952 resultados para PRESERVATION
Resumo:
A mineralogical survey of chondritic interplanetary dust particles (IDPs)showed that these micrometeorites differ significantly in form and texture from components of carbonaceous chondrites and contain some mineral assemblages which do not occur in any meteorite class1. Models of chondritic IDP mineral evolution generally ignore the typical (ultra-) fine grain size of consituent minerals which range between 0.002-0.1µm in size2. The chondritic porous (CP) subset of chondritic IDPs is probably debris from short period comets although evidence for a cometary origin is still circumstantial3. If CP IDPs represent dust from regions of the Solar System in which comet accretion occurred, it can be argued that pervasive mineralogical evolution of IDP dust has been arrested due to cryogenic storage in comet nuclei. Thus, preservation in CP IDPs of "unusual meteorite minerals", such as oxides of tin, bismuth and titanium4, should not be dismissed casually. These minerals may contain specific information about processes that occurred in regions of the solar nebula, and early Solar System, which spawned the IDP parent bodies such as comets and C, P and D asteroids6. It is not fully appreciated that the apparent disparity between the mineralogy of CP IDPs and carbonaceous chondrite matrix may also be caused by the choice of electron-beam techniques with different analytical resolution. For example, Mg-Si-Fe distributions of Cl matrix obtained by "defocussed beam" microprobe analyses are displaced towards lower Fe-values when using analytical electron microscope (AEM)data which resolve individual mineral grains of various layer silicates and magnetite in the same matrix6,7. In general, "unusual meteorite minerals" in chondritic IDPs, such as metallic titanium, Tin01-n(Magneli phases) and anatase8 add to the mineral data base of fine-grained Solar System materials and provide constraints on processes that occurred in the early Solar System.
Resumo:
Currently, 1.3 billion tonnes of food is lost annually due to lack of proper processing and preservation method. Drying is one of the easiest and oldest methods of food processing which can contribute to reduce that huge losses, combat hunger and promote food security. Drying increase shelf life, reduce weight and volume of food thus minimize packing, storage, and transportation cost and enable storage of food under ambient environment. However, drying is a complex process which involves combination of heat and mass transfer and physical property change and shrinkage of the food material. Modelling of this process is essential to optimize the drying kinetics and improve energy efficiency of the process. Since material properties varies with moisture content, the models should not consider constant materials properties, constant diffusion .The objective of this paper is to develop a multiphysics based mathematical model to simulate coupled heat and mass transfer during convective drying of fruit considering variable material properties. This model can be used predict the temperature and moisture distribution inside the food during drying. Effect of different drying air temperature and drying air velocity on drying kinetics has been demonstrated. The governing equations of heat and mass transfer were solved with Comsol Multiphysics 4.3.
Resumo:
Food has been a major agenda in political, socio-cultural, and environmental domains throughout history. The significance of food has been particularly highlighted in recent years with the growing public awareness of the unfolding impacts of climate change, challenging our understanding, practice, and expectations of our relationship with food. Parallel to this development has been the rise of web applications such as blogs, wikis, video and photo sharing sites, and social networking systems that are arguably more open, collaborative, and personalisable. These so-called ‘Web 2.0’ technologies have contributed to a more participatory Internet experience than what had previously been possible. An increasing number of these social applications are now available on mobile technologies where they take advantage of device-specific features such as sensors, location and context awareness, further expanding potential for the culture of participation and creativity. This international volume assembles a diverse collection of book chapters that contribute towards exploring and better understanding the opportunities and challenges provided by tools, interfaces, methods, and practices of social and mobile technology to enable engagement with people and creativity in the domain of food in contemporary society. It brings together an international group of academics and practitioners from a diverse range of disciplines such as computing and engineering, social sciences, digital media and human-computer interaction to critically examine a range of applications of social and mobile technology, such as social networking, mobile interaction, wikis, twitter, blogging, mapping, shared displays and urban screens, and their impact to foster a better understanding and practice of environmentally, socio-culturally, economically, and health-wise sustainable food culture.
Resumo:
Intercalated Archean komatiites and dacites sit above a thick footwall dacite unit in the host rock succession at the Black Swan Nickel Mine, north of Kalgoorlie in the Yilgarn Craton, Western Australia. Both lithofacies occur in units that vary in scale from laterally extensive at the scale of the mine lease to localized, thin, irregular bodies, from > 100 m thick to only centimetres thick. Some dacites are only slightly altered and deformed, and are interpreted to post-date major deformation and alteration (late porphyries). However, the majority of the dacites display evidence of deformation, especially at contacts, and metamorphism, varying from silicification and chlorite alteration at contacts to pervasive low grade regional metamorphic alteration represented by common assemblages of chlorite, sericite and albite. Texturally, the dacites vary from entirely massive and coherent to partially brecciated to totally brecciated. Strangely, some dacites are coherent at the margins and brecciated internally. Breccia textures vary from cryptically defined, to blocky, closely packed, in situ jig-saw fit textures with secondary minerals in fractures between clasts, to more apparent matrix rich textures with round clast forms, giving apparent conglomerate textures. Some clast zones have multi-coloured clasts, giving the impression of varied provenance. Strangely however, all these textural variants have gradational relationships with each other, and no bedding or depositional structures are present. This indicates that all textures have an in situ origin. The komatiites are generally altered and pervasively carbonate veined. Preservation of original textures is patchy and local, but includes coarse adcumulate, mesocumulate, orthocumulate, crescumulate-harrisite and occasionally spinifex textures. Where original contacts between komatiites and dacites are preserved intact (i.e. not sheared or overprinted by alteration), the komatiites have chilled margins, whereas the dacites do not. The margins of the dacites are commonly silicified, and inclusions of dacite occur in komatiite, even at the top contacts of komatiite units, but komatiite clasts do not occur in the dacites. The komatiites therefore were emplaced as sills into the dacites, and the intercalated relationships are interpreted as intrusive. The brecciation and alteration in the dacites are interpreted as being largely due to hydraulic fracturing and alteration induced by contact metamorphic effects and hydrothermal alteration deriving from the intrusion of komatiites into the felsic pile. The absence of autobreccia and hyaloclastite textures in the dacites suggest that they were emplaced as an earlier intrusive (sill?) complex at a high level in the crust.
Resumo:
Complex Internet attacks may come from multiple sources, and target multiple networks and technologies. Nevertheless, Collaborative Intrusion Detection Systems (CIDS) emerges as a promising solution by using information from multiple sources to gain a better understanding of objective and impact of complex Internet attacks. CIDS also help to cope with classical problems of Intrusion Detection Systems (IDS) such as zero-day attacks, high false alarm rates and architectural challenges, e. g., centralized designs exposing the Single-Point-of-Failure. Improved complexity on the other hand gives raise to new exploitation opportunities for adversaries. The contribution of this paper is twofold. We first investigate related research on CIDS to identify the common building blocks and to understand vulnerabilities of the Collaborative Intrusion Detection Framework (CIDF). Second, we focus on the problem of anonymity preservation in a decentralized intrusion detection related message exchange scheme. We use techniques from design theory to provide multi-path peer-to-peer communication scheme where the adversary can not perform better than guessing randomly the originator of an alert message.
Resumo:
Information privacy is a crucial aspect of eHealth. Appropriate privacy management measures are therefore essential for its success. However, traditional measures for privacy preservation such as rigid access controls (i.e., preventive measures) are not suitable to eHealth because of the specialised and information - intensive nature of healthcare itself, and the nature of the information. Healthcare professionals (HCP) require easy, unrestricted access to as much information as possible towards making well - informed decisions. On the other end of the scale however, consumers (i.e., patients) demand control over their health information and raise concerns for privacy arising from internal activities (i.e., information use by HCPs). A proper balance of these competing concerns is vital for the implementation of successful eHealth systems. Towards reaching this balance, we propose an information accountability framework (IAF) for eHealth systems.
Resumo:
California is home to multiple queer community archives created by community members outside of government, academic, and public archives. These archives are maintained by the communities and are important spaces not only for the preservation of records, but also as safe spaces to study, gather, and learn about the communities’ histories. This article describes the histories of three such queer community archives (Gay, Lesbian, Bisexual, Transgender Historical Society Lavender Library, Archives, and Cultural Exchange of Sacramento, Inc.; and ONE National Gay & Lesbian Archives) in order to discuss the role of activism in the community archives and implications for re-examining the role of activism to incorporate communities into the heart of archival professional work. By understanding the impetus for creating and maintaining queer community archives, archivists can use this knowledge to foster more reflective practices to be more inclusive in their archival practices through outreach, collaboration, and descriptive practices. This article extends our knowledge of community archives and provides evidence for the need to include communities in archival professional practice.
Resumo:
We present a tool for automatic analysis of computational indistinguishability between two strings of information. This is designed as a generic tool for proving cryptographic security based on a formalism that provides computational soundness preservation. The tool has been implemented and tested successfully with several cryptographic schemes.
Resumo:
This thesis examines the role of government as proprietor, preserver and user of copyright material under the Copyright Act 1968 (Cth) and the policy considerations which Australian law should take into account in that role. There are two recurring themes arising in this examination which are significant to the recommendations and conclusions. The first is whether the needs and status of government should be different from private sector institutions, which also obtain copyright protection under the law. This theme stems from the 2005 Report on Crown Copyright by the Copyright Law Review Committee and the earlier Ergas Committee Report which are discussed in Chapters 2 and 8 of this thesis. The second is to identify the relationship between government copyright law and policy, national cultural policy and fundamental governance values. This theme goes to the essence of the thesis. For example, does the law and practice of government copyright properly reflect technological change in the way we now access and use information and does it facilitate the modern information management principles of government? Is the law and practice of government copyright consistent with the greater openness and accountability of government? The thesis concludes that government copyright law and practice in each of the three governmental roles recognised under the Copyright Act 1968 has not responded adequately to the information age and to the desire and the ability of individuals to access information quickly and effectively. The solution offered in this thesis is reform of the law and of public policy that is in step with access to information policy, the promotion of better communication and interaction with the community, and the enhanced preservation of government and private copyright materials for reasons of government accountability, effective administration and national culture and heritage.
Resumo:
This study aimed to identify how school leaders’ practices influence department activities during school transformation. The method used to explore emerging disturbances and contradictions within and between school departments was based on Cultural Historical Activity Theory (CHAT). The findings show that in order to implement educational changes in schools successfully, leaders should promote the change they envision as being highly consistent with the current collective identity (shared object) of the departments. From this perspective, the systemic components of the school departments are given a sense of preservation and continuity, rather than loss.
Resumo:
Purpose The purpose of this paper is to attempt to bridge the gap between sustainable housing and the use of smart technologies to improve the level of sustainability in the housing construction in Saudi Arabia, by discussing the barriers and enablers concerned with applying sustainability to housing construction in Saudi Arabia, which utilises smart technologies. Design/methodology/approach A Delphi method survey was employed, for which 25 individuals from three key stakeholder groups of the Saudi housing sector participated. They were asked about their degree of agreement (or disagreement) about the various barriers and enablers of applying sustainability to housing construction in Saudi Arabia, which utilises smart technologies. This research paper must be considered as an indicative study of selected experts that do not represent in any way the total population of Saudi Arabia. Findings Lack of public awareness has been identified as the most significant barrier in implementing sustainable housing development in Saudi Arabia, which utilises smart technologies. Raising awareness of the public to the benefits of sustainable housing and enlightening key project stakeholders in the design of sustainable housing are both essential in order to overcome the barriers discussed in this paper. In addition, it is important to adopt smart sustainable construction methods, exemplified by but not limited to, appropriate water preservation and wastewater treatment systems that are simultaneously smart and sustainable. Research limitations/implications This particular research has dealt with only barriers and enablers in the application of sustainability to housing in Saudi Arabia, which utilises smart technologies. For a more complete understanding, there is a need for further analysis of supplementary factors. Practical implications A study such as this, which identifies and prioritises barriers and enablers, could prove useful in guiding or encouraging the relevant ministry in Saudi Arabia to develop policies founded in the implementation of sustainability to the housing sector. Originality/value This research is a preliminary investigation into the implementation of sustainable housing development as it relates to Saudi Arabia.
Resumo:
Neo-angiogenesis during neoplastic growth involves endothelial mitogenic and migration stimuli produced by cancer or tumour stromal cells. Although this active angiogenesis takes place in the tumour periphery, the process of vessel growth and survival in inner areas and its clinical role remain largely unexplored. The present study compared the microvessel score (MS) as well as the single endothelial cell score (ECS) in the invading edge and in inner areas of non-small cell lung carcinomas (NSCLCs). Three different patterns of vascular growth were distinguished: the edvin (edge vs. inner) type 1, where a low MS was observed in both peripheral and inner tumour areas; the edvin type 2, where a high MS was noted in the invading front but a low MS in inner areas; and the edvin type 3, where both peripheral and inner tumour areas had a high MS. The ECS was high in the invading edge in edvin type 2 and 3 cases and was sharply decreased in both types in inner areas, suggesting that endothelial cell migration is unlikely to contribute to the angiogenic process in areas away from the tumour front. Expression of the vascular endothelial growth factor (VEGF) and of thymidine phosphorylase (TP) was associated with a high MS in the invading edge. VEGF was associated with a high MS in inner areas (edvin 3), while TP expression was associated with edvin type 2, showing that VEGF (and not TP) contributes to the preservation of the inner vasculature. Both edvin type 2 and 3 cases showed an increased incidence of node metastasis, but edvin type 3 cases had a poorer prognosis, even in the N1-stage group. The present study suggests that tumour factors regulating angiogenesis and vascular survival are not identical. A possible method is reported to quantify these two parameters by comparing the MS in the invading edge and inner areas (edvin types). This observation may contribute to the evaluation of the effectiveness of different therapeutic approaches, namely vascular targeting vs. anti-angiogenesis. Copyright (C) 2000 John Wiley and Sons, Ltd.
Resumo:
Autologous bone marrow-derived mesenchymal stem cell (BMSCs)-based therapies show great potential in regenerative medicine. However, long-term storage and preservation of BMSCs for clinical use is still a great clinical challenge. The present study aimed to analyze the effect of long-term cryopreservation on the regenerative ability of BMSCs. After cryopreservation of BMSCs from beagle dogs for three years, cell viability, and quantitative analysis of alkaline phosphatase (ALP) activity, surface adherence, and mineralized nodule formation were analyzed. BMSCs in cell-scaffold complex were then implanted into nude mice. There was no significant difference in cell viability and ALP activity between osteogenic differentiation and non-osteogenic differentiation of BMSCs, and BMSCs in cell-scaffold complex retained osteogenic differentiation ability in vivo. These results indicate that long-term cryopreserved BMSCs maintain their have capacity to contribute to regeneration.
Resumo:
Women’s Experimental Cinema provides lively introductions to the work of fifteen avant-garde women filmmakers, some of whom worked as early as the 1950s and many of whom are still working today. In each essay in this collection, a leading film scholar considers a single filmmaker, supplying biographical information, analyzing various influences on her work, examining the development of her corpus, and interpreting a significant number of individual films. The essays rescue the work of critically neglected but influential women filmmakers for teaching, further study, and, hopefully, restoration and preservation. Just as importantly, they enrich the understanding of feminism in cinema and expand the terrain of film history, particularly the history of the American avant-garde.
Resumo:
A new wave energy flow (WEF) map concept was proposed in this work. Based on it, an improved technique incorporating the laser scanning method and Betti’s reciprocal theorem was developed to evaluate the shape and size of damage as well as to realize visualization of wave propagation. In this technique, a simple signal processing algorithm was proposed to construct the WEF map when waves propagate through an inspection region, and multiple lead zirconate titanate (PZT) sensors were employed to improve inspection reliability. Various damages in aluminum and carbon fiber reinforced plastic laminated plates were experimentally and numerically evaluated to validate this technique. The results show that it can effectively evaluate the shape and size of damage from wave field variations around the damage in the WEF map.