219 resultados para Dam-break
Resumo:
A comprehensive literature review has been undertaken exploring the stressors placed on the personal relationships of Australian Army personnel, through service life and also overseas deployments. This work is the first step in a program of research aimed at developing a screening tool, aimed at acting as an early warning system to enable the right assistance to be given to affected personnel at the earliest possible time. It is envisioned that this tool will be utilised by the day-to-day managers of Australian Army personnel, of whom the vast majority are not health practitioners. This review has identified the commonalities of relationships that last through service life and/or deployments, and those that fail. These factors are those which will aid the development of the screening tool, and enable the early identification of Australian Army personnel who are at risk of having their personal relationship break down. Several of the known relationship stressors are relevant to other ‘high intensity’ professions, such as paramedics. Personal experience as an Army Officer has helped to highlight the importance of this research, and the benefits of developing a tool tailored to the unique social microclimate that is the Australian Army are clear. This research is, to the author’s knowledge, unique in the Australian context.
Resumo:
Train pedestrian collisions are the most likely to result in severe injuries and fatalities when compared to other types of rail crossing accidents. However, there is currently scant research that has examined the origins of pedestrians’ rule breaking at level crossings. As a result, this study examined the origins of pedestrians’ rule breaking behaviour at crossings, with particular emphasis directed towards examining the factors associated with making errors versus deliberation violations. A total of 636 individuals volunteered to participate in the study and completed either an online or paper version of the questionnaire. Quantitative analysis of the data revealed that knowledge regarding crossing rules was high, although up to 18% of level crossing users were either unsure or did not know (in some circumstances) when it was legal to cross at a level crossing. Furthermore, 156 participants (24.52%) reported having intentionally violated the rules at level crossings and 3.46% (n = 22) of the sample had previously made a mistake at a crossing. In regards to rule violators, males (particularly minors) were more likely to report breaking rules, and the most frequent occurrence was after the train had passed rather than before it arrives. Regression analysis revealed that males who frequently use pedestrian crossings and report higher sensation seeking traits are most likely to break the rules. This research provides evidence that pedestrians are more likely to deliberately violate rules (rather than make errors) at crossings and it illuminates high risk groups. This paper will further outline the study findings in regards to the development of countermeasures as well as provide direction for future research efforts in this area.
Resumo:
1.Description of the Work The Fleet Store was devised as a creative output to establish an exhibition linked to a fashion business model where emerging designers were encouraged to research new and innovative strategies for creating design-driven and commercial collections for a public consumer. This was a project that was devised to break down the perceptions of emerging fashion designers that designing commercial collections linked to a sustainable business model is a boring and unnecessary process. The focus was to demystify the business of fashion and to link its importance to a design-driven and public outcome that is more familiar to fashion designers. The criterion for participation was that all designers had to be registered as a business with the Australian Taxation Office. Designers were chosen from the Creative Enterprise Australia Fashion Business Incubator, the QUT fashion graduate alumni and current QUT fashion design and double degree (fashion and business) students with existing businesses. The project evolved from a series of collaborative workshops where designers were introduced to new and innovative creative industries’ business models and the processes, costings and timings involved to create a niche, sustainable business for a public exhibition of design-driven commercial collections. All designers initiated their own business infra-structure but were then introduced to the concept of collaboration for successful and profitable exhibition and business outcomes. Collaborative strategies such as crowd funding, crowd sourcing, peer to peer mentoring and manufacturing were all researched, and strategies for the establishment of the retail exhibition were all devised in a collaborative environment. All participants also took on roles outside their ‘designer’ background to create a retail exhibition that was creative but also had critical mass and aesthetic for the consumer. The Fleet Store ‘popped up’ for 2 weeks (10 days), in a heritage-listed building in an inner city location. Passers-by were important, but the main consumer was enlisted by the use of interest and investment from crowd sourcing, crowd funding, ethical marketing, corporate social responsibility projects and collaborative public relations and social media strategies. The research has furthered discussion on innovative strategies for emerging fashion designers to initiate and maintain sustainable businesses and suggests that collaboration combined with a design-driven and business focus can create a sustainable and economically viable retail exhibition. 2. Research Statement Research Background The research field involved developing a new ethical, design-driven, collaborative and sustainable model for fashion design practice and management. The research asked can a public, design-driven, collaborative retail exhibition create a platform for promoting creative, innovative and sustainable business models for emerging fashion designers. The methodology was primarily practice-led as all participants were designers in their own right and the project manager acted as a mentor and curator to guide the process and analyse the potential of the research question. The Fleet Store offers new knowledge in design practice and management; with the creation of a model where design outcomes and business models are inextricably linked to the success of the creative output. Key innovations include extending the commercialisation of emerging fashion businesses by creating a curated retail gallery for collaborative and sustainable strategies to support niche fashion designer labels. This has contributed to a broader conversation on how to nurture and sustain competitive Australian fashion designers/labels. Research Contribution and Significance The Fleet Store has contributed to a growing body of research into innovative and sustainable business models for niche fashion and creative industries’ practitioners. All participants have maintained their business infra-structure and many are currently growing their businesses, using the strategies tested for the Fleet Store. The exhibition space was visited by over 1,000 people and sales of $27,000 were made in 10 days of opening. (Follow up sales of $3,000 has also been reported.) Three of the designers were ‘discovered’ from the exhibition and have received substantial orders from high profile national buyers and retailers for next season delivery. Several participants have since collaborated to create other pop up retail environments and are now mentoring other emerging designers on the significance of a collaborative retail exhibition to consolidate niche business models for emerging fashion designers.
Resumo:
The NLM stream cipher designed by Hoon Jae Lee, Sang Min Sung, Hyeong Rag Kim is a strengthened version of the LM summation generator that combines linear and non-linear feedback shift registers. In recent works, the NLM cipher has been used for message authentication in lightweight communication over wireless sensor networks and for RFID authentication protocols. The work analyses the security of the NLM stream cipher and the NLM-MAC scheme that is built on the top of the NLM cipher. We first show that the NLM cipher suffers from two major weaknesses that lead to key recovery and forgery attacks. We prove the internal state of the NLM cipher can be recovered with time complexity about nlog7×2, where the total length of internal state is 2⋅n+22⋅n+2 bits. The attack needs about n2n2 key-stream bits. We also show adversary is able to forge any MAC tag very efficiently by having only one pair (MAC tag, ciphertext). The proposed attacks are practical and break the scheme with a negligible error probability.
Resumo:
Water to air methane emissions from freshwater reservoirs can be dominated by sediment bubbling (ebullitive) events. Previous work to quantify methane bubbling from a number of Australian sub-tropical reservoirs has shown that this can contribute as much as 95% of total emissions. These bubbling events are controlled by a variety of different factors including water depth, surface and internal waves, wind seiching, atmospheric pressure changes and water levels changes. Key to quantifying the magnitude of this emission pathway is estimating both the bubbling rate as well as the areal extent of bubbling. Both bubbling rate and areal extent are seldom constant and require persistent monitoring over extended time periods before true estimates can be generated. In this paper we present a novel system for persistent monitoring of both bubbling rate and areal extent using multiple robotic surface chambers and adaptive sampling (grazing) algorithms to automate the quantification process. Individual chambers are self-propelled and guided and communicate between each other without the need for supervised control. They can maintain station at a sampling site for a desired incubation period and continuously monitor, record and report fluxes during the incubation. To exploit the methane sensor detection capabilities, the chamber can be automatically lowered to decrease the head-space and increase concentration. The grazing algorithms assign a hierarchical order to chambers within a preselected zone. Chambers then converge on the individual recording the highest 15 minute bubbling rate. Individuals maintain a specified distance apart from each other during each sampling period before all individuals are then required to move to different locations based on a sampling algorithm (systematic or adaptive) exploiting prior measurements. This system has been field tested on a large-scale subtropical reservoir, Little Nerang Dam, and over monthly timescales. Using this technique, localised bubbling zones on the water storage were found to produce over 50,000 mg m-2 d-1 and the areal extent ranged from 1.8 to 7% of the total reservoir area. The drivers behind these changes as well as lessons learnt from the system implementation are presented. This system exploits relatively cheap materials, sensing and computing and can be applied to a wide variety of aquatic and terrestrial systems.
Resumo:
In this paper, Bree Hadley discusses The Ex/centric Fixations Project, a practice-led research project which explores the inadequacy of language as a technology for expressing human experiences of difference, discrimination or marginalisation within mainstream cultures. The project asks questions about the way experience, memory and the public discourses available to express them are bound together, about the silences, failures and falsehoods embedded in any effort to convey human experience via public discourses, and about how these failures might form the basis of a performative writing method. It has, to date, focused on developing a method that expresses experience through improvised, intertextual and discontinous collages of language drawn from a variety of public discourses. Aesthetically, this method works with what Hans Theis Lehmann (Postdramatic Theatre p. 17) calls a “textual variant” of the postdramatic “in which language appears not as the speech of characters – if there are still definable characters at all – but as an autonomous theatricality” (Ibid. 18). It is defined by what Lehmann, following Julia Kristeva, calls a “polylogue”, which presents experience as a conflicted, discontinuous and circular phenomenon, akin to a musical fugue, to break away from “an order centred on one logos” (Ibid. 32). The texts function simultaneously as a series of parts, and as wholes, interwoven voices seeming almost to connect, almost to respond to each other, and almost to tell – or challenging each other’s telling – of a story. In this paper, Hadley offers a performative demonstration, together with descriptions of the way spectators respond, including the way their playful, polyvocal texture impacts on engagement, and the way the presence or non-presence of performing bodies to which the experiences depicted can be attached impacts on engagement. She suggests that the improvised, intertextual and experimental enactments of self embodied in the texts encourage spectators to engage at an emotional level, and make-meaning based primarily on memories they recall in the moment, and thus has the potential to counter the risk that people may read depictions of experiences radically different from their own in reductive, essentialised ways.
Resumo:
This project investigates the integration of Information Communication Technologies (ICTs) into educational settings by closely looking at the uptake of the perceived affordances offered by ICTs by students enrolled in a French language course at Queensland University of Technology. This cross-disciplinary research uses the theoretical concepts of: Ecological Psychology (Gibson, 1979; Good, 2007; Reed, 1996); Ecological Linguistics (Greeno, 1994; Leather & van Dam, 2003; van Lier 2000, 2003, 2004a, 2004b); Design (Norman, 1988, 1999); Software Design/ Human-Computer Interaction (Hartson, 2003; McGrenere & Ho, 2000); Learning Design (Conole & Dyke, 2004a, 2004b; Laurillard et al. 2000;); Education (Kirschner, 2002; Salomon, 1993; Wijekumar et al., 2006) and Educational Psychology (Greeno, 1994). In order to investigate this subject, the following research questions, rooted in the theoretical foundations of the thesis, were formulated: (1) What are the learners’ attitudes towards the ICT tools used in the project?; (2) What are the affordances offered by ICTs used in a specific French language course at university level from the perspective of the teacher and from the perspective of language learners?; (3) What affordances offered by ICT tools used by the teacher within the specific teaching and learning environment have been taken up by learners?; and (4) What factors influence the uptake by learners of the affordances created by ICT tools used by the teacher within the specific teaching and learning environment? The teaching phase of this project, conducted between 2006 and 2008, used Action Research procedures (Hopkins, 2002; McNiff & Whitehead, 2002; van Lier 1994) as a research framework. The data were collected using the following combination of qualitative and quantitative methods: (1) questionnaires administered to students (Hopkins, 2002; McNiff & Whitehead, 2002) using Likert-scale questions, open questions, yes/no questions; (2) partnership classroom observations of research participants conducted by Research Participant Advocates (Hopkins, 2002; McNiff & Whitehead, 2002); and (3) a focus group with volunteering students who participated in the unit (semi-structured interview) (Hopkins, 2002; McNiff & Whitehead, 2002). The data analysis confirms the importance of a careful examination of the teaching and learning environment and reveals differences in the ways in which the opportunities for an action offered by the ICTs were perceived by teacher and students, which impacted on the uptake of affordances. The author applied the model of affordance, as described by Good (2007), to explain these differences and to investigate their consequences. In conclusion, the teacher-researcher considers that the discrepancies in perceiving the affordances result from the disparities between the frames of reference and the functional contexts of the teacher-researcher and students. Based on the results of the data analysis, a series of recommendations is formulated supporting calls for careful analysis of frames of reference and the functional contexts of all participants in the learning and teaching process. The author also suggests a modified model of affordance, outlining the important characteristics of its constituents.
Resumo:
A curvilinear thin film model is used to simulate the motion of droplets on a virtual leaf surface, with a view to better understand the retention of agricultural sprays on plants. The governing model, adapted from Roy et al. (2002 J. Fluid Mech. 454, 235–261) with the addition of a disjoining pressure term, describes the gravity- and curvature driven flow of a small droplet on a complex substrate: a cotton leaf reconstructed from digitized scan data. Coalescence is the key mechanism behind spray coating of foliage, and our simulations demonstrate that various experimentally observed coalescence behaviours can be reproduced qualitatively. By varying the contact angle over the domain, we also demonstrate that the presence of a chemical defect can act as an obstacle to the droplet’s path, causing break-up. In simulations on the virtual leaf, it is found that the movement of a typical spray size droplet is driven almost exclusively by substrate curvature gradients. It is not until droplet mass is sufficiently increased via coalescence that gravity becomes the dominating force.
Resumo:
What do you with a teenager that no high school in Queensland wants sitting in its classrooms? A child that's disruptive, violent, who won't turn up? Who, it seems, the system has given up on? Any police officer, or child welfare worker will tell you what's likely to happen... a story with an unhappy ending, usually involving brushes with the law and then jail. But a unique project being run in Brisbane is trying to break that cycle.
Resumo:
In 2005, Ginger Myles and Hongxia Jin proposed a software watermarking scheme based on converting jump instructions or unconditional branch statements (UBSs) by calls to a fingerprint branch function (FBF) that computes the correct target address of the UBS as a function of the generated fingerprint and integrity check. If the program is tampered with, the fingerprint and integrity checks change and the target address will not be computed correctly. In this paper, we present an attack based on tracking stack pointer modifications to break the scheme and provide implementation details. The key element of the attack is to remove the fingerprint and integrity check generating code from the program after disassociating the target address from the fingerprint and integrity value. Using the debugging tools that give vast control to the attacker to track stack pointer operations, we perform both subtractive and watermark replacement attacks. The major steps in the attack are automated resulting in a fast and low-cost attack.
Resumo:
Christmas has come early for copyright owners in Australia. The film company, Roadshow, the pay television company Foxtel, and Rupert Murdoch's News Corp and News Limited--as well as copyright industries--have been clamoring for new copyright powers and remedies. In the summer break, the Coalition Government has responded to such entreaties from its industry supporters and donors, with a new package of copyright laws and policies. There has been significant debate over the proposals between the odd couple of Attorney-General George Brandis and the Minister for Communications, Malcolm Turnbull. There have been deep, philosophical differences between the two Ministers over the copyright agenda. The Attorney-General George Brandis has supported a model of copyright maximalism, with strong rights and remedies for the copyright empires in film, television, and publishing. He has shown little empathy for the information technology companies of the digital economy. The Attorney-General has been impatient to press ahead with a copyright regime. The Minister for Communications, Malcolm Turnbull, has been somewhat more circumspect, recognizing that there is a need to ensure that copyright laws do not adversely impact upon competition in the digital economy. The final proposal is a somewhat awkward compromise between the discipline-and-punish regime preferred by Brandis, and the responsive regulation model favored by Turnbull. In his new book, Information Doesn't Want to Be Free: Laws for the Internet Age, Cory Doctorow has some sage advice for copyright owners: Things that don't make money: Complaining about piracy. Calling your customers thieves. Treating your customers like thieves. In this context, the push by copyright owners and the Coalition Government to have a copyright crackdown may well be counter-productive to their interests.
Resumo:
Everything revolves around desiring-machines and the production of desire… Schizoanalysis merely asks what are the machinic, social and technical indices on a socius that open to desiring-machines (Deleuze & Guattari, 1983, pp. 380-381). Achievement tests like NAPLAN are fairly recent, yet common, education policy initiatives in much of the Western world. They intersect with, use and change pre-existing logics of education, teaching and learning. There has been much written about the form and function of these tests, the ‘stakes’ involved and the effects of their practice. This paper adopts a different “angle of vision” to ask what ‘opens’ education to these regimes of testing(Roy, 2008)? This paper builds on previous analyses of NAPLAN as a modulating machine, or a machine characterised by the increased intensity of connections and couplings. One affect can be “an existential disquiet” as “disciplinary subjects attempt to force coherence onto a disintegrating narrative of self”(Thompson & Cook, 2012, p. 576). Desire operates at all levels of the education assemblage, however our argument is that achievement testing manifests desire as ‘lack’; seen in the desire for improved results, the desire for increased control, the desire for freedom, the desire for acceptance to name a few. For Deleuze and Guattari desire is irreducible to lack, instead desire is productive. As a productive assemblage, education machines operationalise and produce through desire; “Desire is a machine, and the object of the desire is another machine connected to it”(Deleuze & Guattari, 1983, p. 26). This intersection is complexified by the strata at which they occur, the molar and molecular connections and flows they make possible. Our argument is that when attention is paid to the macro and micro connections, the machines built and disassembled as a result of high-stakes testing, a map is constructed that outlines possibilities, desires and blockages within the education assemblage. This schizoanalytic cartography suggests a new analysis of these ‘axioms’ of testing and accountability. It follows the flows and disruptions made possible as different or altered connections are made and as new machines are brought online. Thinking of education machinically requires recognising that “every machine functions as a break in the flow in relation to the machine to which it is connected, but at the same time is also a flow itself, or the production of flow, in relation to the machine connected to it”(Deleuze & Guattari, 1983, p. 37). Through its potential to map desire, desire-production and the production of desire within those assemblages that have come to dominate our understanding of what is possible, Deleuze and Guattari’s method of schizoanalysis provides a provocative lens for grappling with the question of what one can do, and what lines of flight are possible.
Resumo:
IODP Expedition 340 successfully drilled a series of sites offshore Montserrat, Martinique and Dominica in the Lesser Antilles from March to April 2012. These are among the few drill sites gathered around volcanic islands, and the first scientific drilling of large and likely tsunamigenic volcanic island-arc landslide deposits. These cores provide evidence and tests of previous hypotheses for the composition and origin of those deposits. Sites U1394, U1399, and U1400 that penetrated landslide deposits recovered exclusively seafloor sediment, comprising mainly turbidites and hemipelagic deposits, and lacked debris avalanche deposits. This supports the concepts that i/ volcanic debris avalanches tend to stop at the slope break, and ii/ widespread and voluminous failures of preexisting low-gradient seafloor sediment can be triggered by initial emplacement of material from the volcano. Offshore Martinique (U1399 and 1400), the landslide deposits comprised blocks of parallel strata that were tilted or microfaulted, sometimes separated by intervals of homogenized sediment (intense shearing), while Site U1394 offshore Montserrat penetrated a flat-lying block of intact strata. The most likely mechanism for generating these large-scale seafloor sediment failures appears to be propagation of a decollement from proximal areas loaded and incised by a volcanic debris avalanche. These results have implications for the magnitude of tsunami generation. Under some conditions, volcanic island landslide deposits composed of mainly seafloor sediment will tend to form smaller magnitude tsunamis than equivalent volumes of subaerial block-rich mass flows rapidly entering water. Expedition 340 also successfully drilled sites to access the undisturbed record of eruption fallout layers intercalated with marine sediment which provide an outstanding high-resolution data set to analyze eruption and landslides cycles, improve understanding of magmatic evolution as well as offshore sedimentation processes.
Resumo:
Phylogeographic patterns and population structure of the pelagic Indian mackerel, Rastrelliger kanagurta were examined in 23 populations collected from the Indonesian-Malaysian Archipelago (IMA) and the West Indian Ocean (WIO). Despite the vast expanse of the IMA and neighbouring seas, no evidence for geographical structure was evident. An indication that R. kanagurta populations across this region are essentially panmictic. This study also revealed that historical isolation was insufficient for R. kanagurta to attain migration drift equilibrium. Two distinct subpopulations were detected between the WIO and the IMA (and adjacent populations); interpopulation genetic variation was high. A plausible explanation for the genetic differentiation observed between the IMA and WIO regions suggest historical isolation as a result of fluctuations in sea levels during the late Pleistocene. This occurrence resulted in the evolution of a phylogeographic break for this species to the north of the Andaman Sea.
Resumo:
Klaassen and Magnus (2003) provide a model of the probability of a given player winning a tennis match, with the prediction updated on a point-by-point basis. This paper provides a point-by-point comparison of that model with the probability of a given player winning the match, as implied by betting odds. The predictions implied by the betting odds match the model predictions closely, with an extremely high correlation being found between the model and the betting market. The results for both men’s and women’s matches also suggest that there is a high level of efficiency in the betting market, demonstrating that betting markets are a good predictor of the outcomes of tennis matches. The significance of service breaks and service being held is anticipated up to four points prior to the end of the game. However, the tendency of players to lose more points than would be expected after conceding a break of service is not captured instantaneously in betting odds. In contrast, there is no evidence of a biased reaction to a player winning a game on service.