928 resultados para second harmonic generation
Resumo:
Purpose: Generation Y (Gen Y) is the newest and largest generation entering the workforce. Gen Y may differ from previous generations in work-related characteristics which may have recruitment and retention repercussions. Currently, limited theoretically-based research exists regarding Gen Y’s work expectations and goals in relation to undergraduate students and graduates. Design/methodology/approach: This study conducted a theoretically-based investigation of the work expectations and goals of student- and working-Gen Y individuals based within a framework incorporating both expectancy-value and goal setting theories. N = 398 provided useable data via an on-line survey. Findings: Overall, some support was found for predictions with career goals loading on a separate component to daily work expectations and significant differences between student- and working- Gen Y on career goals. No significant differences were found, however, between the two groups in daily work expectations. Research limitations/implications: Future research may benefit from adopting a theoretical framework which assesses both daily work expectations and career goals when examining the factors which motivate Gen Y’s decisions to join and remain at a particular organisation. Practical implications: At a practical level, based on the findings, some examples are provided of the means by which organisations may draw upon daily work expectations and career goals of importance to Gen Y and, in doing so, influence the likelihood that a Gen Y individual will join and remain at their particular organisation. Originality/value: This research has demonstrated the utility of adopting a sound theoretical framework in furthering understanding about the motivations which influence organisations’ ability to recruit and retain Gen Y, among both student Gen Y as well as those Gen Y individuals who are already working.
Resumo:
This paper uses interviews with wealthy Australians to examine the progression from entrepreneurship to philanthropy in an Australian context. Understanding the characteristics, behaviours and motivations of this group of entrepreneurs turned philanthropists strengthens the links identified in international research between the entrepreneurship and philanthropic sectors. Three major themes emerging from the qualitative data are explored: first, the tipping points that move individuals (and their partners/families) between the two spheres of activity; and second, the strong motivations for giving that see entrepreneurs identified internationally as more generous than high net worth individuals whose wealth derives from other sources. The third major theme is the modes of giving that distinguish those with an entrepreneurship background from other philanthropists. The unique characteristics of a smaller sub-set of ultra high net worth donors are also explored, and areas for future study are highlighted.
Resumo:
This item provides supplementary materials for the paper mentioned in the title, specifically a range of organisms used in the study. The full abstract for the main paper is as follows: Next Generation Sequencing (NGS) technologies have revolutionised molecular biology, allowing clinical sequencing to become a matter of routine. NGS data sets consist of short sequence reads obtained from the machine, given context and meaning through downstream assembly and annotation. For these techniques to operate successfully, the collected reads must be consistent with the assumed species or species group, and not corrupted in some way. The common bacterium Staphylococcus aureus may cause severe and life-threatening infections in humans,with some strains exhibiting antibiotic resistance. In this paper, we apply an SVM classifier to the important problem of distinguishing S. aureus sequencing projects from alternative pathogens, including closely related Staphylococci. Using a sequence k-mer representation, we achieve precision and recall above 95%, implicating features with important functional associations.
Resumo:
Multilevel converters, because of the benefits they attract in generating high quality output voltage, are used in several applications. Various modulation and control techniques are introduced by several researchers to control the output voltage of the multilevel converters like space vector modulation and harmonic elimination (HE) methods. Multilevel converters may have a DC link with equal or unequal DC voltages. In this study a new HE technique based on the HE method is proposed for multilevel converters with unequal DC link voltage. The DC link voltage levels are considered as additional variables for the HE method and the voltage levels are defined based on the HE results. Increasing the number of voltage levels can reduce lower order harmonic content because of the fact that more variables are created. In comparison to previous methods, this new technique has a positive effect on the output voltage quality by reducing its total harmonic distortion, which must take into consideration for some applications such as uninterruptable power supply, motor drive systems and piezoelectric transducer excitation. In order to verify the proposed modulation technique, MATLAB simulations and experimental tests are carried out for a single-phase four-level diode-clamped converter.
Resumo:
An online survey was conducted to investigate the views and experiences of Australian traffic and transport professionals about practical problems and issues in terms of trip generation and trip chaining for use in Transport Impact Assessment (TIA). Findings from this survey revealed that there is a shortage of appropriate data related to trip generation estimation for use in TIAs in Australia. Establishing a National Trip Generation Database (NTGD) with a centralised responsible organisation for collecting and publishing trip generation data based on federal and state governments’ contribution was found the most accepted solution for resolving this shortage as well as providing national standards and guidelines associated with trip generation definitions, data collection methodology, and TIA preparation process based on updated research. Finally, the study recognised the importance of the trip chaining effects on trip generation estimation and identified most prevalent land uses subject to trip chaining in terms of TIA.
Resumo:
The majority of current first year university students belong to Generation Y. Consequently, research suggests that, in order to more effectively engage them, their particular learning preferences should be acknowledged in the organisation of their learning environments and in the support provided. These preferences are reflected in the Torts Student Peer Mentor Program, which, as part of the undergraduate law degree at the Queensland University of Technology, utilises active learning, structured sessions and teamwork to supplement student understanding of the substantive law of Torts with the development of life-long skills. This article outlines the Program, and its relevance to the learning styles and experiences of Generation Y first year law students transitioning to university, in order to investigate student perceptions of its effectiveness – both generally and, more specifically, in terms of the Program’s capacity to assist students to develop academic and work-related skills.
Resumo:
Australian Aboriginal Words in English records the Aboriginal contribution to Australian English and provides a fascinating insight into the contact between the first Australians and European settlers. The words are grouped according to subject, and for each one there is information on the Aboriginal language from which it derives, the date of its first written use in English, and its present meaning and pronunciation. This book brings them together and provides the fullest available information about their Aboriginal background and their Australian English History.
Resumo:
The decision in ACN 070 037 599 Pty Ltd v Larvik Pty Ltd (No 2) [2008] QSC 118 involved a consideration of the implications for a plaintiff whose offer to settle under Part 5 of the Uniform Civil Procedure Rules 1999 (Qld) was made jointly with another plaintiff who abandoned her action before trial. The court found nothing wrong with the making of a joint offer. It concluded the successful plaintiff would be entitled to indemnity costs on the simple test of whether the judgment for that plaintiff was more favourable than the offer.
Resumo:
SYN (Student Youth Network) is a media organisation run by people between the ages of 12 and 26. In this ‘coming of age story’, Ellie Rennie follows the SYNners as they build Australia’s most unusual media empire against enormous odds. Over the course of the book, social networking becomes the most popular use of the internet and traditional media institutions are forced to acknowledge the rise of amateur content. In response, SYN rethinks its approach to the online environment, kills its print publication, deals with the introduction of digital broadcasting and teaches schoolteachers about a new kind of literacy. In just two years dozens of careers are launched, the SYN radio audience doubles and they get told off for swearing. Life of SYN takes on the big issues of the media through the story of a small media organisation. This humorous and insightful book describes a media environment in flux, where audiences and producers express their freedom in unruly and contradictory ways. Life of SYN gives structure to the new media world without curtailing its inventiveness and possibility. Life of SYN combines story with media theory, encompassing: digital literacy and media participation; the future of community media; youth media and media industries.
Resumo:
Rayleigh–Stokes problems have in recent years received much attention due to their importance in physics. In this article, we focus on the variable-order Rayleigh–Stokes problem for a heated generalized second grade fluid with fractional derivative. Implicit and explicit numerical methods are developed to solve the problem. The convergence, stability of the numerical methods and solvability of the implicit numerical method are discussed via Fourier analysis. Moreover, a numerical example is given and the results support the effectiveness of the theoretical analysis.
Resumo:
The structures of two ammonium salts of 3-carboxy-4-hydroxybenzenesulfonic acid (5-sulfosalicylic acid, 5-SSA) have been determined at 200 K. In the 1:1 hydrated salt, ammonium 3-carboxy-4-hydroxybenzenesulfonate monohydrate, NH4+·C7H5O6S-·H2O, (I), the 5-SSA- monoanions give two types of head-to-tail laterally linked cyclic hydrogen-bonding associations, both with graph-set R44(20). The first involves both carboxylic acid O-HOwater and water O-HOsulfonate hydrogen bonds at one end, and ammonium N-HOsulfonate and N-HOcarboxy hydrogen bonds at the other. The second association is centrosymmetric, with end linkages through water O-HOsulfonate hydrogen bonds. These conjoined units form stacks down c and are extended into a three-dimensional framework structure through N-HO and water O-HO hydrogen bonds to sulfonate O-atom acceptors. Anhydrous triammonium 3-carboxy-4-hydroxybenzenesulfonate 3-carboxylato-4-hydroxybenzenesulfonate, 3NH4+·C7H4O6S2-·C7H5O6S-, (II), is unusual, having both dianionic 5-SSA2- and monoanionic 5-SSA- species. These are linked by a carboxylic acid O-HO hydrogen bond and, together with the three ammonium cations (two on general sites and the third comprising two independent half-cations lying on crystallographic twofold rotation axes), give a pseudo-centrosymmetric asymmetric unit. Cation-anion hydrogen bonding within this layered unit involves a cyclic R33(8) association which, together with extensive peripheral N-HO hydrogen bonding involving both sulfonate and carboxy/carboxylate acceptors, gives a three-dimensional framework structure. This work further demonstrates the utility of the 5-SSA- monoanion for the generation of stable hydrogen-bonded crystalline materials, and provides the structure of a dianionic 5-SSA2- species of which there are only a few examples in the crystallographic literature.
Resumo:
Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. This approach is more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message, and in a separate pass providing integrity protection by generating a Message Authentication Code (MAC). AE using symmetric ciphers can be provided by either stream ciphers with built in authentication mechanisms or block ciphers using appropriate modes of operation. However, stream ciphers have the potential for higher performance and smaller footprint in hardware and/or software than block ciphers. This property makes stream ciphers suitable for resource constrained environments, where storage and computational power are limited. There have been several recent stream cipher proposals that claim to provide AE. These ciphers can be analysed using existing techniques that consider confidentiality or integrity separately; however currently there is no existing framework for the analysis of AE stream ciphers that analyses these two properties simultaneously. This thesis introduces a novel framework for the analysis of AE using stream cipher algorithms. This thesis analyzes the mechanisms for providing confidentiality and for providing integrity in AE algorithms using stream ciphers. There is a greater emphasis on the analysis of the integrity mechanisms, as there is little in the public literature on this, in the context of authenticated encryption. The thesis has four main contributions as follows. The first contribution is the design of a framework that can be used to classify AE stream ciphers based on three characteristics. The first classification applies Bellare and Namprempre's work on the the order in which encryption and authentication processes take place. The second classification is based on the method used for accumulating the input message (either directly or indirectly) into the into the internal states of the cipher to generate a MAC. The third classification is based on whether the sequence that is used to provide encryption and authentication is generated using a single key and initial vector, or two keys and two initial vectors. The second contribution is the application of an existing algebraic method to analyse the confidentiality algorithms of two AE stream ciphers; namely SSS and ZUC. The algebraic method is based on considering the nonlinear filter (NLF) of these ciphers as a combiner with memory. This method enables us to construct equations for the NLF that relate the (inputs, outputs and memory of the combiner) to the output keystream. We show that both of these ciphers are secure from this type of algebraic attack. We conclude that using a keydependent SBox in the NLF twice, and using two different SBoxes in the NLF of ZUC, prevents this type of algebraic attack. The third contribution is a new general matrix based model for MAC generation where the input message is injected directly into the internal state. This model describes the accumulation process when the input message is injected directly into the internal state of a nonlinear filter generator. We show that three recently proposed AE stream ciphers can be considered as instances of this model; namely SSS, NLSv2 and SOBER-128. Our model is more general than a previous investigations into direct injection. Possible forgery attacks against this model are investigated. It is shown that using a nonlinear filter in the accumulation process of the input message when either the input message or the initial states of the register is unknown prevents forgery attacks based on collisions. The last contribution is a new general matrix based model for MAC generation where the input message is injected indirectly into the internal state. This model uses the input message as a controller to accumulate a keystream sequence into an accumulation register. We show that three current AE stream ciphers can be considered as instances of this model; namely ZUC, Grain-128a and Sfinks. We establish the conditions under which the model is susceptible to forgery and side-channel attacks.
Resumo:
The multilamellar structure of phospholipids, i.e. the surface amorphous layer (SAL) that covers the natural surface of articular cartilage, and hexagonal boron nitride (h-BN) on the surface of metal porous bearings are two prominent examples of the family of layered materials that possess the ability to deliver lamellar lubrication. This chapter presents the friction study that was conducted on the surfaces of cartilage and the metal porous bearing impregnated with oil (first generation) and with oil + h-BN (second generation). The porosity of cartilage is around 75% and those of metal porous bearings were 15–28 wt%. It is concluded that porosity is a critical factor in facilitating the excellent tribological properties of both articular cartilage and the porous metal bearings studied.