941 resultados para Network Formation
Resumo:
The reactions of distonic 4-(N, N, N-trimethylammonium)-2-methylphenyl and 5-(N, N, N-trimethylammonium)-2-methylphenyl radical cations (m/z 149) with O-2 are studied in the gas phase using ion-trap mass spectrometry. Photodissociation (PD) of halogenated precursors gives rise to the target distonic charge-tagged methylphenyl radical whereas collision-induced dissociation (CID) is found to produce unreactive radical ions. The PD generated distonic radicals, however, react rapidly with O-2 to form \[M + O2](center dot+) and \[M + O-2 - OH](center dot+) ions, detected at m/z 181 and m/z 164, respectively. Quantum chemical calculations using G3SX(MP3) and M06-2X theories are deployed to examine key decomposition pathways of the 5-(N, N, N-trimethylammonium)-2-methylphenylperoxyl radical and rationalise the observed product ions. The prevailing product mechanism involves a 1,5- H shift in the peroxyl radical forming a QOOH-type intermediate that subsequently eliminates (OH)-O-center dot to yield charge-tagged 2-quinone methide. Our study suggests that the analogous process should occur for the neutral methylphenyl + O-2 reaction, thus serving as a plausible source of (OH)-O-center dot radicals in combustion environments. Grants: ARC/DP0986738, ARC/DP130100862
Resumo:
Fatty acids are long-chain carboxylic acids that readily produce \[M - H](-) ions upon negative ion electrospray ionization (ESI) and cationic complexes with alkali, alkaline earth, and transition metals in positive ion ESI. In contrast, only one anionic monomeric fatty acid-metal ion complex has been reported in the literature, namely \[M - 2H + (FeCl)-Cl-II](-). In this manuscript, we present two methods to form anionic unsaturated fatty acid-sodium ion complexes (i.e., \[M - 2H + Na](-)). We find that these ions may be generated efficiently by two distinct methods: (1) negative ion ESI of a methanolic solution containing the fatty acid and sodium fluoride forming an \[M - H + NaF](-) ion. Subsequent collision-induced dissociation (CID) results in the desired \[M - 2H + Na](-) ion via the neutral loss of HF. (2) Direct formation of the \[M - 2H + Na](-) ion by negative ion ESI of a methanolic solution containing the fatty acid and sodium hydroxide or bicarbonate. In addition to deprotonation of the carboxylic acid moiety, formation of \[M - 2H + Na](-) ions requires the removal of a proton from the fatty acid acyl chain. We propose that this deprotonation occurs at the bis-allylic position(s) of polyunsaturated fatty acids resulting in the formation of a resonance-stabilized carbanion. This proposal is supported by ab initio calculations, which reveal that removal of a proton from the bis-allylic position, followed by neutral loss of HX (where X = F- and -OH), is the lowest energy dissociation pathway.
Resumo:
The anionic heterocumulene SCCCN- was generated in the gas phase by collisional activation of the radical anion of 1,2-dicyanoethylenedithiolate. The mechanism of this reaction, as well as the structures of neutral and anionic products, was investigated by hybrid density functional theory (DFT) calculations. Dissociation to form SCCCN- and SCN is proposed to occur by a radical directed cyano migration reaction, with calculations suggesting this is the lowest energy fragmentation pathway available to the precursor anion. In contrast, the even-electron protonated 1,2-dicyanoethylenedithiolate anion fragmented by loss of HCN.
Resumo:
Many large-scale GNSS CORS networks have been deployed around the world to support various commercial and scientific applications. To make use of these networks for real-time kinematic positioning services, one of the major challenges is the ambiguity resolution (AR) over long inter-station baselines in the presence of considerable atmosphere biases. Usually, the widelane ambiguities are fixed first, followed by the procedure of determination of the narrowlane ambiguity integers based on the ionosphere-free model in which the widelane integers are introduced as known quantities. This paper seeks to improve the AR performance over long baseline through efficient procedures for improved float solutions and ambiguity fixing. The contribution is threefold: (1) instead of using the ionosphere-free measurements, the absolute and/or relative ionospheric constraints are introduced in the ionosphere-constrained model to enhance the model strength, thus resulting in the better float solutions; (2) the realistic widelane ambiguity precision is estimated by capturing the multipath effects due to the observation complexity, leading to improvement of reliability of widelane AR; (3) for the narrowlane AR, the partial AR for a subset of ambiguities selected according to the successively increased elevation is applied. For fixing the scalar ambiguity, an error probability controllable rounding method is proposed. The established ionosphere-constrained model can be efficiently solved based on the sequential Kalman filter. It can be either reduced to some special models simply by adjusting the variances of ionospheric constraints, or extended with more parameters and constraints. The presented methodology is tested over seven baselines of around 100 km from USA CORS network. The results show that the new widelane AR scheme can obtain the 99.4 % successful fixing rate with 0.6 % failure rate; while the new rounding method of narrowlane AR can obtain the fix rate of 89 % with failure rate of 0.8 %. In summary, the AR reliability can be efficiently improved with rigorous controllable probability of incorrectly fixed ambiguities.
Resumo:
Detecting anomalies in the online social network is a significant task as it assists in revealing the useful and interesting information about the user behavior on the network. This paper proposes a rule-based hybrid method using graph theory, Fuzzy clustering and Fuzzy rules for modeling user relationships inherent in online-social-network and for identifying anomalies. Fuzzy C-Means clustering is used to cluster the data and Fuzzy inference engine is used to generate rules based on the cluster behavior. The proposed method is able to achieve improved accuracy for identifying anomalies in comparison to existing methods.
Resumo:
Safety concerns in the operation of autonomous aerial systems require safe-landing protocols be followed during situations where the mission should be aborted due to mechanical or other failure. This article presents a pulse-coupled neural network (PCNN) to assist in the vegetation classification in a vision-based landing site detection system for an unmanned aircraft. We propose a heterogeneous computing architecture and an OpenCL implementation of a PCNN feature generator. Its performance is compared across OpenCL kernels designed for CPU, GPU, and FPGA platforms. This comparison examines the compute times required for network convergence under a variety of images to determine the plausibility for real-time feature detection.
Resumo:
In the context of modern western psychologised, techno-social hybrid realities, where individuals are incited constantly to work on themselves and perform their self-development in public, the use of online social networking sites (SNSs) can be conceptualised as what Foucault has described as a ‘technique of self’. This article explores examples of status updates on Facebook to reveal that writing on Facebook is a tool for self-formation with historical roots. Exploring examples of self-writing from the past, and considering some of the continuities and discontinuities between these age-old practices and their modern translations, provides a non-technologically deterministic and historically aware way of thinking about the use of new media technologies in modern societies that understands them to be more than mere tools for communication.
Capital Formation in the Futures Focused School : Indicators of a Breakthrough in School Improvement
Resumo:
Network coding is a method for achieving channel capacity in networks. The key idea is to allow network routers to linearly mix packets as they traverse the network so that recipients receive linear combinations of packets. Network coded systems are vulnerable to pollution attacks where a single malicious node floods the network with bad packets and prevents the receiver from decoding correctly. Cryptographic defenses to these problems are based on homomorphic signatures and MACs. These proposals, however, cannot handle mixing of packets from multiple sources, which is needed to achieve the full benefits of network coding. In this paper we address integrity of multi-source mixing. We propose a security model for this setting and provide a generic construction.
Resumo:
For TREC Crowdsourcing 2011 (Stage 2) we propose a networkbased approach for assigning an indicative measure of worker trustworthiness in crowdsourced labelling tasks. Workers, the gold standard and worker/gold standard agreements are modelled as a network. For the purpose of worker trustworthiness assignment, a variant of the PageRank algorithm, named TurkRank, is used to adaptively combine evidence that suggests worker trustworthiness, i.e., agreement with other trustworthy co-workers and agreement with the gold standard. A single parameter controls the importance of co-worker agreement versus gold standard agreement. The TurkRank score calculated for each worker is incorporated with a worker-weighted mean label aggregation.
Resumo:
This thesis is the first comprehensive study of important parameters relating to aerosols' impact on climate and human health, namely spatial variation, particle size distribution and new particle formation. We determined the importance of spatial variation of particle number concentration in microscale environments, developed a method for particle size parameterisation and provided knowledge about the chemistry of new particle formation. This is a significant contribution to our understanding of processes behind the transformation and dynamics of urban aerosols. This PhD project included extensive measurements of air quality parameters using state of the art instrumentation at each of the 25 sites within the Brisbane metropolitan area and advanced statistical analysis.
Resumo:
This study investigates grade eight girls’ use of status updates on Facebook in order to create identities online. Using sociologist Erving Goffman’s theory of self-presentation as a framework, Jones and Pittman’s subsequent strategies of self-presentation are used to discover the ways in which teenage girls use status updates in order to create identities online and manage audience impressions. Using a mixed methods design, the results showed that, while existing self-presentation strategies persist, social networking has created new means of self-presentation. This study adds to a growing pool of research regarding teens’ engagement with social networking websites to form identities.
Resumo:
A new strategy has emerged to improve healing of bone defects using exogenous glycosaminoglycans by increasing the effectiveness of bone-anabolic growth factors. Wnt ligands play an important role in bone formation. However, their functional interactions with heparan sulfate/heparin have only been investigated in non-osseous tissues. Our study now shows that the osteogenic activity of Wnt3a is cooperatively stimulated through physical interactions with exogenous heparin. N-Sulfation and to a lesser extent O-sulfation of heparin contribute to the physical binding and optimal co-stimulation of Wnt3a. Wnt3a-heparin signaling synergistically increases osteoblast differentiation with minimal effects on cell proliferation. Thus, heparin selectively reduces the effective dose of Wnt3a needed to elicit osteogenic, but not mitogenic responses. Mechanistically, Wnt3a-heparin signaling strongly activates the phosphoinositide 3-kinase/Akt pathway and requires the bone-related transcription factor RUNX2 to stimulate alkaline phosphatase activity, which parallels canonical beta-catenin signaling. Collectively, our findings establish the osteo-inductive potential of a heparin-mediated Wnt3a-phosphoinositide 3-kinase/Akt-RUNX2 signaling network and suggest that heparan sulfate supplementation may selectively reduce the therapeutic doses of peptide factors required to promote bone formation.
Resumo:
Objective To understand how the formal curriculum experience of an Australian undergraduate pharmacy program supports students’ professional identity formation. Methods A qualitative ethnographic study was conducted over four weeks using participant observation and examined the ‘typical’ student experience from the perspective of a pharmacist. A one-week period of observation was undertaken with each of the four year groups (that is, for years one to four) comprising the undergraduate curriculum. Data were collected through observation of the formal curriculum experience using field notes, a reflective journal and informal interviews with 38 pharmacy students. Data were analyzed thematically using an a priori analytical framework. Results Our findings showed that the observed curriculum was a conventional curricular experience which focused on the provision of technical knowledge and provided some opportunities for practical engagement. There were some opportunities for students to imagine themselves as pharmacists, for example, when the lecture content related to practice or teaching staff described their approach to practice problems. However, there were limited opportunities for students to observe pharmacist role models, experiment with being a pharmacist or evaluate their professional identities. While curricular learning activities were available for students to develop as pharmacists e.g. patient counseling, there was no contact with patients and pharmacist academic staff tended to role model as educators with little evidence of their pharmacist selves. Conclusion These findings suggest that the current conventional approach to the curriculum design may not be fully enabling learning experiences which support students in successfully negotiating their professional identities. Instead it appeared to reinforce their identities as students with a naïve understanding of professional practice, making their future transition to professional practice challenging.
Resumo:
This special issue of Networking Science focuses on Next Generation Network (NGN) that enables the deployment of access independent services over converged fixed and mobile networks. NGN is a packet-based network and uses the Internet protocol (IP) to transport the various types of traffic (voice, video, data and signalling). NGN facilitates easy adoption of distributed computing applications by providing high speed connectivity in a converged networked environment. It also makes end user devices and applications highly intelligent and efficient by empowering them with programmability and remote configuration options. However, there are a number of important challenges in provisioning next generation network technologies in a converged communication environment. Some preliminary challenges include those that relate to QoS, switching and routing, management and control, and security which must be addressed on an urgent or emergency basis. The consideration of architectural issues in the design and pro- vision of secure services for NGN deserves special attention and hence is the main theme of this special issue.