178 resultados para Arbitrary detention
Resumo:
The notion of being sure that you have completely eradicated an invasive species is fanciful because of imperfect detection and persistent seed banks. Eradication is commonly declared either on an ad hoc basis, on notions of seed bank longevity, or on setting arbitrary thresholds of 1% or 5% confidence that the species is not present. Rather than declaring eradication at some arbitrary level of confidence, we take an economic approach in which we stop looking when the expected costs outweigh the expected benefits. We develop theory that determines the number of years of absent surveys required to minimize the net expected cost. Given detection of a species is imperfect, the optimal stopping time is a trade-off between the cost of continued surveying and the cost of escape and damage if eradication is declared too soon. A simple rule of thumb compares well to the exact optimal solution using stochastic dynamic programming. Application of the approach to the eradication programme of Helenium amarum reveals that the actual stopping time was a precautionary one given the ranges for each parameter. © 2006 Blackwell Publishing Ltd/CNRS.
Resumo:
Indigenous leader Pat Dodson – who revealed he has met Prime Minister Tony Abbott only once, and then in passing – said last week that removal of frontline services from Indigenous organisations working towards Closing the Gap in Indigenous health “would seem counter intuitive to any fair-minded Australian”. But that, he said in this Age OpEd, has been the result of the Federal Government’s much-awaited Indigenous Advancement Strategy...
Resumo:
In the finite element modelling of structural frames, external loads such as wind loads, dead loads and imposed loads usually act along the elements rather than at the nodes only. Conventionally, when an element is subjected to these general transverse element loads, they are usually converted to nodal forces acting at the ends of the elements by either lumping or consistent load approaches. In addition, it is especially important for an element subjected to the first- and second-order elastic behaviour, to which the steel structure is critically prone to; in particular the thin-walled steel structures, when the stocky element section may be generally critical to the inelastic behaviour. In this sense, the accurate first- and second-order elastic displacement solutions of element load effect along an element is vitally crucial, but cannot be simulated using neither numerical nodal nor consistent load methods alone, as long as no equilibrium condition is enforced in the finite element formulation, which can inevitably impair the structural safety of the steel structure particularly. It can be therefore regarded as a unique element load method to account for the element load nonlinearly. If accurate displacement solution is targeted for simulating the first- and second-order elastic behaviour on an element on the basis of sophisticated non-linear element stiffness formulation, the numerous prescribed stiffness matrices must indispensably be used for the plethora of specific transverse element loading patterns encountered. In order to circumvent this shortcoming, the present paper proposes a numerical technique to include the transverse element loading in the non-linear stiffness formulation without numerous prescribed stiffness matrices, and which is able to predict structural responses involving the effect of first-order element loads as well as the second-order coupling effect between the transverse load and axial force in the element. This paper shows that the principle of superposition can be applied to derive the generalized stiffness formulation for element load effect, so that the form of the stiffness matrix remains unchanged with respect to the specific loading patterns, but with only the magnitude of the loading (element load coefficients) being needed to be adjusted in the stiffness formulation, and subsequently the non-linear effect on element loadings can be commensurate by updating the magnitude of element load coefficients through the non-linear solution procedures. In principle, the element loading distribution is converted into a single loading magnitude at mid-span in order to provide the initial perturbation for triggering the member bowing effect due to its transverse element loads. This approach in turn sacrifices the effect of element loading distribution except at mid-span. Therefore, it can be foreseen that the load-deflection behaviour may not be as accurate as those at mid-span, but its discrepancy is still trivial as proved. This novelty allows for a very useful generalised stiffness formulation for a single higher-order element with arbitrary transverse loading patterns to be formulated. Moreover, another significance of this paper is placed on shifting the nodal response (system analysis) to both nodal and element response (sophisticated element formulation). For the conventional finite element method, such as the cubic element, all accurate solutions can be only found at node. It means no accurate and reliable structural safety can be ensured within an element, and as a result, it hinders the engineering applications. The results of the paper are verified using analytical stability function studies, as well as with numerical results reported by independent researchers on several simple frames.
Resumo:
This paper presents a feasibility study on structural damage alarming and localization of long-span cable-supported bridges using multi-novelty indices formulated by monitoring-derived modal parameters. The proposed method which requires neither structural model nor damage model is applicable to structures of arbitrary complexity. With the intention to enhance the tolerance to measurement noise/uncertainty and the sensitivity to structural damage, an improved novelty index is formulated in terms of auto-associative neural networks (ANNs) where the output vector is designated to differ from the input vector while the training of the ANNs needs only the measured modal properties of the intact structure under in-service conditions. After validating the enhanced capability of the improved novelty index for structural damage alarming over the commonly configured novelty index, the performance of the improved novelty index for damage occurrence detection of large-scale bridges is examined through numerical simulation studies of the suspension Tsing Ma Bridge (TMB) and the cable-stayed Ting Kau Bridge (TKB) incurred with different types of structural damage. Then the improved novelty index is extended to formulate multi-novelty indices in terms of the measured modal frequencies and incomplete modeshape components for damage region identification. The capability of the formulated multi-novelty indices for damage region identification is also examined through numerical simulations of the TMB and TKB.
Resumo:
Increasing threat of terrorism highlights the importance of enhancing the resilience of underground tunnels to all hazards. This paper develops, applies and compares the Arbitrary Lagrangian Eulerian (ALE) and Smooth Particle Hydrodynamics (SPH) techniques to treat the response of buried tunnels to surface explosions. The results and outcomes of the two techniques were compared, along with results from existing test data. The comparison shows that the ALE technique is a better method for describing the tunnel response for above ground explosion with regards to modeling accuracy and computational efficiency. The ALE technique was then applied to treat the blast response of different types of segmented bored tunnels buried in dry sand. Results indicate that the most used modern ring type segmented tunnels were more flexible for in-plane response, however, they suffered permanent drifts between the rings. Hexagonal segmented tunnels responded with negligible drifts in the longitudinal direction, but the magnitudes of in-plane drifts were large and hence hazardous for the tunnel. Interlocking segmented tunnels suffered from permanent drifts in both the longitudinal and transverse directions. Multi-surface radial joints in both the hexagonal and interlocking segments affected the flexibility of the tunnel in the transverse direction. The findings offer significant new information in the behavior of segmented bored tunnels to guide their future implementation in civil engineering applications.
Resumo:
A number of international human rights frameworks protect the rights of young people in contact with the criminal justice system in states parties, including Australia. These frameworks inform youth justice policy in Australia’s jurisdictions. While the frameworks protect young people’s right to non-discrimination on the grounds of ‘race’, religion and political opinion, the rights of young people to non-discrimination on the grounds of sexuality and gender diversity are not explicitly protected. This is problematic given that lesbian, gay, bisexual, trans, intersex and queer (LGBTIQ) young people appear over-represented in youth justice systems. This article argues that the exclusion of this group from human rights frameworks has an important flow-on effect: the marginalisation of the right of LGBTIQ young people to non-discrimination in policy and discourse that is informed by international human rights frameworks. After outlining the relevant frameworks, this article examines the evidence about LGBTIQ young people’s interactions with youth justice agencies, particularly police. The evidence indicates that the human rights of LGBTIQ young people are frequently breached in these interactions. We conclude by arguing that it is timely to consider how best to protect the human rights of LBGTIQ young people and keep their rights on the agenda.
Resumo:
Supervisory Control and Data Acquisition (SCADA) systems are one of the key foundations of smart grids. The Distributed Network Protocol version 3 (DNP3) is a standard SCADA protocol designed to facilitate communications in substations and smart grid nodes. The protocol is embedded with a security mechanism called Secure Authentication (DNP3-SA). This mechanism ensures that end-to-end communication security is provided in substations. This paper presents a formal model for the behavioural analysis of DNP3-SA using Coloured Petri Nets (CPN). Our DNP3-SA CPN model is capable of testing and verifying various attack scenarios: modification, replay and spoofing, combined complex attack and mitigation strategies. Using the model has revealed a previously unidentified flaw in the DNP3-SA protocol that can be exploited by an attacker that has access to the network interconnecting DNP3 devices. An attacker can launch a successful attack on an outstation without possessing the pre-shared keys by replaying a previously authenticated command with arbitrary parameters. We propose an update to the DNP3-SA protocol that removes the flaw and prevents such attacks. The update is validated and verified using our CPN model proving the effectiveness of the model and importance of the formal protocol analysis.
Resumo:
This paper presents an uncertainty quantification study of the performance analysis of the high pressure ratio single stage radial-inflow turbine used in the Sundstrand Power Systems T-100 Multi-purpose Small Power Unit. A deterministic 3D volume-averaged Computational Fluid Dynamics (CFD) solver is coupled with a non-statistical generalized Polynomial Chaos (gPC) representation based on a pseudo-spectral projection method. One of the advantages of this approach is that it does not require any modification of the CFD code for the propagation of random disturbances in the aerodynamic and geometric fields. The stochastic results highlight the importance of the blade thickness and trailing edge tip radius on the total-to-static efficiency of the turbine compared to the angular velocity and trailing edge tip length. From a theoretical point of view, the use of the gPC representation on an arbitrary grid also allows the investigation of the sensitivity of the blade thickness profiles on the turbine efficiency. The gPC approach is also applied to coupled random parameters. The results show that the most influential coupled random variables are trailing edge tip radius coupled with the angular velocity.
Resumo:
This paper presents a visual SLAM method for temporary satellite dropout navigation, here applied on fixed- wing aircraft. It is designed for flight altitudes beyond typical stereo ranges, but within the range of distance measurement sensors. The proposed visual SLAM method consists of a common localization step with monocular camera resectioning, and a mapping step which incorporates radar altimeter data for absolute scale estimation. With that, there will be no scale drift of the map and the estimated flight path. The method does not require simplifications like known landmarks and it is thus suitable for unknown and nearly arbitrary terrain. The method is tested with sensor datasets from a manned Cessna 172 aircraft. With 5% absolute scale error from radar measurements causing approximately 2-6% accumulation error over the flown distance, stable positioning is achieved over several minutes of flight time. The main limitations are flight altitudes above the radar range of 750 m where the monocular method will suffer from scale drift, and, depending on the flight speed, flights below 50 m where image processing gets difficult with a downwards-looking camera due to the high optical flow rates and the low image overlap.
Resumo:
Back in 1995, Peter Drahos wrote a futuristic article called ‘Information feudalism in the information society’. It took the form of an imagined history of the information society in the year 2015. Drahos provided a pessimistic vision of the future, in which the information age was ruled by the private owners of intellectual property. He ended with the bleak, Hobbesian image: "It is unimaginable that the information society of the 21st century could be like this. And yet if abstract objects fall out of the intellectual commons and are enclosed by private owners, private, arbitrary, unchecked global power will become a part of life in the information society. A world in which seed rights, algorithms, DNA, and chemical formulas are owned by a few, a world in which information flows can be coordinated by information-media barons, might indeed be information feudalism (p. 222)." This science fiction assumed that a small number of states would dominate the emerging international regulatory order set up under the World Trade Organization. In Information Feudalism: Who Owns the Knowledge Economy?, Peter Drahos and his collaborator John Braithwaite reprise and expand upon the themes first developed in that article. The authors contend: "Information feudalism is a regime of property rights that is not economicallyefficient, and does not get the balance right between rewarding innovation and diffusing it. Like feudalism, it rewards guilds instead of inventive individual citizens. It makes democratic citizens trespassers on knowledge that should be the common heritage of humankind, their educational birthright. Ironically, information feudalism, by dismantling the publicness of knowledge, will eventually rob the knowledge economy of much of its productivity (p. 219)." Drahos and Braithwaite emphasise that the title Information Feudalism is not intended to be taken at face value by literal-minded readers, and crudely equated with medieval feudalism. Rather, the title serves as a suggestive metaphor. It designates the transfer of knowledge from the intellectual commons to private corporation under the regime of intellectual property.
Resumo:
Aims To better understand the knowledge and behaviors of drunk-driving offenders relating to alcohol use and driving in the context of recently amended Chinese legislation, and to investigate the involvement of alcohol-use disorders. Design The study was a cross-sectional survey conducted in 2012. Setting and participants: Data were collected at a local jail and 101 participants were recruited while in detention. Measures Questionnaire items examined demographic characteristics as well as practices and knowledge relating to alcohol use and driving. The Alcohol Use Disorders Identification Test (AUDIT) was used to assess hazardous drinking levels. Findings Knowledge about the two legal limits for “drink driving” and for “drunk driving” was low, at 28.3% and 41.4%, respectively. AUDIT scores indicated that a substantial proportion of the offenders had high levels of alcohol-use disorders. Higher AUDIT scores were found among the least experienced drivers, those who lacked knowledge about the legal limits, and recidivist drunk drivers. Conclusions Limited awareness of legal alcohol limits might contribute to offending; high AUDIT scores suggest that hazardous drinking levels may also contribute. This study provides important information to assist in refining community education and prevention efforts.
Resumo:
Worldwide, no fewer than 50 million people a year are now fleeing dangerous and often life threatening situations in their countries of origin (UNHCR, 2014c). As one part of this movement, thousands risk journeys through dangerous waters hoping to obtain asylum in Australia. However, Australian Government policies adopted since 2013 aim to ensure that no asylum seeker nor any of the 3,500 detainees held in offshore detention centres will ever be settled on the mainland. To this has now been added a declaration that none of the recent refugees or 6200 asylum seekers waiting in Indonesia in centres run by the United Nations High Commissioner for Refugees (UNHCR) will gain entry (Whyte, 2014a). These immigration policies differ dramatically from those adopted in earlier decades that produced the country’s decidedly multicultural identity. This article reviews these changing perspectives of Australian governments and communities within the context of international obligations and expectations; the experiences of those directly involved in border policing practices and in detention centres; and the attitudes of national media. Relations and conflicts among the interests of the different parties are discussed and the scope for less punitive responses to the plight of asylum seekers is examined. The authors then focus on alternative processes to better address the interests and objectives of legitimately interested parties by processes which successively examine, optimise and reconcile the concerns of each. In so doing, they aim to demonstrate that such methods of sequential problem solving can respond effectively to the multiple concerns of the many significant stakeholders involved in increasingly significant global issues, whereas recourse to such single-goal, top-down programs as are expressed in the government’s current determination to “Stop the boats” at all costs are unlikely to prove sustainable.
Resumo:
Double diffusive Marangoni convection flow of viscous incompressible electrically conducting fluid in a square cavity is studied in this paper by taking into consideration of the effect of applied magnetic field in arbitrary direction and the chemical reaction. The governing equations are solved numerically by using alternate direct implicit (ADI) method together with the successive over relaxation (SOR) technique. The flow pattern with the effect of governing parameters, namely the buoyancy ratio W, diffusocapillary ratio w, and the Hartmann number Ha, is investigated. It is revealed from the numerical simulations that the average Nusselt number decreases; whereas the average Sherwood number increases as the orientation of magnetic field is shifted from horizontal to vertical. Moreover, the effect of buoyancy due to species concentration on the flow is stronger than the one due to thermal buoyancy. The increase in diffusocapillary parameter, w caus
Resumo:
Theodor Adorno was opposed to the cinema because he felt it was too close to reality, and ipso facto an extension of ideological Capital, as he wrote in 1944 in Dialectic of Enlightenment. What troubled Adorno was the iconic nature of cinema – the semiotic category invented by C. S. Peirce where the signifier (sign) does not merely signify, in the arbitrary capacity attested by Saussure, but mimics the formal-visual qualities of its referent. Iconicity finds its perfect example in the film’s ingenuous surface illusion of an unmediated reality – its genealogy (the iconic), since classical antiquity, lay in the Greek term eikōn which meant “image,” to refer to the ancient portrait statues of victorious athletes which were thought to bear a direct similitude with their parent divinities. For the postwar, Hollywood-film spectator, Adorno said, “the world outside is an extension of the film he has just left,” because realism is a precise instrument for the manipulation of the mass spectator by the culture industry, for which the filmic image is an advertisement for the world unedited. Mimesis, or the reproduction of reality, is a “mere reproduction of the economic base.” It is precisely film’s iconicity, then, its “realist aesthetic . . . [that] makes it inseparable from its commodity character.”...
Resumo:
The formation of ordered arrays of molecules via self-assembly is a rapid, scalable route towards the realization of nanoscale architectures with tailored properties. In recent years, graphene has emerged as an appealing substrate for molecular self-assembly in two dimensions. Here, the first five years of progress in supramolecular organization on graphene are reviewed. The self-assembly process can vary depending on the type of graphene employed: epitaxial graphene, grown in situ on a metal surface, and non-epitaxial graphene, transferred onto an arbitrary substrate, can have different effects on the final structure. On epitaxial graphene, the process is sensitive to the interaction between the graphene and the substrate on which it is grown. In the case of graphene that strongly interacts with its substrate, such as graphene/Ru(0001), the inhomogeneous adsorption landscape of the graphene moiré superlattice provides a unique opportunity for guiding molecular organization, since molecules experience spatially constrained diffusion and adsorption. On weaker-interacting epitaxial graphene films, and on non-epitaxial graphene transferred onto a host substrate, self-assembly leads to films similar to those obtained on graphite surfaces. The efficacy of a graphene layer for facilitating planar adsorption of aromatic molecules has been repeatedly demonstrated, indicating that it can be used to direct molecular adsorption, and therefore carrier transport, in a certain orientation, and suggesting that the use of transferred graphene may allow for predictible molecular self-assembly on a wide range of surfaces.