865 resultados para Polymorphous modification
Resumo:
Diamond/metal composites are very attractive materials for electronics because their excellent thermal properties make them suitable for use as heat sink elements in multifunctional electronic packaging systems. To enlarge the potential applications of these composites, current efforts are mainly focused on investigating different ways to improve the contact between metal and diamond. In the present work, a theoretical study has been carried out to determine the differences between the interfacial thermal conductance of aluminum/diamond and aluminum/graphite interfaces. Additionally, diamond particles were surface modified with oxygen to observe how it affects the quality of the diamond surface. The characterization of the surface of diamonds has been performed using different surface analysis techniques, especially x-ray photoelectron spectroscopy and temperature-programmed desorption.
Resumo:
In view of a field research carried out by a team connected to the universe of body modification, it is possible to discern some uses and meanings linked to these forms of body interventions. Body modification or body change is part of the circuit of piercings and tattoos, although they are socially less thinned and more extreme, like scarifications, subcutaneous implants, bifurcated tongues, surfaces and body suspensions. The aim of this paper is to cast an anthropological glance on these practices, joining at the same context all the subjects involved with these techniques, placing them inside the same relational focus and capturing their journeys and trajectories. The discussions are concentrated on the notion of body building and urban life style. Ideas as personal distinctness and prestige imitation are also present in this universe, as well as matters attached to genre, pleasure, art, and to the so-called alternative circuit . This way, the ethnography so far presented here, reveals the complex and contemporaneous character of these practices of body markings in which the body appears as the central element in the experiences of the subjects of this study
Resumo:
Doutoramento em Engenharia Agronómica - Instituto Superior de Agronomia - UL
Resumo:
Genome editing is becoming an important biotechnological tool for gene function analysis and crop improvement, being the CRISPR-Cas9 (Clustered Regularly Interspaced Short Palindromic Repeat-CRISPR associated protein 9) system the most widely used. The natural CRISPR/Cas9 system has been reduced to two components: a single-guide RNA (sgRNA) for target recognition via RNA-DNA base pairing, which is commonly expressed using a promoter for small-RNAs (U6 promoter), and the Cas9 endonuclease for DNA cleavage (1). To validate the CRISPR/Cas9 system in strawberry plants, we designed two sgRNAs directed against the floral homeotic gene APETALA3 (sgRNA-AP3#1 and sgRNA-AP3#2). This gene was selected because ap3 mutations induce clear developmental phenotypes in which petals and stamens are missing or partially converted to sepals and carpels respectively (2). In this work, we used two different U6 promoters to drive the sgRNA-AP3s expression: AtU6-26 from Arabidopsis (4), and a U6 promoter from Fragaria vesca (FvU6) (this work). We also tested two different coding sequences of Cas9: a human- (hSpCas9) (3) and a plant-codon optimized (pSpCas9) (this work). Transient expression experiments using both CRISPR/Cas9 systems (AtU6-26:sgRNA-AP3#1_35S:hSpCas9_AtU6-26:sgRNA-AP3#2 and FvU6:sgRNA-AP3#1_35S:pSpCas9_FvU6:sgRNA-AP3#2) were performed infiltrating Agrobacterium tumefaciens into F. vesca fruits. PCR amplification and sequencing analyses across the target sites showed a deletion of 188-189 bp corresponding to the region comprised between the two cutting sites of Cas9, confirming that the CRISPR/Cas9 system is functional in F. vesca. Remarkably, the two systems showed different mutagenic efficiency that could be related to differences in expression of the U6 promoters as well as differences in the Cas9 transcripts stability and translation. Stable transformants for both F. vesca (2n) and Fragaria X anannassa (8n) are currently being established to test whether is possible to obtain heritable homozygous mutants derived from CRISPR/Cas9 strategies in strawberry. Thus, our work offers a promising tool for genome editing and gene functional analysis in strawberry. This tool might represent a more efficient alternative to the sometimes inefficient RNAi silencing methods commonly used in this species.
Resumo:
We present an advanced method to achieve natural modifications when applying a pitch shifting process to singing voice by modifying the spectral envelope of the audio ex- cerpt. To this end, an all-pole spectral envelope model has been selected to describe the global variations of the spectral envelope with the changes of the pitch. We performed a pitch shifting process of some sustained vowels with the envelope processing and without it, and compared both by means of a survey open to volunteers in our website.
Resumo:
Bulk electric waste plastics were recycled and reduced in size into plastic chips before pulverization or cryogenic grinding into powders. Two major types of electronic waste plastics were used in this investigation: acrylonitrile butadiene styrene (ABS) and high impact polystyrene (HIPS). This research investigation utilized two approaches for incorporating electronic waste plastics into asphalt pavement materials. The first approach was blending and integrating recycled and processed electronic waste powders directly into asphalt mixtures and binders; and the second approach was to chemically treat recycled and processed electronic waste powders with hydro-peroxide before blending into asphalt mixtures and binders. The chemical treatment of electronic waste (e-waste) powders was intended to strengthen molecular bonding between e-waste plastics and asphalt binders for improved low and high temperature performance. Superpave asphalt binder and mixture testing techniques were conducted to determine the rheological and mechanical performance of the e-waste modified asphalt binders and mixtures. This investigation included a limited emissions-performance assessment to compare electronic waste modified asphalt pavement mixture emissions using SimaPro and performance using MEPDG software. Carbon dioxide emissions for e-waste modified pavement mixtures were compared with conventional asphalt pavement mixtures using SimaPro. MEPDG analysis was used to determine rutting potential between the various e-waste modified pavement mixtures and the control asphalt mixture. The results from this investigation showed the following: treating the electronic waste plastics delayed the onset of tertiary flow for electronic waste mixtures, electronic waste mixtures showed some improvement in dynamic modulus results at low temperatures versus the control mixture, and tensile strength ratio values for treated e-waste asphalt mixtures were improved versus the control mixture.
Resumo:
Ce mémoire de recherche investigue la continuité des traits psychopathiques chez les enfants de même que la contribution de la qualité des relations avec les parents, l’enseignant et les pairs à la variabilité de ces traits. La présente étude porte sur 281 enfants (48 % de filles) âgés de 6 à 9 ans avec un trouble des conduites. Trois dimensions de traits psychopathiques ont été évaluées chez les enfants (narcissisme, impulsivité, insensibilité), en plus d’un construit global. Ces traits ont été mesurés avec l’APSD par un parent et un enseignant à l’entrée dans l’étude (temps 0 ou T0) puis à une année d’intervalle sur une période de 4 ans (T1 à T4). Ces évaluateurs ont également évalué la qualité de leur relation avec l’enfant ainsi que celle avec les pairs (T0). Les résultats montrent que la stabilité différentielle des traits sur l’intervalle de quatre années va de faible à modérée pour chaque dimension. Cependant, l’analyse de la stabilité des niveaux moyens indique que c’est entre le T0 et le T2 que la variabilité des traits est la plus significative, la stabilité étant plus importante entre le T2 et le T4. Enfin, l’étude démontre qu’aucune des variables relationnelles ne contribue significativement à la variabilité des traits quatre ans plus tard et ce, pour chacune des dimensions ainsi que pour le construit global. stabilité, traits psychopathiques, traits antisociaux, trouble des conduites, enfants, relation avec le parent, relation avec l’enseignant, relation avec les pairs
Resumo:
The modification of peripherally metalated meso-η1-platiniometalloporphyrins, such as trans-[PtBr(NiDAPP)(PPh3)2] (H2DAPP = 5-phenyl-10,20-bis(3‘,5‘-di-tert-butylphenyl)porphyrin), leads to the analogous platinum(II) nitrato and triflato electrophiles in almost quantitative yields. Self-assembly reactions of these meso-platinioporphyrin tectons with pyridine, 4,4‘-bipyridine, or various meso-4-pyridylporphyrins in chloroform generate new multicomponent organometallic porphyrin arrays containing up to five porphyrin units. These new types of supramolecular arrays are formed exclusively in high yields and are stable in solution or in the solid state for extended periods. They were characterized by multinuclear NMR and UV−visible spectroscopy as well as high-resolution electrospray ionization mass spectrometry.
Resumo:
The anatomy and microstructure of the spine and in particular the intervertebral disc are intimately linked to how they operate in vivo and how they distribute loads to the adjacent musculature and bony anatomy. The degeneration of the intervertebral discs may be characterised by a loss of hydration, loss of disc height, a granular texture and the presence of annular lesions. As such, degeneration of the intervertebral discs compromises the mechanical integrity of their components and results in adaption and modification in the mechanical means by which loads are distributed between adjacent spinal motion segments.
Resumo:
Although internet chat is a significant aspect of many internet users’ lives, the manner in which participants in quasi-synchronous chat situations orient to issues of social and moral order remains to be studied in depth. The research presented here is therefore at the forefront of a continually developing area of study. This work contributes new insights into how members construct and make accountable the social and moral orders of an adult-oriented Internet Relay Chat (IRC) channel by addressing three questions: (1) What conversational resources do participants use in addressing matters of social and moral order? (2) How are these conversational resources deployed within IRC interaction? and (3) What interactional work is locally accomplished through use of these resources? A survey of the literature reveals considerable research in the field of computer-mediated communication, exploring both asynchronous and quasi-synchronous discussion forums. The research discussed represents a range of communication interests including group and collaborative interaction, the linguistic construction of social identity, and the linguistic features of online interaction. It is suggested that the present research differs from previous studies in three ways: (1) it focuses on the interaction itself, rather than the ways in which the medium affects the interaction; (2) it offers turn-by-turn analysis of interaction in situ; and (3) it discusses membership categories only insofar as they are shown to be relevant by participants through their talk. Through consideration of the literature, the present study is firmly situated within the broader computer-mediated communication field. Ethnomethodology, conversation analysis and membership categorization analysis were adopted as appropriate methodological approaches to explore the research focus on interaction in situ, and in particular to investigate the ways in which participants negotiate and co-construct social and moral orders in the course of their interaction. IRC logs collected from one chat room were analysed using a two-pass method, based on a modification of the approaches proposed by Pomerantz and Fehr (1997) and ten Have (1999). From this detailed examination of the data corpus three interaction topics are identified by means of which participants clearly orient to issues of social and moral order: challenges to rule violations, ‘trolling’ for cybersex, and experiences regarding the 9/11 attacks. Instances of these interactional topics are subjected to fine-grained analysis, to demonstrate the ways in which participants draw upon various interactional resources in their negotiation and construction of channel social and moral orders. While these analytical topics stand alone in individual focus, together they illustrate different instances in which participants’ talk serves to negotiate social and moral orders or collaboratively construct new orders. Building on the work of Vallis (2001), Chapter 5 illustrates three ways that rule violation is initiated as a channel discussion topic: (1) through a visible violation in open channel, (2) through an official warning or sanction by a channel operator regarding the violation, and (3) through a complaint or announcement of a rule violation by a non-channel operator participant. Once the topic has been initiated, it is shown to become available as a topic for others, including the perceived violator. The fine-grained analysis of challenges to rule violations ultimately demonstrates that channel participants orient to the rules as a resource in developing categorizations of both the rule violation and violator. These categorizations are contextual in that they are locally based and understood within specific contexts and practices. Thus, it is shown that compliance with rules and an orientation to rule violations as inappropriate within the social and moral orders of the channel serves two purposes: (1) to orient the speaker as a group member, and (2) to reinforce the social and moral orders of the group. Chapter 6 explores a particular type of rule violation, solicitations for ‘cybersex’ known in IRC parlance as ‘trolling’. In responding to trolling violations participants are demonstrated to use affiliative and aggressive humour, in particular irony, sarcasm and insults. These conversational resources perform solidarity building within the group, positioning non-Troll respondents as compliant group members. This solidarity work is shown to have three outcomes: (1) consensus building, (2) collaborative construction of group membership, and (3) the continued construction and negotiation of existing social and moral orders. Chapter 7, the final data analysis chapter, offers insight into how participants, in discussing the events of 9/11 on the actual day, collaboratively constructed new social and moral orders, while orienting to issues of appropriate and reasonable emotional responses. This analysis demonstrates how participants go about ‘doing being ordinary’ (Sacks, 1992b) in formulating their ‘first thoughts’ (Jefferson, 2004). Through sharing their initial impressions of the event, participants perform support work within the interaction, in essence working to normalize both the event and their initial misinterpretation of it. Normalising as a support work mechanism is also shown in relation to participants constructing the ‘quiet’ following the event as unusual. Normalising is accomplished by reference to the indexical ‘it’ and location formulations, which participants use both to negotiate who can claim to experience the ‘unnatural quiet’ and to identify the extent of the quiet. Through their talk participants upgrade the quiet from something legitimately experienced by one person in a particular place to something that could be experienced ‘anywhere’, moving the phenomenon from local to global provenance. With its methodological design and detailed analysis and findings, this research contributes to existing knowledge in four ways. First, it shows how rules are used by participants as a resource in negotiating and constructing social and moral orders. Second, it demonstrates that irony, sarcasm and insults are three devices of humour which can be used to perform solidarity work and reinforce existing social and moral orders. Third, it demonstrates how new social and moral orders are collaboratively constructed in relation to extraordinary events, which serve to frame the event and evoke reasonable responses for participants. And last, the detailed analysis and findings further support the use of conversation analysis and membership categorization as valuable methods for approaching quasi-synchronous computer-mediated communication.
Resumo:
Key topics: Since the birth of the Open Source movement in the mid-80's, open source software has become more and more widespread. Amongst others, the Linux operating system, the Apache web server and the Firefox internet explorer have taken substantial market shares to their proprietary competitors. Open source software is governed by particular types of licenses. As proprietary licenses only allow the software's use in exchange for a fee, open source licenses grant users more rights like the free use, free copy, free modification and free distribution of the software, as well as free access to the source code. This new phenomenon has raised many managerial questions: organizational issues related to the system of governance that underlie such open source communities (Raymond, 1999a; Lerner and Tirole, 2002; Lee and Cole 2003; Mockus et al. 2000; Tuomi, 2000; Demil and Lecocq, 2006; O'Mahony and Ferraro, 2007;Fleming and Waguespack, 2007), collaborative innovation issues (Von Hippel, 2003; Von Krogh et al., 2003; Von Hippel and Von Krogh, 2003; Dahlander, 2005; Osterloh, 2007; David, 2008), issues related to the nature as well as the motivations of developers (Lerner and Tirole, 2002; Hertel, 2003; Dahlander and McKelvey, 2005; Jeppesen and Frederiksen, 2006), public policy and innovation issues (Jullien and Zimmermann, 2005; Lee, 2006), technological competitions issues related to standard battles between proprietary and open source software (Bonaccorsi and Rossi, 2003; Bonaccorsi et al. 2004, Economides and Katsamakas, 2005; Chen, 2007), intellectual property rights and licensing issues (Laat 2005; Lerner and Tirole, 2005; Gambardella, 2006; Determann et al., 2007). A major unresolved issue concerns open source business models and revenue capture, given that open source licenses imply no fee for users. On this topic, articles show that a commercial activity based on open source software is possible, as they describe different possible ways of doing business around open source (Raymond, 1999; Dahlander, 2004; Daffara, 2007; Bonaccorsi and Merito, 2007). These studies usually look at open source-based companies. Open source-based companies encompass a wide range of firms with different categories of activities: providers of packaged open source solutions, IT Services&Software Engineering firms and open source software publishers. However, business models implications are different for each of these categories: providers of packaged solutions and IT Services&Software Engineering firms' activities are based on software developed outside their boundaries, whereas commercial software publishers sponsor the development of the open source software. This paper focuses on open source software publishers' business models as this issue is even more crucial for this category of firms which take the risk of investing in the development of the software. Literature at last identifies and depicts only two generic types of business models for open source software publishers: the business models of ''bundling'' (Pal and Madanmohan, 2002; Dahlander 2004) and the dual licensing business models (Välimäki, 2003; Comino and Manenti, 2007). Nevertheless, these business models are not applicable in all circumstances. Methodology: The objectives of this paper are: (1) to explore in which contexts the two generic business models described in literature can be implemented successfully and (2) to depict an additional business model for open source software publishers which can be used in a different context. To do so, this paper draws upon an explorative case study of IdealX, a French open source security software publisher. This case study consists in a series of 3 interviews conducted between February 2005 and April 2006 with the co-founder and the business manager. It aims at depicting the process of IdealX's search for the appropriate business model between its creation in 2000 and 2006. This software publisher has tried both generic types of open source software publishers' business models before designing its own. Consequently, through IdealX's trials and errors, I investigate the conditions under which such generic business models can be effective. Moreover, this study describes the business model finally designed and adopted by IdealX: an additional open source software publisher's business model based on the principle of ''mutualisation'', which is applicable in a different context. Results and implications: Finally, this article contributes to ongoing empirical work within entrepreneurship and strategic management on open source software publishers' business models: it provides the characteristics of three generic business models (the business model of bundling, the dual licensing business model and the business model of mutualisation) as well as conditions under which they can be successfully implemented (regarding the type of product developed and the competencies of the firm). This paper also goes further into the traditional concept of business model used by scholars in the open source related literature. In this article, a business model is not only considered as a way of generating incomes (''revenue model'' (Amit and Zott, 2001)), but rather as the necessary conjunction of value creation and value capture, according to the recent literature about business models (Amit and Zott, 2001; Chresbrough and Rosenblum, 2002; Teece, 2007). Consequently, this paper analyses the business models from these two components' point of view.
Resumo:
Cipher Cities was a practice-led research project developed in 3 stages between 2005 and 2007 resulting in the creation of a unique online community, ‘Cipher Cities’, that provides simple authoring tools and processes for individuals and groups to create their own mobile events and event journals, build community profile and participate in other online community activities. Cipher Cities was created to revitalise peoples relationship to everyday places by giving them the opportunity and motivation to create and share complex digital stories in simple and engaging ways. To do so we developed new design processes and methods for both the research team and the end user to appropriate web and mobile technologies. To do so we collaborated with ethnographers, designers and ICT researchers and developers. In teams we ran a series of workshops in a wide variety of cities in Australia to refine an engagement process and to test a series of iteratively developed prototypes to refine the systems that supported community motivation and collaboration. The result of the research is 2 fold: 1. a sophisticated prototype for researchers and designers to further experiment with community engagement methodologies using existing and emerging communications technologies. 2. A ‘human dimensions matrix’. This matrix assists in the identification and modification of place based interventions in the social, technical, spatial, cultural, pedagogical conditions of any given community. This matrix has now become an essential part of a number of subsequent projects and assists design collaborators to successfully conceptualise, generate and evaluate interactive experiences. the research team employed practice-led action research methodologies that involved a collaborative effort across the fields of interaction design and social science, in particular ethnography, in order to: 1. seek, contest, refine a design methodology that would maximise the successful application of a dynamic system to create new kinds of interactions between people, places and artefacts’. 2. To design and deploy an application that intervenes in place-based and mobile technologies and offers people simple interfaces to create and share digital stories. Cipher Cities was awarded 3 separate CRC competitive grants (over $270,000 in total) to assist 3 stages of research covering the development of the Ethnographic Design Methodologies, the development of the tools, and the testing and refinement of both the engagement models and technologies. The resulting methodologies and tools are in the process of being commercialised by the Australasian CRC for Interaction Design.
Resumo:
A number of intervention approaches have been developed to improve work-related driving safety. However, past interventions have been limited in that they have been data-driven, and have not been developed within a theoretical framework. The aim of this study is to present a theory-driven intervention. Based on the methodology developed by Ludwig and Geller (1991), this study evaluates the effectiveness of a participative education intervention on a group of work-related drivers (n = 28; experimental group n = 19, control n = 9). The results support the effectiveness of the intervention in reducing speeding over a six month period, while a non significant increase was found in the control group. The results of this study have important implications for organisations developing theory-driven interventions designed to improve work-related driving behaviour.
Resumo:
One of the most wide-ranging and sophisticated critiques of creative industries policy argues that it is a kind of Trojan horse, secreting the intellectual heritage of the information society and its technocratic baggage into the realm of cultural practice, suborning the latter's proper claims on the public purse and self-understanding, and aligning it with inappropriate bedfellows such as business services, telecommunications and calls for increases in generic creativity. Reviewing the broad adoption of the concept in policy discourse around the world, this paper suggests that rather than a Trojan horse, it might be better thought of as a Rorschach blot, being invested in for varying reasons and with varying emphases and outcomes. Based on spatial analysis, then, the critique may need modification. Temporally as well, the critique may have been overtaken by later developments taking policy emphases 'beyond' the creative industries.
Resumo:
Physiological responses to environmental stress are increasingly well studied in scleractinian corals. This work reports a new stress-related skeletal structure we term clypeotheca. Clypeotheca was observed in several livecollected common reef-building coral genera and a two to three kya subfossil specimen from Heron Reef, Great Barrier Reef and consists of an epitheca-like skeletal wall that seals over the surface of parts of the corallum in areas of stress or damage. It appears to form from a coordinated process wherein neighboring polyps and adjoining coenosarc seal themselves off from the surrounding environment as they contract and die. Clypeotheca forms from inward skeletal centripetal growth at the edges of corallites and by the merging of flange-like outgrowths that surround individual spines over the surface of the coenosteum. Microstructurally, the merged flanges are similar to upsidedown dissepiments and true epitheca. Clypeotheca is interpreted primarily as a response to stress that may help protect the colony from invasion of unhealthy tissues by parasites or disease by retracting tissues in areas that have become unhealthy for the polyps. Identification of skeletal responses of corals to environmental stress may enable the frequency of certain types of environmental stress to be documented in past environments. Such data may be important for understanding the nature of reef dynamics through intervals of climate change and for monitoring the effects of possible anthropogenic stress in modern coral reef habitats.