1000 resultados para Heterotrinuclear complex
Resumo:
Two main deformational phases are recognised in the Archaean Boorara Domain of the Kalgoorlie Terrane, Eastern Goldfields Superterrane, Yilgarn Craton, Western Australia, primarily involving southover- north thrust faulting that repeated and thickened the stratigraphy, followed by east northeast – west-southwest shortening that resulted in macroscale folding of the greenstone lithologies. The domain preserves mid-greenschist facies metamorphic grade, with an increase to lower amphibolite metamorphic grade towards the north of the region. As a result of the deformation and metamorphism, individual stratigraphic horizons are difficult to trace continuously throughout the entire domain. Volcanological and sedimentological textures and structures, primary lithological contacts, petrography and geochemistry have been used to correlate lithofacies between faultbounded structural blocks. The correlated stratigraphic sequence for the Boorara Domain comprises quartzo-feldspathic turbidite packages, overlain by high-Mg tholeiitic basalt (lower basalt), coherent and clastic dacite facies, intrusive and extrusive komatiite units, an overlying komatiitic basalt unit (upper basalt), and at the stratigraphic top of the sequence, volcaniclastic quartz-rich turbidites. Reconstruction of the stratigraphy and consideration of emplacement dynamics has allowed reconstruction of the emplacement history and setting of the preserved sequence. This involves a felsic, mafic and ultramafic magmatic system emplaced as high-level intrusions, with localised emergent volcanic centres, into a submarine basin in which active sedimentation was occurring.
Resumo:
Wayfinding is the process of finding your way to a destination in a familiar or unfamiliar setting using any cues given by the environment. Due to its ubiquity in everyday life, wayfinding appears on the surface to be a simply characterised and understood process, however this very ubiquity and the resulting need to refine and optimise wayfinding has lead to a great number of studies that have revealed that it is in fact a deeply complex exercise. In this paper we examine the motivations for investigating wayfinding, with particular attention being paid to the unique challenges faced in transportation hubs, and discuss the associated principles and factors involved as they have been perceived from different research perspectives.We also review the approaches used to date in the modelling of wayfinding in various contexts. We attempt to draw together the different perspectives applied to wayfinding and postulate the importance of wayfinding and the need to understand this seemingly simple, but concurrently complex, process.
Resumo:
Child abuse and neglect is prevalent and entails significant costs to children, families and society. Teachers are responsible for significant proportions of official notifications to statutory child protection agencies. Hence, their accurate and appropriate reporting is crucial for well-functioning child protection systems. Approximately one-quarter of Australian teachers indicate never detecting a case of child maltreatment across their careers, while a further 13-15% admit to not reporting suspected cases in some circumstances. The detection and reporting of child abuse and neglect are complex decision-making behaviors, influenced by: the nature of the maltreatment itself; the characteristics of the teacher; the school environment; and the broader legislative and policy environment. In this chapter, the authors provide a background to teachers’ involvement in detecting and reporting child abuse and neglect, and an overview of the role of teachers is provided. Results are presented from three Australian studies that examine the unique contributions of: case; teacher; and contextual characteristics to detection and reporting behaviors. The authors conclude by highlighting the key implications for enhancing teacher training in child abuse and neglect, and outline future research directions.
Resumo:
This paper presents a combined structure for using real, complex, and binary valued vectors for semantic representation. The theory, implementation, and application of this structure are all significant. For the theory underlying quantum interaction, it is important to develop a core set of mathematical operators that describe systems of information, just as core mathematical operators in quantum mechanics are used to describe the behavior of physical systems. The system described in this paper enables us to compare more traditional quantum mechanical models (which use complex state vectors), alongside more generalized quantum models that use real and binary vectors. The implementation of such a system presents fundamental computational challenges. For large and sometimes sparse datasets, the demands on time and space are different for real, complex, and binary vectors. To accommodate these demands, the Semantic Vectors package has been carefully adapted and can now switch between different number types comparatively seamlessly. This paper describes the key abstract operations in our semantic vector models, and describes the implementations for real, complex, and binary vectors. We also discuss some of the key questions that arise in the field of quantum interaction and informatics, explaining how the wide availability of modelling options for different number fields will help to investigate some of these questions.
Shifting meanings : The role of metaphors in collective meaning–making in complex project leadership
Resumo:
This paper examines the use of metaphors in collective meaning-making in the work of managers and leaders of megaprojects, drawing on interviews with thirty-three leaders of complex projects in a case study organisation responsible for the delivery of major acquisitions. Recognising the notion of both contextualised and decontextualised approaches to either seeking to elicit or project metaphors, the paper describes the various ways in practising project leaders describe their work and the synergies these metaphors have with the broader social discourse and theorisation around complexity and the language of complex adaptive systems. The paper presents our case study findings where we outline our typology of meta-metaphors describing project leaders’ multiple roles and our interpretation of the significance of these choices.
Resumo:
Complex flow datasets are often difficult to represent in detail using traditional vector visualisation techniques such as arrow plots and streamlines. This is particularly true when the flow regime changes in time. Texture-based techniques, which are based on the advection of dense textures, are novel techniques for visualising such flows (i.e., complex dynamics and time-dependent). In this paper, we review two popular texture-based techniques and their application to flow datasets sourced from real research projects. The texture-based techniques investigated were Line Integral Convolution (LIC), and Image-Based Flow Visualisation (IBFV). We evaluated these techniques and in this paper report on their visualisation effectiveness (when compared with traditional techniques), their ease of implementation, and their computational overhead.
Resumo:
Detailed representations of complex flow datasets are often difficult to generate using traditional vector visualisation techniques such as arrow plots and streamlines. This is particularly true when the flow regime changes in time. Texture-based techniques, which are based on the advection of dense textures, are novel techniques for visualising such flows. We review two popular texture based techniques and their application to flow datasets sourced from active research projects. The techniques investigated were Line integral convolution (LIC) [1], and Image based flow visualisation (IBFV) [18]. We evaluated these and report on their effectiveness from a visualisation perspective. We also report on their ease of implementation and computational overheads.
Resumo:
Maize streak virus (MSV; Genus Mastrevirus, Family Geminiviridae) occurs throughout Africa, where it causes what is probably the most serious viral crop disease on the continent. It is obligately transmitted by as many as six leafhopper species in the Genus Cicadulina, but mainly by C. mbila Naudé and C. storeyi. In addition to maize, it can infect over 80 other species in the Family Poaceae. Whereas 11 strains of MSV are currently known, only the MSV-A strain is known to cause economically significant streak disease in maize. Severe maize streak disease (MSD) manifests as pronounced, continuous parallel chlorotic streaks on leaves, with severe stunting of the affected plant and, usuallly, a failure to produce complete cobs or seed. Natural resistance to MSV in maize, and/or maize infections caused by non-maize-adapted MSV strains, can result in narrow, interrupted streaks and no obvious yield losses. MSV epidemiology is primarily governed by environmental influences on its vector species, resulting in erratic epidemics every 3-10 years. Even in epidemic years, disease incidences can vary from a few infected plants per field, with little associated yield loss, to 100% infection rates and complete yield loss. Taxonomy: The only virus species known to cause MSD is MSV, the type member of the Genus Mastrevirus in the Family Geminiviridae. In addition to the MSV-A strain, which causes the most severe form of streak disease in maize, 10 other MSV strains (MSV-B to MSV-K) are known to infect barley, wheat, oats, rye, sugarcane, millet and many wild, mostly annual, grass species. Seven other mastrevirus species, many with host and geographical ranges partially overlapping those of MSV, appear to infect primarily perennial grasses. Physical properties: MSV and all related grass mastreviruses have single-component, circular, single-stranded DNA genomes of approximately 2700 bases, encapsidated in 22 × 38-nm geminate particles comprising two incomplete T = 1 icosahedra, with 22 pentameric capsomers composed of a single 32-kDa capsid protein. Particles are generally stable in buffers of pH 4-8. Disease symptoms: In infected maize plants, streak disease initially manifests as minute, pale, circular spots on the lowest exposed portion of the youngest leaves. The only leaves that develop symptoms are those formed after infection, with older leaves remaining healthy. As the disease progresses, newer leaves emerge containing streaks up to several millimetres in length along the leaf veins, with primary veins being less affected than secondary or tertiary veins. The streaks are often fused laterally, appearing as narrow, broken, chlorotic stripes, which may extend over the entire length of severely affected leaves. Lesion colour generally varies from white to yellow, with some virus strains causing red pigmentation on maize leaves and abnormal shoot and flower bunching in grasses. Reduced photosynthesis and increased respiration usually lead to a reduction in leaf length and plant height; thus, maize plants infected at an early stage become severely stunted, producing undersized, misshapen cobs or giving no yield at all. Yield loss in susceptible maize is directly related to the time of infection: Infected seedlings produce no yield or are killed, whereas plants infected at later times are proportionately less affected. Disease control: Disease avoidance can be practised by only planting maize during the early season when viral inoculum loads are lowest. Leafhopper vectors can also be controlled with insecticides such as carbofuran. However, the development and use of streak-resistant cultivars is probably the most effective and economically viable means of preventing streak epidemics. Naturally occurring tolerance to MSV (meaning that, although plants become systemically infected, they do not suffer serious yield losses) has been found, which has primarily been attributed to a single gene, msv-1. However, other MSV resistance genes also exist and improved resistance has been achieved by concentrating these within individual maiz genotypes. Whereas true MSV immunity (meaning that plants cannot be symptomatically infected by the virus) has been achieved in lines that include multiple small-effect resistance genes together with msv-1, it has proven difficult to transfer this immunity into commercial maize genotypes. An alternative resistance strategy using genetic engineering is currently being investigated in South Africa. Useful websites: 〈http://www.mcb.uct.ac.za/MSV/mastrevirus.htm〉; 〈http://www. danforthcenter.org/iltab/geminiviridae/geminiaccess/mastrevirus/Mastrevirus. htm〉. © 2009 Blackwell Publishing Ltd.
Resumo:
Objectives: To investigate the efficacy of progestin treatment to achieve pathological complete response (pCR) in patients with complex atypical endometrial hyperplasia (CAH) or early endometrial adenocarcinoma (EC). Methods: A systematic search identified 3245 potentially relevant citations. Studies containing less than ten eligible CAH or EC patients in either oral or intrauterine treatment arm were excluded. Only information from patients receiving six or more months of treatment and not receiving other treatments was included. Weighted proportions of patients achieving pCR were calculated using R software. Results: Twelve studies met the selection criteria. Eleven studies reported treatment of patients with oral (219 patients, 117 with CAH, 102 with grade 1 Stage I EC) and one reported treatment of patients with intrauterine progestin (11 patients with grade 1 Stage IEC). Overall, 74% (95% confidence interval [CI] 65-81%) of patients with CAH and 72% (95% CI 62-80%) of patients with grade 1 Stage I EC achieved a pCR to oral progestin. Disease progression while on oral treatment was reported for 6/219 (2.7%), and relapse after initial complete response for 32/159 (20.1%) patients. The weighted mean pCR rate of patients with grade 1 Stage I EC treated with intrauterine progestin from one prospective pilot study and an unpublished retrospective case series from the Queensland Centre of Gynaecologic Oncology (QCGC) was 68% (95% CI 45- 86%). Conclusions: There is a lack of high quality evidence for the efficacy of progestin in CAH or EC. The available evidence however suggests that treatment with oral or intrauterine progestin is similarly effective. The risk of progression during treatment is small but longer follow-up is required. Evidence from prospective controlled clinical trials is warranted to establish how the efficacy of progestin for the treatment of CAH and EC can be improved further.
Resumo:
This paper reports the findings of a qualitative study which investigated 25 international students’ use of online information resources for study purposes at two Australian universities. Using an expanded critical incident approach, the study viewed international students through an information literacy lens, as information-using learners. The findings are presented in two complementary parts: as a word picture that describes their whole experience of using online information resources to learn; and as a tabulated set of critical findings that summarises their associated information literacy learning needs. The word picture shows international students’ resource use as a complex interplay of eight inter-related elements: students; information-learning environment; interactions (with online resources); strengths-challenges; learning-help; affective responses; reflective responses; cultural-linguistic dimensions. In using online resources, the international students experience an array of strengths and challenges, and an apparent information literacy imbalance between their more developed information skills and less developed critical information use. The critical findings about information literacy needs provide a framework for developing an inclusive informed learning approach that responds to international students’ complex information using experiences and needs. While the study is situated in Australia, the findings are of potential interest to educators, information professionals and researchers worldwide who seek to support learning in culturally diverse higher education contexts.
Resumo:
While highly cohesive groups are potentially advantageous they are also often correlated with the emergence of knowledge and information silos based around those same functional or occupational clusters. Consequently, an essential challenge for engineering organisations wishing to overcome informational silos is to implement mechanisms that facilitate, encourage and sustain interactions between otherwise disconnected groups. This paper acts as a primer for those seeking to gain an understanding of the design, functionality and utility of a suite of software tools generically termed social media technologies in the context of optimising the management of tacit engineering knowledge. Underpinned by knowledge management theory and using detailed case examples, this paper explores how social media technologies achieve such goals, allowing for the transfer of knowledge by tapping into the tacit and explicit knowledge of disparate groups in complex engineering environments.
Resumo:
This study used both content and frame analyses to test news-media representations of homelessness in The Courier-Mail newspaper for evidence of restricted journalism practice. Specifically, it sought signs of either direct manipulation of issue representation based on ideological grounds, and also evidence of news organisations prioritising low-cost news production over Public Sphere journalistic news values. The study found that news stories from the earlier parts of the longitudinal study showed stereotypical misrepresentations of homelessness for public deliberation which might be attributed to either, or both of the nominated restricting factors. However news stories from the latter part of the study saw a distinct change in the way the issue was represented, indicating a journalistic capacity to thoughtfully and sensitively represent a complex social issue to the public. Further study is recommended to ascertain how and why this change occurred, so that journalistic practice might be further improved.
Resumo:
A complex attack is a sequence of temporally and spatially separated legal and illegal actions each of which can be detected by various IDS but as a whole they constitute a powerful attack. IDS fall short of detecting and modeling complex attacks therefore new methods are required. This paper presents a formal methodology for modeling and detection of complex attacks in three phases: (1) we extend basic attack tree (AT) approach to capture temporal dependencies between components and expiration of an attack, (2) using enhanced AT we build a tree automaton which accepts a sequence of actions from input message streams from various sources if there is a traversal of an AT from leaves to root, and (3) we show how to construct an enhanced parallel automaton that has each tree automaton as a subroutine. We use simulation to test our methods, and provide a case study of representing attacks in WLANs.