960 resultados para Top 10


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The effect of conduction-convection-radiation on natural convection flow of Newtonian optically thick gray fluid, confined in a non-Darcian porous media square cavity is numerically studied. For the gray fluid consideration is given to Rosseland diffusion approximation. Further assuming that (i) the temperature of the left vertical wall is varying linearly with height, (ii) cooled right vertical and top walls and (iii) the bottom wall is uniformly-heated. The governing equations are solved using the Alternate Direct Implicit method together with the Successive Over Relaxation technique. The investigation of the effect of governing parameters namely the Forschheimer resistance (Γ), the Planck constant (Rd), and the temperature difference (Δ), on flow pattern and heat transfer characteristics has been carried out. It was seen that the reduction of flow and heat transfer occurs as the Forschheimer resistance is increased. On the other hand both the strength of flow and heat transfer increases as the temperature ratio, Δ, is increased.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Flexible information exchange is critical to successful design-analysis integration, but current top-down, standards-based and model-oriented strategies impose restrictions that contradicts this flexibility. In this article we present a bottom-up, user-controlled and process-oriented approach to linking design and analysis applications that is more responsive to the varied needs of designers and design teams. Drawing on research into scientific workflows, we present a framework for integration that capitalises on advances in cloud computing to connect discrete tools via flexible and distributed process networks. We then discuss how a shared mapping process that is flexible and user friendly supports non-programmers in creating these custom connections. Adopting a services-oriented system architecture, we propose a web-based platform that enables data, semantics and models to be shared on the fly. We then discuss potential challenges and opportunities for its development as a flexible, visual, collaborative, scalable and open system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Intercalated Archean komatiites and dacites sit above a thick footwall dacite unit in the host rock succession at the Black Swan Nickel Mine, north of Kalgoorlie in the Yilgarn Craton, Western Australia. Both lithofacies occur in units that vary in scale from laterally extensive at the scale of the mine lease to localized, thin, irregular bodies, from > 100 m thick to only centimetres thick. Some dacites are only slightly altered and deformed, and are interpreted to post-date major deformation and alteration (late porphyries). However, the majority of the dacites display evidence of deformation, especially at contacts, and metamorphism, varying from silicification and chlorite alteration at contacts to pervasive low grade regional metamorphic alteration represented by common assemblages of chlorite, sericite and albite. Texturally, the dacites vary from entirely massive and coherent to partially brecciated to totally brecciated. Strangely, some dacites are coherent at the margins and brecciated internally. Breccia textures vary from cryptically defined, to blocky, closely packed, in situ jig-saw fit textures with secondary minerals in fractures between clasts, to more apparent matrix rich textures with round clast forms, giving apparent conglomerate textures. Some clast zones have multi-coloured clasts, giving the impression of varied provenance. Strangely however, all these textural variants have gradational relationships with each other, and no bedding or depositional structures are present. This indicates that all textures have an in situ origin. The komatiites are generally altered and pervasively carbonate veined. Preservation of original textures is patchy and local, but includes coarse adcumulate, mesocumulate, orthocumulate, crescumulate-harrisite and occasionally spinifex textures. Where original contacts between komatiites and dacites are preserved intact (i.e. not sheared or overprinted by alteration), the komatiites have chilled margins, whereas the dacites do not. The margins of the dacites are commonly silicified, and inclusions of dacite occur in komatiite, even at the top contacts of komatiite units, but komatiite clasts do not occur in the dacites. The komatiites therefore were emplaced as sills into the dacites, and the intercalated relationships are interpreted as intrusive. The brecciation and alteration in the dacites are interpreted as being largely due to hydraulic fracturing and alteration induced by contact metamorphic effects and hydrothermal alteration deriving from the intrusion of komatiites into the felsic pile. The absence of autobreccia and hyaloclastite textures in the dacites suggest that they were emplaced as an earlier intrusive (sill?) complex at a high level in the crust.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways from payment systems to assisting the lives of elderly or disabled people. Security threats for these devices become increasingly dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level. Therefore, third-party developers have the opportunity to develop kernel-based low-level security tools which is not normal for smartphone platforms. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS for example, holding the greatest market share among all smartphone OSs, was closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners� privacy. In this work, we present our current results in analyzing the security of Android smartphones with a focus on its Linux side. Our results are not limited to Android, they are also applicable to Linux-based smartphones such as OpenMoko Neo FreeRunner. Our contribution in this work is three-fold. First, we analyze android framework and the Linux-kernel to check security functionalities. We survey wellaccepted security mechanisms and tools which can increase device security. We provide descriptions on how to adopt these security tools on Android kernel, and provide their overhead analysis in terms of resource usage. As open smartphones are released and may increase their market share similar to Symbian, they may attract attention of malware writers. Therefore, our second contribution focuses on malware detection techniques at the kernel level. We test applicability of existing signature and intrusion detection methods in Android environment. We focus on monitoring events on the kernel; that is, identifying critical kernel, log file, file system and network activity events, and devising efficient mechanisms to monitor them in a resource limited environment. Our third contribution involves initial results of our malware detection mechanism basing on static function call analysis. We identified approximately 105 Executable and Linking Format (ELF) executables installed to the Linux side of Android. We perform a statistical analysis on the function calls used by these applications. The results of the analysis can be compared to newly installed applications for detecting significant differences. Additionally, certain function calls indicate malicious activity. Therefore, we present a simple decision tree for deciding the suspiciousness of the corresponding application. Our results present a first step towards detecting malicious applications on Android-based devices.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Polymerase chain reaction (PCR) was developed for the detection of Banana bunchy top virus (BBTV) at maximum after 210 min and at minimum after 90 min using Pc-1 and Pc-2, respectively. PCR detection of BBTV in crude sap indicated that the freezing of banana tissue in liquid nitrogen (LN2) before extraction was more effective than using sand as the extraction technique. BBTV was also detected using PCR assay in 69 healthy and diseased plants using Na-PO4 buffer containing 1 % SDS. PCR detection of BBTV in nucleic acid extracts using seven different extraction buffers to adapt the use of PCR in routine detection in the field was studied. Results proved that BBTV was detected with high sensitivity in nucleic acid extracts more than in infectious sap. The results also suggested the common aetiology for the BBTV by the PCR reactions of BBTV in nucleic acid extracts from Australia, Burundi, Egypt, France, Gabon, Philippines and Taiwan. Results also proved a positive relation between the Egyptian-BBTV isolate and abaca bunchy top isolate from the Philippines, but there no relation was found with the Cucumber mosaic cucumovirus (CMV) isolates from Egypt and Philippines and Banana bract mosaic virus (BBMV) were found.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article proposes an approach for real-time monitoring of risks in executable business process models. The approach considers risks in all phases of the business process management lifecycle, from process design, where risks are defined on top of process models, through to process diagnosis, where risks are detected during process execution. The approach has been realized via a distributed, sensor-based architecture. At design-time, sensors are defined to specify risk conditions which when fulfilled, are a likely indicator of negative process states (faults) to eventuate. Both historical and current process execution data can be used to compose such conditions. At run-time, each sensor independently notifies a sensor manager when a risk is detected. In turn, the sensor manager interacts with the monitoring component of a business process management system to prompt the results to process administrators who may take remedial actions. The proposed architecture has been implemented on top of the YAWL system, and evaluated through performance measurements and usability tests with students. The results show that risk conditions can be computed efficiently and that the approach is perceived as useful by the participants in the tests.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Smartphones get increasingly popular where more and more smartphone platforms emerge. Special attention was gained by the open source platform Android which was presented by the Open Handset Alliance (OHA) hosting members like Google, Motorola, and HTC. Android uses a Linux kernel and a stripped-down userland with a custom Java VM set on top. The resulting system joins the advantages of both environments, while third-parties are intended to develop only Java applications at the moment. In this work, we present the benefit of using native applications in Android. Android includes a fully functional Linux, and using it for heavy computational tasks when developing applications can bring in substantional performance increase. We present how to develop native applications and software components, as well as how to let Linux applications and components communicate with Java programs. Additionally, we present performance measurements of native and Java applications executing identical tasks. The results show that native C applications can be up to 30 times as fast as an identical algorithm running in Dalvik VM. Java applications can become a speed-up of up to 10 times if utilizing JNI.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study assessed the workday step counts of lower active (<10,000 daily steps) university employees using an automated, web-based walking intervention (Walk@Work). METHODS: Academic and administrative staff (n=390; 45.6±10.8years; BMI 27.2±5.5kg/m2; 290 women) at five campuses (Australia [x2], Canada, Northern Ireland and the United States), were given a pedometer, access to the website program (2010-11) and tasked with increasing workday walking by 1000 daily steps above baseline, every two weeks, over a six week period. Step count changes at four weeks post intervention were evaluated relative to campus and baseline walking. RESULTS: Across the sample, step counts significantly increased from baseline to post-intervention (1477 daily steps; p=0.001). Variations in increases were evident between campuses (largest difference of 870 daily steps; p=0.04) and for baseline activity status. Those least active at baseline (<5000 daily steps; n=125) increased step counts the most (1837 daily steps; p=0.001), whereas those most active (7500-9999 daily steps; n=79) increased the least (929 daily steps; p=0.001). CONCLUSIONS: Walk@Work increased workday walking by 25% in this sample overall. Increases occurred through an automated program, at campuses in different countries, and were most evident for those most in need of intervention.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study investigates the citation patterns of theoretical and empirical papers published in a top economics journal, namely American Economic Review, over a period of almost 30 years, while also exploring the determinants of citation success. The results indicate that empirical papers attract more citation success than theoretical studies. However, the pattern over time is very similar. Moreover, among empirical papers it appears that the cross-country studies are more successful than single country studies focusing on North America data or other regions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

IT Governance (ITG) continues to be a top priority for organizations, public and non-public. While the level of awareness towards ITG is evident, it is hardly manifested in practice. The purpose of this study is to elicit factors that act as barriers to the adoption of formal ITG practice. This qualitative study consists of 9 semi-structured interviews with the key person in charge of ITG adoption and practice within their respective organizations. The interviews were analyzed using thematic content analysis, guided by themes previously obtained from the literature and from an earlier pilot study. Findings obtained supported previous findings and also reveal new factors noticeably absent from the ITG literature. The findings will provide useful input towards the development of a causal model on barriers to formal ITG practice

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The parallel track model is one of the several models that are used in health promotion programmes that focus on community empowerment. It is unique in that it explicitly incorporates an empowerment approach with a top-down health programme. Since its development in 1999-2000 the model has been used in various health programmes in both developed and developing countries. The aim of this review is to examine the nature and extent of the application of this model and its contribution to promoting health. A review of the literature published between 2000 and 2011 was conducted. Nine results matched the inclusion criteria and revealed that the model has been mostly applied to disadvantaged communities to address health determinants, such as poverty and health literacy. This review found that the model had a positive impact on specific health outcomes such as health literacy and community capacity. We concluded that the parallel track model has the most potential for building capacity for community health promotion and appears to be the least useful for interventions focusing on health behaviour change within a limited time frame.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Melt electrospinning in a direct writing mode is a recent additive manufacturing approach to fabricate porous scaffolds for tissue engineering applications. In this study, we describe porous and cell-invasive poly (ε-caprolactone) scaffolds fabricated by combining melt electrospinning and a programmable x–y stage. Fibers were 7.5 ± 1.6 µm in diameter and separated by interfiber distances ranging from 8 to 133 µm, with an average of 46 ± 22 µm. Micro-computed tomography revealed that the resulting scaffolds had a highly porous (87%), three-dimensional structure. Due to the high porosity and interconnectivity of the scaffolds, a top-seeding method was adequate to achieve fibroblast penetration, with cells present throughout and underneath the scaffold. This was confirmed histologically, whereby a 3D fibroblast-scaffold construct with full cellular penetration was produced after 14 days in vitro. Immunohistochemistry was used to confirm the presence and even distribution of the key dermal extracellular matrix proteins, collagen type I and fibronectin. These results show that melt electrospinning in a direct writing mode can produce cell invasive scaffolds, using simple top-seeding approaches.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents a study whereby a series of tests was undertaken using a naturally aspirated 4 cylinder, 2.216 litre, Perkins Diesel engine fitted with a piston having an undersized skirt. This experimental simulation resulted in engine running conditions that included abnormally high levels of piston slap occurring in one of the cylinders. The detectability of the resultant Diesel engine piston slap was investigated using acoustic emission signals. Data corresponding to both normal and piston slap engine running conditions was captured using acoustic emission transducers along with both; in-cylinder pressure and top-dead centre reference signals. Using these signals it was possible to demonstrate that the increased piston slap running conditions were distinguishable by monitoring the piston slap events occurring near the piston mid-stroke positions. However, when monitoring the piston slap events occurring near the TDC/BDC piston stroke positions, the normal and excessive piston slap engine running condition were not clearly distinguishable.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The validity of the Multidimensional School Anger Inventory (MSAI) was examined with adolescents from 5 Pacific Rim countries (N ¼ 3,181 adolescents; age, M ¼ 14.8 years; 52% females). Confirmatory factor analyses examined configural invariance for the MSAI’s anger experience, hostility, destructive expression, and anger coping subscales. The model did not converge for Peruvian students. Using the top 4 loaded items for anger experience, hostility, and destructive expression configural invariance and partial metric and scalar invariances were found. Latent means analysis compared mean responses on each subscale to the U.S. sample. Students from other countries showed higher mean responses on the anger experience subscale (ds ¼ .37–.73). Australian (d ¼ .40) and Japanese students (d ¼ .21) had significantly higher mean hostility subscale scores. Australian students had higher mean scores on the destructive expression subscale (d ¼ .30), whereas Japanese students had lower mean scores (d ¼ 2.17). The largest latent mean gender differences (females lower than males) were for destructive expression among Australian (d ¼ 2.67), Guatemalan (d ¼ 2.42), and U.S. (d ¼ 2.66) students. This study supported an abbreviated, 12-item MSAI with partial invariance. Implications for the use of the MSAI in comparative research are discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Construction activities have significant impacts on the environment, economy and society. As a result, sustainability has become an agenda in construction related business. This is evidenced by an increasingly number of construction related companies adopting sustainability reporting practice. Construction contractors are no exception. This study aims to investigate the sustainability reporting practices adopted by top Chinese contractors active in the international arena. The focus is placed on those Chinese contractors ranked top 50 by the Engineering News Record (ENR) top 225 international contractors. The results showed that the sustainability reporting practices of these top Chinese contractors, in terms of both approaches and the depth, varied significantly however there is a clear trend of growing level of disclosure of sustainability related information. Similarly, environmental sustainability seems the predominate focus of sustainability reporting exercises of top international contractors from China. These findings help to assist senior management of construction contractors to form business strategies to facilitate disclosure and other sustainability related practices.