883 resultados para applications in logistics
Resumo:
3D virtual reality, including the current generation of multi-user virtual worlds, has had a long history of use in education and training, and it experienced a surge of renewed interest with the advent of Second Life in 2003. What followed shortly after were several years marked by considerable hype around the use of virtual worlds for teaching, learning and research in higher education. For the moment, uptake of the technology seems to have plateaued, with academics either maintaining the status quo and continuing to use virtual worlds as they have previously done or choosing to opt out altogether. This paper presents a brief review of the use of virtual worlds in the Australian and New Zealand higher education sector in the past and reports on its use in the sector at the present time, based on input from members of the Australian and New Zealand Virtual Worlds Working Group. It then adopts a forward-looking perspective amid the current climate of uncertainty, musing on future directions and offering suggestions for potential new applications in light of recent technological developments and innovations in the area.
Electrochemical fabrication of metallic nanostructured electrodes for electroanalytical applications
Resumo:
The use of electrodeposited metal-based nanostructures for electroanalytical applications has recently received widespread attention. There are several approaches to creating nanostructured materials through electrochemical routes that include facile electrodeposition at either untreated or modified electrodes, or through the use of physical or chemical templating methods. This allows the shape, size and composition of the nanomaterial to be readily tuned for the application of interest. The use of such materials is particularly suited to electroanalytical applications. In this mini-review an overview of recently developed nanostructured materials developed through electrochemical routes is presented as well as their electroanalytical applications in areas of biological and environmental importance.
Resumo:
The spontaneous reaction between microrods of an organic semiconductor molecule, copper 7,7,8,8-tetracyanoquinodimethane (CuTCNQ) with [AuBr4]− ions in an aqueous environment is reported. The reaction is found to be redox in nature which proceeds via a complex galvanic replacement mechanism, wherein the surface of the CuTCNQ microrods is replaced with metallic gold nanoparticles. Unlike previous reactions reported in acetonitrile, the galvanic replacement reaction in aqueous solution proceeds via an entirely different reaction mechanism, wherein a cyclical reaction mechanism involving continuous regeneration of CuTCNQ consumed during the galvanic replacement reaction occurs in parallel with the galvanic replacement reaction. This results in the driving force of the galvanic replacement reaction in aqueous medium being largely dependent on the availability of [AuBr4]− ions during the reaction. Therefore, this study highlights the importance of the choice of an appropriate solvent during galvanic replacement reactions, which can significantly impact upon the reaction mechanism. The reaction progress with respect to different gold salt concentration was monitored using Fourier transform infrared (FT-IR), Raman, and X-ray photoelectron spectroscopy (XPS), as well as XRD and EDX analysis, and SEM imaging. The CuTCNQ/Au nanocomposites were also investigated for their potential photocatalytic properties, wherein the destruction of the organic dye, Congo red, in a simulated solar light environment was found to be largely dependent on the degree of gold nanoparticle surface coverage. The approach reported here opens up new possibilities of decorating metal–organic charge transfer complexes with a host of metals, leading to potentially novel applications in catalysis and sensing.
Resumo:
IEEE 802.11p is the new standard for Inter-Vehicular Communications (IVC) using the 5.9 GHz frequency band, as part of the DSRC framework; it will enable applications based on Cooperative Systems. Simulation is widely used to estimate or verify the potential benefits of such cooperative applications, notably in terms of safety for the drivers. We have developed a performance model for 802.11p that can be used by simulations of cooperative applications (e.g. collision avoidance) without requiring intricate models of the whole IVC stack. Instead, it provide a a straightforward yet realistic modelisation of IVC performance. Our model uses data from extensive field trials to infer the correlation between speed, distance and performance metrics such as maximum range, latency and frame loss. Then, we improve this model to limit the number of profiles that have to be generated when there are more than a few couples of emitter-receptor in a given location. Our model generates realistic performance for rural or suburban environments among small groups of IVC-equipped vehicles and road side units.
Resumo:
The notion of plaintext awareness ( PA ) has many applications in public key cryptography: it offers unique, stand-alone security guarantees for public key encryption schemes, has been used as a sufficient condition for proving indistinguishability against adaptive chosen-ciphertext attacks ( IND-CCA ), and can be used to construct privacy-preserving protocols such as deniable authentication. Unlike many other security notions, plaintext awareness is very fragile when it comes to differences between the random oracle and standard models; for example, many implications involving PA in the random oracle model are not valid in the standard model and vice versa. Similarly, strategies for proving PA of schemes in one model cannot be adapted to the other model. Existing research addresses PA in detail only in the public key setting. This paper gives the first formal exploration of plaintext awareness in the identity-based setting and, as initial work, proceeds in the random oracle model. The focus is laid mainly on identity-based key encapsulation mechanisms (IB-KEMs), for which the paper presents the first definitions of plaintext awareness, highlights the role of PA in proof strategies of IND-CCA security, and explores relationships between PA and other security properties. On the practical side, our work offers the first, highly efficient, general approach for building IB-KEMs that are simultaneously plaintext-aware and IND-CCA -secure. Our construction is inspired by the Fujisaki-Okamoto (FO) transform, but demands weaker and more natural properties of its building blocks. This result comes from a new look at the notion of γ -uniformity that was inherent in the original FO transform. We show that for IB-KEMs (and PK-KEMs), this assumption can be replaced with a weaker computational notion, which is in fact implied by one-wayness. Finally, we give the first concrete IB-KEM scheme that is PA and IND-CCA -secure by applying our construction to a popular IB-KEM and optimizing it for better performance.
Resumo:
Since the discovery of RNAi, its mechanism in plants and animals has been intensively studied, widely exploited as a research tool, and used for a number of potential commercial applications. In this article, we discuss the platforms for delivering RNAi in plants. We provide a brief background to these platforms and concentrate on discussing the more recent advances, comparing the RNAi technologies used in plants with those used in animals, and trying to predict the ways in which RNAi technologies may further develop. © 2005 Federation of European Biochemical Societies. Published by Elsevier B.V. All rights reserved.
Resumo:
A suite of plant expression vectors (pPLEX), constructed from the gene regulation signals from subterranean clover stunt virus (SCSV) genome, has previously been used in dicot transformation for a variety of applications in plant biotechnology. To assess their use for the transformation of monocots, a number of modifications were made to the basic vector series and assessed in rice. In their unmodified forms, the SCSV promoters directed low levels of gene expression, however, insertion of an intron between the promoter and the transgene open reading frame (analogous to the rice actin and maize ubiquitin promoter systems) increased transgene expression 50-fold. The expression patterns from the intron-modified SCSV (segments 4 and 7) promoters were very similar to those directed by the actin or ubiquitin promoters. All promoter systems investigated directed expression that appeared to be constitutive within leaf tissue, and localised to the epidermal and vascular tissues of the root. The pPLEX vectors described here are an important counterpart to the dicot pPLEX series and have the potential to be useful in monocot research and biotechnology.
Resumo:
This paper describes the theory and practice for a stable haptic teleoperation of a flying vehicle. It extends passivity-based control framework for haptic teleoperation of aerial vehicles in the longest intercontinental setting that presents great challenges. The practicality of the control architecture has been shown in maneuvering and obstacle-avoidance tasks over the internet with the presence of significant time-varying delays and packet losses. Experimental results are presented for teleoperation of a slave quadrotor in Australia from a master station in the Netherlands. The results show that the remote operator is able to safely maneuver the flying vehicle through a structure using haptic feedback of the state of the slave and the perceived obstacles.
Resumo:
Widespread scholarly interest in ethics in research with children, as an extant field of inquiry and practice, is a relatively new phenomenon. The discipline of ethics can be traced back to the Hippocratic school, but its contemporary applications in the everyday worlds of children and those around them are gaining greater attention from theorists, practitioners, and those involved in policy. Heightened international awareness of the United Nations Convention on the Rights of the Child (1979) gave significant impetus to increasing international awareness of children’s rights to provision, protection, and participation in everyday contexts, including those in which research occurs. Understandings of research ethics and of children’s involvement in research relate to broader understandings of children and childhood drawn from developmental science, sociology, human geography, health sciences, and children’s human rights to participation and protection. Key understandings pertain to children’s competence to participate in research, to operate as reliable informants with respect to their own lives, to provide voluntary informed consent and dissent in research, and to make meaningful decisions about the nature and extent of their participation. The field is international and interdisciplinary, although bounded by legislative, policy, and jurisdictional requirements governing research—its conduct and dissemination. So, too, the burgeoning work of ethics committees, whether in relation to health research or social research, is evidence of a sharpened focus on governance of child research. Oxford Bibliographies offers a suite of perspectives, resources, and strategies to guide the researcher, practitioner, and policymaker and serves to challenge readers to interrogate conceptual understandings, methodologies, and dissemination of research with and about children. Exploration of the suite opens up new possibilities for considering children’s rights to participation in matters that affect their lives and for children to be seen and heard in research.
Resumo:
In this paper, an integrated inter-vehicles wireless communications and positioning system supporting alternate positioning techniques is proposed to meet the requirements of safety applications of Cooperative Intelligent Transportation Systems (C-ITS). Recent advances have repeatedly demonstrated that road safety problems can be to a large extent addressed via a range of technologies including wireless communications and positioning in vehicular environments. The novel communication stack utilizing a dedicated frequency spectrum (e.g. at 5.9 GHz band), known as Dedicated Short-Range Communications (DSRC), has been particularly designed for Wireless Access in Vehicular Environments (WAVE) to support safety applications in highly dynamic environments. Global Navigation Satellite Systems (GNSS) is another essential enabler to support safety on rail and roads. Although current vehicle navigation systems such as single frequency Global Positioning System (GPS) receivers can provide route guidance with 5-10 meters (road-level) position accuracy, positioning systems utilized in C-ITS must provide position solutions with lane-level and even in-lane-level accuracies based on the requirements of safety applications. This article reviews the issues and technical approaches that are involved in designing a vehicular safety communications and positioning architecture; it also provides technological solutions to further improve vehicular safety by integrating the DSRC and GNSS-based positioning technologies.
Resumo:
The present article gives an overview of the reversible addition fragmentation chain transfer (RAFT) process. RAFT is one of the most versatile living radical polymerization systems and yields polymers of predictable chain length and narrow molecular weight distribution. RAFT relies on the rapid exchange of thiocarbonyl thio groups between growing polymeric chains. The key strengths of the RAFT process for polymer design are its high tolerance of monomer functionality and reaction conditions, the wide range of well-controlled polymeric architectures achievable, and its (in-principle) non-rate-retarding nature. This article introduces the mechanism of polymerization, the range of polymer molecular weights achievable, the range of monomers in which polymerization is controlled by RAFT, the various polymeric architectures that can be obtained, the type of end-group functionalities available to RAFT-made polymers, and the process of RAFT polymerization.
Resumo:
In this chapter, we discuss four related areas of cryptology, namely, authentication, hashing, message authentication codes (MACs), and digital signatures. These topics represent active and growing research topics in cryptology. Space limitations allow us to concentrate only on the essential aspects of each topic. The bibliography is intended to supplement our survey. We have selected those items which providean overview of the current state of knowledge in the above areas. Authentication deals with the problem of providing assurance to a receiver that a communicated message originates from a particular transmitter, and that the received message has the same content as the transmitted message. A typical authentication scenario occurs in computer networks, where the identity of two communicating entities is established by means of authentication. Hashing is concerned with the problem of providing a relatively short digest–fingerprint of a much longer message or electronic document. A hashing function must satisfy (at least) the critical requirement that the fingerprints of two distinct messages are distinct. Hashing functions have numerous applications in cryptology. They are often used as primitives to construct other cryptographic functions. MACs are symmetric key primitives that provide message integrity against active spoofing by appending a cryptographic checksum to a message that is verifiable only by the intended recipient of the message. Message authentication is one of the most important ways of ensuring the integrity of information that is transferred by electronic means. Digital signatures provide electronic equivalents of handwritten signatures. They preserve the essential features of handwritten signatures and can be used to sign electronic documents. Digital signatures can potentially be used in legal contexts.
Resumo:
Autonomous navigation and picture compilation tasks require robust feature descriptions or models. Given the non Gaussian nature of sensor observations, it will be shown that Gaussian mixture models provide a general probabilistic representation allowing analytical solutions to the update and prediction operations in the general Bayesian filtering problem. Each operation in the Bayesian filter for Gaussian mixture models multiplicatively increases the number of parameters in the representation leading to the need for a re-parameterisation step. A computationally efficient re-parameterisation step will be demonstrated resulting in a compact and accurate estimate of the true distribution.
Resumo:
This contribution outlines Synchrotron-based X-ray micro-tomography and its potential use in structural geology and rock mechanics. The paper complements several recent reviews of X-ray microtomography. We summarize the general approach to data acquisition, post-processing as well as analysis and thereby aim to provide an entry point for the interested reader. The paper includes tables listing relevant beamlines, a list of all available imaging techniques, and available free and commercial software packages for data visualization and quantification. We highlight potential applications in a review of relevant literature including time-resolved experiments and digital rock physics. The paper concludes with a report on ongoing developments and upgrades at synchrotron facilities to frame the future possibilities for imaging sub-second processes in centimetre-sized samples.
Resumo:
This paper presents the application of a statistical method for model structure selection of lift-drag and viscous damping components in ship manoeuvring models. The damping model is posed as a family of linear stochastic models, which is postulated based on previous work in the literature. Then a nested test of hypothesis problem is considered. The testing reduces to a recursive comparison of two competing models, for which optimal tests in the Neyman sense exist. The method yields a preferred model structure and its initial parameter estimates. Alternatively, the method can give a reduced set of likely models. Using simulated data we study how the selection method performs when there is both uncorrelated and correlated noise in the measurements. The first case is related to instrumentation noise, whereas the second case is related to spurious wave-induced motion often present during sea trials. We then consider the model structure selection of a modern high-speed trimaran ferry from full scale trial data.