874 resultados para mobile phone involvement
Resumo:
Sulphoxidation of compounds capable of undergoing biological sulphoxidation has been demonstrated in a model system (NADH–phenazine methosulphate–O2), known to generate superoxide anions (O2-). Addition of superoxide dismutase to this system results in complete inhibition, suggesting the involvement of O2- in sulphoxidation.
Resumo:
A collaborative, performative and relational experience for two people, woven together by a custom digital phone App. Two walkers, who have never met, simultaneously use a phone App to record a personalised walk around their locality, crafting a series of special moments and surprises for each other. The App then allows participants to continue their two walks, but now directed by what the other person has just created for them. Finally, at the end of the experience they can then choose whether they would like to actually meet in person. Based loosely on the idea of a date, each participant is initially asked to give a little bit of personal information, and then actually speak volumes about themselves through how they choose to care for their 'date's future experience. After walking in parallel universes, but never far away from each other, both daters can ultimately choose to then meet in person -- if what they have experienced tells them that maybe "We Are The One".
Resumo:
Background and Aims Considerable variation has been documented with fleet safety interventions’ abilities to create lasting behavioural change, and research has neglected to consider employees’ perceptions regarding the effectiveness of fleet interventions. This is a critical oversight as employees’ beliefs and acceptance levels (as well as the perceived organisational commitment to safety) can ultimately influence levels of effectiveness, and this study aimed to examine such perceptions in Australian fleet settings. Method 679 employees sourced from four Australian organisations completed a safety climate questionnaire as well as provided perspectives about the effectiveness of 35 different safety initiatives. Results Countermeasures that were perceived as most effective were a mix of human and engineering-based approaches: - (a) purchasing safer vehicles; - (b) investigating serious vehicle incidents, and; - (c) practical driver skills training. In contrast, least effective countermeasures were considered to be: - (a) signing a promise card; - (b) advertising a company’s phone number on the back of cars for complaints and compliments, and; - (c) communicating cost benefits of road safety to employees. No significant differences in employee perceptions were identified based on age, gender, employees’ self-reported crash involvement or employees’ self-reported traffic infringement history. Perceptions of safety climate were identified to be “moderate” but were not linked to self-reported crash or traffic infringement history. However, higher levels of safety climate were positively correlated with perceived effectiveness of some interventions. Conclusion Taken together, employees believed occupational road safety risks could best be managed by the employer by implementing a combination of engineering and human resource initiatives to enhance road safety. This paper will further outline the key findings in regards to practice as well as provide direction for future research.
Resumo:
Corporate executives require relevant and intelligent business information in real-time to take strategic decisions. They require the freedom to access this information anywhere and anytime. There is a need to extend this functionality beyond the office and on the fingertips of the decision makers. Mobile Business Intelligence Tool (MBIT) aims to provide these features in a flexible and cost-efficient manner. This paper describes the detailed architecture of MBIT to overcome the limitations of existing mobile business intelligence tools. Further, a detailed implementation framework is presented to realize the design. This research highlights the benefits of using service oriented architecture to design flexible and platform independent mobile business applications. © 2009 IEEE.
Resumo:
The synthesis and phosphorylation of protein factor(s) that bind to the positivecis-acting element (−69 to −98 nt) of the CYP2B1/B2 gene have been examinedin vivoin the rat. Treatment of rats with cycloheximide, a protein synthetic inhibitor, suppresses basal as well as phenobarbitone-induced levels of CYP2B1/B2 mRNA and its run-on transcription. Under these conditions, complex formation of the nuclear extract with the positive element is also inhibited, as judged by gel shift assays. Treatment of rats with 2-aminopurine, a general protein kinase inhibitor, blocks the phenobarbitone-mediated increase in CYP2B1/B2 mRNA, cell-free transcription of a minigene construct containing the positive element, pP450e179DNA, and binding of nuclear proteins to the positive element. Treatment of rats with okadaic acid, a protein phosphatase inhibitor, mimics the effects of phenobarbitone, but only partially. Thus, both phenobarbitone and okadaic acid individually enhance binding of the nuclear protein(s) to the positive element, cell-free transcription of the minigene construct, and phosphorylation of the not, vert, similar26- and 94-kDa proteins binding to the positive element. But unlike phenobarbitone, okadaic acid is not an inducer of CYP2B1/B2 mRNA or its run-on transcription. Thus, phenobarbitone-responsive positive element interactions constitute only a minimal requirement, and okadaic acid is perhaps not able to bring about the total requirement for activation of CYP2B1/B2 gene transcription that should include interaction between the minimal promoter and further upstream elements. An intriguing feature is the antagonistic effect of okadaic acid on phenobarbitone-mediated effects on CYP2B1/B2 mRNA levels, cell-free and run-on transcription, and nuclear protein binding to the positive element. The reason for this antagonism is not clear. It is concluded that phenobarbitone treatment enhancesin vivothe synthesis and phosphorylation of protein factors binding to the positive element and these constitute a minimal requirement for the transcriptional activation of the CYP2B1/B2 gene.
Resumo:
Mobile dating applications (‘apps’) have increased in popularity over recent years, with Tinder among the first to break into the mainstream heterosexual market. Since mobile dating intensifies the need to confirm that potential dates are not misrepresenting themselves and are safe to meet in person, Tinder’s success indicates that it has allayed these concerns regarding the authenticity of its users. This article combines Giddens’ conceptualization of authenticity, as the ability to reference a coherent biographical narrative, with Callon’s sociology of translation to investigate Tinder’s framing of authenticity within mobile dating. Applying a walkthrough method that interrogates Tinder’s technological architecture, promotional materials, and related media, this hybrid theoretical framework is used to identify how Tinder configures an actor-network that establishes its app as the solution to users’ concerns, enrols individuals in using its features in authenticity claims, and popularizes Tinder’s framing across public discourse. This network of human and non-human actors frames authenticity as being established through one’s Facebook profile and adherence to normative standards relating to age, gender, ethnicity, and socioeconomic status. However, user discourses on other social media identify and challenge negative outcomes of this framing, with normativity fostering discrimination and Facebook verification failing to prevent abusive behavior. This case study of Tinder paves the way for future investigation into user responses to its framing. Further, it demonstrates the efficacy and broader applicability of this theoretical approach for identifying both human and technological influences on the construction of authenticity with digital media.
Resumo:
This chapter surveys the landscape of mobile dating and hookup apps—understood as media technologies, as businesses, and as sites of social practice. It situates the discussion within the broader contexts of technologically mediated dating and digital sexual cultures. By outlining a number of methodological approaches and data sources that can be used in the study of dating and hookup apps, it equips the reader with tools and approaches for investigating hookup app culture in ways that go beyond “media panics” – the familiar combination of moral panics and media effects which is so prevalent in discussions of sexuality in digital media.
Resumo:
Parent involvement is widely accepted as being associated with children’s improved educational outcomes. However, the role of early school-based parent involvement is still being established. This study investigated the mediating role of self-regulated learning behaviors in the relationship between early school-based parent involvement and children’s academic achievement, using data from the Longitudinal Study of Australian Children (N = 2616). Family socioeconomic position, Aboriginal and Torres Strait Islander status, language background, child gender and cognitive competence, were controlled, as well home and community based parent involvement activity in order to derive a more confident interpretation of the results. Structural equation modeling analyses showed that children’s self-regulated learning behaviors fully mediated the relationships between school-based parent involvement at Grade 1 and children’s reading achievement at Grade 3. Importantly, these relationships were evident for children across all socio-economic backgrounds. Although there was no direct relationship between parent involvement at Grade 1 and numeracy achievement at Grade 3, parent involvement was indirectly associated with higher children’s numeracy achievement through children’s self-regulation of learning behaviors, though this relationship was stronger for children from middle and higher socio-economic backgrounds. Implications for policy and practice are discussed, and further research recommended.
Resumo:
Security in a mobile communication environment is always a matter for concern, even after deploying many security techniques at device, network, and application levels. The end-to-end security for mobile applications can be made robust by developing dynamic schemes at application level which makes use of the existing security techniques varying in terms of space, time, and attacks complexities. In this paper we present a security techniques selection scheme for mobile transactions, called the Transactions-Based Security Scheme (TBSS). The TBSS uses intelligence to study, and analyzes the security implications of transactions under execution based on certain criterion such as user behaviors, transaction sensitivity levels, and credibility factors computed over the previous transactions by the users, network vulnerability, and device characteristics. The TBSS identifies a suitable level of security techniques from the repository, which consists of symmetric, and asymmetric types of security algorithms arranged in three complexity levels, covering various encryption/decryption techniques, digital signature schemes, andhashing techniques. From this identified level, one of the techniques is deployed randomly. The results shows that, there is a considerable reduction in security cost compared to static schemes, which employ pre-fixed security techniques to secure the transactions data.
Resumo:
The need for paying with mobile devices has urged the development of payment systems for mobile electronic commerce. In this paper we have considered two important abuses in electronic payments systems for detection. The fraud, which is an intentional deception accomplished to secure an unfair gain, and an intrusion which are any set of actions that attempt to compromise the integrity, confidentiality or availability of a resource. Most of the available fraud and intrusion detection systems for e-payments are specific to the systems where they have been incorporated. This paper proposes a generic model called as Activity-Event-Symptoms(AES) model for detecting fraud and intrusion attacks which appears during payment process in the mobile commerce environment. The AES model is designed to identify the symptoms of fraud and intrusions by observing various events/transactions occurs during mobile commerce activity. The symptoms identification is followed by computing the suspicion factors for event attributes, and the certainty factor for a fraud and intrusion is generated using these suspicion factors. We have tested the proposed system by conducting various case studies, on the in-house established mobile commerce environment over wired and wire-less networks test bed.
Resumo:
Biological systems present remarkable adaptation, reliability, and robustness in various environments, even under hostility. Most of them are controlled by the individuals in a distributed and self-organized way. These biological mechanisms provide useful resources for designing the dynamical and adaptive routing schemes of wireless mobile sensor networks, in which the individual nodes should ideally operate without central control. This paper investigates crucial biologically inspired mechanisms and the associated techniques for resolving routing in wireless sensor networks, including Ant-based and genetic approaches. Furthermore, the principal contributions of this paper are as follows. We present a mathematical theory of the biological computations in the context of sensor networks; we further present a generalized routing framework in sensor networks by diffusing different modes of biological computations using Ant-based and genetic approaches; finally, an overview of several emerging research directions are addressed within the new biologically computational framework.
Resumo:
Mobile applications are being increasingly deployed on a massive scale in various mobile sensor grid database systems. With limited resources from the mobile devices, how to process the huge number of queries from mobile users with distributed sensor grid databases becomes a critical problem for such mobile systems. While the fundamental semantic cache technique has been investigated for query optimization in sensor grid database systems, the problem is still difficult due to the fact that more realistic multi-dimensional constraints have not been considered in existing methods. To solve the problem, a new semantic cache scheme is presented in this paper for location-dependent data queries in distributed sensor grid database systems. It considers multi-dimensional constraints or factors in a unified cost model architecture, determines the parameters of the cost model in the scheme by using the concept of Nash equilibrium from game theory, and makes semantic cache decisions from the established cost model. The scenarios of three factors of semantic, time and locations are investigated as special cases, which improve existing methods. Experiments are conducted to demonstrate the semantic cache scheme presented in this paper for distributed sensor grid database systems.
Resumo:
Next generation wireless systems employ Orthogonal frequency division multiplexing (OFDM) physical layer owing to the high data rate transmissions that are possible without increase in bandwidth. While TCP performance has been extensively studied for interaction with link layer ARQ, little attention has been given to the interaction of TCP with MAC layer. In this work, we explore cross-layer interactions in an OFDM based wireless system, specifically focusing on channel-aware resource allocation strategies at the MAC layer and its impact on TCP congestion control. Both efficiency and fairness oriented MAC resource allocation strategies were designed for evaluating the performance of TCP. The former schemes try to exploit the channel diversity to maximize the system throughput, while the latter schemes try to provide a fair resource allocation over sufficiently long time duration. From a TCP goodput standpoint, we show that the class of MAC algorithms that incorporate a fairness metric and consider the backlog outperform the channel diversity exploiting schemes.