993 resultados para 540 Chimica e scienze connesse


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Many people take pleasure in visiting waterfalls and much has been written on the subject. Numerous accounts of Niagara Falls were published after Hennepin's late seventeenth-centure descriptions, particularly from the early nineteenth century, but is was only later that other waterfalls became the subject of books. George Holley's Niagara and Other Famous Cataracts of the World, published in 1883, and John Gibson's Great Waterfalls, Cataracts and Geysers, published in 1887, are early examples of global accounts of major falls. Most books about waterfalls are guides to the falls of a particular country, state or region. Apart from a few slim illustrated volumes, few books have been puslished on the world's waterfalls since Edward Rashleigh's Among the Waterfalls (1935). Most of these are slim pictorial volumes, some aimed at the children's market. Geologist Richard Maxwell Pearl published a series of waterfall articles in his journal Earth Science between 1973 and 1975, apparently with the intention of turning them into a book, but this never materialized. My book, the culmination of more than a decade of waterfalls research, is comprehensive in its approach, but is not intended to describe as many of the world's waterfalls as possible. This is far from my aim, and readers may be disappointed at my omission of falls they feel deserved mention. What I have attempted to do is celebrate the delights of these beautiful wonders of nature by considering them from many points of view, emphasizing the roles that they play in the human experience. To be as representative as possible, I draw on examples of waterfalls from all over the world, some famous, many not. North and South America, Europe, Africa, Asia and Oceania and, with recent global warming, the Earth's polar regions, all feature in the discussion. Even though there are already enough books and articles about Niagara Falls to fill a large library, it has been impossible to avoid making frequent reference to this great cataract, which has been so important in the history of travel and tourism, power generation, urban development and art. Amoung the issues that I consider is the human impact on waterfalls, particularly the effects of hydropower schemes and tourism development. Also considered are artificial waterfalls, which have long been features of the designed landscape. Their contemporay role is poignantly exemplified in the design of the National September 11 Memorial, in which the footprints of the Twin Towers are traced by walls of waterfalls. A geographer and urban and regional planner by training, I have ventured into many other fields of knowledge that are outside my areas of expertise. I apologize for any errors that I may have made in my book and invite correction.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The striking color patterns of butterflies and birds have long interested biologists. But how these animals see color is less well understood. Opsins are the protein components of the visual pigments of the eye. Color vision has evolved in butterflies through opsin gene duplications, through positive selection at individual opsin loci, and by the use of filtering pigments. By contrast, birds have retained the same opsin complement present in early-jawed vertebrates, and their visual system has diversified primarily through tuning of the short-wavelength-sensitive photoreceptors, rather than by opsin duplication or the use of filtering elements. Butterflies and birds have evolved photoreceptors that might use some of the same amino acid sites for generating similar spectral phenotypes across approximately 540 million years of evolution, when rhabdomeric and ciliary-type opsins radiated during the early Cambrian period. Considering the similarities between the two taxa, it is surprising that the eyes of birds are not more diverse. Additional taxonomic sampling of birds may help clarify this mystery.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Butterfly long-wavelength (L) photopigments are interesting for comparative studies of adaptive evolution because of the tremendous phenotypic variation that exists in their wavelength of peak absorbance (lambda(max) value). Here we present a comprehensive survey of L photopigment variation by measuring lambda(max) in 12 nymphalid and 1 riodinid species using epi-microspectrophotometry. Together with previous data, we find that L photopigment lambda(max) varies from 510-565 nm in 22 nymphalids, with an even broader 505- to 600-nm range in riodinids. We then surveyed the L opsin genes for which lambda(max) values are available as well as from related taxa and found 2 instances of L opsin gene duplication within nymphalids, in Hermeuptychia hermes and Amathusia phidippus, and 1 instance within riodinids, in the metalmark butterfly Apodemia mormo. Using maximum parsimony and maximum likelihood ancestral state reconstructions to map the evolution of spectral shifts within the L photopigments of nymphalids, we estimate the ancestral pigment had a lambda(max) = 540 nm +/- 10 nm standard error and that blueshifts in wavelength have occurred at least 4 times within the family. We used ancestral state reconstructions to investigate the importance of several amino acid substitutions (Ile17Met, Ala64Ser, Asn70Ser, and Ser137Ala) previously shown to have evolved under positive selection that are correlated with blue spectral shifts. These reconstructions suggest that the Ala64Ser substitution has indeed occurred along the newly identified blueshifted L photopigment lineages. Substitutions at the other 3 sites may also be involved in the functional diversification of L photopigments. Our data strongly suggest that there are limits to the evolution of L photopigment spectral shifts among species with only one L opsin gene and that opsin gene duplication broadens the potential range of lambda(max) values.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: Injury is a leading cause of adolescent death. Risk-taking behaviours, including unsafe road behaviours, violence and alcohol use, are primary contributors. Recent research suggests adolescents look out for their friends and engage in protective behaviour to reduce others’ involvement in risk-taking. A positive school environment, and particularly students’ school connectedness, is also associated with reduced injury-risks. Aim: This study aimed to understand the role of school connectedness in adolescents’ intentions to protect and prevent their friends from involvement in alcohol use, fights, drink driving and unlicensed driving. Method: Surveys were completed by 540 13-14 year old students (49% male). Four sequential logistic regression analyses were conducted to determine whether school connectedness statistically predicted intentions to protect friends from injury-risk behaviours. Gender and ethnicity were entered at step 1, students’ own risk behaviour at step 2, and school connectedness scores at step 3 for all analyses. Results: School connectedness significantly predicted intentions to protect friends from all four injury-risk behaviours, after accounting for the variance attributable to sex, ethnicity and adolescents’ own involvement in injury-risks. Significance: School connectedness is negatively associated with adolescents’ own injury-risk behaviours. This research extends our knowledge of this critical protective factor, as it shows that students who are connected to school are also more likely to protect their friends from alcohol use, violence and unsafe road behaviours. School connectedness may therefore be an important factor to target in school-based prevention programs, both to reduce adolescents’ own injury-risk behaviour and to increase injury prevention among friends.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The school environment plays an important role in shaping adolescent outcomes, and research increasingly demonstrates the need to target the school social context in health promotion programs. This paper describes the research process undertaken to design a school connectedness component of an injury prevention program for early adolescents, Skills for Preventing Injury in Youth (SPIY). The connectedness component takes the form of a professional development workshop for teachers on increasing students’ connectedness to school, and this paper describes the research process used to construct program material. It also describes the methods used to encourage teachers’ implementation of connectedness strategies following program delivery. A multi-stage process of data collection included, (i) surveys with 540 Grade 9 students to examine links between school connectedness and risk-related injury, (ii) a systematic literature review of previously-evaluated school connectedness programs to determine key strategies that encourage implementation fidelity and program effectiveness, and (iii) interviews with 14 high school teachers to understand current use of connectedness strategies and ideas for program design. Findings from each stage are discussed in terms of how results informed the program design. The survey data provided information from which to frame program content, and the results of the systematic review demonstrated effective program strategies. The teacher interview data also provided program content incorporating target participants’ views and aligning with their priorities, which is important to ensure effective implementation of program strategies. A comprehensive design process provides an understanding of methods for, and may encourage, teachers’ future implementation of program strategies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Virtual Reality (VR) techniques are increasingly being used in education about and in the treatment of certain types of mental illness. Research indicates VR is delivering on it's promised potential to provide enhanced training and treatment outcomes through incorporation of this high-end technology. Schizophrenia is a mental disorder affecting 1−2% of the population. A significant research project being undertaken at the University of Queensland has constructed virtual environments that reproduce the phenomena experienced by patients who have psychosis. The VR environment will allow behavioral exposure therapies to be conducted with exactly controlled exposure stimuli and an expected reduction in risk of harm. This paper reports on the work of the project, previous stages of software development and current and future educational and clinical applications of the Virtual Environments.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Emergence has the potential to effect complex, creative or open-ended interactions and novel game-play. We report on research into an emergent interactive system. This investigates emergent user behaviors and experience through the creation and evaluation of an interactive system. The system is +-NOW, an augmented reality, tangible, interactive art system. The paper briefly describes the qualities of emergence and +-NOW before focusing on its evaluation. This was a qualitative study with 30 participants conducted in context. Data analysis followed Grounded Theory Methods. Coding schemes, induced from data and external literature are presented. Findings show that emergence occurred in over half of the participants. The nature of these emergent behaviors is discussed along with examples from the data. Other findings indicate that participants found interaction with the work satisfactory. Design strategies for facilitating satisfactory experience despite the often unpredictable character of emergence, are briefly reviewed and potential application areas for emergence are discussed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: Whilst the benefits of physical activity in preventing progression from impaired glucose tolerance to overt diabetes in older adults are well recognised, it is not clear which strategies may prevent progression to overt diabetes in women with recent gestational diabetes. We sought to devise and pilot test a convenient, home based exercise program with telephone support, suited to the early post partum period. Twenty eight women with recent gestational diabetes were enrolled six weeks post partum into a 12 week randomised controlled trial of Usual Care ("UC" Controls (n= 13)) vs. Supported Care ("SC" individualised exercise program with regular telephone support (n= 15)). Findings: Baseline characteristics for the whole cohort at six weeks post partum (Mean ± SD) were Age 33 ± 4 years, Weight 80 ± 20 kg and Body Mass Index (BMI) 30.0 ± 9.7 kg / m2. The primary outcome, planned physical activity, increased by Median (Range) 60 (0-540) mins/wk in the SC group vs. 0 (0-580) mins/wk in the UC group (p = 0.234, Mann Whitney U test). The change in planned physical activity predominantly comprised planned walking. Body weight, BMI, waist circumference, % body fat (measured by bioimpedance), fasting glucose and insulin did not change significantly over time in either group. Conclusions: The intervention designed to increase physical activity in post partum women with previous gestational diabetes was feasible. However, no evidence to suggest that this type of program provides any measurable improvement in metabolic or biometric parameters over a three month post partum follow up was observed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor deployment scenario, there will be no prior knowledge of post deployment configuration. For security solutions requiring pairwise keys, it is impossible to decide how to distribute key pairs to sensor nodes before the deployment. Existing approaches to this problem are to assign more than one key, namely a key-chain, to each node. Key-chains are randomly drawn from a key-pool. Either two neighboring nodes have a key in common in their key-chains, or there is a path, called key-path, among these two nodes where each pair of neighboring nodes on this path has a key in common. Problem in such a solution is to decide on the key-chain size and key-pool size so that every pair of nodes can establish a session key directly or through a path with high probability. The size of the key-path is the key factor for the efficiency of the design. This paper presents novel, deterministic and hybrid approaches based on Combinatorial Design for key distribution. In particular, several block design techniques are considered for generating the key-chains and the key-pools.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper details the progress to date, toward developing a small autonomous helicopter. We describe system architecture, avionics, visual state estimation, custom IMU design, aircraft modelling, as well as various linear and neuro/fuzzy control algorithms. Experimental results are presented for state estimation using fused stereo vision and IMU data, heading control, and attitude control. FAM attitude and velocity controllers have been shown to be effective in simulation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Internet chatrooms are common means of interaction and communications, and they carry valuable information about formal or ad-hoc formation of groups with diverse objectives. This work presents a fully automated surveillance system for data collection and analysis in Internet chatrooms. The system has two components: First, it has an eavesdropping tool which collects statistics on individual (chatter) and chatroom behavior. This data can be used to profile a chatroom and its chatters. Second, it has a computational discovery algorithm based on Singular Value Decomposition (SVD) to locate hidden communities and communication patterns within a chatroom. The eavesdropping tool is used for fine tuning the SVD-based discovery algorithm which can be deployed in real-time and requires no semantic information processing. The evaluation of the system on real data shows that (i) statistical properties of different chatrooms vary significantly, thus profiling is possible, (ii) SVD-based algorithm has up to 70-80% accuracy to discover groups of chatters.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We consider Cooperative Intrusion Detection System (CIDS) which is a distributed AIS-based (Artificial Immune System) IDS where nodes collaborate over a peer-to-peer overlay network. The AIS uses the negative selection algorithm for the selection of detectors (e.g., vectors of features such as CPU utilization, memory usage and network activity). For better detection performance, selection of all possible detectors for a node is desirable but it may not be feasible due to storage and computational overheads. Limiting the number of detectors on the other hand comes with the danger of missing attacks. We present a scheme for the controlled and decentralized division of detector sets where each IDS is assigned to a region of the feature space. We investigate the trade-off between scalability and robustness of detector sets. We address the problem of self-organization in CIDS so that each node generates a distinct set of the detectors to maximize the coverage of the feature space while pairs of nodes exchange their detector sets to provide a controlled level of redundancy. Our contribution is twofold. First, we use Symmetric Balanced Incomplete Block Design, Generalized Quadrangles and Ramanujan Expander Graph based deterministic techniques from combinatorial design theory and graph theory to decide how many and which detectors are exchanged between which pair of IDS nodes. Second, we use a classical epidemic model (SIR model) to show how properties from deterministic techniques can help us to reduce the attack spread rate.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Identity-Based (IB) cryptography is a rapidly emerging approach to public-key cryptography that does not require principals to pre-compute key pairs and obtain certificates for their public keys— instead, public keys can be arbitrary identifiers such as email addresses, while private keys are derived at any time by a trusted private key generator upon request by the designated principals. Despite the flurry of recent results on IB encryption and signature, some questions regarding the security and efficiency of practicing IB encryption (IBE) and signature (IBS) as a joint IB signature/encryption (IBSE) scheme with a common set of parameters and keys, remain unanswered. We first propose a stringent security model for IBSE schemes. We require the usual strong security properties of: (for confidentiality) indistinguishability against adaptive chosen-ciphertext attacks, and (for nonrepudiation) existential unforgeability against chosen-message insider attacks. In addition, to ensure as strong as possible ciphertext armoring, we also ask (for anonymity) that authorship not be transmitted in the clear, and (for unlinkability) that it remain unverifiable by anyone except (for authentication) by the legitimate recipient alone. We then present an efficient IBSE construction, based on bilinear pairings, that satisfies all these security requirements, and yet is as compact as pairing-based IBE and IBS in isolation. Our scheme is secure, compact, fast and practical, offers detachable signatures, and supports multirecipient encryption with signature sharing for maximum scalability.