7,717 research outputs found

    Dextran and its potential use as tablet excipient

    Get PDF
    Dextrans are a class of carbohydrate polymers extensively applied in pharmaceutical applications, particularly as drug conjugate macromolecular carriers or drug delivery systems. These polysaccharides improve the stability of the therapeutics enabling also the control of their release, via either the parenteral and or oral routes. In the latter case, due to their gel forming ability they may have potential as hydrophilic matrix tablets for sustained drug release. In this paper, we investigated the behaviour of different molecular weight (1, 40, 500 and 2300 kDa) dextrans as tabletting excipients. Powder particle size and hygroscopic studies have been reported, together with tabletability, tablet stability and tablet swelling. Moreover we use tramadol as model compound to evaluate the ability of dextrans to control drug dissolution. The results suggest that dextrans with lower molecular weights may be a promising excipient to be used as filler for immediate release tablets, due to their good tabletability and fast dissolution rate, while dextrans with higher molecular weights could be an efficient disintegrant due to their swelling ability

    The mechanics of trust: a framework for research and design

    Get PDF
    With an increasing number of technologies supporting transactions over distance and replacing traditional forms of interaction, designing for trust in mediated interactions has become a key concern for researchers in human computer interaction (HCI). While much of this research focuses on increasing users’ trust, we present a framework that shifts the perspective towards factors that support trustworthy behavior. In a second step, we analyze how the presence of these factors can be signalled. We argue that it is essential to take a systemic perspective for enabling well-placed trust and trustworthy behavior in the long term. For our analysis we draw on relevant research from sociology, economics, and psychology, as well as HCI. We identify contextual properties (motivation based on temporal, social, and institutional embeddedness) and the actor's intrinsic properties (ability, and motivation based on internalized norms and benevolence) that form the basis of trustworthy behavior. Our analysis provides a frame of reference for the design of studies on trust in technology-mediated interactions, as well as a guide for identifying trust requirements in design processes. We demonstrate the application of the framework in three scenarios: call centre interactions, B2C e-commerce, and voice-enabled on-line gaming

    Engineering topology aware adaptive security: preventing requirements violations at runtime

    Get PDF
    Adaptive security systems aim to protect critical assets in the face of changes in their operational environment. We have argued that incorporating an explicit representation of the environment’s topology enables reasoning on the location of assets being protected and the proximity of potentially harmful agents. This paper proposes to engineer topology aware adaptive security systems by identifying violations of security requirementsthat may be caused by topological changes, and selecting a setof security controls that prevent such violations. Our approach focuses on physical topologies; it maintains at runtime a live representation of the topology which is updated when assets or agents move, or when the structure of the physical space is altered. When the topology changes, we look ahead at a subset of the future system states. These states are reachable when the agents move within the physical space. If security requirements can be violated in future system states, a configuration of security controls is proactively applied to prevent the system from reaching those states. Thus, the system continuously adapts to topological stimuli, while maintaining requirements satisfaction. Security requirements are formally expressed using a propositional temporal logic, encoding spatial properties in Computation Tree Logic (CTL). The Ambient Calculus is used to represent the topology of the operational environment - including location of assets and agents - as well as to identify future system states that are reachable from the current one. The approach is demonstrated and evaluated using a substantive example concerned with physical access control

    Context-Aware and Adaptive Usage Control Model

    Get PDF
    Information protection is a key issue for the acceptance and adoption of pervasive computing systems where various portable devices such as smart phones, Personal Digital Assistants (PDAs) and laptop computers are being used to share information and to access digital resources via wireless connection to the Internet. Because these are resources constrained devices and highly mobile, changes in the environmental context or device context can affect the security of the system a great deal. A proper security mechanism must be put in place which is able to cope with changing environmental and system context. Usage CONtrol (UCON) model is the latest major enhancement of the traditional access control models which enables mutability of subject and object attributes, and continuity of control on usage of resources. In UCON, access permission decision is based on three factors: authorisations, obligations and conditions. While authorisations and obligations are requirements that must be fulfilled by the subject and the object, conditions are subject and object independent requirements that must be satisfied by the environment. As a consequence, access permission may be revoked (and the access stopped) as a result of changes in the environment regardless of whether the authorisations and obligations requirements are met. This constitutes a major shortcoming of the UCON model in pervasive computing systems which constantly strive to adapt to environmental changes so as to minimise disruptions to the user. We propose a Context-Aware and Adaptive Usage Control (CA-UCON) model which extends the traditional UCON model to enable adaptation to environmental changes in the aim of preserving continuity of access. Indeed, when the authorisation and obligations requirements are fulfilled by the subject and object, and the conditions requirements fail due to changes in the environmental or the system context, our proposed model CA-UCON triggers specific actions in order to adapt to the new situation, so as to ensure continuity of usage. We then propose an architecture of CA-UCON model, presenting its various components. In this model, we integrated the adaptation decision with usage decision architecture, the comprehensive definition of each components and reveals the functions performed by each components in the architecture are presented. We also propose a novel computational model of our CA-UCON architecture. This model is formally specified as a finite state machine. It demonstrates how the access request of the subject is handled in CA-UCON model, including detail with regards to revoking of access and actions undertaken due to context changes. The extension of the original UCON architecture can be understood from this model. The formal specification of the CA-UCON is presented utilising the Calculus of Context-aware Ambients (CCA). This mathematical notation is considered suitable for modelling mobile and context-aware systems and has been preferred over alternatives for the following reasons: (i) Mobility and Context awareness are primitive constructs in CCA; (ii) A system's properties can be formally analysed; (iii) Most importantly, CCA specifications are executable allowing early validation of system properties and accelerated development of prototypes. For evaluation of CA-UCON model, a real-world case study of a ubiquitous learning (u-learning) system is selected. We propose a CA-UCON model for the u-learning system. This model is then formalised in CCA and the resultant specification is executed and analysed using an execution environment of CCA. Finally, we investigate the enforcement approaches for CA-UCON model. We present the CA-UCON reference monitor architecture with its components. We then proceed to demonstrate three types of enforcement architectures of the CA-UCON model: centralised architecture, distributed architecture and hybrid architecture. These are discussed in detail, including the analysis of their merits and drawbacks

    Structure of cellulose microfibrils in primary cell-walls from collenchyma

    Get PDF
    In the primary walls of growing plant cells, the glucose polymer cellulose is assembled into long microfibrils a few nanometers in diameter. The rigidity and orientation of these microfibrils control cell expansion; therefore, cellulose synthesis is a key factor in the growth and morphogenesis of plants. Celery (Apium graveolens) collenchyma is a useful model system for the study of primary wall microfibril structure because its microfibrils are oriented with unusual uniformity, facilitating spectroscopic and diffraction experiments. Using a combination of x-ray and neutron scattering methods with vibrational and nuclear magnetic resonance spectroscopy, we show that celery collenchyma microfibrils were 2.9 to 3.0 nm in mean diameter, with a most probable structure containing 24 chains in cross section, arranged in eight hydrogen-bonded sheets of three chains, with extensive disorder in lateral packing, conformation, and hydrogen bonding. A similar 18-chain structure, and 24-chain structures of different shape, fitted the data less well. Conformational disorder was largely restricted to the surface chains, but disorder in chain packing was not. That is, in position and orientation, the surface chains conformed to the disordered lattice constituting the core of each microfibril. There was evidence that adjacent microfibrils were noncovalently aggregated together over part of their length, suggesting that the need to disrupt these aggregates might be a constraining factor in growth and in the hydrolysis of cellulose for biofuel production

    "Tap it again, Sam": Harmonizing the frontiers between digital and real worlds in education

    Get PDF
    Lifelong leaners are intrinsically motivated to embed learning activities into daily life activities. Finding a suitable combination of the two is not trivial since lifelong learners have to face conflicts of time and location. Hence, lifelong learners normally build personal learning ecologies in those moments they set aside to learn making use of their available resources. On the other hand, the advent of Near Field Communication (NFC) technology facilitates the harmonization in the interactions between the digital world and daily physical spaces. Likewise, NFC enabled phones are becoming more and more popular. The contribution of this manuscript is threefold: first, scientific literature where NFC has been used with a direct or indirect purpose to learn is reviewed, and potential uses for lifelong learners are identified; based on these findings the Ecology of Resources for Lifelong Learning is presented as suitable setup for the scaffolding of learning activities with NFC augmented physical spaces; finally, this ecology is piloted and different learning scenarios are proposed for further extension
    corecore