868 resultados para anionic exchange


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Heteroatom doping on the edge of graphene may serve as an effective way to tune chemical activity of carbon-based electrodes with respect to charge carrier transfer in an aqueous environment. In a step towards developing mechanistic understanding of this phenomenon, we explore herein mechanisms of proton transfer from aqueous solution to pristine and doped graphene edges utilizing density functional theory. Atomic B-, N-, and O- doped edges as well as the native graphene are examined, displaying varying proton affinities and effective interaction ranges with the H3O+ charge carrier. Our study shows that the doped edges characterized by more dispersive orbitals, namely boron and nitrogen, demonstrate more energetically favourable charge carrier exchange compared with oxygen, which features more localized orbitals. Extended calculations are carried out to examine proton transfer from the hydronium ion in the presence of explicit water, with results indicating that the basic mechanistic features of the simpler model are unchanged.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Guide includes research findings from the Australian Centre for Philanthropy and Non Profit Studies at the Queensland University of Technology (QUT). This research probed the experiences of fourteen Indigenous people who have had different degrees of success in seeking funding from philanthropic organisations. This research shows how grantmakers can make a significant difference in the lives of Aboriginal and Torres Strait Islander people.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Most security models for authenticated key exchange (AKE) do not explicitly model the associated certification system, which includes the certification authority (CA) and its behaviour. However, there are several well-known and realistic attacks on AKE protocols which exploit various forms of malicious key registration and which therefore lie outside the scope of these models. We provide the first systematic analysis of AKE security incorporating certification systems (ASICS). We define a family of security models that, in addition to allowing different sets of standard AKE adversary queries, also permit the adversary to register arbitrary bitstrings as keys. For this model family we prove generic results that enable the design and verification of protocols that achieve security even if some keys have been produced maliciously. Our approach is applicable to a wide range of models and protocols; as a concrete illustration of its power, we apply it to the CMQV protocol in the natural strengthening of the eCK model to the ASICS setting.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study was conducted within the context of a flexible education institution where conventional educational assessment practices and tests fail to recognise and assess the creativity and cultural capital of a cohort of marginalised young people. A new assessment model which included an electronic-portfolio-social-networking system (EPS) was developed and trialled to identify and exhibit evidence of students' learning. The study aimed to discern unique forms of cultural capital (Bourdieu, 1986) possessed by students who attend the Edmund Rice Education Australia Flexible Learning Centre Network (EREAFLCN). The EPS was trialled at the case study schools in an intervention and developed a space where students could make evident culturally specific forms of capital and funds of knowledge (Gonzalez, Moll, & Amanti, 2005). These resources were evaluated, modified and developed through dialogic processes utilising assessment for learning approaches (Qualifications and Curriculum Development Agency, 2009) in online and classroom settings. Students, peers and staff engaged in the recognition, judgement, revision and evaluation of students' cultural capital in a subfield of exchange (Bourdieu, 1990). The study developed the theory of assessment for learning as a field of exchange incorporating an online system as a teaching and assessment model. The term efield has been coined to describe this particular capital exchange model. A quasi-ethnographic approach was used to develop a collective case study (Stake, 1995). This case study involved an in-depth exploration of five students' forms of cultural capital and the ways in which this capital could be assessed and exchanged using the efield model. A comparative analysis of the five cases was conducted to identify the emergent issues of students' recognisable cultural capital resources and the processes of exchange that can be facilitated to acquire legitimate credentials for these students in the Australian field of education. The participants in the study were young people at two EREAFLC schools aged between 12 and 18 years. Data was collected through interviews, observations and examination of documents made available by the EREAFLCN. The data was coded and analysed using a theoretical framework based on Bourdieu's analytical tools and a sociocultural psychology theoretical perspective. Findings suggest that processes based on dialogic relationships can identify and recognise students' forms of cultural capital that are frequently misrecognised in mainstream school environments. The theory of assessment for learning as a field of exchange was developed into praxis and integrated in an intervention. The efield model was found to be an effective sociocultural tool in converting and exchanging students' capital resources for legitimated cultural and symbolic capital in the field of education.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Road traffic injuries are one of the major public health burdens worldwide. The United Nations Decade of Action for Road Safety (2011-2020) implores all nations to work to reduce this burden. This decade represents a unique and historic period of time in the field of road safety. Information exchange and co-operation between nations is an important step in achieving the goal. The burden of road crashes, fatalities and injuries is not equally distributed. We know that low and middle-income countries experience the majority of the road trauma burden. Therefore it is imperative that these countries learn from the successes of others that have developed and implemented road safety laws, public education campaigns and countermeasures over many years and have achieved significant road trauma reductions as a result. China is one of the countries experiencing a large road trauma burden. Vulnerable road users such as pedestrians and cyclists make up a large proportion of fatalities and injuries in China. Speeding, impaired/drug driving, distracted driving, vehicle overloading, inadequate road infrastructure, limited use of safety restraints and helmets, and limited road safety training have all been identified as contributing to the problem. Some important steps have been taken to strengthen China’s approach, including increased penalties for drunk driving in May 2011 and increased attention to school bus safety in 2011/12. However, there is still a large amount of work needed to improve the current road safety position in China. This paper provides details of a program to assist with road safety knowledge exchange between China and Australia that was funded by the Australian Government which was undertaken in the latter part of 2012. The four month program provided the opportunity for the first author to work closely with key agencies in Australia that are responsible for policy development and implementation of a broad range of road safety initiatives. In doing so, an in-depth understanding was gained about key road safety strategies in Australia and processes for developing and implementing them. Insights were also gained into the mechanisms used for road safety policy development, implementation and evaluation in several Australian jurisdictions. Road traffic law and enforcement issues were explored with the relevant jurisdictional transport and police agencies to provide a greater understanding of how Chinese laws and practices could be enhanced. Working with agencies responsible for public education and awareness campaigns about road safety in Australia also provided relevant information about how to promote road safety at the broader community level in China. Finally, the program provided opportunities to work closely with several world-renowned Australian research centres and key expert researchers to enhance opportunities for ongoing road safety research in China. The overall program provided the opportunity for the first author to develop knowledge in key areas of road safety strategy development, implementation and management which are directly relevant to the current situation in China. This paper describes some main observations and findings from participation in the program.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Security models for two-party authenticated key exchange (AKE) protocols have developed over time to prove the security of AKE protocols even when the adversary learns certain secret values. In this work, we address more granular leakage: partial leakage of long-term secrets of protocol principals, even after the session key is established. We introduce a generic key exchange security model, which can be instantiated allowing bounded or continuous leakage, even when the adversary learns certain ephemeral secrets or session keys. Our model is the strongest known partial-leakage-based security model for key exchange protocols. We propose a generic construction of a two-pass leakage-resilient key exchange protocol that is secure in the proposed model, by introducing a new concept: the leakage-resilient NAXOS trick. We identify a special property for public-key cryptosystems: pair generation indistinguishability, and show how to obtain the leakage-resilient NAXOS trick from a pair generation indistinguishable leakage-resilient public-key cryptosystem.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Putnam's “constrict theory” suggests that ethnic diversity creates challenges for developing and sustaining social capital in urban settings. He argues that diversity decreases social cohesion and reduces social interactions among community residents. While Putnam's thesis is the subject of much debate in North America, the United Kingdom, and Europe, there is a limited focus on how ethnic diversity impacts upon social cohesion and neighborly exchange behaviors in Australia. Employing multilevel modeling and utilizing administrative and survey data from 4,000 residents living in 148 Brisbane suburbs, we assess whether ethnic diversity lowers social cohesion and increases “hunkering.” Our findings indicate that social cohesion and neighborly exchange are attenuated in ethnically diverse suburbs. However, diversity is less consequential for neighborly exchange among immigrants when compared to the general population. Our results provide at least partial support for Putnam's thesis.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Long-range cross-ring reactions are of minor importance in the collision-induced mass spectra (MS/MS) of [M - H]- ions of CH2OCO-C6H4-NHCOR systems: e.g. the loss of 'CD3CO2CH3' from CH3OCO-C6H4-(N) over bar COCD3. Major processes involve (i) losses of radicals to form stable radical anions, e.g. loss of a ring hydrogen atom and losses from the ester (CH3 ., CH3O . and . CO2CH3), (ii) losses of neutral molecules from the amide moiety [e.g. CO (R = H) and CH2CO (R = CH3), and proximity effects when the two substituents are ortho [e.g. loss of (CH3OD+CO2) from o-CH3OCO-C6H4 (N) over bar COCD3].

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper reports a study of ion exchange (IX) as an alternative CSG water treatment to the widely used reverse osmosis (RO) desalination process. An IX pilot plant facility has been constructed and operated using both synthetic and real CSG water samples. Application of appropriate synthetic resin technology has proved the effectiveness of IX processes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Security models for two-party authenticated key exchange (AKE) protocols have developed over time to provide security even when the adversary learns certain secret keys. In this work, we advance the modelling of AKE protocols by considering more granular, continuous leakage of long-term secrets of protocol participants: the adversary can adaptively request arbitrary leakage of long-term secrets even after the test session is activated, with limits on the amount of leakage per query but no bounds on the total leakage. We present a security model supporting continuous leakage even when the adversary learns certain ephemeral secrets or session keys, and give a generic construction of a two-pass leakage-resilient key exchange protocol that is secure in the model; our protocol achieves continuous, after-the-fact leakage resilience with not much more cost than a previous protocol with only bounded, non-after-the-fact leakage.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Drawing on principles of social exchange this thesis employs mediated regression to investigate the relationship between internal communication and employee engagement in the Australian workforce. Findings suggest organisations and supervisors should focus internal communication efforts toward building greater perceptions of support and stronger identification among employees in order to foster optimal engagement. This research contributes to public relations and management scholarship through understanding how perceived support and identification act as mediating mechanisms in the relationship between internal communication and employee engagement at the organisational and supervisory level.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The ion PhCO2--CHPh, upon collision activation, undergoes competitive losses of CO and CO2 of which the former process produces the base peak of the spectrum. Product ion and substituent effect (Hammett) studies indicate that PhCO2--CHPh cyclises to a deprotonated hydroxydiphenyloxirane which ring opens to PhCOCH(O-)Ph. This anion then undergoes an anionic 1,2-Wittig type rearrangement {through [PhCO- (PhCHO)]} to form Ph2CHO- and CO. The mechanism of the 1,2-rearrangement has been probed by an ab initio study [at MP4(SDTQ)/6-31++G(d,p) level] of the model system HCOCH2O- →; MeO- + CO The analogous system RCO2--CHPh (R = alkyl) similarly loses CO, and the migratory aptitudes of the alkyl R groups in this reaction are Bu′ > Me > Et ∼Pri). This trend correlates with the order of anion basicities (i.e. the order of ΔG○acid values of RH), supporting the operation of an anion migration process. The loss of CO2 from PhCO2--CHPh yields Ph2CH- as the anionic product: several mechanistic scenarios are possible, one of which involves an initial ipso nucleophilic substitution.