363 resultados para Surf Smart I
Resumo:
A novel intelligent online demand side management system is proposed for peak load management in low-voltage distribution networks. This method uses low-cost controllers with low-bandwidth two-way communication installed in custumers’ premises and at distribution transformers to manage the peak load while maximising customer satisfaction. A multi-objective decision making process is proposed to select the load(s) to be delayed or controlled. The efficacy of the proposed control system is verified by simulation of three different feeder types.
Resumo:
The measurement of ventilation distribution is currently performed using inhaled tracer gases for multiple breath inhalation studies or imaging techniques to quantify spatial gas distribution. Most tracer gases used for these studies have properties different from that of air. The effect of gas density on regional ventilation distribution has not been studied. This study aimed to measure the effect of gas density on regional ventilation distribution. Methods Ventilation distribution was measured in seven rats using electrical impedance tomography (EIT) in supine, prone, left and right lateral positions while being mechanically ventilated with either air, heliox (30% oxygen, 70% helium) or sulfur hexafluoride (20% SF6, 20% oxygen, 60% air). The effect of gas density on regional ventilation distribution was assessed. Results Gas density did not impact on regional ventilation distribution. The non-dependent lung was better ventilated in all four body positions. Gas density had no further impact on regional filling characteristics. The filling characteristics followed an anatomical pattern with the anterior and left lung showing a greater impedance change during the initial phase of the inspiration. Conclusion It was shown that gas density did not impact on convection dependent ventilation distribution in rats measured with EIT.
Resumo:
The evolution of classic power grids to smart grids creates chances for most participants in the energy sector. Customers can save money by reducing energy consumption, energy providers can better predict energy demand and environment benefits since lower energy consumption implies lower energy production including a decrease of emissions from plants. But information and communication systems supporting smart grids can also be subject to classical or new network attacks. Attacks can result in serious damage such as harming privacy of customers, creating economical loss and even disturb the power supply/demand balance of large regions and countries. In this paper, we give an overview about the German smart measuring architecture, protocols and security. Afterwards, we present a simulation framework which enables researchers to analyze security aspects of smart measuring scenarios.
Resumo:
Lending teachers for two-year periods is one of the ways in which Cuba has been able to collaborate with other countries in their efforts to improve educational planning and practice. My field research in 2001 in Jamaica (March and November) and in Namibia (December) enabled me to obtain information about how Cuban teachers are being utilized, and about the educational implications of this project. In Jamaica, I interviewed 15 Cuban teachers in several schools and one in the vocational institute, as well as the Cuban project supervisor in charge of the 51 Cuban teachers. I also talked with officials at the Jamaican Ministry of Education to obtain an idea of the developmental needs in the various subjects that the Cubans had been asked to teach. In Namibia I interviewed personnel in the National Sports Directorate and the Cuban manager in charge of the sports education project. The chapter draws on these interviews to build a picture of how the program of collaboration is organized, and considers its postcolonial significance, in theory and in practice, as an example of South-South collaboration. The chapter contributes to a multilevel style of comparative education analysis based on microlevel qualitative fieldwork within a framework that compares cross-cultural issues and national policies. The discussion of the educational situation of the host countries suggests why Cuban teachers can contribute to meeting curricular needs, particularly in the areas of the sciences, mathematics, Spanish, and sports. The friendly and joking remark of one of the Cuban teachers to school students in Jamaica: “You help me improve my English, I’ll teach you Physics!” highlights the reciprocal potential of these cooperation projects, discussed in several chapters of this book.
Resumo:
There are different ways to authenticate humans, which is an essential prerequisite for access control. The authentication process can be subdivided into three categories that rely on something someone i) knows (e.g. password), and/or ii) has (e.g. smart card), and/or iii) is (biometric features). Besides classical attacks on password solutions and the risk that identity-related objects can be stolen, traditional biometric solutions have their own disadvantages such as the requirement of expensive devices, risk of stolen bio-templates etc. Moreover, existing approaches provide the authentication process usually performed only once initially. Non-intrusive and continuous monitoring of user activities emerges as promising solution in hardening authentication process: iii-2) how so. behaves. In recent years various keystroke dynamic behavior-based approaches were published that are able to authenticate humans based on their typing behavior. The majority focuses on so-called static text approaches, where users are requested to type a previously defined text. Relatively few techniques are based on free text approaches that allow a transparent monitoring of user activities and provide continuous verification. Unfortunately only few solutions are deployable in application environments under realistic conditions. Unsolved problems are for instance scalability problems, high response times and error rates. The aim of this work is the development of behavioral-based verification solutions. Our main requirement is to deploy these solutions under realistic conditions within existing environments in order to enable a transparent and free text based continuous verification of active users with low error rates and response times.
Resumo:
Purpose – This chapter examines an episode of pretend play amongst a group of young girls in an elementary school in Australia, highlighting how they interact within the membership categorization device ‘family’ to manage their social and power relationships. Approach – Using conversation analysis and membership categorization analysis, an episode of video-recorded interaction that occurs amongst a group of four young girls is analyzed. Findings – As disputes arise amongst the girls, the mother category is produced as authoritative through authoritative actions by the girl in the category of mother, and displays of subordination on the part of the other children, in the categories of sister, dog and cat. Value of paper – Examining play as a social practice provides insight into the social worlds of children. The analysis shows how the children draw upon and co-construct family-style relationships in a pretend play context, in ways that enable them to build and organize peer interaction. Authority is highlighted as a joint accomplishment that is part of the social and moral order continuously being negotiated by the children. The authority of the mother category is produced and oriented to as a means of managing the disputes within the pretend frame of play.
Resumo:
Long traffic queues on off-ramps significantly compromise the safety and throughput of motorways. Obtaining accurate queue information is crucial for countermeasure strategies. However, it is challenging to estimate traffic queues with locally installed inductive loop detectors. This paper deals with the problem of queue estimation with the interpretation of queuing dynamics and the corresponding time-occupancy distribution over motorway off-ramps. A novel algorithm for real-time queue estimation with two detectors is presented and discussed. Results derived from microscopic traffic simulation validated the effectiveness of the algorithm and revealed some of its useful features: (a) long and intermediate traffic queues could be accurately measured, (b) relatively simple detector input (i.e., time occupancy) was required, and (c) the estimation philosophy was independent with signal timing changes and provided the potential to cooperate with advanced strategies for signal control. Some issues concerning field implementation are also discussed.
Resumo:
Voltage rise is one of the main factors which limits the capacity of Low Voltage (LV) network to accommodate more Renewable Energy (RE) sources. This paper proposes a robust and effective approach to coordinate customers’ resources and manage voltage rise in residential LV networks. PV is considered as the customer RE source. The suggested coordination approach in this paper includes both localized control strategy, based on local measurement, and distributed control strategy based on consensus algorithm. This approach can completely avoid maximum permissible voltage limit violation. A typical residential LV network is used as the case study where the simulated results are shown to verify the effectiveness of the proposed approach.
Resumo:
An increasing body of research is highlighting the involvement of illicit drugs in many road fatalities. Deterrence theory has been a core conceptual framework underpinning traffic enforcement as well as interventions designed to reduce road fatalities. Essentially the effectiveness of deterrence-based approaches is predicated on perceptions of certainty, severity, and swiftness of apprehension. However, much less is known about how the awareness of legal sanctions can impact upon the effectiveness of deterrence mechanisms and whether promoting such detection methods can increase the deterrent effect. Nevertheless, the implicit assumption is that individuals aware of the legal sanctions will be more deterred. This study seeks to explore how awareness of the testing method impacts upon the effectiveness of deterrence-based interventions and intentions to drug drive again in the future. In total, 161 participants who reported drug driving in the previous six months took part in the current study. The results show that awareness of testing had a small effect upon increasing perceptions of the certainty of apprehension and severity of punishment. However, awareness was not a significant predictor of intentions to drug drive again in the future. Importantly, higher levels of drug use were a significant predictor of intentions to drug drive in the future. Whilst awareness does have a small effect on deterrence variables, the influence of levels of drug use seems to reduce any deterrent effect.
Resumo:
This paper investigates advanced channel compensation techniques for the purpose of improving i-vector speaker verification performance in the presence of high intersession variability using the NIST 2008 and 2010 SRE corpora. The performance of four channel compensation techniques: (a) weighted maximum margin criterion (WMMC), (b) source-normalized WMMC (SN-WMMC), (c) weighted linear discriminant analysis (WLDA), and; (d) source-normalized WLDA (SN-WLDA) have been investigated. We show that, by extracting the discriminatory information between pairs of speakers as well as capturing the source variation information in the development i-vector space, the SN-WLDA based cosine similarity scoring (CSS) i-vector system is shown to provide over 20% improvement in EER for NIST 2008 interview and microphone verification and over 10% improvement in EER for NIST 2008 telephone verification, when compared to SN-LDA based CSS i-vector system. Further, score-level fusion techniques are analyzed to combine the best channel compensation approaches, to provide over 8% improvement in DCF over the best single approach, (SN-WLDA), for NIST 2008 interview/ telephone enrolment-verification condition. Finally, we demonstrate that the improvements found in the context of CSS also generalize to state-of-the-art GPLDA with up to 14% relative improvement in EER for NIST SRE 2010 interview and microphone verification and over 7% relative improvement in EER for NIST SRE 2010 telephone verification.
Resumo:
This paper looks at the accuracy of using the built-in camera of smart phones and free software as an economical way to quantify and analyse light exposure by producing luminance maps from High Dynamic Range (HDR) images. HDR images were captured with an Apple iPhone 4S to capture a wide variation of luminance within an indoor and outdoor scene. The HDR images were then processed using Photosphere software (Ward, 2010.) to produce luminance maps, where individual pixel values were compared with calibrated luminance meter readings. This comparison has shown an average luminance error of ~8% between the HDR image pixel values and luminance meter readings, when the range of luminances in the image is limited to approximately 1,500cd/m2.
Resumo:
Pt/anodized TiO2/SiC based metal-oxide-semiconductor (MOS) devices were fabricated and characterized for their sensitivity towards propene (C3H6). Titanium (Ti) thin films were deposited onto the SiC substrates using a filtered cathodic vacuum arc (FCVA) method. Fluoride ions containing neutral electrolyte (0.5 wt% NH4F in ethylene glycol)were used to anodize the Ti films. The anodized films were subsequently annealed at 600 °C for 4 hrs in an oxygen rich environment to obtain TiO2. The current-voltage(I-V) characteristics of the Pt/TiO2/SiC devices were measured in different concentrations of propene. Exposure to the analyte gas caused a change in the Schottky barrier height and hence a lateral shift in the I-V characteristics. The effective change in the barrier height for 1% propene was calculated as 32.8 meV at 620°C. The dynamic response of the sensors was also investigated and a voltage shift of 157 mV was measured at 620°C during exposure to 1% propene.
Resumo:
The resulting live and video performance follows the stories of Jared, Amanda and Sonia and the issues they face in transitioning to university, and uses interactive elements to engage real university students in thinking about approaches to their studies. It has been commissioned for presentation 5 times with varying groups of actors since it was created.
Resumo:
The generation of a correlation matrix from a large set of long gene sequences is a common requirement in many bioinformatics problems such as phylogenetic analysis. The generation is not only computationally intensive but also requires significant memory resources as, typically, few gene sequences can be simultaneously stored in primary memory. The standard practice in such computation is to use frequent input/output (I/O) operations. Therefore, minimizing the number of these operations will yield much faster run-times. This paper develops an approach for the faster and scalable computing of large-size correlation matrices through the full use of available memory and a reduced number of I/O operations. The approach is scalable in the sense that the same algorithms can be executed on different computing platforms with different amounts of memory and can be applied to different problems with different correlation matrix sizes. The significant performance improvement of the approach over the existing approaches is demonstrated through benchmark examples.
"I drove after drinking alcohol" and other risky driving behaviours reported by young novice drivers
Resumo:
Background Volitional risky driving behaviours including drink- and drug-driving and speeding contribute to the overrepresentation of young novice drivers in road crash fatalities, and crash risk is greatest during the first year of independent driving in particular. Aims To compare: 1) the self-reported compliance of drivers with road rules relating to substance-impaired driving and other risky driving behaviours including speeding and driving tired, one year after progression from a Learner to a Provisional (intermediate) licence; and 2) the interrelationships between substance-impaired driving and other risky driving behaviours (crashes, offences, and Police avoidance). Methods 1268 drivers (373 males) aged 17-26 years were surveyed regarding their sociodemographics (age, gender) and self-reported driving behaviours including crashes, offences, Police-avoidance, and driving intentions. Results A relatively small proportion of participants reported driving after taking drugs (5.9% males, 1.3% females) and drinking alcohol (19.3% males, 11.6% females). In comparison, a considerable proportion of participants reported at least occasionally exceeding speed limits (85.7% novices) and driving when tired (82.7% novices). Substance-impaired driving was associated with avoiding Police, speeding, risky driving intentions, and self reported crashes and offences. Forty-four percent of illicit-drug drivers also reported alcohol-impaired driving. Discussion and conclusions The low self-reported prevalence of substance-impaired driving suggests official enforcement measures play a role in promoting compliance, in addition to social influences such as the broader community and the young novice drivers’ social networks including friends and family. Conversely, the prevalence of speeding appears to reflect the pervasive cultural acceptance of this behaviour. Given the interrelationships between the risky driving behaviours, a deeper understanding of influential factors is required to inform targeted and general countermeasure implementation and evaluation during this critical driving period.