948 resultados para Reveal
Resumo:
Fatty acids are long-chain carboxylic acids that readily produce \[M - H](-) ions upon negative ion electrospray ionization (ESI) and cationic complexes with alkali, alkaline earth, and transition metals in positive ion ESI. In contrast, only one anionic monomeric fatty acid-metal ion complex has been reported in the literature, namely \[M - 2H + (FeCl)-Cl-II](-). In this manuscript, we present two methods to form anionic unsaturated fatty acid-sodium ion complexes (i.e., \[M - 2H + Na](-)). We find that these ions may be generated efficiently by two distinct methods: (1) negative ion ESI of a methanolic solution containing the fatty acid and sodium fluoride forming an \[M - H + NaF](-) ion. Subsequent collision-induced dissociation (CID) results in the desired \[M - 2H + Na](-) ion via the neutral loss of HF. (2) Direct formation of the \[M - 2H + Na](-) ion by negative ion ESI of a methanolic solution containing the fatty acid and sodium hydroxide or bicarbonate. In addition to deprotonation of the carboxylic acid moiety, formation of \[M - 2H + Na](-) ions requires the removal of a proton from the fatty acid acyl chain. We propose that this deprotonation occurs at the bis-allylic position(s) of polyunsaturated fatty acids resulting in the formation of a resonance-stabilized carbanion. This proposal is supported by ab initio calculations, which reveal that removal of a proton from the bis-allylic position, followed by neutral loss of HX (where X = F- and -OH), is the lowest energy dissociation pathway.
Resumo:
Background The transfer and/or retrieval of a critically patient is inherently dangerous not only for the patient but for staff as well. The quality and experience of unplanned transfers can influence patient mortality and morbidity. However, international evidence suggests that dedicated transfer/retrieval teams can improve mortality and morbidity outcomes. Aims The initial aim of this paper is to describe an in-house competency-based training programme, which encompasses the STaR approach to develop members of our existing nursing team to be part of the dedicated transfer/retrieval service. The paper also presents audit data findings which examined the source of referrals, number of patients actually transferred and clinical status of those being transferred. Results Audit data illustrate that the most frequent source of referrals comes from Accident and Emergency and the Surgical Directorate with the most common presenting condition being cardio-respiratory failure or arrest. Audit data reveal that the number of patients actually transferred or retrieved is relatively small (33%) compared with the overall number of requests for assistance. However, 36% of those patients transferred had a level 2 or level 3 acuity status that necessitated the admission to a critical care area. Conclusions A number of studies have concluded that the ill-experienced and ill-equipped transfer team can place patients’ at serious risk of harm. Whether planned or unplanned, dedicated critical care transfer/retrieval teams have been shown to reduce patient mortality and morbidity.
Resumo:
Shared Material on Dying is a trio/solo work commissioned by Jenny Roche and the Dublin Dance Festival in 2008 from choreographer Liz Roche. Touring widely since its creation, it continues to be a rich research environment for the interrogation by Jenny Roche of the dancer’s first-person perspective in choreographic production and performance. The research perspective drawn from the live performance of this iteration was how the exploration of the same dancing moment might be expressed from multiple perspectives by three different dancers and what this might reveal about the dancer’s inner configuring of the performance environment. Erin Manning (2009) describes the unstable and emergent moment before movement materialises as the preacceleration of the movement, when the potentialities of the gesture collapse and stabilize into form. It is this threshold of potentiality that is interesting, the moment before the dance happens when the configuring process of the dancer brings it into being. Cynthia Roses Thema (2007), after neuroscientist Antonio Damasio, writes that embodied experience is mapped as it unfolds and alters from moment to moment in line with a constantly changing internal milieu. As a performer in this piece, I explored the inner terrain of the three performers (myself included) by externalizing these inner states. This research contributed to a paper presentation at the Digital Resources for the Arts and Humanities Conference, UK 2013.
Resumo:
Significant attention has been given in urban policy literature to the integration of land-use and transport planning and policies—with a view to curbing sprawling urban form and diminishing externalities associated with car-dependent travel patterns. By taking land-use and transport interaction into account, this debate mainly focuses on how a successful integration can contribute to societal well-being, providing efficient and balanced economic growth while accomplishing the goal of developing sustainable urban environments and communities. The integration is also a focal theme of contemporary urban development models, such as smart growth, liveable neighbourhoods, and new urbanism. Even though available planning policy options for ameliorating urban form and transport-related externalities have matured—owing to growing research and practice worldwide—there remains a lack of suitable evaluation models to reflect on the current status of urban form and travel problems or on the success of implemented integration policies. In this study we explore the applicability of indicator-based spatial indexing to assess land-use and transport integration at the neighbourhood level. For this, a spatial index is developed by a number of indicators compiled from international studies and trialled in Gold Coast, Queensland, Australia. The results of this modelling study reveal that it is possible to propose an effective metric to determine the success level of city plans considering their sustainability performance via composite indicator methodology. The model proved useful in demarcating areas where planning intervention is applicable, and in identifying the most suitable locations for future urban development and plan amendments. Lastly, we integrate variance-based sensitivity analysis with the spatial indexing method, and discuss the applicability of the model in other urban contexts.
Resumo:
In the context of modern western psychologised, techno-social hybrid realities, where individuals are incited constantly to work on themselves and perform their self-development in public, the use of online social networking sites (SNSs) can be conceptualised as what Foucault has described as a ‘technique of self’. This article explores examples of status updates on Facebook to reveal that writing on Facebook is a tool for self-formation with historical roots. Exploring examples of self-writing from the past, and considering some of the continuities and discontinuities between these age-old practices and their modern translations, provides a non-technologically deterministic and historically aware way of thinking about the use of new media technologies in modern societies that understands them to be more than mere tools for communication.
Resumo:
Recently, a convex hull-based human identification protocol was proposed by Sobrado and Birget, whose steps can be performed by humans without additional aid. The main part of the protocol involves the user mentally forming a convex hull of secret icons in a set of graphical icons and then clicking randomly within this convex hull. While some rudimentary security issues of this protocol have been discussed, a comprehensive security analysis has been lacking. In this paper, we analyze the security of this convex hull-based protocol. In particular, we show two probabilistic attacks that reveal the user’s secret after the observation of only a handful of authentication sessions. These attacks can be efficiently implemented as their time and space complexities are considerably less than brute force attack. We show that while the first attack can be mitigated through appropriately chosen values of system parameters, the second attack succeeds with a non-negligible probability even with large system parameter values that cross the threshold of usability.
Resumo:
Despite board meetings representing the main arena where directors discharge their duties and make critical corporate decisions, we know little about what occurs in the boardroom. Consequently, there is increasing academic interest in understanding how meetings are run and how directors participate. This study contributes to this emerging literature by exploring the impact of board meeting arrangements on directors’ interactions and perceptions of meeting effectiveness. We video-taped board meetings at two Australian corporations operating in the same industry and use an in-depth analysis of interactions and board processes to reveal that a rather small difference in meeting arrangements (i.e. the timing and length of meetings) had a significant influence on interaction patterns. Specifically, given significant amounts of environmental turbulence in the sector, director inclusiveness and participation were reduced as time pressure increased due to shorter meetings, lowering director perceptions of meeting effectiveness.
Resumo:
How do you identify "good" teaching practice in the complexity of a real classroom? How do you know that beginning teachers can recognise effective digital pedagogy when they see it? How can teacher educators see through their students’ eyes? The study in this paper has arisen from our interest in what pre-service teachers “see” when observing effective classroom practice and how this might reveal their own technological, pedagogical and content knowledge. We asked 104 pre-service teachers from Early Years, Primary and Secondary cohorts to watch and comment upon selected exemplary videos of teachers using ICT (information and communication technologies) in Science. The pre-service teachers recorded their observations using a simple PMI (plus, minus, interesting) matrix which were then coded using the SOLO Taxonomy to look for evidence of their familiarity with and judgements of digital pedagogies. From this, we determined that the majority of preservice teachers we surveyed were using a descriptive rather than a reflective strategy, that is, not extending beyond what was demonstrated in the teaching exemplar or differentiating between action and purpose. We also determined that this method warrants wider trialling as a means of evaluating students’ understandings of the complexity of the digital classroom.
Resumo:
The purpose of this research is to examine School Based Youth Health Nurses experience of partnerships for health education and team teaching. The School Based Youth Health Nurse Program is a contemporary model of school nursing in Queensland, Australia. The role of the School Based Youth Health Nurse consists of individual health consultations and health promotion. This research analyses a subset of qualitative data collected for a larger project about the experience of school based youth health nursing. The Health Promoting Schools model is used as a deductive framework. The findings reveal five subthemes across the three areas of the Health Promoting Schools approach. There are two subthemes within the curriculum, teaching and learning area; We were on the same page so to speak and I can go and do my reports or whatever. There are two sub-themes within the partnerships and services area; I had a beautiful science teacher who was just delightful and really just wanted to do things in partnerships and It’s all airy fairy arty farty stuff that’s not important. There is one theme in the school organisation, ethos and environment area; I just don’t know how well the top of these organisations communicate with the bottom of those organisations. Successful partnerships for health education and team teaching between school nurses and teachers are based on personal relationships based on rapport which lead to trust and reciprocity. Partnerships are limited by teachers understanding of the role of the school nurse and engagement with school nurses in the classroom. Administrative support from the top down is fundamental.
Resumo:
The standard method of labelling proliferating cells uses the thymidine analogue, bromodeoxyuridine (BrdU), which incorporates into the DNA during S-phase of the cell cycle. A disadvantage of this method is that the immunochemical processing requires pre-treatment of the cells and tissue with heat or acid to reveal the antigen. This pre-treatment reduces reliability of the method and degrades the specimen, reducing the ability for multiple immuno-fluorescence labelling at high resolution. We report here the utility of a novel thymidine analogue, ethynyl deoxyuridine (EdU), detected with a fluorescent azide via the “click” chemistry reaction (the Huisgen 1,3-dipolar cycloaddition reaction of an organic azide to a terminal acetylene). The detection of EdU requires no heat or acid treatment and the incorporated EdU is covalently conjugated to fluorescent probe. The reaction is quick and compatible with fluorescence immunochemistry and other fluorescent probes. We show here that EdU is non-toxic in vitro and in vivo and can be used in place of BrdU to label cells during neurogenesis and the progeny identified at least 30 days later. The fluorescent labelling of EdU, markedly improves the detection of proliferating cells and allows concurrent high resolution fluorescence immunochemistry.
Resumo:
Using Media-Access-Control (MAC) address for data collection and tracking is a capable and cost effective approach as the traditional ways such as surveys and video surveillance have numerous drawbacks and limitations. Positioning cell-phones by Global System for Mobile communication was considered an attack on people's privacy. MAC addresses just keep a unique log of a WiFi or Bluetooth enabled device for connecting to another device that has not potential privacy infringements. This paper presents the use of MAC address data collection approach for analysis of spatio-temporal dynamics of human in terms of shared space utilization. This paper firstly discuses the critical challenges and key benefits of MAC address data as a tracking technology for monitoring human movement. Here, proximity-based MAC address tracking is postulated as an effective methodology for analysing the complex spatio-temporal dynamics of human movements at shared zones such as lounge and office areas. A case study of university staff lounge area is described in detail and results indicates a significant added value of the methodology for human movement tracking. By analysis of MAC address data in the study area, clear statistics such as staff’s utilisation frequency, utilisation peak periods, and staff time spent is obtained. The analyses also reveal staff’s socialising profiles in terms of group and solo gathering. The paper is concluded with a discussion on why MAC address tracking offers significant advantages for tracking human behaviour in terms of shared space utilisation with respect to other and more prominent technologies, and outlines some of its remaining deficiencies.
Resumo:
The position(s) of carbon-carbon double bonds within lipids can dramatically affect their structure and reactivity and thus has a direct bearing on biological function. Commonly employed mass spectrometric approaches to the characterization of complex lipids, however, fail to localize sites of unsaturation within the molecular structure and thus cannot distinguish naturally occurring regioisomers. In a recent communication \[Thomas, M. C.; Mitchell, T. W.; Blanksby, S. J. J. Am. Chem. Soc. 2006, 128, 58-59], we have presented a new technique for the elucidation of double bond position in glycerophospholipids using ozone-induced fragmentation within the source of a conventional electrospray ionization mass spectrometer. Here we report the on-line analysis, using ozone electrospray mass spectrometry (OzESI-MS), of a broad range of common unsaturated lipids including acidic and neutral glycerophospholipids, sphingomyelins, and triacylglycerols. All lipids analyzed are found to form a pair of chemically induced fragment ions diagnostic of the position of each double bond(s) regardless of the polarity, the number of charges, or the adduction (e.g., \[M - H](-), \[M - 2H](2-), \[M + H](+), \[M + Na](+), \[M + NH4](+)). The ability of OzESI-MS to distinguish lipids that differ only in the position of the double bonds is demonstrated using the glycerophosphocholine standards, GPCho(9Z-18:1/9Z-18:1) and GPCho(6Z-18:1/6Z-18:1). While these regioisomers cannot be differentiated by their conventional tandem mass spectra, the OzESI-MS spectra reveal abundant fragment ions of distinctive mass-to-charge ratio (m/z). The approach is found to be sufficiently robust to be used in conjunction with the m/z 184 precursor ion scans commonly employed for the identification of phosphocholine-containing lipids in shotgun lipidomic analyses. This tandem OzESI-MS approach was used, in conjunction with conventional tandem mass spectral analysis, for the structural characterization of an unknown sphingolipid in a crude lipid extract obtained from a human lens. The OzESI-MS data confirm the presence of two regioisomers, namely, SM(d18:0/15Z-24:1) and SM(d18:0/17Z-24:1), and suggest the possible presence of a third isomer, SM(d18:0/19Z-24:1), in lower abundance. The data presented herein demonstrate that OzESI-MS is a broadly applicable, on-line approach for structure determination and, when used in conjunction with established tandem mass spectrometric methods, can provide near complete structural characterization of a range of important lipid classes. As such, OzESI-MS may provide important new insight into the molecular diversity of naturally occurring lipids.
Resumo:
This thesis opens up the design space for awareness research in CSCW and HCI. By challenging the prevalent understanding of roles in awareness processes and exploring different mechanisms for actively engaging users in the awareness process, this thesis provides a better understanding of the complexity of these processes and suggests practical solutions for designing and implementing systems that support active awareness. Mutual awareness, a prominent research topic in the fields of Computer-Supported Cooperative Work (CSCW) and Human-Computer Interaction (HCI) refers to a fundamental aspect of a person’s work: their ability to gain a better understanding of a situation by perceiving and interpreting their co-workers actions. Technologically-mediated awareness, used to support co-workers across distributed settings, distinguishes between the roles of the actor, whose actions are often limited to being the target of an automated data gathering processes, and the receiver, who wants to be made aware of the actors’ actions. This receiver-centric view of awareness, focusing on helping receivers to deal with complex sets of awareness information, stands in stark contrast to our understanding of awareness as social process involving complex interactions between both actors and receivers. It fails to take into account an actors’ intimate understanding of their own activities and the contribution that this subjective understanding could make in providing richer awareness information. In this thesis I challenge the prevalent receiver-centric notion of awareness, and explore the conceptual foundations, design, implementation and evaluation of an alternative active awareness approach by making the following five contributions. Firstly, I identify the limitations of existing awareness research and solicit further evidence to support the notion of active awareness. I analyse ethnographic workplace studies that demonstrate how actors engage in an intricate interplay involving the monitoring of their co-workers progress and displaying aspects of their activities that may be of relevance to others. The examination of a large body of awareness research reveals that while disclosing information is a common practice in face-to-face collaborative settings it has been neglected in implementations of technically mediated awareness. Based on these considerations, I introduce the notion of intentional disclosure to describe the action of users actively and deliberately contributing awareness information. I consider challenges and potential solutions for the design of active awareness. I compare a range of systems, each allowing users to share information about their activities at various levels of detail. I discuss one of the main challenges to active awareness: that disclosing information about activities requires some degree of effort. I discuss various representations of effort in collaborative work. These considerations reveal that there is a trade-off between the richness of awareness information and the effort required to provide this information. I propose a framework for active awareness, aimed to help designers to understand the scope and limitations of different types of intentional disclosure. I draw on the identified richness/effort trade-off to develop two types of intentional disclosure, both of which aim to facilitate the disclosure of information while reducing the effort required to do so. For both of these approaches, direct and indirect disclosure, I delineate how they differ from related approaches and define a set of design criteria that is intended to guide their implementation. I demonstrate how the framework of active awareness can be practically applied by building two proof-of-concept prototypes that implement direct and indirect disclosure respectively. AnyBiff, implementing direct disclosure, allows users to create, share and use shared representations of activities in order to express their current actions and intentions. SphereX, implementing indirect disclosure, represents shared areas of interests or working context, and links sets of activities to these representations. Lastly, I present the results of the qualitative evaluation of the two prototypes and analyse the results with regard to the extent to which they implemented their respective disclosure mechanisms and supported active awareness. Both systems were deployed and tested in real world environments. The results for AnyBiff showed that users developed a wide range of activity representations, some unanticipated, and actively used the system to disclose information. The results further highlighted a number of design considerations relating to the relationship between awareness and communication, and the role of ambiguity. The evaluation of SphereX validated the feasibility of the indirect disclosure approach. However, the study highlighted the challenges of implementing cross-application awareness support and translating the concept to users. The study resulted in design recommendations aimed to improve the implementation of future systems.
Resumo:
Recently a convex hull based human identification protocol was proposed by Sobrado and Birget, whose steps can be performed by humans without additional aid. The main part of the protocol involves the user mentally forming a convex hull of secret icons in a set of graphical icons and then clicking randomly within this convex hull. In this paper we show two efficient probabilistic attacks on this protocol which reveal the user’s secret after the observation of only a handful of authentication sessions. We show that while the first attack can be mitigated through appropriately chosen values of system parameters, the second attack succeeds with a non-negligible probability even with large system parameter values which cross the threshold of usability.
Resumo:
In this paper, we propose a steganalysis method that is able to identify the locations of stego bearing pixels in the binary image. In order to do that, our proposed method will calculate the residual between a given stego image and its estimated cover image. After that, we will compute the local entropy difference between these two versions of images as well. Finally, we will compute the mean of residual and mean of local entropy difference across multiple stego images. From these two means, the locations of stego bearing pixels can be identified. The presented empirical results demonstrate that our proposed method can identify the stego bearing locations of near perfect accuracy when sufficient stego images are supplied. Hence, our proposed method can be used to reveal which pixels in the binary image have been used to carry the secret message.