905 resultados para Mobiles devices
Resumo:
Protein molecular motors, which are natural nano-machines that convert the chemical energy into mechanical work for cellular motion, muscle contraction and cell division, have been integrated in the last decade in primitive nanodevices based on the motility of nano-biological objects in micro- and nano-fabricated structures. However, the motility of microorganisms powered by molecular motors has not been similarly exploited. Moreover, among the proposed devices based on molecular motors, i.e., nanosensors, nano-mechanical devices and nano-imaging devices, biocomputation devices are conspicuously missing. The present contribution discusses, based on the present state of the art nano- and micro-fabrication, the comparative advantages and disadvantages of using nano- and micro-biological objects in future computation devices. (c) 2006 Elsevier B.V. All rights reserved.
Resumo:
This study presents results from an experimental 10-day research charter that was designed to quantify the effects of (a) a turtle excluder device (TED), (b) a radial escape section bycatch reduction device (BRD) and (c) both devices together, on bycatch and prawn catch rates in the Queensland shallow water eastern king prawn (Penaeus plebejus) trawl fishery. The bycatch was comprised of 250 taxa, mainly gurnards, whiting, lizard fish, flathead, dragonets, portunid crabs, turretfish and flounders. The observed mean catch rates of bycatch and marketable eastern king prawns from the standard trawl net (i.e., net with no TED or BRD) used during the charter were 11.06 kg/hectare (ha(-1)) (S.E. 0.90) swept by the trawl gear and 0.94 kg ha(-1), respectively. For the range of depths sampled (20.1-90.7 m), bycatch rates declined significantly at a rate of 0.14 kg ha-1 for every 1 m increase in depth, while prawn catch rates were unaffected. When both the TED and radial escape section BRD were used together, the bycatch rate declined by 24% compared to a standard net, but at a 20% reduction in marketable prawn catch rate. The largest reductions were achieved for stout whiting Sillago robusta (57% reduction) and yellowtail scad Trachurus novaezelandiae (32% reduction). Multidimensional scaling and analysis of similarities revealed that bycatch assemblages differed significantly between depths and latitude, but not between the different combinations of bycatch reduction devices. Despite the lowered prawn catch rates, the reduced bycatch rates are promising, particularly for S. robusta, which is targeted in another fishery. Prawn trawl operators are not permitted to retain S. robusta and the devices examined herein offer the potential to significantly reduce the incidental fishing mortality that this species experiences. (c) 2006 Elsevier B.V. All rights reserved.
Resumo:
The ability to control the surface properties and subsequent colloidal stability of dispersed particles has widespread applicability in many fields. Sub-micrometer fluorescent silica particles (reporters) can be used to actively encode the combinatorial synthesis of peptide libraries through interparticle association. To achieve these associations, the surface chemistry of the small fluorescent silica reporters is tailored to encourage robust adhesion to large silica microparticles onto which the peptides are synthesized. The interparticle association must withstand a harsh solvent environment multiple synthetic and washing procedures, and biological screening buffers. The encoded support beads were exposed to different solvents used for peptide synthesis, and different solutions used for biological screening including phosphate buffered saline (PBS), 2-[N-morpholino]ethane sulfonic acid (VIES) and a mixture of MES and N-(3-dimethyl-aminopropyl)-N'-ethylcarbodiimide (EDC). The number of reporters remaining adhered to the support bead was quantified after each step. The nature of the associations were explored and tested to optimize the efficiency of these phenomena. Results presented illustrate the influence of the surface functionality and polyelectrolyte modification of the reporters. These parameters were investigated through zeta potential and X-ray photoelectron spectroscopy.
Resumo:
Since 1994, Canada, the United Kingdom and Australia have adopted new choice of law rules for cross-border torts that, in different ways, centre on the application of the law of the place where the tort occurred (the lex loci delicti). All three countries abandoned some species of the rule in Phillips v Eyre, which required some reference to the law of the forum (the lex fori) as well as the lex loci delicti. However, predictions were made that, where possible, courts in these countries would continue to show a strong inclination to apply the lex fori in cross-border tort cases - and would use a range of homing devices to do so. A comprehensive survey and analysis of the cases that have been decided under the Australian, British and Canadian lex loci delicti regimes suggests that courts in these countries do betray a homing instinct, but one that has actually been tightly restrained by appeal courts. Where application of the lex fori was formally allowed by use of a 'flexible exception' in Canada and the United Kingdom, this has been contained by courts of first appeal. Indeed, only the continuing characterization of the assessment of damages as a procedural question in Canada and the United Kingdom, seems to remain as a significant homing device for courts in these countries. © 2006 Oxford University Press.
Resumo:
Online multimedia data needs to be encrypted for access control. To be capable of working on mobile devices such as pocket PC and mobile phones, lightweight video encryption algorithms should be proposed. The two major problems in these algorithms are that they are either not fast enough or unable to work on highly compressed data stream. In this paper, we proposed a new lightweight encryption algorithm based on Huffman error diffusion. It is a selective algorithm working on compressed data. By carefully choosing the most significant parts (MSP), high performance is achieved with proper security. Experimental results has proved the algorithm to be fast. secure: and compression-compatible.
Resumo:
We describe a tool for analysing information flow in security hardware. It identifies both sub-circuits critical to the preservation of security as well as the potential for information flow due to hardware failure. The tool allows for the composition of both logical and physical views of circuit designs. An example based on a cryptographic device is provided.