement a data breach scheme that includes a different type of safe harbour, factor based analysis. The authors examine the potential capability of the ALRC’s proposed encryption safe harbour in relation to the US experience at the state legislature level.
Resumo:
Evidence-based practice is increasingly being recognised as an important issue in a range of professional contexts including education, nursing, occupational therapy and librarianship. Many of these professions have observed a relationship or interface between evidence-based practice and information literacy. Using a phenomenographic approach this research explores variation in the how library and information professionals are experiencing evidence-based practice as part of their professional work. The findings of the research provide a basis for arguing that evidence-based practice represents the professional's enactment of information literacy in the workplace.
Resumo:
This report presents the results of the largest study ever conducted into the law, policy and practice of primary school teachers’ reporting of child sexual abuse in New South Wales, Queensland and Western Australia. The study included the largest Australian survey of teachers about reporting sexual abuse, in both government and non-government schools (n=470). Our research has produced evidence-based findings to enhance law, policy and practice about teachers’ reporting of child sexual abuse. The major benefits of our findings and recommendations are to: • Show how the legislation in each State can be improved; • Show how the policies in government and non-government school sectors can be improved; and • Show how teacher training can be improved. These improvements can enhance the already valuable contribution that teachers are making to identify cases of child sexual abuse. Based on the findings of our research, this report proposes solutions to issues in seven key areas of law, policy and practice. These solutions are relevant for State Parliaments, government and non-government educational authorities, and child protection departments. The solutions in each State are practicable, low-cost, and align with current government policy approaches. Implementing these solutions will: • protect more children from sexual abuse; • save cost to governments and society; • develop a professional teacher workforce better equipped for their child protection role; and • protect government and school authorities from legal liability.
Resumo:
The application of near-infrared and infrared spectroscopy has been used for identification and distinction of basic Cu-sulphates that include devilline, chalcoalumite and caledonite. Near-infrared spectra of copper sulphate minerals confirm copper in divalent state. Jahn-Teller effect is more significant in chalcoalumite where 2B1g ® 2B2g transition band shows a larger splitting (490 cm-1) confirming more distorted octahedral coordination of Cu2+ ion. One symmetrical band at 5145 cm-1 with shoulder band 5715 cm-1 result from the absorbed molecular water in the copper complexes are the combinations of OH vibrations of H2O. One sharp band at around 3400 cm-1 in IR common to the three complexes is evidenced by Cu-OH vibrations. The strong absorptions observed at 1685 and 1620 cm-1 for water bending modes in two species confirm strong hydrogen bonding in devilline and chalcoalumite. The multiple bands in v3 and v4(SO4)2- stretching regions are attributed to the reduction of symmetry to the sulphate ion from Td to C2V. Chalcoalumite, the excellent IR absorber over the range 3800-500 cm-1 is treated as most efficient heat insulator among the Cu-sulphate complexes.
Resumo:
Piezoelectric polymers based on polyvinylidene flouride (PVDF) are of interest as adaptive materials for large aperture space-based telescopes. In this study, two piezoelectric polymers, PVDF and P(VDF-TrFE), were exposed to conditions simulating the thermal, radiative and atomic oxygen conditions of low Earth orbit. The degradation pathways were governed by a combination of chemical and physical degradation processes with the molecular changes primarily induced via radiative damage, and physical damage from temperature and atomic oxygen exposure, as evident from depoling, loss of orientation and surface erosion. The piezoelectric responsiveness of each polymer was strongly dependent on exposure temperature. Radiation and atomic oxygen exposure caused physical and chemical degradation, which would ultimately cause terminal damage of thin films, but did not adversely affect the piezoelectric properties.
Resumo:
The effects of simulated low earth orbit conditions on vinylidene-fluoride based thin-film piezoelectrics for use in lightweight, large surface area spacecraft such as telescope mirrors and antennae is presented. The environmental factors considered as having the greatest potential to cause damage are temperature, atomic oxygen and vacuum UV radiation. Using the piezoelectric strain coefficients and bimorph deflection measurements the piezoelectric performance over the temperature range -100 to +150°C was studied. The effects of simultaneous AO/VUV exposure were also examined and films characterized by their piezoelectric, surface, and thermal properties. Two fluorinated piezoelectric polymers, poly(vinylidene fluoride) and poly(vinylidene fluoride-co-trifluoroethylene), were adversely affected at elevated temperatures due to depoling caused by randomization of the dipole orientation, while AO/VUV contributed little to depoling but did cause significant surface erosion and, in the case of P(VDF-TrFE), bulk crosslinking. These results highlight the importance of materials selection for use in space environments.
Resumo:
Insight into the unique structure of hydrotalcites has been obtained using Raman spectroscopy. Gallium containing hydrotalcites of formula Mg4Ga2(CO3)(OH)12•4H2O (2:1 Ga-HT) to Mg8Ga2(CO3)(OH)20•4H2O (4:1 Ga-HT) have been successfully synthesised and characterized by X-ray diffraction and Raman spectroscopy. The d(003) spacing varied from 7.83 Å for the 2:1 hydrotalcite to 8.15 Å for the 3:1 gallium containing hydrotalcite. Raman spectroscopy complemented with selected infrared data has been used to characterise the synthesised gallium containing hydrotalcites of formula Mg6Ga2(CO3)(OH)16•4H2O. Raman bands observed at around 1046, 1048 and 1058 cm-1 were attributed to the symmetric stretching modes of the (CO32-) units. Multiple ν3 CO32- antisymmetric stretching modes are found at around 1346, 1378, 1446, 1464 and 1494 cm-1. The splitting of this mode indicates the carbonate anion is in a perturbed state. Raman bands observed at 710 and 717 cm-1 assigned to the ν4 (CO32-) modes support the concept of multiple carbonate species in the interlayer.
Resumo:
Purpose – One of the critical issues for change management, particularly in relation to the implementation of new technologies, is the existence of prior knowledge and established mental models which may hinder change efforts. Understanding unlearning and how it might assist during organizational change is a way to address this resistance. The purpose of this paper is to present research designed to identify specific factors that facilitate unlearning. Design/methodology/approach – Drawing together issues identified as potential influencers of unlearning, a survey questionnaire was developed and administered in an Australian corporation undergoing large-scale change due to the implementation of an enterprise information system. The results were analyzed to identify specific factors that impact on unlearning. Findings – Findings from this paper identify factors that hinder or help the unlearning process during times of change including understanding the need for change, the level of organizational support and training, assessment of the change, positive experience and informal support, the organization's history of change, individual's prior outlooks, and individuals' feelings and expectations. Research limitations/implications – The use of only one organization does not allow for comparisons between organizations of different sizes, cultures or industries and therefore extension of this research is recommended. Practical implications – For practitioners, this paper provides specific elements at both the level of individuals and the organization that need to be considered for optimal unlearning during times of change. Originality/value – Previous literature on unlearning has been predominantly conceptual and theoretical. These empirical findings serve to further an earlier model based on qualitative research into potential influencers of unlearning.
Resumo:
A decade ago, Queensland University of Technology (QUT) developed an innovative annual Courses Performance Report, but through incremental change, this report became quite labour-intensive. A new risk-based approach to course quality assurance, that consolidates voluminous data in a simple dashboard, responds to the changing context of the higher education sector. This paper will briefly describe QUT’s context and outline the second phase of implementation of this new approach to course quality assurance. The main components are: Individual Course Reports (ICRs), the Consolidated Courses Performance Report (CCPR), Underperforming Courses Status Update and the Strategic Faculty Courses Update (SFCU). These components together form a parsimonious and strategic annual cycle of reporting and place QUT in a positive position to respond to future sector change
Resumo:
The ad hoc networks are vulnerable to attacks due to distributed nature and lack of infrastructure. Intrusion detection systems (IDS) provide audit and monitoring capabilities that offer the local security to a node and help to perceive the specific trust level of other nodes. The clustering protocols can be taken as an additional advantage in these processing constrained networks to collaboratively detect intrusions with less power usage and minimal overhead. Existing clustering protocols are not suitable for intrusion detection purposes, because they are linked with the routes. The route establishment and route renewal affects the clusters and as a consequence, the processing and traffic overhead increases due to instability of clusters. The ad hoc networks are battery and power constraint, and therefore a trusted monitoring node should be available to detect and respond against intrusions in time. This can be achieved only if the clusters are stable for a long period of time. If the clusters are regularly changed due to routes, the intrusion detection will not prove to be effective. Therefore, a generalized clustering algorithm has been proposed that can run on top of any routing protocol and can monitor the intrusions constantly irrespective of the routes. The proposed simplified clustering scheme has been used to detect intrusions, resulting in high detection rates and low processing and memory overhead irrespective of the routes, connections, traffic types and mobility of nodes in the network. Clustering is also useful to detect intrusions collaboratively since an individual node can neither detect the malicious node alone nor it can take action against that node on its own.
Resumo:
Cloud computing is a latest new computing paradigm where applications, data and IT services are provided over the Internet. Cloud computing has become a main medium for Software as a Service (SaaS) providers to host their SaaS as it can provide the scalability a SaaS requires. The challenges in the composite SaaS placement process rely on several factors including the large size of the Cloud network, SaaS competing resource requirements, SaaS interactions between its components and SaaS interactions with its data components. However, existing applications’ placement methods in data centres are not concerned with the placement of the component’s data. In addition, a Cloud network is much larger than data center networks that have been discussed in existing studies. This paper proposes a penalty-based genetic algorithm (GA) to the composite SaaS placement problem in the Cloud. We believe this is the first attempt to the SaaS placement with its data in Cloud provider’s servers. Experimental results demonstrate the feasibility and the scalability of the GA.
Resumo:
TCP is a dominant protocol for consistent communication over the internet. It provides flow, congestion and error control mechanisms while using wired reliable networks. Its congestion control mechanism is not suitable for wireless links where data corruption and its lost rate are higher. The physical links are transparent from TCP that takes packet losses due to congestion only and initiates congestion handling mechanisms by reducing transmission speed. This results in wasting already limited available bandwidth on the wireless links. Therefore, there is no use to carry out research on increasing bandwidth of the wireless links until the available bandwidth is not optimally utilized. This paper proposed a hybrid scheme called TCP Detection and Recovery (TCP-DR) to distinguish congestion, corruption and mobility related losses and then instructs the data sending host to take appropriate action. Therefore, the link utilization is optimal while losses are either due to high bit error rate or mobility.
Resumo:
We describe the design and implementation of a public-key platform, secFleck, based on a commodity Trusted Platform Module (TPM) chip that extends the capability of a standard node. Unlike previous software public-key implementations this approach provides E- Commerce grade security; is computationally fast, energy efficient; and has low financial cost — all essential attributes for secure large-scale sen- sor networks. We describe the secFleck message security services such as confidentiality, authenticity and integrity, and present performance re- sults including computation time, energy consumption and cost. This is followed by examples, built on secFleck, of symmetric key management, secure RPC and secure software update.