228 resultados para Volvo 244 DL.


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Zero valent iron (ZVI) was prepared by reducing natural goethite (NG-ZVI) and synthetic goethite (SG-ZVI) in hydrogen at 550 °C. XRD, TEM, FESEM/EDS and specific surface area (SSA) and pore analyser were used to characterize goethites and reduced goethites. Both NG-ZVI and SG-ZVI with a size of nanoscale to several hundreds of nanometers were obtained by reducing goethites at 550 °C. The reductive capacity of the ZVIs was assessed by removal of Cr(VI) at ambient temperature in comparison with that of commercial iron powder (CIP). The effect of contact time, initial concentration and reaction temperature on Cr(VI) removal was investigated. Furthermore, the uptake mechanism was discussed according to isotherms, thermodynamic analysis and the results of XPS. The results showed that SG-ZVI had the best reductive capacity to Cr(VI) and reduced Cr(VI) to Cr(III). The results suggest that hydrogen reduction is a good approach to prepare ZVI and this type of ZVI is potentially useful in remediating heavy metals as a material of permeable reaction barrier.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this chapter, we discuss four related areas of cryptology, namely, authentication, hashing, message authentication codes (MACs), and digital signatures. These topics represent active and growing research topics in cryptology. Space limitations allow us to concentrate only on the essential aspects of each topic. The bibliography is intended to supplement our survey. We have selected those items which providean overview of the current state of knowledge in the above areas. Authentication deals with the problem of providing assurance to a receiver that a communicated message originates from a particular transmitter, and that the received message has the same content as the transmitted message. A typical authentication scenario occurs in computer networks, where the identity of two communicating entities is established by means of authentication. Hashing is concerned with the problem of providing a relatively short digest–fingerprint of a much longer message or electronic document. A hashing function must satisfy (at least) the critical requirement that the fingerprints of two distinct messages are distinct. Hashing functions have numerous applications in cryptology. They are often used as primitives to construct other cryptographic functions. MACs are symmetric key primitives that provide message integrity against active spoofing by appending a cryptographic checksum to a message that is verifiable only by the intended recipient of the message. Message authentication is one of the most important ways of ensuring the integrity of information that is transferred by electronic means. Digital signatures provide electronic equivalents of handwritten signatures. They preserve the essential features of handwritten signatures and can be used to sign electronic documents. Digital signatures can potentially be used in legal contexts.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this chapter we continue the exposition of crypto topics that was begun in the previous chapter. This chapter covers secret sharing, threshold cryptography, signature schemes, and finally quantum key distribution and quantum cryptography. As in the previous chapter, we have focused only on the essentials of each topic. We have selected in the bibliography a list of representative items, which can be consulted for further details. First we give a synopsis of the topics that are discussed in this chapter. Secret sharing is concerned with the problem of how to distribute a secret among a group of participating individuals, or entities, so that only predesignated collections of individuals are able to recreate the secret by collectively combining the parts of the secret that were allocated to them. There are numerous applications of secret-sharing schemes in practice. One example of secret sharing occurs in banking. For instance, the combination to a vault may be distributed in such a way that only specified collections of employees can open the vault by pooling their portions of the combination. In this way the authority to initiate an action, e.g., the opening of a bank vault, is divided for the purposes of providing security and for added functionality, such as auditing, if required. Threshold cryptography is a relatively recently studied area of cryptography. It deals with situations where the authority to initiate or perform cryptographic operations is distributed among a group of individuals. Many of the standard operations of single-user cryptography have counterparts in threshold cryptography. Signature schemes deal with the problem of generating and verifying electronic) signatures for documents.Asubclass of signature schemes is concerned with the shared-generation and the sharedverification of signatures, where a collaborating group of individuals are required to perform these actions. A new paradigm of security has recently been introduced into cryptography with the emergence of the ideas of quantum key distribution and quantum cryptography. While classical cryptography employs various mathematical techniques to restrict eavesdroppers from learning the contents of encrypted messages, in quantum cryptography the information is protected by the laws of physics.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Early works on Private Information Retrieval (PIR) focused on minimizing the necessary communication overhead. They seemed to achieve this goal but at the expense of query response time. To mitigate this weakness, protocols with secure coprocessors were introduced. They achieve optimal communication complexity and better online processing complexity. Unfortunately, all secure coprocessor-based PIR protocols require heavy periodical preprocessing. In this paper, we propose a new protocol, which is free from the periodical preprocessing while offering the optimal communication complexity and almost optimal online processing complexity. The proposed protocol is proven to be secure.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Database watermarking has received significant research attention in the current decade. Although, almost all watermarking models have been either irreversible (the original relation cannot be restored from the watermarked relation) and/or non-blind (requiring original relation to detect the watermark in watermarked relation). This model has several disadvantages over reversible and blind watermarking (requiring only watermarked relation and secret key from which the watermark is detected and original relation is restored) including inability to identify rightful owner in case of successful secondary watermarking, inability to revert the relation to original data set (required in high precision industries) and requirement to store unmarked relation at a secure secondary storage. To overcome these problems, we propose a watermarking scheme that is reversible as well as blind. We utilize difference expansion on integers to achieve reversibility. The major advantages provided by our scheme are reversibility to high quality original data set, rightful owner identification, resistance against secondary watermarking attacks, and no need to store original database at a secure secondary storage.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: International epidemic clones (ribotypes 027 and 078) of Clostridium difficile have been associated with death, toxic megacolon and other adverse outcomes in North America and Europe. In 2010, the first local transmission of an epidemic strain (027) of C. difficile was reported in the state of Victoria, Australia, but no cases of infection with this strain were reported in the state of Queensland. In 2012, a prevalence study was undertaken in all public and selected private hospitals to examine the epidemiology of CDI and determine the prevalence of epidemic C. difficile strains in Queensland. Methods: Enhanced surveillance was undertaken on all hospital identified CDI cases aged over 2 years between 10 April and 15 June 2012. Where available, patient samples were cultured and isolates of C. difficile ribotyped. The toxin profile of each isolate was determined by PCR. Results: In total, 168 cases of CDI were identified during the study period. A majority (58.3%) of cases had onset of symptoms in hospital. Of the 62 patients with community onset of symptoms, most (74%) had a hospital admission in the previous 3 months. Only 4 of 168 patients had onset of symptoms within a residential care facility. Thirteen out of the 168 (7.7%) patients included in the study had severe disease (ICU admission and/or death within 30 days of onset). Overall 136/168 (81%) of cases had been prescribed antibiotics in the last month. Of concern was the emergence of a novel ribotype (244) which has recently been described in other parts of Australia and is genetically related to ribotype 027. Seven patients were infected with C. difficile ribotype 244 (8% of 83 samples ribotyped), including one patient requiring ICU admission and one patient who died. Ribotype 244 was tcdA, tcdB and CDT positive and contained a tcdC mutation at position 117. Conclusion: Ongoing surveillance is required to determine the origin and epidemiology of C. difficile ribotype 244 infections in Australia.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper we describe the design of DNA Jewellery, which is a wearable tangible data representation of personal DNA profile data. An iterative design process was followed to develop a 3D form-language that could be mapped to standard DNA profile data, with the aim of retaining readability of data while also producing an aesthetically pleasing and unique result in the area of personalized design. The work explores design issues with the production of data tangibles, contributes to a growing body of research exploring tangible representations of data and highlights the importance of approaches that move between technology, art and design.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In many cities around the world, surveillance by a pervasive net of CCTV cameras is a common phenomenon in an attempt to uphold safety and security across the urban environment. Video footage is being recorded and stored, sometimes live feeds are being watched in control rooms hidden from public access and view. In this study, we were inspired by Steve Mann’s original work on sousveillance (surveillance from below) to examine how a network of camera equipped urban screens could allow the residents of Oulu in Finland to collaborate on the safekeeping of their city. An agile, rapid prototyping process led to the design, implementation and ‘in the wild’ deployment of the UbiOpticon screen application. Live video streams captured by web cams integrated at the top of 12 distributed urban screens were broadcast and displayed in a matrix arrangement on all screens. The matrix also included live video streams of two roaming mobile phone cameras. In our field study we explored the reactions of passers-by and users of this screen application that seeks to inverse Bentham’s original panopticon by allowing the watched to be watchers at the same time. In addition to the original goal of participatory sousveillance, the system’s live video feature sparked fun and novel user-led apprlopriations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Falling prices have led to an ongoing spread of public displays in urban areas. Still, they mostly show passive content such as commercials and digital signage. At the same time, technological advances have enabled the creation of interactive displays potentially increasing their attractiveness for the audience, e.g. through providing a platform for civic discourse. This poses considerable challenges, since displays need to communicate the opportunity to engage, motivate the audience to do so, and be easy to use. In this paper we present Vote With Your Feet, a hyperlocal public polling tool for urban screens allowing users to express their opinions. Similar to vox populi interviews on TV or polls on news websites, the tool is meant to reflect the mindset of the community on topics such as current affairs, cultural identity and local matters. It is novel in that it focuses on a situated civic discourse and provides a tangible user interface, tackling the mentioned challenges. It shows one Yes/No question at a time and enables users to vote by stepping on one of two tangible buttons on the ground. This user interface was introduced to attract people’s attention and to lower participation barriers. Our field study showed that Vote With Your Feet is perceived as inviting and that it can spark discussions among co-located people.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Companies use business process models to represent their working procedures in order to deploy services to markets, to analyze them, and to improve upon them. Competitive markets necessitate complex procedures, which lead to large process specifications with sophisticated structures. Real world process models can often incorporate hundreds of modeling constructs. While a large degree of detail complicates the comprehension of the processes, it is essential to many analysis tasks. This paper presents a technique to abstract, i.e., to simplify process models. Given a detailed model, we introduce abstraction rules which generalize process fragments in order to bring the model to a higher abstraction level. The approach is suited for the abstraction of large process specifications in order to aid model comprehension as well as decomposing problems of process model analysis. The work is based on process structure trees that have recently been introduced to the field of business process management.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper we describe the use and evaluation of CubIT, a multi-user, very large-scale presentation and collaboration framework. CubIT is installed at the Queensland University of Technology’s (QUT) Cube facility. The “Cube” is an interactive visualisation facility made up of five very large-scale interactive multi-panel wall displays, each consisting of up to twelve 55-inch multi-touch screens (48 screens in total) and massive projected display screens situated above the display panels. The paper outlines the unique design challenges, features, use and evaluation of CubIT. The system was built to make the Cube facility accessible to QUT’s academic and student population. CubIT enables users to easily upload and share their own media content, and allows multiple users to simultaneously interact with the Cube’s wall displays. The features of CubIT are implemented via three user interfaces, a multi-touch interface working on the wall displays, a mobile phone and tablet application and a web-based content management system. The evaluation reveals issues around the public use and functional scope of the system.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Changes in the construction sector are creating opportunities in research to maximise the benefits of those changes and to continue the exciting developments in improved people skills, new processes and developing technologies. Many research centres around the world are investigating aspects of the current changes to drive their particular expertise forward. However, the CIB Integrated Design and Delivery Solutions (IDDS) priority research theme takes a higher-level view of the changes and then focuses down on a prioritised set of research targets. These targets have been investigated, re-focussed and validated over a period of four years through many workshops, conferences and meetings by a wide ranging group of representatives from approximately 90 industry and research organisations. The outcomes of such research, once put into practice should be significantly shortened timespans from conception of need to occupation of new or revised structures. As time is money, the owners will get their investments into productive use sooner, which means a shorter payback time. In addition, there will inevitably be a reduction in construction costs as productivity increases. The improvements in reliable delivery and improved quality currently being seen in relatively simplistic use of Building information Modelling (BIM) (compared to full IDDS) will inevitably continue its on-going trajectory of improvement. We should also consider the wider economic contribution to society that will stem from such improvements and, finally, and by no means unimportantly, the reliable modelling and delivery of sustainability at both the building and estate/ area scale will significantly improve carbon footprints and other sustainable outcomes. Whilst there are huge opportunities for early adopters, the primary risk will be the expansion of the gap between those working in this way and those who are not so advanced or who even refuse to progress . The opportunities to address the significant and widely varying wastes within the structure of the construction sector and within and across projects are huge and timely and industry is encouraged to become involved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Changes in the construction sector are creating opportunities in research to maximise the benefits of those changes and to continue the exciting developments in improved people skills, new processes and developing technologies. There are many research centres around the world investigating aspects of the current changes to drive their particular expertise forward. However, the CIB Integrated Design and Delivery Solutions (IDDS) priority research theme takes a higher-level view of the changes and then focuses down on a prioritised set of research targets. These targets have been investigated, re-focussed and validated over a period of four years through many workshops, conferences and meetings by a wide ranging group of representatives from approximately 90 industry and research organisations. This roadmap prioritises and details the research to be performed, why and by whom. In particular, some 25 CIB Working Commissions and Task Groups are explained as having potential roles in the delivery of this research theme. We are extremely privileged to have been urged on by such distinguished construction professionals in their forewords and the case for research. The outcomes of such research, once put into practice should be significantly shortened timespans from conception of need to occupation of new or revised structures. As time is money, the owners will get their investments into productive use sooner, which means a shorter payback time. In addition, there will inevitably be a reduction in construction costs as productivity increases. The improvements in reliable delivery and improved quality currently being seen in relatively simplistic use of Building information Modelling (BIM) (compared to full IDDS) will inevitably continue its on-going trajectory of improvement. We should also consider the wider economic contribution to society that will stem from such improvements and, finally, and by no means unimportantly, the reliable modelling and delivery of sustainability at both the building and estate/ area scale will significantly improve carbon footprints and other sustainable outcomes. Whilst there are huge opportunities for early adopters, the primary risk will be the expansion of the gap between those working in this way and those who are not so advanced or who even refuse to progress1. However, a similar issue arises between industry, clients, educators and trainers; the latter have particular challenges, having existed for many years in a sector that has had relatively few technological changes. However, the opportunities to address the significant and widely varying wastes within the structure of the construction sector and within and across projects are huge and timely. Whilst this Roadmap is specifically targeted at the Standing Commissions and Task Groups of the CIB, it is hoped that there are elements for research and applied research across academia and industry.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Introduction This study investigates uncertainties pertaining to the use of optically stimulated luminescence dosimeters (OSLDs) in radiotherapy dosimetry. The sensitivity of the luminescent material is related to the density of recombination centres [1], which is in the range of 1015–1016 cm-3. Because of this non-uniform distribution of traps in crystal growth the sensitivity varies substantially within a batch of dosimeters. However, a quantitative understanding of the relationship between the response of an OSLD and its sensitive volume has not yet been investigated or reported in literature. Methods In this work, OSLDs are scanned with a MicroCT scanner to determine potential sources for the variation in relative sensitivity across a selection of Landauer nanoDot dosimeters. Specifically, the correlation between a dosimeters relative sensitivity and the loading density of Al2O3:C powder was determined. Results When extrapolating the sensitive volume’s radiodensity from the CT data, it was shown that there is a non-uniform distribution incrystal growth as illustrated in Fig. 1. A plot of voxel count versus the element-specific correction factor is shown in Fig. 2 where each point represents a single OSLD. A line was fitted which has an R2-value of 0.69 and a P-value of 8.21 9 10-19. This data shows that the response of a dosimeter decreases proportionally with sensitive volume. Extrapolating from this data, a quantitative relationship between response and sensitive volume was roughly determined for this batch of dosimeters. A change in volume of 1.176 9 10-5 cm3 corresponds to a 1 % change in response. In other words, a 0.05 % change in the nominal volume of the chip would result in a 1 % change in response. Discussion and conclusions This work demonstrated that the amount of sensitive material is approximately linked to the total correction factor. Furthermore, the ‘true’ volume of an OSLD’s sensitive material is, on average, 17.90 % less than that which has been reported in literature, mainly due to the presence of air cavities in the material’s structure. Finally, the potential effects of the inaccuracy of Al2O3:C deposition increases with decreasing chip size. If a luminescent dosimeter were manufactured with a smaller volume than currently employed using the same manufacturing protocol, the variation in response from chip to chip would more than likely exceed the current 5 % range.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Social media tools are starting to become mainstream and those working in the software development industry are often ahead of the game in terms of using current technological innovations to improve their work. With the advent of outsourcing and distributed teams the software industry is ideally placed to take advantage of social media technologies, tools and environments. This paper looks at how social media is being used by early adopters within the software development industry. Current tools and trends in social media tool use are described and critiqued: what works and what doesn't. We use industrial case studies from platform development, commercial application development and government contexts which provide a clear picture of the emergent state of the art. These real world experiences are then used to show how working collaboratively in geographically dispersed teams, enabled by social media, can enhance and improve the development experience.