959 resultados para MARC format
Resumo:
Environmental degradation is a worldwide phenomenon. It is manifested in the clearing of forests, polluted waterways, soil erosion, the loss of biodiversity, the presence of chemicals in the ecosystem and a host of other concerns. Modern agricultural practices have been implicated in much of this degradation. This chapter explores the connections between the form of agricultural production undertaken in advanced nations – so called ‘productivist’ or ‘high-tech’ farming – and environmental degradation. It is argued, first, that the entrenchment of productivist agriculture has placed considerable, and continuing, pressures on the environment and, second, that while there are both new options for a more sustainable agriculture and new policies being proposed to tackle the existing problem, the underlying basis of productivist agriculture remains largely unchallenged. The prediction is that environmental degradation will continue unabated until more dramatic (and possibly less palatable) measures are taken to alter the behaviour of producers and the trajectory of farming and grazing industries throughout the world.
Resumo:
The format of grant applications should be updated to incorporate multimedia video. This would help researchers to convey complex topics to grant-review panels. If time-poor research panels cannot quickly grasp the scientific ideas presented in a paper application, other factors, such as author affiliations and track records, may disproportionately influence project rankings...
Resumo:
Introduction The presentation of pulmonary embolism to the emergency department (ED) can prove challenging because of the myriad of potential disease processes that mimic its signs and symptoms. The incidence of pulmonary embolism and indeed the mortality associated with it is relatively high. Early diagnosis and treatment is crucial in off-setting the potential deleterious effects associated with this condition. The aim of this article is to present a nursing case review of a patient presenting to the ED with a diagnosis of pulmonary embolism. Method We chose to use a case review to highlight the nursing and medical care that was provided for a patient who presented to the emergency department acutely with dyspnoea, chest pain and pyrexia. The use of case reviews are useful in reporting unusual or rare cases and this format is typically seen more in medicine than in nursing. They can naturally take one of two formats—a single case report or a series of case reports; in this case we opted to report on a single case. Discussion The gentleman in question was an ambulance admissionto the ED with a three day history of chest pain, shortness of breath and one episode of syncope which brought him to the ED. Over the course of his admission a variety of treatment modalities were used successfully to alleviate the problem. More notable from a nursing perspective was the use of diagnostic tools as an interpretation to guide his care and provide a platform from which a deeper understanding and appreciation of the intricacies the critically ill patient often presents. Conclusion We found the use of case review very enlightening in understanding the disease process and the decision-making that accompanies this. Whilst our patient was successfully rehabilitated home, we learnt a lot from the experience which has been most beneficial in supporting our understanding of pulmonary embolism.
Resumo:
The cryptographic community has, of late, shown much inventiveness in the creation of powerful new IBE-like primitives that go beyond the basic IBE notion and extend it in many new directions. Virtually all of these “super-IBE” schemes rely on bilinear pairings for their implementation, which they tend to use in a surprisingly small number of different ways: three of them as of this writing. What is interesting is that, among the three main frameworks that we know of so far, one has acted as a veritable magnet for the construction of many of these “generalized IBE” primitives, whereas the other two have not been nearly as fruitful in that respect. This refers to the Commutative Blinding framework defined by the Boneh-Boyen [Bscr ][Bscr ]1 IBE scheme from 2004. The aim of this chapter is to try to shed some light on this approach's popularity, first by comparing its key properties with those of the competing frameworks, and then by providing a number of examples that illustrate how those properties have been used.
Resumo:
The purpose of this chapter is to provide an abstraction for the class of Exponent-Inversion IBE exemplified by the [Bscr ][Bscr ]2 and [Sscr ][Kscr ] schemes, and, on the basis of that abstraction, to show that those schemes do support interesting and useful extensions such as HIBE and ABE. Our results narrow, if not entirely close, the “flexibility gap” between the Exponent-Inversion and Commutative-Blinding IBE concepts.
Resumo:
We recently developed a binding assay format by incorporating native transmembrane receptors into artificial phospholipid bilayers on biosensor devices for surface plasmon resonance spectroscopy. By extending the method to surface plasmon-enhanced fluorescence spectroscopy (SPFS), sensitive recording of the association of even very small ligands is enabled. Herewith, we monitored binding of synthetic mono- and oligomeric RGD-based peptides and peptidomimetics to integrins alphavbeta3 and alphavbeta5, after having confirmed correct orientation and functionality of membrane-embedded integrins. We evaluated integrin binding of RGD multimers linked together via aminohexanoic acid (Ahx) spacers and showed that the dimer revealed higher binding activity than the tetramer, followed by the RGD monomers. The peptidomimetic was also found to be highly active with a slightly higher selectivity toward alphavbeta3. The different compounds were also evaluated in in vitro cell adhesion tests for their capacity to interfere with alphavbeta3-mediated cell attachment to vitronectin. We hereby demonstrated that the different RGD monomers were similarly effective; the RGD dimer and tetramer showed comparable IC50 values, which were, however, significantly higher than those of the monomers. Best cell detachment from vitronectin was achieved by the peptidomimetic. The novel SPFS-binding assay platform proves to be a suitable, reliable, and sensitive method to monitor the binding capacity of small ligands to native transmembrane receptors, here demonstrated for integrins.
Resumo:
John Dewey’s pragmatist aesthetics is used as a conceptual basis for designing new technologies that support staff-members’ mundane social interactions in an academic department. From this perspective, aesthetics is seen as a broader phenomenon that encompasses experiential aspects of staffmembers’ everyday lives and not only a look-&-feel aspect.
Resumo:
Management of the industrial nations' hazardous waste is a current and exponentially increasing, global threatening situation. Improved environmental information must be obtained and managed concerning the current status, temporal dynamics and potential future status of these critical sites. To test the application of spatial environmental techniques to the problem of hazardous waste sites, as Superfund (CERCLA) test site was chosen in an industrial/urban valley experiencing severe TCE, PCE, and CTC ground water contamination. A paradigm is presented for investigating spatial/environmental tools available for the mapping, monitoring and modelling of the environment and its toxic contaminated plumes. This model incorporates a range of technical issues concerning the collection of data as augmented by remotely sensed tools, the format and storage of data utilizing geographic information systems, and the analysis and modelling of environment through the use of advance GIS analysis algorithms and geophysic models of hydrologic transport including statistical surface generation. This spatial based approach is evaluated against the current government/industry standards of operations. Advantages and lessons learned of the spatial approach are discussed.
Resumo:
The article introduces a novel platform for conducting controlled and risk-free driving and traveling behavior studies, called Cyber-Physical System Simulator (CPSS). The key features of CPSS are: (1) simulation of multiuser immersive driving in a threedimensional (3D) virtual environment; (2) integration of traffic and communication simulators with human driving based on dedicated middleware; and (3) accessibility of multiuser driving simulator on popular software and hardware platforms. This combination of features allows us to easily collect large-scale data on interesting phenomena regarding the interaction between multiple user drivers, which is not possible with current single-user driving simulators. The core original contribution of this article is threefold: (1) we introduce a multiuser driving simulator based on DiVE, our original massively multiuser networked 3D virtual environment; (2) we introduce OpenV2X, a middleware for simulating vehicle-to-vehicle and vehicle to infrastructure communication; and (3) we present two experiments based on our CPSS platform. The first experiment investigates the “rubbernecking” phenomenon, where a platoon of four user drivers experiences an accident in the oncoming direction of traffic. Second, we report on a pilot study about the effectiveness of a Cooperative Intelligent Transport Systems advisory system.
Resumo:
The Surface Ocean Aerosol Production (SOAP) study was undertaken in February/March 2012 in the biologically active waters of the Chatham Rise, NZ. Aerosol hygroscopicity and volatility were examined with a volatility hygroscopicity tandem differential mobility analyser. These observations confirm results from other hygroscopicity-based studies that the dominant fraction of the observed remote marine particles were non-sea salt sulfates. Further observations are required to clarify the influences of seawater composition, meteorology and analysis techniques seasonally across different ocean basins.
Resumo:
One of the concerns about the use of Bluetooth MAC Scanner (BMS) data, especially from urban arterial, is the bias in the travel time estimates from multiple Bluetooth devices being transported by a vehicle. For instance, if a bus is transporting 20 passengers with Bluetooth equipped mobile phones, then the discovery of these mobile phones by BMS will be considered as 20 different vehicles, and the average travel time along the corridor estimated from the BMS data will be biased with the travel time from the bus. This paper integrates Bus Vehicle Identification system with BMS network to empirically evaluate such bias, if any. The paper also reports an interesting finding on the uniqueness of MAC IDs.
Resumo:
There has been tremendous interest in watermarking multimedia content during the past two decades, mainly for proving ownership and detecting tamper. Digital fingerprinting, that deals with identifying malicious user(s), has also received significant attention. While extensive work has been carried out in watermarking of images, other multimedia objects still have enormous research potential. Watermarking database relations is one of the several areas which demand research focus owing to the commercial implications of database theft. Recently, there has been little progress in database watermarking, with most of the watermarking schemes modeled after the irreversible database watermarking scheme proposed by Agrawal and Kiernan. Reversibility is the ability to re-generate the original (unmarked) relation from the watermarked relation using a secret key. As explained in our paper, reversible watermarking schemes provide greater security against secondary watermarking attacks, where an attacker watermarks an already marked relation in an attempt to erase the original watermark. This paper proposes an improvement over the reversible and blind watermarking scheme presented in [5], identifying and eliminating a critical problem with the previous model. Experiments showing that the average watermark detection rate is around 91% even with attacker distorting half of the attributes. The current scheme provides security against secondary watermarking attacks.
Resumo:
The cryptographic hash function literature has numerous hash function definitions and hash function requirements, and many of them disagree. This survey talks about the various definitions, and takes steps towards cleaning up the literature by explaining how the field has evolved and accurately depicting the research aims people have today.
Resumo:
Implementation of an electronic tendering (e-tendering) systems requires careful attention to the needs of the system and its various participants. Fairness in an e-tendering is of utmost importance. Current proposals and implementations do not provide fairness and thus, are vulnerable to collusion and favourism. Dishonest participants, either the principal or tenderer may collude to alter or view competing tenders which would give the favoured tenderer a greater chance of winning the contract. This paper proposes an e-tendering system that is secure and fair to all participants. We employ the techniques of anonymous token system along with signed commitment approach to achieve a publicly verifiable fair e-tendering protocol. We also provide an analysis of the protocol that confirms the security of our proposal against security goals for an e-tendering system.
Resumo:
The M¨obius transform of Boolean functions is often involved in cryptographic design and analysis. As studied previously, a Boolean function f is said to be coincident if it is identical with its M¨obius transform fμ, i.e., f = fμ...