999 resultados para 1007
Resumo:
A purified commercial double-walled carbon nanotube (DWCNT) sample was investigated by transmission electron microscopy (TEM), thermogravimetry (TG), and Raman spectroscopy. Moreover, the heat capacity of the DWCNT sample was determined by temperature-modulated differential scanning calorimetry in the range of temperature between -50 and 290 °C. The main thermo-oxidation characterized by TG occurred at 474 °C with the loss of 90 wt% of the sample. Thermo-oxidation of the sample was also investigated by high-resolution TG, which indicated that a fraction rich in carbon nanotube represents more than 80 wt% of the material. Other carbonaceous fractions rich in amorphous coating and graphitic particles were identified by the deconvolution procedure applied to the derivative of TG curve. Complementary structural data were provided by TEM and Raman studies. The information obtained allows the optimization of composites based on this nanomaterial with reliable characteristics.
Resumo:
A computational framework for enhancing design in an evolutionary approach with a dynamic hierarchical structure is presented in this paper. This framework can be used as an evolutionary kernel for building computer-supported design systems. It provides computational components for generating, adapting and exploring alternative design solutions at multiple levels of abstraction with hierarchically structured design representations. In this paper, preliminary experimental results of using this framework in several design applications are presented.
Resumo:
Business process modeling has undoubtedly emerged as a popular and relevant practice in Information Systems. Despite being an actively researched field, anecdotal evidence and experiences suggest that the focus of the research community is not always well aligned with the needs of industry. The main aim of this paper is, accordingly, to explore the current issues and the future challenges in business process modeling, as perceived by three key stakeholder groups (academics, practitioners, and tool vendors). We present the results of a global Delphi study with these three groups of stakeholders, and discuss the findings and their implications for research and practice. Our findings suggest that the critical areas of concern are standardization of modeling approaches, identification of the value proposition of business process modeling, and model-driven process execution. These areas are also expected to persist as business process modeling roadblocks in the future.
Resumo:
Among the many new opportunities that digital technologies are enabling are an increased capacity for viewers to interact not only with the program content, but with an increasingly wide array of other digital applications. Within this context this project has developed a new interaction device (incorporating gestural platform technology) and user interfaces to facilitate interactive access to digital media in a lounge room setting. This paper provides an overview of an interdisciplinary design process applied by Australasian CRC for Interaction Design (ACID) researchers—in order to develop the device and present in detail its unique features.
Resumo:
A key exchange protocol allows a set of parties to agree upon a secret session key over a public network. Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, the security attribute of key compromise impersonation (KCI) resilience has so far been ignored for the case of GKE protocols. We first model the security of GKE protocols addressing KCI attacks by both outsider and insider adversaries. We then show that a few existing protocols are not secure even against outsider KCI attacks. The attacks on these protocols demonstrate the necessity of considering KCI resilience for GKE protocols. Finally, we give a new proof of security for an existing GKE protocol under the revised model assuming random oracles.
Resumo:
Providing support for reversible transformations as a basis for round-trip engineering is a significant challenge in model transformation research. While there are a number of current approaches, they require the underlying transformation to exhibit an injective behaviour when reversing changes. This however, does not serve all practical transformations well. In this paper, we present a novel approach to round-trip engineering that does not place restrictions on the nature of the underlying transformation. Based on abductive logic programming, it allows us to compute a set of legitimate source changes that equate to a given change to the target model. Encouraging results are derived from an initial prototype that supports most concepts of the Tefkat transformation language
Resumo:
For certain continuum problems, it is desirable and beneficial to combine two different methods together in order to exploit their advantages while evading their disadvantages. In this paper, a bridging transition algorithm is developed for the combination of the meshfree method (MM) with the finite element method (FEM). In this coupled method, the meshfree method is used in the sub-domain where the MM is required to obtain high accuracy, and the finite element method is employed in other sub-domains where FEM is required to improve the computational efficiency. The MM domain and the FEM domain are connected by a transition (bridging) region. A modified variational formulation and the Lagrange multiplier method are used to ensure the compatibility of displacements and their gradients. To improve the computational efficiency and reduce the meshing cost in the transition region, regularly distributed transition particles, which are independent of either the meshfree nodes or the FE nodes, can be inserted into the transition region. The newly developed coupled method is applied to the stress analysis of 2D solids and structures in order to investigate its’ performance and study parameters. Numerical results show that the present coupled method is convergent, accurate and stable. The coupled method has a promising potential for practical applications, because it can take advantages of both the meshfree method and FEM when overcome their shortcomings.
Resumo:
In this paper we propose a method for vision only topological simultaneous localisation and mapping (SLAM). Our approach does not use motion or odometric information but a sequence of colour histograms from visited places. In particular, we address the perceptual aliasing problem which occurs using external observations only in topological navigation. We propose a Bayesian inference method to incrementally build a topological map by inferring spatial relations from the sequence of observations while simultaneously estimating the robot's location. The algorithm aims to build a small map which is consistent with local adjacency information extracted from the sequence measurements. Local adjacency information is incorporated to disambiguate places which otherwise would appear to be the same. Experiments in an indoor environment show that the proposed technique is capable of dealing with perceptual aliasing using visual observations only and successfully performs topological SLAM.
Resumo:
High resolution thermogravimetry has been used to evaluate the carbonaceous content in a commercial sample of single-walled carbon nanotube (SWNT). The content of SWNTs in the sample was found to be at least 77mass% which was supported by images obtained with scanning and transmission electron microscopies (SEM and TEM). Furthermore, the influence of SWNT addition on the thermal stability of graphite in mixtures of SWNT/graphite at different proportions was investigated. The graphite stability decreased with the increased of SWNT content in the overall range of composition. This behavior could be due to the close contact between these carbonaceous species as determined by SEM analysis.
Resumo:
Scott A. Shane is the 2009 winner of the Global Award for Entrepreneurship Research. In this article we discuss and analyze Shane’s most important contributions to the field of entrepreneurship. His contribution is extraordinarily broad in scope, which makes it difficult to pinpoint one or a few specifics that we associate with Shane’s scholarship. Instead, they can be summarized in the following three points. First, he has influenced what we view as central aspects of entrepreneurship. Shane has been a leading figure in redirecting the focus on entrepreneurship research itself. Second, he has influenced how we view entrepreneurship. Shane’s research is arguably theory driven and it applies and develops theoretical lenses that greatly improve our understanding of entrepreneurship. Third, he has contributed to how we conduct entrepreneurship research. Shane has been a forerunner in examining relevant units of analysis that are difficult to sample; research designs and databases specifically designed for studying entrepreneurial processes; and sophisticated analytical methods. This has contributed to advancing the methodological rigor of the field. Summing them up, the contributions are very impressive indeed.
Resumo:
The central thesis in the article is that the venture creation process is different for innovative versus imitative ventures. This holds up; the pace of the process differs by type of venture as do, in line with theory-based hypotheses, the effects of certain human capital (HC) and social capital (SC) predictors. Importantly, and somewhat unexpectedly, the theoretically derived models using HC, SC, and certain controls are relatively successful explaining progress in the creation process for the minority of innovative ventures, but achieve very limited success for the imitative majority. This may be due to a rationalistic bias in conventional theorizing and suggests that there is need for considerable theoretical development regarding the important phenomenon of new venture creation processes. Another important result is that the building up of instrumental social capital, which we assess comprehensively and as a time variant construct, is important for making progress with both types of ventures, and increasingly, so as the process progresses. This result corroborates with stronger operationalization and more appropriate analysis method what previously published research has only been able to hint at.
Resumo:
Archaeology provides a framework of analysis and interpretation that is useful for disentangling the textual layers of a contemporary lived-in urban space. The producers and readers of texts may include those who planned and developed the site and those who now live, visit and work there. Some of the social encounters and content sharing between these people may be artificially produced or manufactured in the hope that certain social situations will occur. Others may be serendipitous. With archaeology’s original focus on places that are no longer inhabited it is often only the remaining artefacts and features of the built environment that form the basis for interpreting the social relationships of past people. Our analysis however, is framed within a contemporary notion of archaeological artefacts in an urban setting. Unlike an excavation, where the past is revealed through digging into the landscape, the application of landscape archaeology within a present day urban context is necessarily more experiential, visual and based on recording and analysing the physical traces of social encounters and relationships between residents and visitors. These physical traces are present within the creative content, and the built and natural elements of the environment. This chapter explores notions of social encounters and content sharing in an urban village by analysing three different types of texts: the design of the built environment; content produced by residents through a geospatial web application; and, print and online media produced in digital storytelling workshops.
Resumo:
Information and Communication Technologies (ICTs) provide great promise for the future of education. In the Asia-Pacific region, many nations have started working towards the comprehensive development of infrastructure to enable the development of strong networked educational systems. In Queensland there have been significant initiatives in the past decade to support the integration of technology in classrooms and to set the conditions for the enhancement of teaching and learning with technology. One of the great challenges is to develop our classrooms to make the most of these technologies for the benefit of student learning. Recent research and theory into cognitive load, suggests that complex information environments may well impose a barrier on student learning. Further, it suggests that teachers have the capacity to mitigate against cognitive load through the way they prepare and support students engaging with complex information environments. This chapter compares student learning at different levels of cognitive load to show that learning is enhanced when integrating pedagogies are employed to mitigate against high-load information environments. This suggests that a mature policy framework for ICTs in education needs to consider carefully the development of professional capacities to effectively design and integrate technologies for learning.
Resumo:
Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructures. It can provide long-term confidentiality for encrypted information without reliance on computational assumptions. Although QKD still requires authentication to prevent man-in-the-middle attacks, it can make use of either information-theoretically secure symmetric key authentication or computationally secure public key authentication: even when using public key authentication, we argue that QKD still offers stronger security than classical key agreement.