240 resultados para job sharing
Resumo:
The effects of suspension parameters and driving conditions on dynamic load-sharing of longitudinal-connected air suspensions of a tri-axle semi-trailer are investigated in this study. A novel nonlinear model of a multi-axle semi-trailer with longitudinal-connected air suspensions is formulated based on fluid mechanics and thermodynamics and validated through test results. The effects of road surface conditions, driving speeds, air line inside diameter and connector inside diameter on dynamic load-sharing capability of the semi-trailer were analyzed in terms of load-sharing criteria. Simulation results indicate that, when larger air lines and connectors are employed, the DLSC (Dynamic Load-Sharing Coefficient) optimization ratio reaches its peak value when the road roughness is medium. The optimization ratio fluctuates in a complex manner as driving speed increases. The results also indicate that if the air line inside diameter is always assumed to be larger than the connector inside diameter, the influence of air line inside diameter on load-sharing is more significant than that of the connector inside diameter. The proposed approach can be used for further study of the influence of additional factors (such as vehicle load, static absolute air pressure and static height of air spring) on load-sharing and the control methods for multi-axle air suspensions with longitudinal air line.
Resumo:
This paper provides details on comparative testing of axle-to-chassis forces of two heavy vehicles (HVs) based on an experimental programme carried out in 2007. Dynamic forces at the air springs were measured against speed and roughness values for the test roads used. One goal of that programme was to determine whether dynamic axle-to-chassis forces could be reduced by using larger-than-standard diameter longitudinal air lines. This paper presents a portion of the methodology, analysis and results from that programme. Two analytical techniques and their results are presented. The first uses correlation coefficients of the forces between air springs and the second is a student’s t-test. These were used to determine the causality surrounding improved dynamic load sharing between heavy vehicle air springs with larger air lines installed longitudinally compared with the standard sized air lines installed on the majority of air-sprung heavy vehicles.
Resumo:
One in five Australian workers believes that work doesn’t fit well with their family and social commitments. Concurrently, organisations are recognising that to stay competitive they need policies and practices that support the multiple aspects of employees’ lives. Many employees work in group environments yet there is currently little group level work-life balance research. This paper proposes a new theoretical framework developed to understand the design of work groups to better facilitate work-life balance. This new framework focuses on task and relational job designs, group structures and processes and workplace culture.
Resumo:
Largely as a result of mass unemployment problems in many European countries, the dynamics of job creation has in recent years attracted increased interest on the part of academics as well as policy-makers. In connection to this, a large number of studies carried out in various countries have concluded that SMEs play a very large and/or growing role as job creators (Birch, 1979; Baldwin and Picot, 1995; Davidsson, 1995a; Davidsson, Lindmark and Olofsson, 1993; 1994; 1995; 1997a; 1997b; Fumagelli and Mussati, 1993; Kirchhoff and Phillips, 1988; Spilling, 1995; for further reference to studies carried out in a large number of countries see also Aiginger and Tichy, 1991; ENSR, 1994; Loveman and Sengenberger, 1991; OECD, 1987; Storey and Johnson, 1987). While most researchers agree on the importance of SMEs, there is some controversy as regards whether this is mainly a result of many small start-ups and incremental expansions, or if a small minority of high growth SMEs contribute the lion’s share of new employment. This is known as the ‘mice vs. gazelles’ or ‘flyers vs. trundlers’ debate. Storey strongly advocates the position that the small group of high growth SMEs are the ‘real’ job creators (Storey, 1994; Storey & Johnson, 1987), whereas, e.g., the Davidsson et al research in Sweden (cf. above) gives more support for the ‘mice’ hypothesis.
Resumo:
A significant minority of young job-seekers remain unemployed for many months, and are at risk of developing depression. Both empirical studies and theoretical models suggest that cognitive, behavioural and social isolation factors interact to increase this risk. Thus, interventions that reduce or prevent depression in young unemployed job-seekers by boosting their resilience are required. Mobile phones may be an effective medium to deliver resilience-boosting support to young unemployed people by using SMS messages to interrupt the feedback loop of depression and social isolation. Three focus groups were conducted to explore young unemployed job-seekers’ attitudes to receiving and requesting regular SMS messages that would help them to feel supported and motivated while job-seeking. Participants reacted favourably to this proposal, and thought that it would be useful to continue to receive and request SMS messages for a few months after commencing employment as well.
Resumo:
The value of tertiary journalism education is an often hotly-debated topic among journalism educators and in the industry. Yet, the voices of students are often not heard in these debates. For example, we know relatively little about why young people actually decide to study journalism, what area of journalism they want to work in and what they are looking for in a job. To shed more light on the student perspective, this paper reports on a survey of 320 undergraduate journalism students at six Australian universities. The results show that only a minority actually want to work in news journalism, while most prefer entertainment-focussed areas. Students are motivated mainly by a love for writing and because they like journalism as a profession. In terms of job characteristics, they are particularly interested in their own career progression, but also in the extent to which they can provide a public service.
Resumo:
A microgrid may contain a large number of distributed generators (DGs). These DGs can be either inertial or non-inertial, either dispatchable or non-dispatchable. Moreover, the DGs may operate in plug and play fashion. The combination of these various types of operation makes the microgrid control a challenging task, especially when the microgrid operates in an autonomous mode. In this paper, a new control algorithm for converter interfaced (dispatchable) DG is proposed which facilitates smooth operation in a hybrid microgrid containing inertial and non-inertial DGs. The control algorithm works satisfactorily even when some of the DGs operate in plug and play mode. The proposed strategy is validated through PSCAD simulation studies.
Resumo:
Introduction In a connected world youth are participating in digital content creating communities. This paper introduces a description of teens' information practices in digital content creating and sharing communities. Method The research design was a constructivist grounded theory methodology. Seventeen interviews with eleven teens were collected and observation of their digital communities occurred over a two-year period. Analysis The data were analysed iteratively to describe teens' interactions with information through open and then focused coding. Emergent categories were shared with participants to confirm conceptual categories. Focused coding provided connections between conceptual categories resulting in the theory, which was also shared with participants for feedback. Results The paper posits a substantive theory of teens' information practices as they create and share content. It highlights that teens engage in the information actions of accessing, evaluating, and using information. They experienced information in five ways: participation, information, collaboration, process, and artefact. The intersection of enacting information actions and experiences of information resulted in five information practices: learning community, negotiating aesthetic, negotiating control, negotiating capacity, and representing knowledge. Conclusion This study contributes to our understanding of youth information actions, experiences, and practices. Further research into these communities might indicate what information practices are foundational to digital communities.
Resumo:
This paper demonstrates power management and control of DERs in an autonomous MG. The paper focuses on the control and performance of converter-interfaced DERs in voltage controlled mode. Several case studies are considered for a MG based on the different types of loads supplied by the MG (i.e. balanced three-phase, unbalanced, single-phase and harmonic loads). DERs are controlled by adjusting the voltage magnitude and angle in their converter output through droop control, in a decentralized concept. Based on this control method, DERs can successfully share the total demand of the MG in the presence of any type of loads. This includes proper total power sharing, unbalanced power sharing as well as harmonic power sharing, depending on the load types. The efficacy of the proposed power control, sharing and management among DERs in a microgrid is validated through extensive simulation studies using PSCAD/EMTDC.
Resumo:
Tacit knowledge sharing amongst physicians is known to have a significant impact on the quality of medical decisions. This thesis posits that social media can provide new opportunities for tacit knowledge sharing amongst physicians, and demonstrates this by presenting findings from a review of relevant literature and a qualitative survey conducted with physicians. Using thematic analysis, the study revealed five major themes and over twenty sub-themes as potential contributions of social media to tacit knowledge flow amongst physicians.
Resumo:
We propose to use a simple and effective way to achieve secure quantum direct secret sharing. The proposed scheme uses the properties of fountain codes to allow a realization of the physical conditions necessary for the implementation of no-cloning principle for eavesdropping-check and authentication. In our scheme, to achieve a variety of security purposes, nonorthogonal state particles are inserted in the transmitted sequence carrying the secret shares to disorder it. However, the positions of the inserted nonorthogonal state particles are not announced directly, but are obtained by sending degrees and positions of a sequence that are pre-shared between Alice and each Bob. Moreover, they can confirm that whether there exists an eavesdropper without exchanging classical messages. Most importantly, without knowing the positions of the inserted nonorthogonal state particles and the sequence constituted by the first particles from every EPR pair, the proposed scheme is shown to be secure.
Resumo:
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive adversary indicate that every n-variate function can be computed by n participants, such that no set of size t < n/2 participants learns any additional information other than what they could derive from their private inputs and the output of the protocol. We study unconditionally secure MPC protocols in the presence of a passive adversary in the trusted setup (‘semi-ideal’) model, in which the participants are supplied with some auxiliary information (which is random and independent from the participant inputs) ahead of the protocol execution (such information can be purchased as a “commodity” well before a run of the protocol). We present a new MPC protocol in the trusted setup model, which allows the adversary to corrupt an arbitrary number t < n of participants. Our protocol makes use of a novel subprotocol for converting an additive secret sharing over a field to a multiplicative secret sharing, and can be used to securely evaluate any n-variate polynomial G over a field F, with inputs restricted to non-zero elements of F. The communication complexity of our protocol is O(ℓ · n 2) field elements, where ℓ is the number of non-linear monomials in G. Previous protocols in the trusted setup model require communication proportional to the number of multiplications in an arithmetic circuit for G; thus, our protocol may offer savings over previous protocols for functions with a small number of monomials but a large number of multiplications.
Resumo:
The purpose of this paper is to describe a new decomposition construction for perfect secret sharing schemes with graph access structures. The previous decomposition construction proposed by Stinson is a recursive method that uses small secret sharing schemes as building blocks in the construction of larger schemes. When the Stinson method is applied to the graph access structures, the number of such “small” schemes is typically exponential in the number of the participants, resulting in an exponential algorithm. Our method has the same flavor as the Stinson decomposition construction; however, the linear programming problem involved in the construction is formulated in such a way that the number of “small” schemes is polynomial in the size of the participants, which in turn gives rise to a polynomial time construction. We also show that if we apply the Stinson construction to the “small” schemes arising from our new construction, both have the same information rate.
Resumo:
We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution) phase, without further communication between the dealer and the shareholders. Previous solutions to this problem require one to start off with a nonstandard scheme designed specifically for this purpose, or to have communication between shareholders. In contrast, we show how to increase the threshold parameter of the standard Shamir secret-sharing scheme without communication between the shareholders. Our technique can thus be applied to existing Shamir schemes even if they were set up without consideration to future threshold increases. Our method is a new positive cryptographic application for lattice reduction algorithms, inspired by recent work on lattice-based list decoding of Reed-Solomon codes with noise bounded in the Lee norm. We use fundamental results from the theory of lattices (geometry of numbers) to prove quantitative statements about the information-theoretic security of our construction. These lattice-based security proof techniques may be of independent interest.