1000 resultados para Mutiny on the Bounty
Resumo:
Whilst the dynamics informing processes have taken time to become clear, civic resistance initiated by young people using new media began in Egypt in 2010 against the Mubarak regime, soon widened to Tunisia, Yemen and Libya. Known as the 'Arab Spring', this phenomenon re-ignited discussion about the political role of digital space and its democratic potential. While parallels between authoritarian regimes and universities and educational institutions might seem overdrawn to some readers, I suggest there is value in considering the 'Digital Spring' (apropos the 'Arab Spring') as a metaphor to suggest the possibility that similar processes are taking place in schools and universities. This invites discussion about the political significance of digital space and its democratic potential in those institutions. To assess how some young people engage in digitally mediated politics within schools and universities, I identify five propositions which amalgamate descriptive and normative elements derived from Habermas and Dahlgren. These propositions offer an ideal taxonomy of normative and descriptive elements to establish whether digital technology promotes participation and debate in ways that sustain democratic practice.
Influence of carbohydrate source on the in vitro flowering of Sturt's Desert Pea (Swainsona formosa)
Resumo:
Problem solving is an essential element of civil engineering education. It has been I observed that students are best able to understand civil engineering theory when there is a ' practical application of it. Teaching theory alone has led to lower levels of comprehension and motivation and a correspondingly higher rate of failure and "drop-out". This paper analyses the effectiveness of introducing practical design projects at an early stage within a civil engineering undergraduate program at Queensland University of Technology. In two of the essential basic subjects, Engineering Mechanics and Steel Structures, model projects which simulate realistic engineering exercises were introduced. Students were required to work in small groups to analyse, design and build the lightest I most efficient model bridges made of specific materials such as spaghetti, drinking straw, paddle pop sticks and balsa wood and steel columns for a given design loading/target capacity. The paper traces the success of the teaching strategy at each stage from its introduction through to the final student and staff evaluation.
Resumo:
A series of Pt(II) diimine complexes bearing benzothiazolylfluorenyl (BTZ-F8), diphenylaminofluorenyl (NPh2- F8), or naphthalimidylfluorenyl (NI-F8) motifs on the bipyridyl or acetylide ligands (Pt-4−Pt-8), (i.e., {4,4′-bis[7-R1-F8-(≡)n-]bpy}Pt(7- R2-F8- ≡ -)2, where F8 = 9,9′-di(2-ethylhexyl)fluorene, bpy = 2,2′- bipyridine, Pt-4: R1 = R2 = BTZ, n = 0; Pt-5: R1 = BTZ, R2 = NI, n = 0; Pt-6: R1 = R2 = BTZ, n = 1; Pt-7: R1 = BTZ, R2 = NPh2, n = 1; Pt- 8: R1 = NPh2, R2 = BTZ, n = 1) were synthesized. Their ground-state and excited-state properties and reverse saturable absorption performances were systematically investigated. The influence of these motifs on the photophysics of the complexes was investigated by spectroscopic methods and simulated by time-dependent density functional theory (TDDFT). The intense absorption bands below 410 nm for these complexes is assigned to predominantly 1π,π* transitions localized on either the bipyridine or the acetylide ligands; while the broad low-energy absorption bands between 420 and 575 nm are attributed to essentially 1MLCT (metal-to-ligand charge transfer)/ 1LLCT (ligand-to-ligand charge transfer) transitions, likely mixed with some 1ILCT (intraligand charge transfer) transition for Pt-4−Pt-7, and predominantly 1ILCT transition admixing with minor 1MLCT/1LLCT characters for Pt-8. The different substituents on the acetylide and bipyridyl ligands, and the degrees of π-conjugation in the bipyridyl ligand influence both the 1π,π* and charge transfer transitions pronouncedly. All complexes are emissive at room temperature. Upon excitation at their respective absorption band maxima, Pt-4, Pt-6, and Pt-8 exhibit acetylide ligand localized 1π,π* fluorescence and 3MLCT/3LLCT phosphorescence in CH2Cl2, while Pt-5 manifests 1ILCT fluorescence and 3ILCT phosphorescence. However, only 1LLCT fluorescence was observed for Pt-7 at room temperature. The nanosecond transient absorption study was carried out for Pt-4−Pt-8 in CH3CN. Except for Pt-7 that contains NPh2 at the acetylide ligands, Pt-4−Pt-6 and Pt-8 all exhibit weak to moderate excited-state absorption in the visible spectral region. Reverse saturable absorption (RSA) of these complexes was demonstrated at 532 nm using 4.1 ns laser pulses in a 2 mm cuvette. The strength of RSA follows this trend: Pt-4 > Pt-5 > Pt-7 > Pt-6 > Pt-8. Incorporation of electron-donating substituent NPh2 on the bipyridyl ligand significantly decreases the RSA, while shorter π-conjugation in the bipyridyl ligand increases the RSA. Therefore, the substituent at either the acetylide ligands or the bipyridyl ligand could affect the singlet and triplet excited-state characteristics significantly, which strongly influences the RSA efficiency.
Resumo:
Many species of bat use ultrasonic frequency modulated (FM) pulses to measure the distance to objects by timing the emission and reception of each pulse. Echolocation is mainly used in flight. Since the flight speed of bats often exceeds 1% of the speed of sound,Doppler effects will lead to compression of the time between emission and reception as well as an elevation of the echo frequencies, resulting in a distortion of the perceived range. This paper describes the consequences of these Doppler effects on the ranging performance of bats using different pulse designs. The consequences of Doppler effects on ranging performance described in this paper assume bats to have a very accurate ranging resolution, which is feasible with a filterbank receiver. By modeling two receiver types, it was first established that the effects of Doppler compression are virtually independent of the receiver type. Then, used a cross-correlation model was used to investigate the effect of flight speed on Doppler tolerance and range–Doppler coupling separately. This paper further shows how pulse duration, bandwidth, function type, and harmonics influence Doppler tolerance and range–Doppler coupling. The influence of each signal parameter is illustrated using calls of several bat species. It is argued that range–Doppler coupling is a significant source of error in bat echolocation, and various strategies bats could employ to deal with this problem, including the use of range rate information are discussed.
Resumo:
A comprehensive literature review has been undertaken exploring the stressors placed on the personal relationships of Australian Army personnel, through service life and also overseas deployments. This work is the first step in a program of research aimed at developing a screening tool, aimed at acting as an early warning system to enable the right assistance to be given to affected personnel at the earliest possible time. It is envisioned that this tool will be utilised by the day-to-day managers of Australian Army personnel, of whom the vast majority are not health practitioners. This review has identified the commonalities of relationships that last through service life and/or deployments, and those that fail. These factors are those which will aid the development of the screening tool, and enable the early identification of Australian Army personnel who are at risk of having their personal relationship break down. Several of the known relationship stressors are relevant to other ‘high intensity’ professions, such as paramedics. Personal experience as an Army Officer has helped to highlight the importance of this research, and the benefits of developing a tool tailored to the unique social microclimate that is the Australian Army are clear. This research is, to the author’s knowledge, unique in the Australian context.
Resumo:
In this paper, the security of two recent RFID mutual authentication protocols are investigated. The first protocol is a scheme proposed by Huang et al. [7] and the second one by Huang, Lin and Li [6]. We show that these two protocols have several weaknesses. In Huang et al.’s scheme, an adversary can determine the 32-bit secret password with a probability of 2−2 , and in Huang-Lin-Li scheme, a passive adversary can recognize a target tag with a success probability of 1−2−4 and an active adversary can determine all 32 bits of Access password with success probability of 2−4 . The computational complexity of these attacks is negligible.
Resumo:
In this paper we present concrete collision and preimage attacks on a large class of compression function constructions making two calls to the underlying ideal primitives. The complexity of the collision attack is above the theoretical lower bound for constructions of this type, but below the birthday complexity; the complexity of the preimage attack, however, is equal to the theoretical lower bound. We also present undesirable properties of some of Stam’s compression functions proposed at CRYPTO ’08. We show that when one of the n-bit to n-bit components of the proposed 2n-bit to n-bit compression function is replaced by a fixed-key cipher in the Davies-Meyer mode, the complexity of finding a preimage would be 2 n/3. We also show that the complexity of finding a collision in a variant of the 3n-bits to 2n-bits scheme with its output truncated to 3n/2 bits is 2 n/2. The complexity of our preimage attack on this hash function is about 2 n . Finally, we present a collision attack on a variant of the proposed m + s-bit to s-bit scheme, truncated to s − 1 bits, with a complexity of O(1). However, none of our results compromise Stam’s security claims.