957 resultados para Current Catalan novel


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we consider a space fractional advection–dispersion equation. The equation is obtained from the standard advection–diffusion equation by replacing the first- and second-order space derivatives by the Riesz fractional derivatives of order β1 ∈ (0, 1) and β2 ∈ (1, 2], respectively. The fractional advection and dispersion terms are approximated by using two fractional centred difference schemes. A new weighted Riesz fractional finite-difference approximation scheme is proposed. When the weighting factor θ equals 12, a second-order accuracy scheme is obtained. The stability, consistency and convergence of the numerical approximation scheme are discussed. A numerical example is given to show that the numerical results are in good agreement with our theoretical analysis.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recent empirical studies of gender discrimination point to the importance of accurately controlling for accumulated labour market experience. Unfortunately in Australia, most data sets do not include information on actual experience. The current paper using data from the National Social Science Survey 1984, examines the efficacy of imputing female labour market experience via the Zabalza and Arrufat (1985) method. The results suggest that the method provides a more accurate measure of experience than that provided by the traditional Mincer proxy. However, the imputation method is sensitive to the choice of identification restrictions. We suggest a novel alternative to a choice between arbitrary restrictions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Fractional mathematical models represent a new approach to modelling complex spatial problems in which there is heterogeneity at many spatial and temporal scales. In this paper, a two-dimensional fractional Fitzhugh-Nagumo-monodomain model with zero Dirichlet boundary conditions is considered. The model consists of a coupled space fractional diffusion equation (SFDE) and an ordinary differential equation. For the SFDE, we first consider the numerical solution of the Riesz fractional nonlinear reaction-diffusion model and compare it to the solution of a fractional in space nonlinear reaction-diffusion model. We present two novel numerical methods for the two-dimensional fractional Fitzhugh-Nagumo-monodomain model using the shifted Grunwald-Letnikov method and the matrix transform method, respectively. Finally, some numerical examples are given to exhibit the consistency of our computational solution methodologies. The numerical results demonstrate the effectiveness of the methods.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Energy represents the cornerstone of modern life. However, current patterns of energy production are unsustainable. This is true for both the developed and developing worlds. In this context, this paper considers how, from a conceptual perspective, the law can contribute to more sustainable patterns of energy production can be addressed. The approach that this paper adopts is to consider two of the most important concepts that are relevant to the governance of modern environmental and societal challenges: human dignity and sustainable development. It is within this context that this paper contends that the convergence of these concepts provides the platform for a novel approach to encourage the sustainable production of energy by way of a ‘right to sustainable energy’. With this in mind, this paper considers the forum in which a right to sustainable energy may be developed and outlines the content of the proposed right.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Anisotropic damage distribution and evolution have a profound effect on borehole stress concentrations. Damage evolution is an irreversible process that is not adequately described within classical equilibrium thermodynamics. Therefore, we propose a constitutive model, based on non-equilibrium thermodynamics, that accounts for anisotropic damage distribution, anisotropic damage threshold and anisotropic damage evolution. We implemented this constitutive model numerically, using the finite element method, to calculate stress–strain curves and borehole stresses. The resulting stress–strain curves are distinctively different from linear elastic-brittle and linear elastic-ideal plastic constitutive models and realistically model experimental responses of brittle rocks. We show that the onset of damage evolution leads to an inhomogeneous redistribution of material properties and stresses along the borehole wall. The classical linear elastic-brittle approach to borehole stability analysis systematically overestimates the stress concentrations on the borehole wall, because dissipative strain-softening is underestimated. The proposed damage mechanics approach explicitly models dissipative behaviour and leads to non-conservative mud window estimations. Furthermore, anisotropic rocks with preferential planes of failure, like shales, can be addressed with our model.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Given global demand for new infrastructure, governments face substantial challenges in funding new infrastructure and delivering Value for Money (VfM). As part of the background to this challenge, a critique is given of current practice in the selection of the approach to procure major public sector infrastructure in Australia and which is akin to the Multi-Attribute Utility Approach (MAUA). To contribute towards addressing the key weaknesses of MAUA, a new first-order procurement decision-making model is presented. The model addresses the make-or-buy decision (risk allocation); the bundling decision (property rights incentives), as well as the exchange relationship decision (relational to arms-length exchange) in its novel approach to articulating a procurement strategy designed to yield superior VfM across the whole life of the asset. The aim of this paper is report on the development of this decisionmaking model in terms of the procedural tasks to be followed and the method being used to test the model. The planned approach to testing the model uses a sample of 87 Australian major infrastructure projects in the sum of AUD32 billion and deploys a key proxy for VfM comprising expressions of interest, as an indicator of competition.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Light gauge steel frame wall systems are commonly used in industrial and commercial buildings, and there is a need for simple fire design rules to predict their load capacities and fire resistance ratings. During fire events, the light gauge steel frame wall studs are subjected to non-uniform temperature distributions that cause thermal bowing, neutral axis shift and magnification effects and thus resulting in a combined axial compression and bending action on the studs. In this research, a series of full-scale fire tests was conducted first to evaluate the performance of light gauge steel frame wall systems with eight different wall configurations under standard fire conditions. Finite element models of light gauge steel frame walls were then developed, analysed under transient and steady-state conditions and validated using full-scale fire tests. Using the results from fire tests and finite element analyses, a detailed investigation was undertaken into the prediction of axial compression strength and failure times of light gauge steel frame wall studs in standard fires using the available fire design rules based on Australian, American and European standards. The results from both fire tests and finite element analyses were used to investigate the ability of these fire design rules to include the complex effects of non-uniform temperature distributions and their accuracy in predicting the axial compression strength of wall studs and the failure times. Suitable modifications were then proposed to the fire design rules. This article presents the details of this investigation on the fire design rules of light gauge steel frame walls and the results.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Despite extensive research, no cure has been found for Alzheimer's disease as yet. A large number of medications have been investigated to determine their potential for altering the natural history of the disease and this work is ongoing. In an effort to shed light on current and future (awaiting approval) medications, the following is a summary of published material and experiences with some of the drugs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A review of radiographers was undertaken to determine the specific projections currently performed for patients with acute presentation for shoulder trauma. Radiographers were asked to indicate projections they would perform for specific patient presentations. This poster presents a snapshot of the diversity of projections performed and a review of the current evidence of the most appropriate projections

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Neutrophils serve as an intriguing model for the study of innate immune cellular activity induced by physiological stress. We measured changes in the transcriptome of circulating neutrophils following an experimental exercise trial (EXTRI) consisting of 1 h of intense cycling immediately followed by 1 h of intense running. Blood samples were taken at baseline, 3 h, 48 h, and 96 h post-EXTRI from eight healthy, endurance-trained, male subjects. RNA was extracted from isolated neutrophils. Differential gene expression was evaluated using Illumina microarrays and validated with quantitative PCR. Gene set enrichment analysis identified enriched molecular signatures chosen from the Molecular Signatures Database. Blood concentrations of muscle damage indexes, neutrophils, interleukin (IL)-6 and IL-10 were increased (P < 0.05) 3 h post-EXTRI. Upregulated groups of functionally related genes 3 h post-EXTRI included gene sets associated with the recognition of tissue damage, the IL-1 receptor, and Toll-like receptor (TLR) pathways (familywise error rate, P value < 0.05). The core enrichment for these pathways included TLRs, low-affinity immunoglobulin receptors, S100 calcium binding protein A12, and negative regulators of innate immunity, e.g., IL-1 receptor antagonist, and IL-1 receptor associated kinase-3. Plasma myoglobin changes correlated with neutrophil TLR4 gene expression (r = 0.74; P < 0.05). Neutrophils had returned to their nonactivated state 48 h post-EXTRI, indicating that their initial proinflammatory response was transient and rapidly counterregulated. This study provides novel insight into the signaling mechanisms underlying the neutrophil responses to endurance exercise, suggesting that their transcriptional activity was particularly induced by damage-associated molecule patterns, hypothetically originating from the leakage of muscle components into the circulation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The determinants and key mechanisms of cancer cell osteotropism have not been identified, mainly due to the lack of reproducible animal models representing the biological, genetic and clinical features seen in humans. An ideal model should be capable of recapitulating as many steps of the metastatic cascade as possible, thus facilitating the development of prognostic markers and novel therapeutic strategies. Most animal models of bone metastasis still have to be derived experimentally as most syngeneic and transgeneic approaches do not provide a robust skeletal phenotype and do not recapitulate the biological processes seen in humans. The xenotransplantation of human cancer cells or tumour tissue into immunocompromised murine hosts provides the possibility to simulate early and late stages of the human disease. Human bone or tissue-engineered human bone constructs can be implanted into the animal to recapitulate more subtle, species-specific aspects of the mutual interaction between human cancer cells and the human bone microenvironment. Moreover, the replication of the entire "organ" bone makes it possible to analyse the interaction between cancer cells and the haematopoietic niche and to confer at least a partial human immunity to the murine host. This process of humanisation is facilitated by novel immunocompromised mouse strains that allow a high engraftment rate of human cells or tissue. These humanised xenograft models provide an important research tool to study human biological processes of bone metastasis.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis consists of the novel Brolga and an exegesis examining in what ways the ideas of katabasis and deterritorialisation inform an understanding of descent narratives in contemporary Australian outback fiction. When writing the creative piece, it was observed that Joseph Campbell’s Hero’s Journey was an imprecise model for my manuscript and indeed for many of the contemporary novels I had read written in similar outback settings. On analysis a better fit lies in the idea of a heroic journey from which there is no clear return from the underworld. This narrative form is defined in this thesis as a katabatic narrative. To unpack this narrative trope, the inverse of territoriality, deterritorialisation, is used as a lens to examine the complex thematic and symbolic resonances of the outback in both Brolga and analogous works of contemporary outback fiction.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Radio Frequency Identification is a wireless identification method that utilizes the reception of electromagnetic radio waves. This research has proposed a novel model to allow for an in-depth security analysis of current protocols and developed new flexible protocols that can be adapted to offer either stronger security or better efficiency.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. This approach is more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message, and in a separate pass providing integrity protection by generating a Message Authentication Code (MAC). AE using symmetric ciphers can be provided by either stream ciphers with built in authentication mechanisms or block ciphers using appropriate modes of operation. However, stream ciphers have the potential for higher performance and smaller footprint in hardware and/or software than block ciphers. This property makes stream ciphers suitable for resource constrained environments, where storage and computational power are limited. There have been several recent stream cipher proposals that claim to provide AE. These ciphers can be analysed using existing techniques that consider confidentiality or integrity separately; however currently there is no existing framework for the analysis of AE stream ciphers that analyses these two properties simultaneously. This thesis introduces a novel framework for the analysis of AE using stream cipher algorithms. This thesis analyzes the mechanisms for providing confidentiality and for providing integrity in AE algorithms using stream ciphers. There is a greater emphasis on the analysis of the integrity mechanisms, as there is little in the public literature on this, in the context of authenticated encryption. The thesis has four main contributions as follows. The first contribution is the design of a framework that can be used to classify AE stream ciphers based on three characteristics. The first classification applies Bellare and Namprempre's work on the the order in which encryption and authentication processes take place. The second classification is based on the method used for accumulating the input message (either directly or indirectly) into the into the internal states of the cipher to generate a MAC. The third classification is based on whether the sequence that is used to provide encryption and authentication is generated using a single key and initial vector, or two keys and two initial vectors. The second contribution is the application of an existing algebraic method to analyse the confidentiality algorithms of two AE stream ciphers; namely SSS and ZUC. The algebraic method is based on considering the nonlinear filter (NLF) of these ciphers as a combiner with memory. This method enables us to construct equations for the NLF that relate the (inputs, outputs and memory of the combiner) to the output keystream. We show that both of these ciphers are secure from this type of algebraic attack. We conclude that using a keydependent SBox in the NLF twice, and using two different SBoxes in the NLF of ZUC, prevents this type of algebraic attack. The third contribution is a new general matrix based model for MAC generation where the input message is injected directly into the internal state. This model describes the accumulation process when the input message is injected directly into the internal state of a nonlinear filter generator. We show that three recently proposed AE stream ciphers can be considered as instances of this model; namely SSS, NLSv2 and SOBER-128. Our model is more general than a previous investigations into direct injection. Possible forgery attacks against this model are investigated. It is shown that using a nonlinear filter in the accumulation process of the input message when either the input message or the initial states of the register is unknown prevents forgery attacks based on collisions. The last contribution is a new general matrix based model for MAC generation where the input message is injected indirectly into the internal state. This model uses the input message as a controller to accumulate a keystream sequence into an accumulation register. We show that three current AE stream ciphers can be considered as instances of this model; namely ZUC, Grain-128a and Sfinks. We establish the conditions under which the model is susceptible to forgery and side-channel attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose – This paper adds to growing research of psychiatric intensive care units (PICU) by recounting descriptions of psychiatric intensive care settings and discusses the perceptions held by nurses of the organisational interfaces, arrangements and provisions of care in these settings. Design/methodology/approach – Data gathered from focus groups held with nurses from two PICUs was used to establish terminology, defining attributes, related concepts, antecedents, values, processes and concepts related to current practices. A literature search was conducted to permit a review of the conceptual arrangements and contemporary understanding of intensive care for people experiencing acute psychiatric illness based on the perspectives held by the nurses from the focus groups. Findings – Dissonance between service needs and the needs and management of individual patients overshadow strategies to implement comprehensive recovery-oriented approaches. Three factors are reported in this paper that influence standards and procedural practice in PICU; organisational structures; physical structures; and subtype nomenclature. Practical implications – Acute inpatient care is an important part of a comprehensive approach to mental health services. Commonly intensive acute care is delivered in specialised wards or units co-located with acute mental health inpatient units mostly known as PICU. Evidence of the most effective treatment and approaches in intensive care settings that support comprehensive recovery for improved outcomes is nascent. Originality/value – Current descriptions from nurses substantiate wide variations in the provisions, design and classifications of psychiatric intensive care. Idiosyncratic and localised conceptions of psychiatric intensive care are not adequately entailing effective treatment and methods in support of recovery principles for improved and comprehensive outcomes. The authors suggest that more concrete descriptions, guidelines, training and policies for provision of intensive psychiatric health care encompassing the perspective of nursing professionals, would reinforce conceptual construction and thus optimum treatments within a comprehensive, recovery-oriented approach to mental health services.