The University of Limerick is a university in Ireland near the city of Limerick. It was established in 1972 as the National Institute for Higher Education, Limerick and became a university by statute in 1989 in accordance with the University of Limerick Act 1989. The university was the first university established since the foundation of the State in 1922, followed later the same day by the establishment of Dublin City University. Wikipedia.
Gleeson J.P.,University of Limerick
Physical Review X | Year: 2013
A wide class of binary-state dynamics on networks-including, for example, the voter model, the Bass diffusion model, and threshold models-can be described in terms of transition rates (spin-flip probabilities) that depend on the number of nearest neighbors in each of the two possible states. High-accuracy approximations for the emergent dynamics of such models on uncorrelated, infinite networks are given by recently developed compartmental models or approximate master equations (AMEs). Pair approximations (PAs) and mean-field theories can be systematically derived from the AME. We show that PA and AME solutions can coincide under certain circumstances, and numerical simulations confirm that PA is highly accurate in these cases. For monotone dynamics (where transitions out of one nodal state are impossible, e.g., susceptible-infected disease spread or Bass diffusion), PA and the AME give identical results for the fraction of nodes in the infected (active) state for all time, provided that the rate of infection depends linearly on the number of infected neighbors. In the more general nonmonotone case, we derive a condition-that proves to be equivalent to a detailed balance condition on the dynamics-for PA and AME solutions to coincide in the limit t∞1. This equivalence permits bifurcation analysis, yielding explicit expressions for the critical (ferromagnetic or paramagnetic transition) point of such dynamics, that is closely analogous to the critical temperature of the Ising spin model. Finally, the AME for threshold models of propagation is shown to reduce to just two differential equations and to give excellent agreement with numerical simulations. As part of this work, the Octave or Matlab code for implementing and solving the differential-equation systems is made available for download. Source
Magner E.,University of Limerick
Chemical Society Reviews | Year: 2013
Mesoporous silicates (MPS) are attractive materials for the immobilisation of enzymes. They possess ordered pore structures, narrow pore size distributions, large surface areas, high stability and can be chemically modified with various functional groups. The properties of MPS materials are reviewed in terms of their ability to act as supports for enzymes for use in biocatalysis with a particular focus on the ability to tailor the surface functionalization of the MPS to suit a specific enzyme. While many reports of the immobilisation of enzymes on MPS have been described, their use as biocatalytic supports is limited. Large scale reactors based on MPS will require continuous flow systems where the properties of the support can be tailored while allowing fluid flow at reasonable low pressure. © 2013 The Royal Society of Chemistry. Source
University of Limerick | Date: 2014-08-06
A water dispersible, biocompatible, non-toxic, seedless Group IV nanowire having an etched surface and surface oxide is provided. Also provided is a method of forming water dispersible seedless Group IV nanowires, comprising the steps of providing pristine seedless Group IV nanowires, and reacting the nanowires with a solution of an acidic amino acid to etch the nanowires and promote the formation of a water dispersible oxide layer through the formation of etched nanowires.
University of Limerick | Date: 2014-06-25
University of Limerick | Date: 2013-09-20
A method of adapting a security configuration of a data processing application at runtime, and a system, together with its computing architecture, are disclosed. The system stores a causal network comprising a plurality of nodes and a plurality of incoming and outgoing causal links associated therewith, wherein each node of the causal network is associated with a security concern or a requirement that can be affected by any configuration of the security controls. The current value of assets nodes, as well as those of the security concerns that can be affected by monitored contextual factors, are updated. The control nodes corresponding to the security controls is updated according to the security configuration whose utility is evaluated by the causal network. The node corresponding to the at least one variable is updated with the determined current value, which is propagated through the causal network through the causal links associated with the updated node. The security configuration with the highest utility is selected and replaces the actual configuration by activating and/or deactivating the security functions corresponding to security control nodes enabled/disabled in the selected security configuration.