873 resultados para Islamic Fashion
Resumo:
Diachasmimorpha kraussii is a polyphagous endoparasitoid of dacine fruit flies. The fruit fly hosts of D. krausii, in turn, attack a wide range of fruits and vegetables. The role that fruits play in host selection behaviour of D. kraussii has not been previously investigated. This study examines fruit preference of D. kraussii through a laboratory choice-test trial and field fruit sampling. In the laboratory trial, oviposition preference and offspring performance measures (sex ratio, developmental time, body length, hind tibial length) of D. kraussii were investigated with respect to five fruit species [Psidium guajava L. (guava), Prunis persica L. (peach), Malus domestica Borkh. (apple), Pyrus communis L. (pear) and Citrus sinensis L. (orange)], and two fruit fly species (Bactrocera jarvisi and B. tryoni). Diachasmimorpha kraussii responded to infested fruit of all fruit types in both choice and no-choice tests, but showed stronger preference for guava and peach in the choice tests irrespective of the species of fly larvae within the fruit. The wasp did not respond to uninfested fruit. The offspring performance measures differed in a non-consistent fashion between the fruit types, but generally wasp offspring performed better in guava, peach and orange. The offspring sex ratio, except for one fruit/fly combination (B. jarvisi in apple), was always female biased. The combined results suggest that of the five fruits tested, guava and peach are the best fruit substrates for D. krausii. Field sampling indicated a non-random use of available, fruit fly infested fruit by D. kraussii. Fruit fly maggots within two fruit species, Plachonia careya and Terminalia catappa, had disproportionately higher levels of D. krausii parasitism than would be expected based on the proportion of different infested fruit species sampled, or levels of fruit fly infestation within those fruit.
Resumo:
Relaxation labeling processes are a class of mechanisms that solve the problem of assigning labels to objects in a manner that is consistent with respect to some domain-specific constraints. We reformulate this using the model of a team of learning automata interacting with an environment or a high-level critic that gives noisy responses as to the consistency of a tentative labeling selected by the automata. This results in an iterative linear algorithm that is itself probabilistic. Using an explicit definition of consistency we give a complete analysis of this probabilistic relaxation process using weak convergence results for stochastic algorithms. Our model can accommodate a range of uncertainties in the compatibility functions. We prove a local convergence result and show that the point of convergence depends both on the initial labeling and the constraints. The algorithm is implementable in a highly parallel fashion.
Resumo:
Photochemical transformations of organic solids provide an exciting area of research with new synthetic possibilities. These reactions are generally governed by topochemical factors rather than the normal rules of chemical reactivity. Defects play a crucial role in some of the reactions. Some of the transformations such as the photodimerization of 4, 4'-dimethoxystilbene occur in a single crystal fashion.
Resumo:
This thesis consists of an introduction, four research articles and an appendix. The thesis studies relations between two different approaches to continuum limit of models of two dimensional statistical mechanics at criticality. The approach of conformal field theory (CFT) could be thought of as the algebraic classification of some basic objects in these models. It has been succesfully used by physicists since 1980's. The other approach, Schramm-Loewner evolutions (SLEs), is a recently introduced set of mathematical methods to study random curves or interfaces occurring in the continuum limit of the models. The first and second included articles argue on basis of statistical mechanics what would be a plausible relation between SLEs and conformal field theory. The first article studies multiple SLEs, several random curves simultaneously in a domain. The proposed definition is compatible with a natural commutation requirement suggested by Dubédat. The curves of multiple SLE may form different topological configurations, ``pure geometries''. We conjecture a relation between the topological configurations and CFT concepts of conformal blocks and operator product expansions. Example applications of multiple SLEs include crossing probabilities for percolation and Ising model. The second article studies SLE variants that represent models with boundary conditions implemented by primary fields. The most well known of these, SLE(kappa, rho), is shown to be simple in terms of the Coulomb gas formalism of CFT. In the third article the space of local martingales for variants of SLE is shown to carry a representation of Virasoro algebra. Finding this structure is guided by the relation of SLEs and CFTs in general, but the result is established in a straightforward fashion. This article, too, emphasizes multiple SLEs and proposes a possible way of treating pure geometries in terms of Coulomb gas. The fourth article states results of applications of the Virasoro structure to the open questions of SLE reversibility and duality. Proofs of the stated results are provided in the appendix. The objective is an indirect computation of certain polynomial expected values. Provided that these expected values exist, in generic cases they are shown to possess the desired properties, thus giving support for both reversibility and duality.
Resumo:
The financial health of beef cattle enterprises in northern Australia has declined markedly over the last decade due to an escalation in production and marketing costs and a real decline in beef prices. Historically, gains in animal productivity have offset the effect of declining terms of trade on farm incomes. This raises the question of whether future productivity improvements can remain a key path for lifting enterprise profitability sufficient to ensure that the industry remains economically viable over the longer term. The key objective of this study was to assess the production and financial implications for north Australian beef enterprises of a range of technology interventions (development scenarios), including genetic gain in cattle, nutrient supplementation, and alteration of the feed base through introduced pastures and forage crops, across a variety of natural environments. To achieve this objective a beef systems model was developed that is capable of simulating livestock production at the enterprise level, including reproduction, growth and mortality, based on energy and protein supply from natural C4 pastures that are subject to high inter-annual climate variability. Comparisons between simulation outputs and enterprise performance data in three case study regions suggested that the simulation model (the Northern Australia Beef Systems Analyser) can adequately represent the performance beef cattle enterprises in northern Australia. Testing of a range of development scenarios suggested that the application of individual technologies can substantially lift productivity and profitability, especially where the entire feedbase was altered through legume augmentation. The simultaneous implementation of multiple technologies that provide benefits to different aspects of animal productivity resulted in the greatest increases in cattle productivity and enterprise profitability, with projected weaning rates increasing by 25%, liveweight gain by 40% and net profit by 150% above current baseline levels, although gains of this magnitude might not necessarily be realised in practice. While there were slight increases in total methane output from these development scenarios, the methane emissions per kg of beef produced were reduced by 20% in scenarios with higher productivity gain. Combinations of technologies or innovative practices applied in a systematic and integrated fashion thus offer scope for providing the productivity and profitability gains necessary to maintain viable beef enterprises in northern Australia into the future.
Resumo:
A direct method of preparing cast aluminium alloy-graphite particle composites using uncoated graphite particles is reported. The method consists of introducing and dispersing uncoated but suitably pretreated graphite particles in aluminium alloy melts, and casting the resulting composite melts in suitable permanent moulds. The optical pretreatment required for the dispersion of the uncoated graphite particles in aluminium alloy melts consists of heating the graphite particles to 400° C in air for 1 h just prior to their dispersion in the melts. The effects of alloying elements such as Si, Cu and Mg on the dispersability of pretreated graphite in molten aluminium have also been reported. It was found that additions of about 0.5% Mg or 5% Si significantly improve the dispersability of graphite particles in aluminium alloy melts as indicated by the high recoveries of graphite in the castings of these composites. It was also possible to disperse upto 3% graphite in LM 13 alloy melts and retain the graphite particles in a well distributed fashion in the castings using the pre-heat-treated graphite particles. The observations in this study have been related to the information presently available on wetting between graphite and molten aluminium in the presence of different elements and our own thermogravimetric analysis studies on graphite particles. Physical and mechanical properties of LM 13-3% graphite composite made using pre-heat-treated graphite powder, were found to be adequate for many applications, including pistons which have been successfully used in internal combustion engines.
Resumo:
Wireless technologies are continuously evolving. Second generation cellular networks have gained worldwide acceptance. Wireless LANs are commonly deployed in corporations or university campuses, and their diffusion in public hotspots is growing. Third generation cellular systems are yet to affirm everywhere; still, there is an impressive amount of research ongoing for deploying beyond 3G systems. These new wireless technologies combine the characteristics of WLAN based and cellular networks to provide increased bandwidth. The common direction where all the efforts in wireless technologies are headed is towards an IP-based communication. Telephony services have been the killer application for cellular systems; their evolution to packet-switched networks is a natural path. Effective IP telephony signaling protocols, such as the Session Initiation Protocol (SIP) and the H 323 protocol are needed to establish IP-based telephony sessions. However, IP telephony is just one service example of IP-based communication. IP-based multimedia sessions are expected to become popular and offer a wider range of communication capabilities than pure telephony. In order to conjoin the advances of the future wireless technologies with the potential of IP-based multimedia communication, the next step would be to obtain ubiquitous communication capabilities. According to this vision, people must be able to communicate also when no support from an infrastructured network is available, needed or desired. In order to achieve ubiquitous communication, end devices must integrate all the capabilities necessary for IP-based distributed and decentralized communication. Such capabilities are currently missing. For example, it is not possible to utilize native IP telephony signaling protocols in a totally decentralized way. This dissertation presents a solution for deploying the SIP protocol in a decentralized fashion without support of infrastructure servers. The proposed solution is mainly designed to fit the needs of decentralized mobile environments, and can be applied to small scale ad-hoc networks or also bigger networks with hundreds of nodes. A framework allowing discovery of SIP users in ad-hoc networks and the establishment of SIP sessions among them, in a fully distributed and secure way, is described and evaluated. Security support allows ad-hoc users to authenticate the sender of a message, and to verify the integrity of a received message. The distributed session management framework has been extended in order to achieve interoperability with the Internet, and the native Internet applications. With limited extensions to the SIP protocol, we have designed and experimentally validated a SIP gateway allowing SIP signaling between ad-hoc networks with private addressing space and native SIP applications in the Internet. The design is completed by an application level relay that permits instant messaging sessions to be established in heterogeneous environments. The resulting framework constitutes a flexible and effective approach for the pervasive deployment of real time applications.
Resumo:
Cell transition data is obtained from a cellular phone that switches its current serving cell tower. The data consists of a sequence of transition events, which are pairs of cell identifiers and transition times. The focus of this thesis is applying data mining methods to such data, developing new algorithms, and extracting knowledge that will be a solid foundation on which to build location-aware applications. In addition to a thorough exploration of the features of the data, the tools and methods developed in this thesis provide solutions to three distinct research problems. First, we develop clustering algorithms that produce a reliable mapping between cell transitions and physical locations observed by users of mobile devices. The main clustering algorithm operates in online fashion, and we consider also a number of offline clustering methods for comparison. Second, we define the concept of significant locations, known as bases, and give an online algorithm for determining them. Finally, we consider the task of predicting the movement of the user, based on historical data. We develop a prediction algorithm that considers paths of movement in their entirety, instead of just the most recent movement history. All of the presented methods are evaluated with a significant body of real cell transition data, collected from about one hundred different individuals. The algorithms developed in this thesis are designed to be implemented on a mobile device, and require no extra hardware sensors or network infrastructure. By not relying on external services and keeping the user information as much as possible on the user s own personal device, we avoid privacy issues and let the users control the disclosure of their location information.
Resumo:
In an earlier communication[l] we have indicated a general graphical design procedure for a sequence of sparger reactors in which a second order liquid phase reaction proceeds in a stagewise fashion. The prediction of the reactant concentration in each stage and hence the conversion depended on a search procedure initiated along a straight line representing the mass balance equation at the given stage and drawn from the known feed stage located on the abscissa in a E-IU diagram for the given system.
Resumo:
In recent years, XML has been accepted as the format of messages for several applications. Prominent examples include SOAP for Web services, XMPP for instant messaging, and RSS and Atom for content syndication. This XML usage is understandable, as the format itself is a well-accepted standard for structured data, and it has excellent support for many popular programming languages, so inventing an application-specific format no longer seems worth the effort. Simultaneously with this XML's rise to prominence there has been an upsurge in the number and capabilities of various mobile devices. These devices are connected through various wireless technologies to larger networks, and a goal of current research is to integrate them seamlessly into these networks. These two developments seem to be at odds with each other. XML as a fully text-based format takes up more processing power and network bandwidth than binary formats would, whereas the battery-powered nature of mobile devices dictates that energy, both in processing and transmitting, be utilized efficiently. This thesis presents the work we have performed to reconcile these two worlds. We present a message transfer service that we have developed to address what we have identified as the three key issues: XML processing at the application level, a more efficient XML serialization format, and the protocol used to transfer messages. Our presentation includes both a high-level architectural view of the whole message transfer service, as well as detailed descriptions of the three new components. These components consist of an API, and an associated data model, for XML processing designed for messaging applications, a binary serialization format for the data model of the API, and a message transfer protocol providing two-way messaging capability with support for client mobility. We also present relevant performance measurements for the service and its components. As a result of this work, we do not consider XML to be inherently incompatible with mobile devices. As the fixed networking world moves toward XML for interoperable data representation, so should the wireless world also do to provide a better-integrated networking infrastructure. However, the problems that XML adoption has touch all of the higher layers of application programming, so instead of concentrating simply on the serialization format we conclude that improvements need to be made in an integrated fashion in all of these layers.
Resumo:
This paper reports on a study conducted in Indonesia at a time when two curricular reforms were underway. School-based curriculum was being implemented to allow Indonesian teachers more autonomy to develop curriculum to suit their local school community and its needs. Alongside this, the second concurrent reform introducing Character Education was more strongly prescriptive, requiring all teachers, including those working in language education, to address a particular set of stipulated values across all classes. The Indonesian schooling sector employs teachers at two different levels of professional status: civil servant teachers working in the higher status public sector and non-civil servant teachers who teach in the private Islamic Schools. Each level received different professional learning opportunities to prepare for the reforms. This study is interested in whether and how EFL teachers of different status exercised degrees of professionalism as they recontextualised these reforms in their classes. Nine teachers were interviewed and three of their classes were observed. This study found that the group of teachers with more professional learning could cope better with the weaker framing of school-based curriculum, while teachers with less professional learning reported disengagement with the reforms.
Resumo:
The oxidase-peroxidase from Datura innoxia which catalyses the oxidation of formylphenylacetic acid ethyl ester to benzoylformic acid ethyl ester and formic acid was also found to catalyse the oxidation of NADH in the presence of Mn2+ and formylphenylacetic acid ethyl ester. NADH was not oxidized in the absence of formylphenylacetic acid ethyl ester, although formylphenylacetonitrile or phenylacetaldehyde could replace it in the reaction. The reaction appeared to be complex and for every mol of NADH oxidized 3-4 g-atoms of oxygen were utilized, with a concomitant formation of approx. 0.8 mol of H2O2, the latter being identified by the starch-iodide test and decomposition by catalase. Benzoylformic acid ethyl ester was also formed in the reaction, but in a nonlinear fashion, indicating a lag phase. In the absence of Mn2+, NADH oxidation was not only very low, but itself inhibited the formation of benzoylformic acid ethyl ester from formylphenylacetic acid ethyl ester. A reaction mechanism for the oxidation of NADH in the presence of formylphenylacetic acid ethyl ester is proposed.
Resumo:
The collection holds primarily the trans-atlantic correspondence of Irma Sondhelm and various family members, 1894-1943. Also included is a fashion pamphlet, 'Die gutgekleidete Dame : Ein Modenbrevier, Luxemburg, 1930.
Resumo:
This study describes and analyses two Lebanese Muslims and two Lebanese Christians ideas about Christian-Muslim dialogue, its nature, aims, and methods and its different dimensions, which include doctrinal, ethical, and social dimensions. On the basis of the analysis, the four thinkers contributions for promoting constructive dialogue are evaluated. The persons studied are two religious authorities, the Shiite Great Ayatollah Muhammad Husayn Fadlallah (b. 1935) and the Eastern Orthodox Metropolitan of Mount Lebanon, Georges Khodr (b. 1923), and two academic scholars, Doctor Mahmoud Ayoub (b. 1935) and Doctor, Father Mouchir Aoun (b. 1964), from the Shiite and Greek Catholic communities, respectively. The method of the study is systematic analysis. The sources consist of the four thinkers writings on Christian-Muslim relations, the most of which have been published in Lebanon in the 1990s and 2000s in the Arabic language. In their general guidelines for Christian-Muslim dialogue, the four authors do not offer any novel or unusual insights. However, their dialogue visions are multi-faceted, motivating interreligious encounter both on religious and practical grounds and clarifying the theological grounds and socio-political conditions of this endeavour. The major challenge appears to be the tension between loyalty to one s own convictions and taking into account the particular self-understanding of the other. While this tension may be ultimately unsolvable, it is obvious that linking dialogue tightly to missionary motivations or certain theological agenda imposed on the others is not conducive for better mutual understanding. As for how diverse theologies of religions affect interreligious dialogue, narrow exclusivism hardly promotes mutual knowledge and appreciation, but also inclusive and pluralistic positions have their particular dilemmas. In the end, dialogue is possible from diverse positions on theology of religions. All the authors discuss the theological themes of divine revelation, concept of God, and human condition and ultimate destiny. The two religions particular views on these issues cannot be reconciled, but the authors offer diverse means to facilitate mutual understanding on them, such as increasing mutual knowledge, questioning certain traditional condemnations, showing theological parallels between the two religions, and transcending doctrinal disagreements by stressing common religious experience or ethical concerns. Among the theological themes, especially the concept of God seems to offer possibilities for better understanding than has traditionally been the case. Significantly, all the four authors maintain that Christians and Muslims share the faith in the one God, irrespective of their disagreements about the nature of his oneness. Basic ethical principles are not discussed as widely by the four authors as might be expected, which may reflect the shared cultural background and common ethical values of the Lebanese Muslims and Christians. On this level, Christians alienation from the Islamic law appears as the most significant challenge to mutual understanding, while neighbourly love and the golden rule of ethics offer a fruitful basis for further dialogue. As for the issue of political power-sharing in Lebanon, it is clear that the proposal of an Islamic state is problematic in a country with a sizable Christian minority and a heterogeneous Muslim population. Some form of democracy seems more viable for a multireligious country, but the question remains how to retain religion as a vital force in society, which is felt to be important by all the four Lebanese authors.
Resumo:
Depending on how they perceive risk, consumers may not always act according to their ethical beliefs, exposing a gap between beliefs and behavior. We investigate the effect of moral potency on perceived psychological risk of committing an unacceptable behavior. The results suggest that perceived risk is triggered by moral ownership.